The Washington Post reported Friday that the United Kingdom’s deep state has demanded that Apple create a back door for them to retrieve all the content any Apple user worldwide has uploaded to the cloud—what would be an unprecedented erosion of online privacy and civil liberties.

Citing anonymous sources, the Post reported that the British government’s undisclosed order was issued last month. It reportedly requires Apple to give officials blanket capability to view fully encrypted material.
Typically, Apple has assisted authorities on a case-by-case basis—such as helping the FBI access a terrorist’s phone, for example. The Post noted that the access sought by the UK “has no known precedent in major democracies.”
🚨WaPo published an EXTREMELY important story today about a secret UK order for Apple to provide it w/ total access to all user data on the cloud — an order that would implicate Americans and the entire world.
The Post rightly notes that the UK’s order “has no known precedent in… pic.twitter.com/pA3uvpnekc— Ken Silva (@JD_Cashless) February 7, 2025
According to the Post, the UK’s order was made pursuant to the sweeping U.K. Investigatory Powers Act of 2016, which authorizes law enforcement to compel assistance from companies to access user data.
“The law, known by critics as the Snoopers’ Charter, makes it a criminal offense to reveal that the government has even made such a demand,” the Post reported.
“Apple can appeal the U.K. capability notice to a secret technical panel, which would consider arguments about the expense of the requirement, and to a judge who would weigh whether the request was in proportion to the government’s needs. But the law does not permit Apple to delay complying during an appeal.”
An Apple spokesman reportedly declined to comment. The Post reported that Apple is likely to stop offering encrypted storage in the UK.
“Yet that concession would not fulfill the U.K. demand for backdoor access to the service in other countries, including the United States,” the newspaper added.
Western countries, including the U.S., have been pushing for total access to online user data for years.
In March 2021, for example, former FBI Director Chris Wray told the Senate Judiciary Committee that encryption was stifling his agents from investigating domestic extremism.
According to Wray and other law enforcers, tech companies should be able to build “backdoors” into their encryption that preserves privacy, while allowing for access when necessary. That, they say, strikes the proper balance between data security and national security.
However, numerous tech experts, civil libertarians, and others say that it’s impossible to build a backdoor that can’t be exploited by hackers. They also say that by banning encryption, the United States would be following in the footsteps of authoritarian countries such as China, which blocked the encrypted messaging app Signal.
“It is important to understand that any kind of back door (or front door) access for the ‘good guys’ can also be exploited by the ’bad guys,’” the pro-industry Information Technology & Innovation Foundation stated in a July 2020 report.
“For example, key escrow systems would introduce new attack vectors that could allow attackers to gain access to encrypted information, such as by compromising the system that maintains copies of the keys.”
Ken Silva is a staff writer at Headline USA. Follow him at x.com/jd_cashless.
SILICON VALLEY IS USING SOCIAL MEDIA SITES TO SPY ON CITIZENS
Did you know that your Apple IPAD is constantly sending hundreds of surveillance points about you, every second, to Apple and the government middlemen that scan Apple’s servers?
Corrupt political families conspire to give government funds, contracts, tax waivers, buildings, stock market profits and other insider perks to themselves and their friends. They also conspire to blockade, harm, sabotage and black-list those who compete with them and their friends. These corrupt politicians are never prosecuted for their crimes, and can laugh in the face of those who point out their crimes, because they control the prosecution system. Their Quid Pro Quo criminal corruption is the single largest cause of the taxpayer hatred of Congress.
Shoshana Zuboff’s, The Age of Surveillance Capitalism – Why Twitter, Google, Facebook, Instagram, YouTube, Netflix, Alphabet are the SAME Thing, The SAME SICKO tech elites and the same kinds of social privacy RAPE against citizens!
https://www.contagious.com/news-and-views/shoshana-zuboff-on-the-age-of-surveillance-capitalism
Match.com, OK Cupid and corporate dating sites exist to harvest your data for political campaigns
—- They spy on you to manipulate your politics, ideology and intentions and to report you to bill collectors, tax colletors, investigators and political parties. –
— When you hear” “BIG DATA”, “AI”, “DATING MINING” …RUN: They are all processes that rape the public and manipulate elections
—– 89% of Silicon Valley’s money comes from data mining you.
—- Google, Netflix, YouTube, Facebook, etc. exist to mass manipulate populations and run stock market scams for their sociopath owners. From INSIDE Google, our team saw Google manipulate the entire internet to hype up Larry Page’s “boyfriend’: Elon Musk and Tesla, which Google execs owned a portion of, while sabotaging Tesla’s competitors.
—- Google illicitly and illegally timed these manipulations with stock market pump-and-dump efforts to exploit insider trading. That is a felony violation of RICO, Antitrust and other laws. Every single thing that Google does is contrived to harm a competitor, a politician, an employee whistle-blower or some other business adversary.
—- Silicon Valley has, AND LEAKS, everybody’s abortion records
—– There are no “bugs”, “operator errors”, “server anomalies” or other media “accidents” at Google. Everything Google does is contrived, at a psychological warfare kind of level, to change a social perception.Google must show its software to FBI, SEC, FTC and our search engine optimisation experts to prove that they did not engage in these crimes. The fact is: We can prove they did the crimes and FBI experts can help us prove it! Google is known as the “Nazi’s of the Internet”. –
—- In a case unfolding in Britain over whether Google wrongly demoted price comparison rival Foundem from its search results in favour of paid-for adverts, Google must now decide which it values more: the algorithms that rank its search results, or its stance that manually fiddling with those results to promote its own paid-for products over rivals’ sites doesn’t break competition laws. –
— The integrity of Google’s ranking processes relies upon all webmasters or website owners having the same degree of access to information about Google’s ranking… This will no longer be the case if information of this kind is made available to some individuals offering commercial services to assist companies to improve their Search ranking. –
— Google is a criminal operation. It’s executives have been publicly exposed as participants in horrific sex scandals, money laundering, political bribery and racism. It is time for the bought and paid shill politicians to stop protecting them! – Google spies on competitors and steals their technology
– Google runs tens of millions of dollars of defamation attacks against competitors – Google hides all media and news coverage for competitors of Larry Page’s boyfriend: Elon Musk – Google lies to the public about what they really do with the public’s data
—- Google promotes illegal immigration in order to get cheap labor and control votes – Google runs VC funding back-lists against start-ups that are competitive – Google bribes thousands of politicians – Google is a criminal RICO-violating monopoly – Google rigs the stock market with Flash-boy, Pump/Dump and Microblast SEC violating computer tricks – Google pays bribes to politicians in Google and YouTube stock – Google manipulates who gets to see what web-sites, globally, for competitor black-lists – Google has a “no poaching” Silicon Valley jobs blacklist –
— Google bosses sexually abuse women and young boys – Google bosses run sex trafficking operations in the Epstein and NXVIUM cults – Google bosses control the NVCA financing cartel over start-ups – Google has placed the majority of the corporate staff in at least one White House – Google controls national elections for anti-competitive purposes – The company “Polyhop”, in the HOUSE OF CARDS tv show, does all the crimes that Google actually does in reality – Google’s law firms, like Wilson Sonsini, are corrupt conduits for payola and political conduit-relays —- Google bribes some politicians with revolving door jobs – Google is primarily responsible for destroying the Bay Area Housing opportunities
– Google runs DDoS attacks on competitors by massively crawling their sites
– Google boss Andy Rubin runs a sex slave farm according to his own family – Google boss Eric Schmidt was a philandering sex-penthouse owner according to vast news articles – Google executives hire so many hookers that one of them, Mr. Hayes, was killed by his hooker
—- Google executives sexually abuse so many women that the women staff of Google walked out one day – In the 2009 White House, you could not swing a cat without hitting a Google insider – Google has paid covert bribes, PAC funds, real estate and search rigging payola to every CA Senator – Google has paid bribes, through its lobby fronts, to halt FBI, SEC, FEC and FTC investigations of Google crimes – Google was funded by the CIA, via In-Q-Tel, a so called “501 c3 charity” which was caught with tons of cocaine
– Google gets millions of dollars of taxpayer cash for spying on Americans inside the USA – Google’s map service was a spy system paid for by taxpayers money that Google now profits off of —- Nancy Pelosi and Dianne Feinstein have promised to “protect” Google because their families profit off Google stocks – Payment receipts prove that Google and Gawker/Gizmodo exchanged cash and staff for Character Assassination attacks – Google VC’s and bosses have spent $30M+ rigging the U.S. Patent Office to protect Google and harm Google competitors –
— Google bribed it’s lawyer into position as head of the U.S. Patent office in order to have her protect Google – To rig insider stock trades, Google hides negative Tesla stories and pumps positive Tesla stories on “push days” – Google and Elon Musk Co-own, co-invest and co-market stocks covertly while running anti-trust schemes – Google rarely likes, or hires, black employees per federal and news media investigations – Google hired most of the Washington, DC K Street lobby firms and told them to “do what ever they could” – The film: “Miss Sloane” depicts only 2% of the illicit lobbying tactics Google employs daily
—- Demands for an FTC and FBI raid of Google, for criminal activity, securities law and election felonies have been filed – Google’s David Drummond had his Woodside, CA Quail Road house bugged revealing sex and financial misdeeds – Google, and it’s Cartel (Alphabet, Youtube, and hundreds of other shell-company facades) are a criminal organization engaged in felony-class crimes. Google’s bosses bribe politicians, regulators and law enforcement officials to hold off prosecution.
—- At Google: Kent Walker, Andy Rubin, Larry Page, Eric Schmidt, Sergy Brin, Jared Cohen, Yasmin Green, David Drummond and Ian Fette are so enmeshed in sex scandals, election manipulation, and White House bribes that it is hard to comprehend how they can get any legitimate work done. Google executives came from most of the fraternity houses involved in the college rape scandals. —- Google sells covert character assassination services to politicians and fellow oligarchs. Youtube/Google/Alphabet/Deep State are all the same entity. They conspire to hide news about their corruption and they control most of the internet.
—- There are hundreds of millions of people in America. The same 120 of them are all involved in operating the same crimes and corruption including: the Sony Pictures corruption; the Afghanistan rare earth mine scandals operated through The Energy Department political slush fund that involves the lithium battery cover-ups (headed by Elon Musk); the Big Tech Brotopia rape, sex trafficking, bribery, exclusionism, racism and misogyny issues they were taught at Stanford University; The Facebook – Meta – Google – Alphabet – Netflix, et al, coordinated news manipulation and domestic spying that they engage in; the hiring of Fusion GPS – Black Cube – Gizmodo/Gawker assassins; the destruction of the housing market by their mass real estate manipulations; patent theft and industrial espionage; and the bribery of almost every politician all the way up to the Oval Office. —- So, while the categories covered in this investigation may seem diverse.
They are connected through an enterprise of criminality and illicit, coordinated operations. We list, by name, the 120 most complicit individuals organizing these crimes, in the evidence documents already submitted to the FBI, FINCEN, DOJ, FTC, SEC, FEC, Congress, InterPol and other authorities. Digital financial tracking of those persons and all of their family members should be assumed to have been under way for some time. Wire-taps and device taps of those persons and all of their family members should be assumed to have been under way for some time.
—- Twitter, Splunk, Google, Facebook, Netflix, YouTube and the Silicon Valley internet Cartel serve you custom manipulated content by automatically creating a covert digital dossier on you reflecting the content consumption preferences they have spied on about you. They continually evolve their dossier on you in order to steer you towards their ideology and their Democrat political party. At these companies, “data mining”, “machine learning” and “AI” means computerized propaganda processing for certain political entities. They began hiring off-shore people (because they would work so cheap) but most of those people turned out to be Muslim. This created conflicts with the entire southern part of the United States (which is anti-Muslim) because those workers steered content to pro-Muslim positions.
—- Their spy dossier on you uses abstract content-specific features of the consumed content, such as categories, topic models, and entities, which they automatically extract using natural language processing by comparing every word you use to a giant computer library of what those words might mean about your psychology. So it’s like you are getting “mind-raped” without any penis use.
Their assessment of what your words might mean is based on what rich, white male, $200K/year, DNC-promoting programmers think they might mean. Their computers scale and expand their tools with algorithmic software created by those politically and socially biased frat white boys that wrote the code. It is all biased as hell. They never hire blacks or women in system creation roles so everything these companies do only supports rich white soyboy snowflake type gamer thinking. –
— Because their Silicon Valley VC’s told them to spy on billions of people, even for these web giants, it is impractical to store the entire dynamic history of a user’s interaction features. They, thus, out of greed, use algorithms that selectively decay information in order to generalize users and populations. To them, you are just a generalized data point, like cattle on a ranch, to be harvested and fed upon by Silicon Valley.
Facebook Is Abusing Your Sensitive Medical Information from Hospital Websites
Experts say some hospitals’ use of an ad tracking tool may violate a federal law protecting health information
A tracking tool installed on many hospitals’ websites has been collecting patients’ sensitive health information—including details about their medical conditions, prescriptions, and doctor’s appointments—and sending it to Facebook.
The Markup tested the websites of Newsweek’s top 100 hospitals in America. On 33 of them we found the tracker, called the Meta Pixel, sending Facebook a packet of data whenever a person clicked a button to schedule a doctor’s appointment. The data is connected to an IP address—an identifier that’s like a computer’s mailing address and can generally be linked to a specific individual or household—creating an intimate receipt of the appointment request for Facebook.
On the website of University Hospitals Cleveland Medical Center, for example, clicking the “Schedule Online” button on a doctor’s page prompted the Meta Pixel to send Facebook the text of the button, the doctor’s name, and the search term we used to find her: “pregnancy termination.”
Clicking the “Schedule Online Now” button for a doctor on the website of Froedtert Hospital, in Wisconsin, prompted the Meta Pixel to send Facebook the text of the button, the doctor’s name, and the condition we selected from a dropdown menu: “Alzheimer’s.”
The Markup also found the Meta Pixel installed inside the password-protected patient portals of seven health systems. On five of those systems’ pages, we documented the pixel sending Facebook data about real patients who volunteered to participate in the Pixel Hunt project, a collaboration between The Markup and Mozilla Rally. The project is a crowd-sourced undertaking in which anyone can install Mozilla’s Rally browser add-on in order to send The Markup data on the Meta Pixel as it appears on sites that they visit. The data sent to hospitals included the names of patients’ medications, descriptions of their allergic reactions, and details about their upcoming doctor’s appointments.
Former regulators, health data security experts, and privacy advocates who reviewed The Markup’s findings said the hospitals in question may have violated the federal Health Insurance Portability and Accountability Act (HIPAA). The law prohibits covered entities like hospitals from sharing personally identifiable health information with third parties like Facebook, except when an individual has expressly consented in advance or under certain contracts.
Neither the hospitals nor Meta said they had such contracts in place, and The Markup found no evidence that the hospitals or Meta were otherwise obtaining patients’ express consent.
“I am deeply troubled by what [the hospitals] are doing with the capture of their data and the sharing of it,” said David Holtzman, a health privacy consultant who previously served as a senior privacy adviser in the U.S. Department of Health and Human Services’ Office for Civil Rights, which enforces HIPAA. “I cannot say [sharing this data] is for certain a HIPAA violation. It is quite likely a HIPAA violation.”
University Hospitals Cleveland Medical Center spokesperson George Stamatis did not respond to The Markup’s questions but said in a brief statement that the hospital “comport[s] with all applicable federal and state laws and regulatory requirements.”
After reviewing The Markup’s findings, Froedtert Hospital removed the Meta Pixel from its website “out of an abundance of caution,” Steve Schooff, a spokesperson for the hospital, wrote in a statement.
This is an extreme example of exactly how far the tentacles of Big Tech reach into what we think of as protected data space.
Nicholas Price, University of Michigan
As of June 15, six other hospitals had also removed pixels from their appointment booking pages and at least five of the seven health systems that had Meta Pixels installed in their patient portals had removed those pixels.
The 33 hospitals The Markup found sending patient appointment details to Facebook collectively reported more than 26 million patient admissions and outpatient visits in 2020, according to the most recent data available from the American Hospital Association. Our investigation was limited to just over 100 hospitals; the data sharing likely affects many more patients and institutions than we identified.
Facebook itself is not subject to HIPAA, but the experts interviewed for this story expressed concerns about how the advertising giant might use the personal health data it’s collecting for its own profit.
“This is an extreme example of exactly how far the tentacles of Big Tech reach into what we think of as a protected data space,” said Nicholson Price, a University of Michigan law professor who studies big data and health care. “I think this is creepy, problematic, and potentially illegal” from the hospitals’ point of view.
The Markup was unable to determine whether Facebook used the data to target advertisements, train its recommendation algorithms, or profit in other ways.
Facebook’s parent company, Meta, did not respond to questions. Instead, spokesperson Dale Hogan sent a brief email paraphrasing the company’s sensitive health data policy.
“If Meta’s signals filtering systems detect that a business is sending potentially sensitive health data from their app or website through their use of Meta Business Tools, which in some cases can happen in error, that potentially sensitive data will be removed before it can be stored in our ads systems,” Hogan wrote.

Pixel Hunt
Facebook and Anti-Abortion Clinics Are Collecting Highly Sensitive Info on Would-Be Patients
The social media giant gathers data from crisis pregnancy centers through a tracking tool that works whether or not a person is logged in to their Facebook account
Meta did not respond to follow-up questions, but Hogan appears to be referencing a sensitive health information filtering system that the company launched in July 2020 in response to a Wall Street Journal article and New York Department of Financial Services investigation. Meta told the investigators that the filtering system was “not yet operating with complete accuracy,” according to the department’s February 2021 final report.
The Markup was unable to confirm whether any of the data referenced in this story was in fact removed before being stored by Meta. However, a recent joint investigation with Reveal found that Meta’s sensitive health information filtering system didn’t block information about appointments a reporter requested with crisis pregnancy centers.
Internally, Facebook employees have been blunt about how well—or not so well—the company generally protects sensitive data.
“We do not have an adequate level of control and explainability over how our systems use data, and thus we can’t confidently make controlled policy changes or external commitments such as ‘we will not use X data for Y purpose.’ ” Facebook engineers on the ad and business product team wrote in a 2021 privacy overview that was leaked to Vice.
“Almost Any Patient Would Be Shocked”
The Meta Pixel is a snippet of code that tracks users as they navigate through a website, logging which pages they visit, which buttons they click, and certain information they enter into forms. It’s one of the most prolific tracking tools on the internet—present on more than 30 percent of the most popular sites on the web, according to The Markup’s analysis.
In exchange for installing its pixel, Meta provides website owners analytics about the ads they’ve placed on Facebook and Instagram and tools to target people who’ve visited their website.

Show Your WorkPixel Hunt
How We Built a Meta Pixel Inspector
The first large-scale, crowdsourced study that monitors how Meta tracks people across the internet
The Meta Pixel sends information to Facebook via scripts running in a person’s internet browser, so each data packet comes labeled with an IP address that can be used in combination with other data to identify an individual or household.
HIPAA lists IP addresses as one of the 18 identifiers that, when linked to information about a person’s health conditions, care, or payment, can qualify the data as protected health information. Unlike anonymized or aggregate health data, hospitals can’t share protected health information with third parties except under the strict terms of business associate agreements that restrict how the data can be used.
In addition, if a patient is logged in to Facebook when they visit a hospital’s website where a Meta Pixel is installed, some browsers will attach third-party cookies—another tracking mechanism—that allow Meta to link pixel data to specific Facebook accounts.
And in several cases we found—using both dummy accounts created by our reporters and data from Mozilla Rally volunteers—that the Meta Pixel made it even easier to identify patients.
When The Markup clicked the “Finish Booking” button on a Scripps Memorial Hospital doctor’s page, the pixel sent Facebook not just the name of the doctor and her field of medicine but also the first name, last name, email address, phone number, zip code, and city of residence we entered into the booking form.
The Meta Pixel “hashed” those personal details—obscuring them through a form of cryptography—before sending them to Facebook. But that hashing doesn’t prevent Facebook from using the data. In fact, Meta explicitly uses the hashed information to link pixel data to Facebook profiles.
Using a free online tool, The Markup was also able to reverse most of our hashed test information that the pixel on Scripps Memorial Hospital’s website sent to Facebook.
Scripps Memorial didn’t respond to The Markup’s questions but it did remove the Meta Pixel from the final webpages in the appointment booking process after we shared our findings with the hospital.
On other hospitals’ websites, we documented the Meta Pixel collecting similarly intimate information about real patients.
When one real patient who participated in the Pixel Hunt study logged in to the MyChart portal for Piedmont Healthcare, a Georgia health system, the Meta Pixel installed in the portal told Facebook the patient’s name, the name of their doctor, and the time of their upcoming appointment, according to data collected by the participant’s Mozilla Rally browser extension.
The Meta Pixel collects sensitive health information and shares it with Facebook
The Meta Pixel installed on Piedmont Healthcare’s MyChart portal sent Facebook details about a real patient’s upcoming doctor’s appointment, including date, time, the patient’s name, and the name of their doctor
- 1Patient name
- 2Date and time of appointment
- 3Name of provider
{“classList”:”_Link+_actionable+_link+_readOnlyText+_InternalLink+main”,”destination”:”https://mychart.piedmont.org/PRD/app/communication-center/conversation?id=ID REDACTED BY THE MARKUP”,”id”:””,”imageUrl”:”/PRD/en-US/images/ProviderSilhouette.png”,”innerText”:”MyChart+Messaging+User\nREDACTED BY THE MARKUP\nAppointment+scheduled+from+MyChart\ nThere+is+a+message+in+this+conversation+that+has+not+yet+been+viewed.\n1Appointment+For:+NAME REDACTED BY THE MARKUP+(ID REDACTED BY THE MARKUP)+Visit+Type:+NEW+PATIENT+(ID REDACTED BY THE MARKUP)+ +2MM/DD/YYYY+0:00+XX+00+mins.+3NAME REDACTED BY THE MARKUP,+MD“,”numChildButtons”:0,”tag”:”a”,”name”:””}
When another Pixel Hunt participant used the MyChart portal for Novant Health, a North Carolina–based health system, the pixel told Facebook the type of allergic reaction the patient had to a specific medication.
The Markup created our own MyChart account through Novant Health to further investigate and found the Meta Pixel collecting a variety of other sensitive information.
Clicking on one button prompted the pixel to tell Facebook the name and dosage of a medication in our health record, as well as any notes we had entered about the prescription. The pixel also told Facebook which button we clicked in response to a question about sexual orientation.
“Our Meta pixel placement is guided by a third party vendor and it has been removed while we continue to look into this matter,” Novant spokesperson Megan Rivers wrote in an email.
Epic Systems, the software company behind MyChart, has “specifically recommended heightened caution around the use of custom analytics scripts,” Stirling Martin, a senior vice president for the company, wrote in an email.
Facebook is able to infer intimate details about people’s health conditions using other means—for example, the fact that a person “liked” a Facebook group associated with a particular disease—but the data collected by pixels on hospitals’ websites is more direct. And in sharing it with Facebook, experts said, health care providers risk damaging patients’ trust in an increasingly digitized health system.
“Almost any patient would be shocked to find out that Facebook is being provided an easy way to associate their prescriptions with their name,” said Glenn Cohen, faculty director of Harvard Law School’s Petrie-Flom Center for Health Law Policy, Biotechnology, and Bioethics. “Even if perhaps there’s something in the legal architecture that permits this to be lawful, it’s totally outside the expectations of what patients think the health privacy laws are doing for them.”
Legal Implications
Facebook’s data collection on hospital websites has been the subject of class action lawsuits in several states, with mixed results.
Those cases involve types of data that health law experts said are sensitive but less regulated than the health information The Markup documented the Meta Pixel collecting.
In 2016, a group of plaintiffs sued Facebook and a handful of health systems and organizations, alleging that the organizations had breached their own privacy policies and several state and federal laws—including wiretapping and intrusion on seclusion statutes—by collecting data via tracking technology on the health care providers’ websites.
The U.S. District Court for the Northern District of California dismissed that case in 2017 for a variety of reasons, including that the plaintiffs failed to prove that Facebook had collected “protected health information,” as defined by HIPAA. Rather, the court found, Facebook had tracked plaintiffs on public-facing pages of the websites—such as the homepage or informational pages about diseases—where there was no evidence that the plaintiffs had established a patient relationship with the provider.
In 2019, plaintiffs brought a similar class action lawsuit in Suffolk County Superior Court against Massachusetts-based Partners Healthcare System, which has since changed its name to Mass General Brigham, alleging that the system had violated patients’ privacy and its own policies by installing the Meta Pixel and other tracking tools on its websites.
The parties settled the case in January, with Mass General Brigham denying the allegations and admitting no wrongdoing or liability but paying $18.4 million to the plaintiffs and their attorneys. After the settlement, Mass General Brigham appears to have removed Meta Pixel and other tracking tools from many of its hospitals’ websites—but not all of them.
When The Markup tested the website of Brigham and Women’s Faulkner Hospital, clicking the “Request Appointment” button on a doctor’s page caused the Meta Pixel to send Facebook the text of the button, the doctor’s name, and the doctor’s field of medicine. Mass General did not respond to The Markup’s request for comment.
As with all such data we found the Meta Pixel collecting, it was sent to Facebook along with our computer’s public IP address.
“When an individual has sought out a provider and indicated that they want to make an appointment, at that point, any individually identifiable health information that they’ve provided in this session, in the past, or certainly in the future, is protected under HIPAA and could not be shared with a third party like Facebook,” Holtzman said.
The U.S. Department of Human Services’ Office for Civil Rights “cannot comment on open or potential investigations,” spokesperson Rachel Seeger wrote in an emailed statement.
“Generally, HIPAA covered entities and business associates should not be sharing identifiable information with social media companies unless they have HIPAA authorization [from the individual] and consent under state law,” said Iliana Peters, a privacy lawyer with the firm Polsinelli who previously headed HIPAA enforcement for the Office for Civil Rights.
Patients have the right to file HIPAA complaints with their medical providers, who are required to investigate the complaints, Peters said, adding, “I would hope that institutions would respond quickly to those types of complaints so that they aren’t escalated to a state or federal regulator.”
“Plausible Deniability“
Most of the hospitals The Markup contacted for this story did not respond to our questions or explain why they chose to install Meta Pixel on their websites. But some did defend their use of the tracker.
“The use of this type of code was vetted,” wrote Chris King, a spokesperson for Northwestern Memorial Hospital, in Chicago. King did not respond to follow-up questions about the vetting process.
King said that no protected health information is hosted on or accessible through Northwestern Memorial’s website and that “Facebook automatically recognizes anything that might be close to personal information and does not store this data.”
In fact, Meta explicitly states in its business tools terms of service that the pixel and other trackers do collect personally identifiable information for a variety of purposes.
Houston Methodist Hospital, in Texas, was the only institution to provide detailed responses to The Markup’s questions. The hospital began using the pixel in 2017, spokesperson Stefanie Asin wrote, and is “confident” in Facebook’s safeguards and that the data being shared isn’t protected health information.
When The Markup tested Houston Methodist’s website, clicking the “Schedule Appointment” button on a doctor’s page prompted the Meta Pixel to send Facebook the text of the button, the name of the doctor, and the search term we used to find the doctor: “Home abortion.”
Houston Methodist doesn’t categorize that data as protected health information, Asin wrote, because a person who clicks the “Schedule Appointment” button may not follow through and confirm the appointment, or, they may be booking the appointment for a family member rather than for themself.
Since our further examination of the topic is ongoing, we elected to remove the pixel for now to be sure we are doing everything we can to protect our patients’ privacy while we are evaluating.
Stefanie Asin, Houston Methodist Hospital spokesperson
“The click doesn’t mean they scheduled,” she wrote. “It’s also worth noting that people often are exploring for a spouse, friend, elderly parent.”
Asin added that Houston Methodist believes Facebook “uses tools to detect and reject any health information, providing a barrier that prevents passage of [protected health information].”
Despite defending its use of the Meta Pixel, Houston Methodist Hospital removed the pixel from its website several days after responding to The Markup’s questions.
“Since our further examination of the topic is ongoing, we elected to remove the pixel for now to be sure we are doing everything we can to protect our patients’ privacy while we are evaluating,” Asin wrote in a follow-up email.
Facebook did not launch its sensitive health data filtering system until July 2020, three years after Houston Methodist began using the pixel, according to the New York Department of Financial Services’ investigation. And as recently as February of last year, the department reported that the system’s accuracy was poor.
That type of Band-Aid fix is a prime example, privacy advocates say, of the online advertising industry’s inability to police itself.
“The evil genius of Facebook’s system is they create this little piece of code that does the snooping for them and then they just put it out into the universe and Facebook can try to claim plausible deniability,” said Alan Butler, executive director of the Electronic Privacy Information Center. “The fact that this is out there in the wild on the websites of hospitals is evidence of how broken the rules are.”
Experts Sound Alarm On ‘Stalkerware,’ Which Can Easily Be Downloaded On Your Phone Without You Knowing
Filed Under:Apps, Cyberstalking, Domestic Violence, Domestic Violence Awareness Month, Jessica Layton, Local TV, smartphone apps, Stalker
Your Phone Is Killing You And Destroying Your Life
By Donna Lawson
Did you know that the electronics in your phone, AND, 99% of the ‘Apps’ on your phone are tracking you, spying on you, tricking you, and reporting to others when you:
– Get an abortion
– Have sex
– Get pregnant
– Don’t go to work
– Enter, or leave, any building
– Get into, or out of, your car
– Have a sex worker take Uber, Lyft or any taxi or ride service to where you are
– Receive money
– Buy anything
– Are depressed
– Breath heavy
– Are located at any location on Earth
– Move from any location on Earth to another location
– Take anything out of your wallet with a chip in it
– Vote
– Express a political opinion
– Use a dating site (Axciom and Equifax make psych profiles on you from your date data)
– Use any ‘gay’ code words
– Use any ‘political’ code words
– Speak, or listen, to anyone within 20 feet
– And thousands of other invasions of privacy…
It does these things even if you pushed the button to ‘turn it off’. Most phones don’t actually turn off when you think they are off because ‘spies-gotta-spy’.
COVID is doing a great job of killing off all of the idiot people who grab the door-knob, bare-handed, at the post office, the Starbucks and the grocery store. COVID waits on public surfaces to kill the sheep of society.
Silicon Valley is doing a great job of killing off all the lives of the rest of the sheep who are too dumb to take the battery out of their phone. The people that walk around with a phone, or tablet, always powered on are committing digital suicide. If you buy a phone that you can’t take the battery out of, you are just an idiot.
You may not want to face the truth but I can show you thousands of court records, Congressional investigations and university studies proving that every single assertion in this report is true.
Everybody in Congress knows this is all true but they do nothing because Silicon Valley is bribing almost every single one of them to do nothing. Silicon Valley’s largest source of income is your privacy!
NEW YORK (CBSNewYork) — As we recognize October as Domestic Violence Awareness Month, we want to shed light on a type of abuse that many don’t even realize is such a problem.
It’s a tool readily available to any abuser and very difficult for victims to detect.
READ MORE: Ground-Breaking Ceremony Held At Site Of New $650 Million ‘Hub’ In New BrunswickCBS2’s Jessica Layton has more on the dangers of cyberstalking and how you can protect yourself.
It’s so simple, it’s scary — software that allows a stalker to secretly spy through an unsuspecting person’s cellphone without their consent.
Experts say “Stalkerware” use is rapidly on the rise, increasing 60% from September 2020 to May 2021.
“Unfortunately, it has been on the increase from being a few hundred apps available in the marketplace,” said Tony Anscombe of ESET Internet Security.
The concept may have started with decent intentions — parents installing apps to keep tabs on their kids. But as Anscombe explained, it has turned into an industry where a stalker can track a victim’s every move, without them ever realizing it.
“These apps can key log, so they can see every key stroke on your device. They can extract all the information from your contacts, your messages, your email,” Anscombe said.
The dangerous app disguises itself as something that is an important function of the operating device on the phone, and it only takes minutes to install. So in the time it takes a person to get up and use the bathroom, take a shower or make a snack, their partner may already have them under surveillance.
Experts showed Layton how easy it is to intercept data once the app is on a phone. Groups like Coalition Against Stalkerware also share warning videos, explaining this is seen most often in cases of domestic abuse.
“When someone is controlling all these aspects of your personal information you have to worry about what they have access to. I know that was a concern for me,” domestic violence survivor Heather Glogolich said.
READ MORE: Some New Yorkers Say Hacking Of MTA Shows How Vulnerable The City And Riding Public AreGlogolich, a police lieutenant in New Jersey, understands in many ways how hijacking a personal devices is just one way an abuser exercises control over a victim.
“I couldn’t leave my phone down without my ex-husband looking through it,” Glogolich said.
“So technology plays a big role in trapping victims and keeping them in that abusive relationship,” survivor Neisha Himes added.
Himes didn’t know the dangers of digital abuse when she was trying to leave a toxic relationship, but she has since dedicated her life to helping other victims. She said she now sees it almost every day.
“If they have a phone that maybe the offender purchased for them, we have to tell them, ‘OK, let’s get you a new phone,’” Himes said.
Glogolich and Himes are supporters of a program developed by Sheri Kurdakul, the CEO of Victim’s Voice. It’s a web-based app that gives power to the victim, allowing him or her to document cases of abuse in real time on their device to present to the courts. They’re taken through a series of guided questions vetted by prosecutors and the answers are encrypted and stored in a secure server.
“It’s a progressive web app, which means there’s nothing to download. You won’t find us in any app store. That also means there’s no dangerous icons on sitting on your phone and there’s no trigger such as a receipt that you downloaded the app,” Kurdakul said. “A lot of victims’ emails and such are being tracked and monitored all the time.”
That kind of awareness and privacy is paramount. That’s why even just knowing there could be Stalkerware on your phone is the first step to protecting yourself.
Low battery life, high data usage and slow performance on your phone may also be red flags, yet sometimes intuition is the best indicator that your personal device isn’t so private.
So if you suspect you’re being stalked through technology, get expert help. Take the phone to a tech company so they can run programs to check it for you. And also, get police involved.
Experts say never try to delete the app yourself. The abuser will get notified and that could put a person in an even more dangerous situation.
CBS2’s Jessica Layton contributed to this report.
Is T-Mobile Liable For “Complicit Homicide” By Allowing Teens To Use Facebook, Google and Instagram, Who Are Facing Lawsuits for Teen Mental Health Crisis, In A MASSIVE Profits-Over-Safety Mobile Services Abuse Charge |
Neumann Law Group is now investigating claims against Meta Platforms, Inc., the parent company of Facebook and Instagram for their intentional manipulation of the mental health of young and at-risk users of their products. In October 2021, a Facebook whistleblower testified to the U.S. Senate how Facebook, Instagram, and Meta used tactics to manipulate young people into using their products for extended periods of time and intentionally created a toxic environment leading to significant psychological harm to America’s youth. Learn More at Neumann Law Group SEE THIS LINK, THIS HAPPENS EVERY FEW HOURS THANKS TO MARK AND SHERYL: Every few hours another teen is MURDERED by Facebook/Instagram executives. Nobody does anything about it because California politicians OWN the stock in Facebook/Instagram and also get their political campaign cash from Facebook/Instagram/Google !!! Should Mark Zuckerberg be charged with Homicide? He knew, for over a decade, that he was killing these kids, but buying a part of Hawaii is expensive, and he needed the cash!
THE UNITED STATES CONGRESS CAN MAKE INSTAGRAM AND FACEBOOK DISAPPEAR OFF THE INTERNET, IN ANY 60 SECOND PERIOD, SIMPLY BY ORDERING DOJ TO DELETE THEIR DNS RECORDS. BOOM! GONE! DEMAND THAT YOUR ELECTED OFFICIALS ORDER THE DNS RECORDS FOR INSTAGRAM AND FACEBOOK DELETED, AND NOT TURNED BACK ON, UNTIL FACEBOOK AND INSTAGRAM PROVE TO CONGRESS THAT NO TEENS WILL BE AFFECTED BY THEIR SITES AGAIN! DO YOU REALLY WANT YOUR KIDS ANYWHERE NEAR FACEBOOK AND THEIR VR SEX PERVERTS?: |
- Were you a minor when you signed up for Facebook and/or Instagram;
- Were you using Facebook and/or Instagram for more than three (3) hours per day at that time; and
- Have you received documented mental health treatment (with no prior history of mental health issues)?
Facebook grilled in Senate hearing over teen mental health – Sheryl Sandberg knew…
techcrunch.com/…/30/facebook-grilled-in-senate-hearing-over-teen-mental-health
Facebook grilled in Senate hearing over teen mental health. Last night, Facebook published two annotated slide decks in an attempt to contextualize the documents that The Wall Street Journal …
Facebook’s whistleblower report confirms what researchers …
theverge.com/2021/10/6/22712927/facebook-instagram-teen-mental-health-research
Internal research at Facebook showing that Instagram might be harmful to the mental health of teen girls is in line with other research in the field. That complicates efforts to minimize the findings.
This is Facebook’s internal research on the mental health effects of …
theverge.com/2021/9/29/22701445/facebook-instagram-mental-health-research…
The release of the research arrives the evening before a Congressional hearing on the effect of Facebook and Instagram on kids’ mental health. That hearing is scheduled for Thursday at 10:30AM ET .
bloomberg.com/opinion/articles/2021-09-22/instagram-youth-adds-risk-to…
So perhaps it isn’t surprising that an internal research effort at the company, revealed last week, found that teens associate the service with a host of men
Facebook Very Aware That Instagram Harms Teen Mental Health But Profits On Its Crimes
thecut.com/2021/09/facebook-very-aware-that-instagram-harms-teen-mental…
For several months now, Facebook execs have been kicking around an eerie product idea few people seem to want: Instagram for Kids.
Facebook knows Instagram is bad for teenagers’ mental healthbut wants the profits anyway
businessinsider.com/facebook-internal-report-shows-instagram-bad-for-teens…
Facebook’s internal research shows that teen users’ mental health is negatively impacted by using the company’s photo- and video-sharing app, Instagram.
Want to help end the tech oligarch’s rape of society? Never, EVER: use, read, quote, link to, paste from, or refer to; anything on corrupt and contrived: Twitter – Google – Alphabet – Facebook – Meta – Instagram – Netflix or YouTube! Don’t expand their reach! Don’t be their digital bitch! Stop being an addict to Silicon Valley’s social media scam! Keep the battery out of your phone so Big Tech can’t continue to spy on you. Did you know you CAN’T turn an iPhone off. Apple iPhone’s pretend to be “off” but still monitor you with reserve power. The government should shut these companies down but they don’t because these companies pay the largest bribes on Earth to politicians! Demand that Congress shut down these big tech abusers that cause child suicides, bullying, sex trafficking, money laundering, tax evasion, political bribery, election manipulation and other social crimes.
Have you, or your teen, suffered from?
- Depression
- Anxiety
- Eating disorders
- Body Dysmorphia
- Self-harm
- ADD/ADHD
- ODD
- Selling their bodies (Instagram is now the #1 source IN THE WORLD, for teenage prostitutes. Rappers spend 1/2 the day talking young girls on Instagram into ‘free plane tickets’)
- Suicidal ideation
- Suicidal attempts
- Any and all other mental health illnesses
Facebook acknowledges Instagram’s damage to teen mental health, but …
mashable.com/article/facebook-instagram-teen-body-image
The Wall Street Journal viewed several internal Facebook documents discussing the issue of teen mental health, the company having performed various focus groups and surveys between 2019 and 2021 …
Harmed by Social Media: Facebook, Instagram Linked to Teen Mental …
omalleylangan.com/posts/facebook-linked-to-teen-mental-health-issues
Hold social media platforms accountable for their actions. Contact our law firm to explore your options. Social media platforms like Facebook and Instagram have been linked to a recent increase in depression and other mental health issues among teenagers, according to researchers and journalists studying this issue, including an in-depth investigation conducted by The Wall Street Journal and …
Facebook Knew Instagram Was Harmful to Mental Health of Teen Girls … Profits over Child Safety
verywellmind.com/facebook-knew-instagram-was-harmful-to-mental-health-of…
One internal Facebook presentation stated that among teens who reported suicidal thoughts, 13% of British users and 6% of American users believed Instagram was to blame.Facebook also found that 14% of boys in the U.S. said Instagram made them feel worse about themselves, reported the Journal.Researchers highlighted Instagram’s Explore page, which provides users with curated posts from a wide …
Facebook publishes slides on how Instagram affects teen mental health
yahoo.com/entertainment/facebook-research-instagram-teen-mental-health…
Facebook has published two slide decks detailing its research into how Instagram affects teens’ mental health. The slides were heavily cited by The Wall Street Journal earlier this month in a …
Do you believe that you or a loved one may have experienced psychological harm due to the negligence of Google, Instagram, Facebook? Call Neumann Law Group today to discuss your claim and share this notice with those you care about below:
Share This Notice On Facebook
Share This Notice on Twitter
Share ThisNotice on Linkedin
END FACEBOOK’S, GOOGLE’S, YOUTUBE’S, INSTAGRAM’S AND NETFLIX DARK MONEY PAYOLA TO OUR POLITICIANS
YOU CAN’T PROTECT YOUR KIDS IF FACEBOOK, GOOGLE, INSTAGRAM, YOUTUBE AND NETFLIX GET TO BRIBE YOUR SENATORS TO AVOID REGULATION
GOOGLE IS RUN BY CHILD SEX PERVERTS
Google whistleblower claims tech giant’s Developer Studio division has been infiltrated by ‘pedophilic religious doomsday cult’ Fellowship of Friends that was featured in a Spotify podcast series called ‘Revelations’ last year
- Kevin Lloyd, 34, was a video producer for Google Developer Studio from 2017 until he was fired in February 2021
- Lloyd in August 2021 filed a lawsuit at California Superior Court alleging that he lost his job because he questioned a ‘cult’ that many of his colleagues joined
- Earlier this month Lloyd wrote a Medium post about his time at Google, and his concerns about Fellowship of Friends
- Google insist that they are unaware of a person’s religious beliefs during hiring; Lloyd says they know about the influence of the cult, but turn a blind eye
An apocalyptic ‘cult’ led by an eccentric misogynist accused of sexual abuse of young men has taken over a division of Google, a whistleblower has claimed.
Kevin Lloyd, 34, claims that he was fired from his job as a video developer at Google last year because he began questioning the influence of the cult.
In August, Lloyd filed a discrimination case in California Superior Court, alleging he was fired for digging into Fellowship of Friends – a group based in the small Californian town of Oregon House, and whose members made up a large percentage of employees in his division.
‘Plaintiff’s preliminary research into Oregon House and the Fellowship of Friends described the Fellowship as a destructive cult, with a pedophilic leader who makes false prophecies about the end of the world,’ the lawsuit claims.
‘Plaintiff became alarmed that Google was involved with and/or financially supporting such an organization.’
Earlier this month, Lloyd wrote a lengthy description of his case on Medium, and spoke to The New York Times – who corroborated many of the lawsuit’s claims through interviews with eight current and former employees of the Google business unit.
Kevin Lloyd, 34, claims he lost his job at Google because he raised concerns about how many people within the Google Developer Studio were affiliated with Fellowship of Friends
Google’s campus in Mountain View is 180 miles from the small town of Oregon House, population 1,250 – yet half of the people Lloyd met were from Oregon House, he said
Lloyd said he began work at Google in 2017, as part of Google Developer Studio (GDS) – the tech giant’s internal production company, making adverts and video content.
He said it slowly dawned on him that many of the people he met at GDS were from the same small Californian town, 180 miles north of Google’s Silicon Valley home, in Mountain View.
RELATED ARTICLES
-
Polygamous cult leader Warren Jeffs, 66, is pictured in new…
EXCLUSIVE: ‘It’s a cult that brainwashes kids into believing…
Share this article
Share
The town of Oregon House is home to 1,250 people, and yet Lloyd said he realized that half of the 25 people he met at GDS were from the same town.
Lloyd said he noticed that many of the outside vendors, such as caterers and entertainers at corporate events, were also from Oregon House.
In 2018, Lloyd said, he was speaking to a freelancer who was working with them that day, and was from a town near Oregon House.
Lloyd recalls the freelancer telling him: ‘Oregon House isn’t a town. It’s a cult.’
He began investigating the freelancer’s claim, and said he was shocked by what he found.
‘There are online support groups for former Fellowship of Friends members to help them process the trauma endured during their membership, as well as problems that arise after leaving,’ Lloyd’s lawsuit states.
Fellowship of Friends, which is based in Oregon House, was founded in 1970 by Robert Earl Burton, a former school teacher in the San Francisco Bay area.
‘From its inception the vision of the Fellowship was, and remains, to establish a practical spiritual organization and to make it available to anyone interested in pursuing the spiritual work of awakening,’ they state on their website.
Robert Earl Burton, now believed to be around 83, founded Fellowship of Friends in 1970. He has been accused in multiple lawsuits of sexual abuse
Burton is seen with a European artwork purchased with the organization’s cash. Members must give 10 percent of their earnings to the group
Burton, believed to be now aged in his early 80s, sought to create a center celebrating the fine arts – with opera, ballet, works of art and literature the focus.
He based his organization in Oregon House, and created a winery where his devotees worked, when not studying the arts.
Google even purchased wine, the lawsuit claims, from the Grant Marie Winery, an allegedly cult-affiliated vineyard run by a Fellowship member in Oregon House.
But critics claimed that he had sexually abused new members of his group – in particular young boys.
In 1984 a former member filed a $2.75 million lawsuit claiming that young men who joined the organization ‘had been forcefully and unlawfully sexually seduced by Burton,’ according to documents obtained by The New York Times.
In 1996, another former member accused Burton in a law suit of sexual misconduct with him while he was minor. Both suits were settled out of court.
Some accusers, Lloyd alleged, had been flown to the country under false pretenses and then abused.
Members of Fellowship of Friends are seen with Burton (left, in pale blue suit) holding a meeting
What is Fellowship of Friends?
Founded on January 1, 1970 by San Francisco school teacher Robert Earl Burton, Fellowship of Friends is a non-profit religious organization, headquartered in Oregon House, California.
Burton based his faith system on a philosophy called the Fourth Way, founded by an Armenian philosopher and mystic, George Gurdjieff, who lived from 1866 to 1949.
Burton adopted Gurdjieff’s believe that people are in a hypnotic ‘waking sleep’, and need to work on themselves through studying art, music and literature.
He named his 1,200-acre headquarters Apollo, and his 1,800 followers gave 10 percent of their earnings to the organization – which spent the money on art, fine wine and culture.
Critics have filed lawsuits claiming sexual abuse.
Other critics said that the group was strongly anti-women, and celebrated white European men above all.
In September, investigative journalist Jennings Brown published a six-part podcast produced for Spotify, entitled Revelations.
Brown had spent three years from 2018 digging into the group, and documented allegations of sexual abuse in what he termed a ‘doomsday cult’.
Lloyd said he was aghast that GDS was so strongly linked to the Fellowship, with GDS’s director, Peter Lubbers, described as a longtime member of the group, who joined shortly after he moved to the U.S. from the Netherlands.
Lubbers introduced a video producer named Gabe Pannell to the Fellowship: Pannell was pictured with Burton in 2015, and described as a ‘new student’, The New York Times report.
Lloyd’s lawsuit states: ‘Mr Lubbers gained status and praise relative to the increase of money flowing to the Fellowship through his efforts at Google that put (and kept) other Fellowship members — directly or indirectly — on Google’s payroll.’
Lubbers insisted faith had nothing to do with his hiring.
‘My personal religious beliefs are a deeply held private matter,’ Lubbers told The New York Times.
‘In all my years in tech, they have never played a role in hiring. I have always performed my role by bringing in the right talent for the situation — bringing in the right vendors for the jobs.’
Pannell told the paper that those hired were brought in from ‘a circle of trusted friends and families with extremely qualified backgrounds’.
Lloyd, in his Medium post – which does not name Lubbers or Pannell – said that anxiety about the Fellowship, and its reputation, sparked a panic attack, for which he was admitted to ER.
He said in his court documents that he worried events he produced ‘could somehow be used to funnel money back into the Fellowship of Friends.’
Burton is seen in a 1981 photo at Oregon House. In 1984, a former member filed a $2.75 million lawsuit claiming that young men who joined the organization ‘had been forcefully and unlawfully sexually seduced by Burton,’ according to documents obtained by The New York Times. The suit was settled out of court
Fired in February 2021, he has retained a lawyer who previously represented a woman at Lubbers’ previous company, Kelly Services, and sued in 2008 in a similar case.
Lynn Noyes claimed that Kelly Services had failed to promote her because she was not a member of the Fellowship.
A California court awarded her $6.5 million in damages.
‘Anyone outside of the Fellowship is seen as somehow inferior and at times adversarial,’ Lloyd’s lawsuit says.
‘Those that express serious concerns, criticism or question the group may be eventually perceived as enemies.’
Google told The New York Times that they were barred by law from inquiring about someone’s religious practices during the hiring process.
‘We have longstanding employee and supplier policies in place to prevent discrimination and conflicts of interest, and we take those seriously,’ a Google spokeswoman, Courtenay Mencini, said in a statement.
‘It’s against the law to ask for the religious affiliations of those who work for us or for our suppliers, but we’ll of course thoroughly look into these allegations for any irregularities or improper contracting practices.
‘If we find evidence of policy violations, we will take action.’
Fellowship of Friends was approached for comment.
THE SILICON VALLEY CARTEL MEMBERS
The Worst Ones – Rev 2.2
You would be shocked to learn how many people are killed, every day, for less than $50.00. ISIS and the Taliban will saw your head off for just an ideology. If people would commit murder over that small an amount of money, imagine what they would do to control the trillions of dollars of money that is always moving through the stock market. These are the people that will stop at nothing for power, mansions, hookers, private jets and greed!
### THE BRIBED INSIDER TRADING POLITICIANS – Tracked via financial records and email leaks to quid pro quo:
– Aneesh Chopra – White House Tech Exec
– Arnold Schwarzenegger – Governor (Accused of political bribery and kickbacks; tax evasion, illicit deal organization with Russians and more…)
– Barack Obama – Chicago politician
-Bill Daley – White House strong-arm (Forced to resign)(he is now under investigation)
– Bill Lockyer – Calif State finance head (Under investigation and sex scandal conflicts, charged with corruption by media. Assets and ownerships under investigation)
– Daniel Cohen – DOE Legal counsel who assisted in the Steven Chu scam (Sent packing/fired/forced to resign)
– David Axelrod – White House strategist who helped stage the quid-pro-quo (Sent packing/fired/forced to resign)(he is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)
– Hunter Biden
– David Plouffe – White House money packager. Arranged deals between VC campaign Donors (Forced to Resign. Under investigation)
– Debbie Wasserman Schultz
– Denis McDonough – White House adviser
– Dianne Feinstein – California politician
– Eric Holder – Attorney General- DOJ (Forced to resign) (Charged with staff & VC Protections and blockade of FBI and Special Prosecutor deployments in order to run the cover-up)
– Eric Strickland – Head of Auto Safety agency under DOT (Sent packing/fired/forced to resign)(he is now under investigation. Charged with cover-up of Tesla and GM auto dangers he had known about)
– Gabriel Burt
– Harry Reid – Senator- Solar factory guru, Congress lead (Accused of political bribery and kickbacks; tax evasion, and more…Forced out of Congress in shame)
– Hillary Clinton – Dynastic politician
– Jack Lew
– Jay Carney – White House press lead (Forced to resign)
– Jeff Berman – Bryan Cave. Berman, the former delegate counter for President Obama’s 2008 campaign
– Jeff Peck, Peck, Madigan, Jones & Stewart. Aide to then-Sen. Joe Biden (D-Del.) on the Senate Judiciary Committee
– Jeffrey Zients
– Jerry Brown – California politician
– Joe Rhodes – White House shill
– Joe Biden – Politican who created Solyndra funds
– John Podesta – White House adviser
– Jonathan Silver – DOE VC (Sent packing/fired/forced to resign)(he is now under investigation. Shamed in media for epic failures)
– Joshua Wright – FTC
– Kamala Harris– Stock favoritism Insider with her husband
– Katherine Feinstein
– Kathy Zoi
– Ken Alex – Scheme Adviser to Jerry Brown
– Ken Duberstein and Marti Thomas, The Duberstein Group. Duberstein was floated as a candidate for Obama’s chief of staff before the president chose Bill Daley, while Thomas is a Democratic vet who worked in the Clinton Treasury Department.
– Lachlan Seward – Energy Department insider gatekeeper
– Melanie Nutter – Pelosi Top Aide
– Matt Rogers – VC and quid pro quo pass-through conduit
– Megan Smith – U.S. CTO
– Mikey Dickerson
– Nancy Pelosi – California politician
– Robert Gibbs – White press office head
– Steven Chu – Secretary of Energy – The most corrupt in US history
– Todd Park – IT manipulator inside White House
–
### THE OLIGARCH FINANCIER/BENEFICIARIES OF THE CRIMES – Tracked via financial records and email leaks to quid pro quo:
– Andy Bechtolsheim – VC- Insider campaign backer (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)
– Bill Gurley
– Carl Gordon
– Chad Hurley – YouTube
– Cheryl Sandberg – Facebook boss, reports to Larry Summers
– Dave McClure – VC
– David Danielson
– David Drummond – Lawyer/Lobbyist– Google, bribes expert for DC and EU regions (Under investigation. Quail Road, Woodside, CA home bugged)
– David Mott
– David Prend
– David Sacks
– Draper – Fisher – VC firm (Campaign funder who received massive windfalls from Russian mining & tech start-up rigging)
– Elon Musk – CEO – Tesla (He is now under investigation & in multiple lawsuits for fraud)(accused of political bribery and kickbacks; tax evasion, and more…) ( All of his personal assets, investments and portfolio holdings are under investigation )
– Emerson Collective -Steve Jobs wife, has one of the largest and stealthiest election data combines
– Eric Paley
– Eric Schmidt – Owner- Google (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)
– Gilman Louie – VC, founder on IN-Q-Tel
– Goldman Sachs – Financial packager (Suspected of staging most of the TARP/DOE deals for personal gain & insider payouts)
– Greylock Capital – Silicon Valley Insider trading operator (Under investigation)
– Ira Ehrenpreis – VC Campaign backer (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…) ( All of his personal assets, investments and portfolio holdings are under investigation)
– Jacque Littlefield – VC, Dead
– James Bronkema – West Coast Money Man for David Rockefeller and Feinstein financier (Dead)
– Jared Cohen – Google boss and international political manipulator
– Wilson Sonsini Partner Club
– Wilson, Sonsini, Goodrich and Rosatti
– Jim Breyer – VC and CIA intermediary
– Joe Lonsdale – VC, famous for rape and abuse scandal and domestic spying via Palantir
– Johanna Shelton – Google Lobbyist
– John Doerr – Owner – Kleiner Perkins. “Godfather” – Silicon Valley Cartel (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)( All of his personal assets, investments and portfolio holdings are under investigation )
– John Lindfors
– Josh Kopelman
– JP Gan
– Keith Rabois -VC
– Ken Howery – VC
– Kleiner Perkins – Campaign funding VC who (Received massive windfalls from Russian mining & tech start-up rigging. Sued. Under investigation. All assets being tracked )
– Larry Page – Google Boss
– Larry Summers – VC
– Lloyd Craig Blankfein – VC and Sachs boss
– Luke Nosek
– Marc Andreessen -VC
– Mario Rosatti – VC
– Mark Zuckerberg – Facebook Boss
– Martin LaGod -VC Firelake Cap
– Mary Meeker – VC
– Max Levchin -VC
– Mckinsey Consulting – The firm you hire to rig white papers and insider hires in government positions for the Palo Alto Mafia
– Michael Moritz -VC
– Neerag Agrawal – VC
– Peter Thiel – VC
– Pierre Omidyar– VC
– Raj Gupta – VC, arrested
– Rakesh Saxeena – Canadian in-house arrest, arms dealer, western political packager
– Ray Lane – VC
– Reid Hoffman – VC and sex.com partner with Gary Kremen, also match.com
– Richard Blum – VC and director/husband of Dianne Feinstein – Finally dead!
– Roelof Botha
– Sanjay Wagle – VC
– Scott Shleiffer
– Sergy Brin – Google boss
– Steve Chen
– Steve Jurvetson – VC embroiled in sex abuse charges
– Steve Rattner – White House car czar, indicted for fraud
– Steve Spinner – Energy Department manipulation expert, Wife was Solyndra’s lawyer
– Steve Westly – VC
– Ted Schlein – IN-Q-Tel
– Tim Draper – VC
– Tom Perkins – Dead KPCB Palo Alto Mafia founder
– Tom Steyer – VC
– Tomorrow Ventures – Social manipulation group
– Tony Podesta, Podesta Group. The prolific Democratic fundraiser has seen his firm rocket to the echelons of the top five lobby shops.
– Viktor Vekselberg – Russian business entity
– Vinod Khosla -VC
### THEIR OPERATIVES AND HIRED MEDIA ASSASSINS – Tracked via financial records, quid pro quo perks and email leaks to payola. The people in the two lists, above, hired these people to harm citizens:
– A.J. Delaurio– Defamation-for-sale blogger
– Adam Dachis– Defamation-for-sale blogger
– Adam Weinstein– Defamation-for-sale blogger
– Adrian Covert– Defamation-for-sale blogger
– Adrien Chen– Defamation-for-sale blogger
– Al D’Amato, Park Strategies. The former GOP New York senator has been a big advocate for online gambling as a lobbyist for the Poker Players Alliance.
– Al Mottur and Manuel Ortiz, Brownstein Hyatt Farber Schreck. Mottur heads up lobbying operations at the K Street giant. Ortiz, one of Brownstein’s newest hires, is a rising star in Democratic circles.
– Alan Henry– Defamation-for-sale blogger
– Albert Burneko– Defamation-for-sale blogger
– Alex Balk– Defamation-for-sale blogger
– Alexander Pareene– Defamation-for-sale blogger
Alexander Sternhell, Sternhell Group. Previously a Senate Banking Committee staffer, Sternhell’s two-year-old venture is in the big leagues with clients such as Citigroup Management and PricewaterhouseCoopers.
– Alexandra Philippides– Defamation-for-sale blogger
– Allison Spinner – Wife of Steve Spinner and lawyer at WSGR and Solyndra who helped Feinstein rig the Solyndra cash ((Under investigation. All assets being tracked and terminated.)
– Allison Wentz– Defamation-for-sale blogger
– Andrew Collins– Defamation-for-sale blogger
– Andrew Magary– Defamation-for-sale blogger
– Andrew McCormack
– Andrew Orin– Defamation-for-sale blogger
– Andy Barbour, Smith-Free Group. Smith lobbies for several financial and insurance companies but is best known for his work as the lead Democratic lobbyist for the Financial Services Roundtable.
– Angelica Alzona– Defamation-for-sale blogger
– Anna Merlan– Defamation-for-sale blogger
– Ariana Cohen– Defamation-for-sale blogger
– Ashley Feinberg– Defamation-for-sale blogger
– Ashley Vance – Elon Musk suck-up and Musk hype monger
– Austin Lau
– Ava Gyurina– Defamation-for-sale blogger
– Barry Petchesky– Defamation-for-sale blogger
– Black Cube – An attack service providing hit jobs on competitors
– Brendan I. Koerner– Defamation-for-sale blogger
– Brendan O’Connor– Defamation-for-sale blogger
– Brent Rose– Defamation-for-sale blogger
– Brian Goncher – Deloitte VC intermediary in the stock market rigging (He is now under investigation)(accused of political bribery and kickbacks; tax evasion, and more…)
Brobeck Law Firm
– Brian Hickey– Defamation-for-sale blogger
– Camila Cabrer– Defamation-for-sale blogger
– Carr & Ferrell – Sony and Facebook’s law firm that helps to blockade inventors
– Choire Sicha– Defamation-for-sale blogger
– Chris Jennings, Jennings Policy Strategies
– Chris Mohney– Defamation-for-sale blogger
– Chuck Brain, Capitol Hill Strategies Inc. Once a Clinton White House aide and longtime House Ways and Means Committee staffer
– Civis Analytics – Social manipulation group
– Clover Hope– Defamation-for-sale blogger
– Covington & Burling
– Dan Tate Jr., Capitol Solutions. Tate delivers stellar client relations while harnessing 10 years of upper-level Hill and administration experience.
– Daniel Morgan– Defamation-for-sale blogger
– Covington & Burling – corrupt law firm that puts appointees in office for VC’s
– David Sandalow
– Diana Moskovitz– Defamation-for-sale blogger
– Doyle Bartlett, Eris Group. Bartlett has years of Capitol Hill experience and a busy lobbying practice
– Eleanor Shechet– Defamation-for-sale blogger
– Elizabeth Spiers– Defamation-for-sale blogger
– Elizabeth Starkey– Defamation-for-sale blogger
– Emily Gould– Defamation-for-sale blogger
– Emily Herzig– Defamation-for-sale blogger
– Emma Carmichael– Defamation-for-sale blogger
– Erin Ryan– Defamation-for-sale blogger
– Ethan Sommer– Defamation-for-sale blogger
– Eyal Ebel– Defamation-for-sale blogger
– Fred Graefe, Law Offices of Frederick H. Graefe
– Fusion GPS – Defamation and journalist bribery service
– Gabrielle Bluestone– Defamation-for-sale blogger
– Gabrielle Darbyshire– Defamation-for-sale blogger and attack services director
– Gawker Media – DNC/Clinton/Obama character assassination media tool (In Mid-Termination)
– Georgina K. Faircloth– Defamation-for-sale blogger
– Gerald Cassidy and Gregg Hartley, Cassidy & Associates
– Gizmodo – DNC/Clinton/Obama character assassination media tool ( Failing, rapidly decreasing users and increasing fake ad stats disclosures )
– Gregory Howard– Defamation-for-sale blogger
– Hamilton Nolan– Defamation-for-sale blogger
– Hannah Keyser– Defamation-for-sale blogger
– Heather Deitrich– Defamation-for-sale blogger
– Heather Podesta, Heather Podesta + Partners. The former congressional aide has built a solid lobbying practice and helps fundraise for Democrats with her husband, Tony Podesta
– Hudson Hongo– Defamation-for-sale blogger
– Hugo Schwyzer– Defamation-for-sale blogger
– Hunter Slaton– Defamation-for-sale blogger
– Ian Fette– Defamation-for-sale blogger and Google, Gawker, Jalopnik, Gizmodo media assassin
– Irin Carmon– Defamation-for-sale blogger
– Jalopnik – Online defamation facade political publication. Pretends to be about cars but is DNC hit job rag
– James Brown Jr – HHS Programming lead in California (Arrested for corruption)
– James J. Cooke– Defamation-for-sale blogger
– James King– Defamation-for-sale blogger
– Jawed Karim – YouTube
– Jeff Lieberman
– Jennifer Ouellette– Defamation-for-sale blogger
– Jesse Oxfeld– Defamation-for-sale blogger
– Jessica Cohen– Defamation-for-sale blogger
– Jesus Diaz– Defamation-for-sale blogger
– Jillian Schulz– Defamation-for-sale blogger
– Joanna Rothkopf– Defamation-for-sale blogger
– Joel Johnson, The Glover Park Group
– John Cook– Defamation-for-sale blogger and director of media assassins group
– John Herrman– Defamation-for-sale blogger
– John Raffaelli, Capitol Counsel
– Jordan Sargent– Defamation-for-sale blogger
– Joseph Keenan Trotter– Defamation-for-sale blogger
– Josh Stein– Defamation-for-sale blogger
– Julia Allison– Defamation-for-sale blogger
– Julianne E. Shepherd– Defamation-for-sale blogger
– Julie Domenick, Multiple Strategies LLC
– Justin Hyde– Defamation-for-sale blogger
– Kate Dries– Defamation-for-sale blogger
– Katharine Trendacosta– Defamation-for-sale blogger
– Katherine Drummond– Defamation-for-sale blogger
– Kelly Stout– Defamation-for-sale blogger
– Kerrie Uthoff– Defamation-for-sale blogger
– Kevin Draper– Defamation-for-sale blogger
– Lacey Donohue– Defamation-for-sale blogger
– Larry O’Brien, OB-C Group
– Lucy Haller– Defamation-for-sale blogger
– Luke Malone– Defamation-for-sale blogger
– Madeleine Davies– Defamation-for-sale blogger
– Madeline Davis– Defamation-for-sale blogger
– Mario Aguilar– Defamation-for-sale blogger
– Mark Isakowitz, Fierce, Isakowitz and Blalock. Isakowitz and his GOP lobby shop scored a coup this year when Apple and Facebook both signed up as clients in a two-week span.
– Mark Kadesh, Kadesh & Associates. Kadesh, once chief of staff to Sen. Dianne Feinstein (D-Calif.), has an A-list of California clients
– Matt Hardigree– Defamation-for-sale blogger
– Matt Novak– Defamation-for-sale blogger
– Michael Ballaban– Defamation-for-sale blogger
– Michael Dobbs– Defamation-for-sale blogger
– Michael Spinelli– Defamation-for-sale blogger
– Morrison and Foerster
– Neal Ungerleider– Defamation-for-sale blogger
– Nicholas Aster– Defamation-for-sale blogger
– Nicholas Guido Denton– Defamation-for-sale blogger and head of the Gawker, Gizmodo, Jalopnik sleaze tabloid empire
– Omar Kardoudi– Defamation-for-sale blogger
– Owen Thomas– Defamation-for-sale blogger
– Patrick George– Defamation-for-sale blogger and Character Assassination expert
– Patrick Laffoon– Defamation-for-sale blogger
– Patrick Redford– Defamation-for-sale blogger
– Perkins Coie – Campaign conduit law firm
– Rich Juzwiak– Defamation-for-sale blogger
– Richard Blakely– Defamation-for-sale blogger
– Richard Rushfield– Defamation-for-sale blogger
– Robert Finger– Defamation-for-sale blogger
– Robert Sorokanich– Defamation-for-sale blogger
– Rory Waltzer– Defamation-for-sale blogger
– Rosa Golijan– Defamation-for-sale blogger
– Ryan Brown– Defamation-for-sale blogger
– Ryan Goldberg– Defamation-for-sale blogger
– Sam Faulkner Biddle– Defamation-for-sale blogger, Runs a large part of the Anti-GOP blog programs
– Sam Woolley– Defamation-for-sale blogger
– Samar Kalaf– Defamation-for-sale blogger
– Sarah Ramey– Defamation-for-sale blogger
– Shannon Marie Donnelly– Defamation-for-sale blogger
– Shep McAllister– Defamation-for-sale blogger
– Sophie Kleeman– Defamation-for-sale blogger
– Stephen Totilo– Defamation-for-sale blogger
– Steve Elmendorf and Jimmy Ryan, Elmendorf | Ryan. A former aide to ex-House Democratic Leader Richard Gephardt (Mo.), Elmendorf brought in Ryan to help expand the Senate ties of his firm.
– Steve McBee, McBee Strategic. A former aide to Rep. Norm Dicks (D-Wash.), McBee has seen his lobby firm take off.
– Steve Perry and Andy Wright, Dutko Grayling. Perry and Wright man the roster for one of the top 20 lobby shops in Washington.
– Tamar Winberg– Defamation-for-sale blogger
– Taryn Schweitzer– Defamation-for-sale blogger
– Taylor McKnight– Defamation-for-sale blogger
– The Groundwork– Social manipulation group
– Thomas Jolly, Jolly/Rissler. Jolly is founding chairman of the Washington Caucus, a group that hosts dinners with lawmakers, and a mainstay among lobbyists.
– Thorin Klosowski– Defamation-for-sale blogger
– Tim Marchman– Defamation-for-sale blogger
– Timothy Burke– Defamation-for-sale blogger
– Tobey Grumet Segal– Defamation-for-sale blogger
– Tom Ley– Defamation-for-sale blogger
– Tom Scocca– Defamation-for-sale blogger
– Veronica de Souza– Defamation-for-sale blogger
– Wes Siler– Defamation-for-sale blogger
– William Haisley– Defamation-for-sale blogger
– William Turton– Defamation-for-sale blogger
### THEIR CORPORATE STOCK MANIPULATION FRONT FACADES- Tracked via financial records and email leaks to RICO, Anti-trust and Money Laundering violations:
– Abound Solar – Criminally corrupt crony campaign finance front operation. (Terminated)
– Alphabet – Privacy abuse, spy-on-the-public, Fake News election rigger, Clinton/DNC scheme financier (Under Federal and EU investigation)
– Facebook/Meta – Privacy abuse, spy-on-the-public, Fake News election rigger, Clinton/DNC scheme financier ( Failing, rapidly decreasing users and increasing fake ad stats disclosures )
– Fisker – Criminally corrupt crony campaign finance front operation. (Terminated)
– Google, Inc. – Data harvesting company(Ran media attacks, stock market pump and dump PR hype and character assassinations)(accused of political bribery and kickbacks; tax evasion, and more…) (charged by EU, and most nations, with multiple abuses of the public. Has totally lost the trust of the public. Revenue loss increasing geometrically.)
– In-Q-Tel, Inc. – CIA off-shoot associated with Eric Schmidt, Google, Elon Musk and the Cartel leaders. Ran “hit-jobs” on Silicon Valley VC adversaries and reporters (Sued, under investigation, exposed in multiple documentaries, under investigation for Cocaine trafficking. Removal of charity status demanded)
– Ivanpah Solar – Criminally corrupt crony Google campaign finance front operation. (In failure mode)
– Linkedin – Election manipulation networking site
– Netflix – Propaganda Site that also conduits jobs as political revolving door payola to politicians
– Solyndra Solar Company – FBI-raided corrupt Clean Tech company
– SpaceX – Elon Musk company that Obama gave part of NASA to in exchange for campaign conduits
– Tesla Motors – Car Company that conduits money to campaigns
Any issues re: culpability can be easily resolved in meetings with the FBI, FINCEN, The SEC, The IRS, The FTC, ICIJ.ORG and open Congressional hearings! Never was the term: “Follow The Money” more appropriate than for these people! Why are these people not yet arrested for election manipulation, RICO and Anti-trust violations, money laundering, bribery and other illicit deeds? Who is protecting them? Who is telling the police not to act? This list also serves as a demand for investigation and prosecution of these individuals who conspired to engage in these illicit acts. This is not the complete list.
Protections: Public Domain. Non-Commercial. Fair Use. Freedom of The Press. No Tracking Of Public Allowed. First Amendment Protections, SLAPP, UN Protected. GDPR Compliant. Section 203 protected. Privacy Tools At: http://privacytools.io, ACLU, ICIJ- supported. If you sue us to try to hide and censor the news, you are allowing us to bypass the demurrer process, and we will counter-sue you for RICO, Anti-trust, Political Bribery, Sex Trafficking, Interference, First Amendment and your other crimes, which we have FBI-grade evidence for! Bring it on corrupt Tesla, Google, Facebook, Youtube, Netflix! We might even get DOJ and/or FTC to partner with us (again) to take your filthy corrupt companies down!….REAL NEWS does not have ads in it. Any news source, with ads in it, is fake news manipulated by the advertisers!….DOWNLOAD AND COPY THIS NEWS SITE. USE ANY FREE SERVER SPACE YOU FIND ON THE WEB. MAKE YOUR OWN DIGITAL NEWSPAPER. JOIN THE HUNDREDS OF THOUSANDS OF FREE NEWS SITES, LIKE THIS, AROUND THE WORLD AND DELIVER THE NEWS AND DEMOCRACY. PLEASE FOLLOW THE WIKIPEDIA RULES FOR POSTING. BE THE NEWS!
INTERNET SAFETY AND PERSONAL SECURITY REPORTS
SEE THESE REPORTS COMPILED BY CONGRESSIONAL AND INTERNET SECURITY EXPERTS. YOUR MEDICAL RECORDS, BANKING RECORDS, CREDIT RECORDS, CREDIT CARD USES, DATING RECORDS, DMV REPORTS, PHONE TEXTS, HOME DATA, TAX RECORDS, UBER TRIPS AND ALL YOUR OTHER DATA HAVE ALREADY BEEN HACKED!
A PHONE OR WEB DEVICE GETS HACKED EVERY TWO SECONDS.
YOUR PHONE AND ‘SMART DEVICES’ HAVE THOUSANDS OF WAYS TO LET HACKERS IN. “THE CLOUD” = ‘SOMEBODY ELSE’S COMPUTER’, MOST OFTEN THOSE OTHER COMPUTERS ARE OPERATED BY YOUR ENEMIES. DON’T EVER PUT ANYTHING IMPORTANT ON THE INTERNET UNLESS IT IS STEALTHED.
IF YOU OWN A SMARTPHONE, EVERY APPLE AND ANDROID PHONE HAS THOUSANDS OF WAYS TO SPY ON YOU AND HARM YOUR PRIVACY. DON’T BE AN IDIOT – GET A ‘DUMB PHONE‘ FLIP-PHONE.
FOLLOW THESE TIPS TO KEEP YOURSELF, AND YOUR FAMILY, SAFE!
SEE THE MOVIE: “SURVEILLED” BY RONAN FARROW, ON HBO MAX AND SEE HOW YOUR PHONE IS DESTROYING YOUR PRIVACY AND GIVING AWAY ALL YOUR SECRETS. GET RID OF YOUR ‘SMART’ PHONE!
Please share these documents with your friends and work-mates that are on the internet!
‘I switched to flip phone and dramatically improved my well-being’…
More than 100 MILLION Americans’ private information leaked in massive data breach at background check company
https://track.easypost.com/djE6dHJrX2UxZmI5OWQ2MDc2MTQ4OGJiNWE2NGEwODFjMTA1YjI2
BE SURE TO, ALSO, CHECK OUT THESE REPORTS ON THE RISKS OF USING SOCIAL MEDIA FROM THESE COMPANIES:
https://en.wikipedia.org/wiki/Criticism_of_Facebook
https://en.wikipedia.org/wiki/Criticism_of_Google
https://en.wikipedia.org/wiki/Criticism_of_Tesla,_Inc.
http://no-hack.org/THE ABYSMAL FAILURES OF ELON MUSK.pdf
https://campaignforaccountability.org/campaign-for-accountability-launches-google-transparency-project/
https://en.wikipedia.org/wiki/Criticism_of_Netflix
https://www.theguardian.com/news/2018/may/03/why-silicon-valley-cant-fix-itself-tech-humanism
https://www.forbes.com/sites/allysonkapin/2020/09/15/sexual-harassment-in-silicon-valley-still-rampant-as-ever/
https://www.makeuseof.com/tag/4-security-threats-whatsapp-users-need-know/
http://no-hack.org
http://http://san-francisco-dating.com
MORE CRUCIAL INVESTIGATION UPDATE DATA:
- AT&T says hacker stole data from ‘NEARLY ALL’ customers…
- One of biggest breaches in history!
- Parents urged to buy ‘dumb’ phones to protect children from socials…
- Privacy ‘virtually impossible’ on iPhones, experts warn…
- “Gay Furry Hackers” Attack Heritage Foundation And Release Sensitive Data
- AT&T Reveals Hackers Stole “Nearly All” Records Of Customer Calls, Texts
- Florida HIV results, social security numbers leaked online in huge data breach…
- Hackers leak data from nearly 10,000 internal DISNEY Slack channels…
- Massive Car Dealership Cyberattack Has Ended With A $25 Million Ransom
- UnitedHealth Group Projects Cyberattack Costs To Top $2.3B
- https://www.wired.com/story/secret-hunting-bill-demirkapi/
- Disney Faces Class Action Suit Over Massive Data Breach
- AI, huge hacks leave consumers facing perfect storm of privacy perils…
- Hackers pivot from data breaches to total destruction…
Hackers have stolen the Social Security numbers of every American. How to protect yourself:
https://www.yahoo.com/news/hackers-may-stolen-social-security-100000278.html
https://www.bleepingcomputer.com/news/security/hackers-leak-27-billion-data-records-with-social-security-numbers/
Here is how Google rapes your privacy:
https://old.reddit.com/r/ProgrammerHumor/comments/1fl7bqy/thoughtyouwereinvisiblehuhthinkagain/lo0w6zy/
A class action lawsuit brought against background check company National Public Data (also known as Jerico Pictures) alleges the personal information of 2.9 billion individuals has made its way onto the dark web via a data breach.
National Public Data uses a process called ‘scraping’ to collect and store personally identifying data from non-public sources to carry out background checks on billions of people.
This means that sensitive information like social security numbers, full names, addresses, relative’s information was exposed – and crucially, it also means the information was not given willingly to the company, and many victims may not know it was stored at all.
Named plaintiff Christopher Hofmann was alerted by his identity-theft protection service provider that his data was exposed and leaked onto the dark web. Cyber criminal group ASDoD had listed a database which claimed to have the personal data of the individuals for sale at $3.5 million.
Hofman and the plaintiffs accused NPD of negligence, breaches of fiduciary duty and third-party beneficiary contract, and unjust enrichment. Hofman is fighting for financial compensation, and for the NPD to segment data, conduct database scanning, employ a threat-management system, and appoint a third-party assessor to conduct an evaluation of its cybersecurity frameworks annually for 10 years.
The court has been asked to require NPD purge personal data of all affected individuals and to encrypt all collected information going forward.
If confirmed, this would be classified as one of the largest data breaches ever in terms of affected individuals – rivalling the Yahoo! 2013 breach which affected three billion customers – and what’s worse is that it’s not yet clear how the data breach occurred.
You’re letting people track your iPhone – here’s how to stop it
You may think your phone’s location is completely private, but you probably didn’t think to check this feature that could be letting others track you. Here’s how to turn it off.
——————————————————————————————-
In the ever-evolving battlefield of cybersecurity, a new adversary has emerged from the shadows. Mandiant, a leader in cyber threat intelligence, has identified the threat group orchestrating the notorious Basta Ransomware attacks. This revelation marks a significant milestone in understanding and combating this sophisticated threat.
Black Basta is a ransomware group that has rapidly risen to prominence in the cyber threat landscape since its first appearance in April 2022. Known for its highly targeted and sophisticated attacks, Black Basta operates as a Ransomware-as-a-Service (RaaS) enterprise. It most recently made news for breaching over 500 organizations worldwide. Its victims have included critical infrastructure sectors, according to a joint report by CISA and the FBI.
The Black Basta Menace
First detected in April 2022, Black Basta operates as a ransomware-as-a-service (RaaS) variant, targeting organizations across North America, Europe, and Australia. With over 500 victims spanning critical infrastructure sectors, including healthcare, this ransomware group has quickly become a formidable foe.
Since its inception, Black Basta has been highly active, amassing over 500 victims as of May 2024. The group utilizes top-tier hacking forums such as Exploit and XSS to seek insiders within target organizations to facilitate administrative access to networks. The group primarily targets organizations in the United States, Japan, Canada, the United Kingdom, Australia, and New Zealand.
Modus Operandi: How Black Basta Strikes
Black Basta affiliates leverage a variety of tactics, techniques, and procedures (TTPs) to infiltrate and cripple their targets. They often gain initial access through phishing attacks, exploiting vulnerabilities in remote desktop protocol (RDP) services, or deploying malware via compromised email attachments. Once inside, they escalate privileges, disable security features, and deploy the ransomware, encrypting critical data and demanding substantial ransoms for decryption keys.
Initial Access
Black Basta employs several strategies to gain initial access to target networks:
- Spear-Phishing Campaigns: In its early campaigns, Black Basta used highly targeted spear-phishing emails to trick individuals into divulging their credentials or downloading malicious attachments.
- Insider Information: The group is known to use illicit forums like Exploit and XSS to recruit insiders within target organizations, offering significant financial incentives for network access.
- Buying Network Access: Black Basta has advertised on forums their intent to purchase corporate network access, collaborating with initial access brokers (IABs) to infiltrate target systems.
Mandiant’s Breakthrough
Mandiant’s investigation into Black Basta revealed a well-coordinated operation with potential links to other notorious cybercrime groups. Their analysis indicated that Black Basta’s methods and infrastructure bear similarities to those used by the infamous Evil Corp, suggesting a possible collaboration or shared resources among these cybercriminal entities.
The Broader Impact
The healthcare sector has been particularly hard-hit by Black Basta, with several high-profile attacks disrupting operations and compromising sensitive patient data. The ransomware’s ability to target both private industry and critical infrastructure underscores the urgent need for robust cybersecurity measures and incident response strategies.
Mitigation and Defense
In response to this growing threat, cybersecurity agencies like CISA, the FBI, and HHS have issued joint advisories, providing detailed guidance on detecting and mitigating Black Basta’s attacks. Key recommendations include regular backups, multifactor authentication, network segmentation, and comprehensive employee training to recognize and report phishing attempts.
Escalating Threats in a Digitalized World
As we progress through the year, the cybersecurity landscape continues to evolve with increasing sophistication in attacks. The rapid digital transformation across industries has expanded attack surfaces dramatically, highlighting an urgent need for adaptive security measures. This analysis draws on insights from leading industry sources to outline significant cyber threats and propose effective strategies for resilience.
The Ransomware Continues
“Ransomware attacks have increased in frequency and ransom demands, leaving even the best-prepared organizations vulnerable,” reports CRN. This year, critical infrastructure sectors have been targeted, causing extensive disruptions. To combat these threats, organizations need to enhance their cybersecurity frameworks with robust disaster recovery plans, advanced detection systems, and comprehensive employee training to mitigate ransomware risks effectively. The current ransomware request is above $10 million for enterprise companies.
Notable Incidents:
- Financial Services: JPMorgan Chase reported a sophisticated cyberattack that compromised the personal data of millions of customers. The breach involved a combination of phishing and advanced persistent threats (APTs), indicating a high level of premeditation and resource investment by the attackers.
- Healthcare: Besides UnitedHealth, Blue Cross Blue Shield was also targeted, where attackers exploited vulnerabilities in web applications to access sensitive patient records. This incident highlighted the ongoing challenges within the healthcare sector to protect patient information against increasingly malicious cyber threats.
- Technology: A major ransomware attack targeted Apple, leading to significant operational disruptions and a temporary shutdown of some services. The attackers encrypted critical data files and demanded a large ransom, showcasing the disruptive potential of ransomware attacks on tech giants.
- Retail: Target experienced another major cybersecurity incident this year, with attackers accessing transaction records and credit card information of thousands of customers through compromised point-of-sale (POS) systems. The breach was linked to malware that had been undetected within their network for months.
- Government: The U.S. Department of Energy suffered a data breach involving the unauthorized access and exfiltration of classified data about energy infrastructure. This cyber espionage episode underscored the national security implications of cyberattacks.
The Human Element: Phishing is a major problem.
The report from TechCrunch on “The Human Element: Critical Findings” highlights how social engineering, particularly phishing, continues to be a formidable threat in cybersecurity breaches across various organizations. Several notable companies were impacted by attacks that leveraged the human element, underscoring the vulnerability of employees to sophisticated phishing schemes.
Companies Affected by Phishing Attacks:
- Facebook: A targeted phishing campaign compromised the personal data of thousands of users. Attackers sent seemingly legitimate security update emails that redirected employees to a malicious website designed to harvest login credentials.
- Cisco: Employees received emails that mimicked internal communications, leading to the unauthorized access of sensitive proprietary data. This breach highlighted the sophistication of phishing attacks that can bypass traditional email filters and security protocols.
- HSBC Bank: A phishing scam impacted several HSBC branches, where employees clicked on malicious links sent via email, leading to financial fraud. The emails appeared to come from trusted sources, like senior management, which prompted quick but misguided action by the recipients.
These incidents demonstrate that even well-established companies with robust security measures can fall victim to the subtleties of social engineering. Phishing remains one of the most effective methods for initial penetration in cyber-attacks due to its direct targeting of human vulnerabilities—namely, trust and habit. Each of these cases involved emails crafted to look incredibly authentic, making it difficult for employees to recognize their malicious intent without proper training and awareness.
Cyber Criminals Entry and Attack
When cyber attackers use phishing to gain access to login credentials (like usernames and passwords), their subsequent actions can vary widely based on their objectives and the sophistication of the attack. Here are some common strategies they might employ after gaining initial access:
- Placing Malware in Backups:Attackers may attempt to infect system backups with malware as part of a more extensive ransomware campaign or to ensure persistence in the system. By corrupting backups, they make it harder for the victim organization to recover without paying a ransom. However, infecting backups specifically requires additional access and control over the backup systems, which might not always be directly achievable through initial phishing access unless the credentials obtained give broad administrative privileges.
- Creating Back Doors:Establishing backdoors is a common goal for attackers who want sustained access to a victim’s network. After gaining initial entry through phishing, they might install a variety of tools or scripts that allow them to bypass normal authentication processes to regain entry later, often undetected. These backdoors can be challenging to detect and may remain operational for a long time, enabling data theft, additional malware deployment, or further exploitation.
- Expanding Access:Often, the initial access gained via phishing is just a foothold within the network. Attackers typically use this access to perform lateral movement—exploring the network to access more sensitive data or systems. This process might involve the escalation of privileges or exploiting other vulnerabilities within the network to deepen their access.
- Data Exfiltration:If the attacker’s intent is to steal data, gaining initial access through phishing might be followed by locating and exfiltrating sensitive data to an external server. This can include personal data, intellectual property, or corporate secrets, depending on what is accessible with the compromised credentials.
- Disruption and Sabotage:In some cases, especially in politically motivated or highly targeted attacks, the goal might be to disrupt operations or damage systems. Here, attackers might use their access to sabotage systems, which could include damaging backups or other critical infrastructure to maximize impact.
Identity Theft: IBM’s Stark Warning
IBM’s X-Force Threat Intelligence Index notes, “There has been a 45% increase in identity theft incidents this year, spurred by large-scale data breaches.” Organizations must strengthen their identity protection measures with technologies like multi-factor authentication, biometric data verification, and continuous monitoring to safeguard user identities effectively.
The current biometric systems only link that biometric, cell phone to your account for login. The problem is that a criminal can create an account with your name and new password and that phone biometric, logs then into the new account with your name on it. Nimbus-Key ID has advanced to True User Verification™ with their KYC/AI/Biometric registration process. The login is secured with DE-MFA® or dynamically encrypted multi-factor authentication in a QRcode and PIN (patented) and dynamic key issuance.
Insights from the World Economic Forum
The Global Risks Report from the World Economic Forum underscores the escalating challenges of cyber insecurity, emphasizing its persistent threat across various time horizons. This year, cyber risks such as malware, deepfakes, and misinformation are highlighted as critical concerns that could impact supply chains, financial stability, and democratic processes. As technological advancements, like generative AI, become more prevalent, they bring both opportunities and heightened risks, particularly in exacerbating cyber inequities between well-protected organizations and those more vulnerable.
There’s a growing divide in cyber resilience, with larger organizations advancing their security measures while small to medium-sized enterprises lag due to resource constraints. This inequity is exacerbated by a significant talent shortage in cybersecurity, further challenging organizations’ ability to secure themselves against increasingly sophisticated cyber threats. The report calls for concerted efforts to bridge these gaps through global cooperation and strategic investments in cybersecurity infrastructure and workforce development.
IBM’s Economic Analysis
The IBM X-Force Threat Intelligence Index provides a comprehensive overview based on monitoring significant security events worldwide. It reports a 71% increase in cyberattacks involving stolen credentials and highlights that 32% of incidents involved data theft. The report emphasizes the shift from ransomware to malware targeting data theft as the primary cyber threat, urging the adoption of advanced identity and access management solutions across hybrid and multi-cloud environments. It also suggests leveraging AI technologies to improve detection and response capabilities and prepare for potential threats against AI systems as they become more prevalent.
Verizon’s Vulnerability Exploitation Report
The Verizon Data Breach Investigations Report, analyzed by Skyhigh Security, reveals an evolving threat landscape. The report examines 30,458 security incidents, noting a significant shift from ransomware to extortion attacks, which involves stealing data and demanding payment to prevent its release. It highlights a decrease in ransomware but a sharp rise in extortion, emphasizing the growing sophistication of cyber threats. The report also details the persistence of human error as a major vulnerability, with social engineering attacks remaining a prevalent method for breaching security.
Artificial Intelligence now in criminal use.
- Europol Anticipates A Rise in AI-Driven Cybercrime: This article from TechStory reports on a new Europol report that predicts an increase in AI-driven cybercrime due to the sophisticated online tools used by criminals. The rise is linked to the broader availability and capabilities of AI technologies that enhance the effectiveness of cyberattacks. Read more.
- Cybercriminal abuse of generative AI on the rise: Insurance Business Magazine discusses a report from TrendMicro, which states that cybercriminals are rapidly adopting generative AI to commit crimes, with the technology’s use developing at a fast pace. This report underscores the dual-use nature of AI technologies in the cyber realm. Read more.
- AI and Cybercrime Trends: DW Observatory explores how AI technologies are increasingly being used both to commit and combat cybercrime. The article highlights the ongoing race between cybercriminals using AI to discover new vulnerabilities and cybersecurity professionals working to protect digital infrastructures. Read more.
Conclusion: Building a Resilient Future
The cybersecurity challenges underscore the need for organizations to embrace advanced technologies, foster continuous learning, and maintain vigilant security practices. By adopting a holistic approach to cybersecurity, businesses can enhance their defenses and stay ahead of threats in an increasingly complex digital environment.
References
- CRN: [Ransomware Trends 2024](https://www.crn.com/news/security/2024-ransomware-trends)
- TechCrunch: [Social Engineering in Cyberattacks](https://techcrunch.com/2024/social-engineering-cyberattacks)
- https://www.techradar.com/pro/security/unitedhealth-confirms-major-cyberattack-says-hackers-stole-substantial-amount-of-patient-data
- IBM: [X-Force Threat Intelligence Index 2024](https://www.ibm.com/security/data-breach/threat-intelligence)
- https://www.weforum.org/publications/global-risks-report-2024/
- Verizon Business: 2024 Data Breach Investigations Report / https://www.skyhighsecurity.com/industry-perspectives/takeaways-from-verizon-2024-data-breach-report.html
- https://ieeexplore.ieee.org/abstract/document/10607393/
- https://www.healthcaredive.com/news/change-healthcare-cyberattack-lawsuit-consolidation/712492/
PERSONAL INTERNET SECURITY – PART 1
Validation Note: University, Federal, Forensic Researcher and Journalism sources provided in the links below, prove every assertion in this report many times over. A simple web-search by any college-educated person, on the top 5 search engines, can turn up hundreds of additional credible, verifying sources. Expert jury trial and Congressional hearing witnesses have proven these facts over and over.
You probably can’t imagine the second-by-second dangers and harms that modern electronics, like your phone and tablet, are causing to your life, your income, your privacy, your beliefs, your human rights, your bank account records, your political data, your job, your brand name, your medical data, your dating life, your reputation and other crucial parts of your life.
Any use of a dating site, Google or Facebook product, social media site, movie site, or anything that you log in to, puts you at substantial risk. Remember: “if it has a plug, it has a bug” . Every electronic device can be easily made to spy on you in ways you cannot possibly imagine.
The Take-Aways:
– Stalkers can find you by zooming in on your pupil reflection images in your online photos ( https://www.kurzweilai.net/reflected-hidden-faces-in-photographs-revealed-in-pupil )
– If you send email overseas or make phone calls overseas all of your communications, and those with anybody else, are NSA monitored ( https://www.privacytools.io/ )
– Bad guys take a single online photo of you and put it in software that instantly builds a dossier on you by finding where every other photo of you is that has ever been posted online ( https://www.aclu.org/blog/privacy-technology/surveillance-technologies/apples-use-face-recognition-new-iphone )
– Face-tracking software for stalking you on Match.com and OK Cupid is more effective than even FBI software for hunting bank robbers ( https://www.cnet.com/news/clearview-app-lets-strangers-find-your-name-info-with-snap-of-a-photo-report-says/ )
– Any glass, metal or ceramic object near you can be reflecting your voice or image to digital beam scanners that can relay your voice or image anywhere in the world
– All your data from any hotel you stay at will eventually be hacked and leaked ( Info of 10 MILLION MGM guests including Justin Bieber and TWITTER CEO leaked online! )
– Your voting data will be used to spy on you and harm you ( Every voter in Israel just had their data leaked in ‘grave’ security breach… )
– Lip-reading software can determine what you are saying from over a mile away ( https://www.telegraph.co.uk/news/2020/01/20/russian-police-use-spy-camera-film-opposition-activist-bedroom/ )
– Every Apple iPhone and other smart-phone has over 1000 ways to bug you, listen to you, track you and record your daily activities even when you think you have turned off the device. Never leave your battery in your phone. ( LEAKED DOCS: Secretive Market For Your Web History… )(Every Search. Every Click. On Every Site… )
– Elon Musk’s SpaceX StarLink satellites are spy satellites that send your data to Google and other tech companies ( https://www.chieftain.com/news/20200118/first-drones-now-unexplained-lights-reported-in-horsetooth )
– Google and Facebook have all of your medical records and they are part of a political operation ( https://www.wsj.com/articles/hospitals-give-tech-giants-access-to-detailed-medical-records-11579516200 )
– Every dating site, comments section and social media site sends your private data, covertly, to government, political campaigns and corporate analysis groups and can also be hacked by anyone.
– Any hacker can hack ANY network with even a single Intel, Cisco, Juniper Networks or AMD motherboard on it and nobody can stop them unless they destroy the motherboard because the back-doors are built into the hardware. Many of the companies you think are providing security are secretly owned by the Chinese government spy agencies or the CIA ( https://boingboing.net/2020/02/11/cia-secretly-owned-worlds-to.html )
– Warehouses in Nigeria, Russia, Ukraine, Sao Paolo, China and hundreds of other regions, house tens of thousands of hackers who work around the clock to try to hack you and manipulate your data.
– Every red light camera, Walmart/Target/Big Box camera and every restaurant camera goes off to networks that send your activities to credit companies, collection companies, political parties and government agencies ( ‘Homeland Security’ using location data from apps to track millions of people…
– Match.com, OKCupid and Plenty of Fish are also DNC voter analysis services that read your texts and keep your profiles forever
– If you don’t put fake ages, addresses, phone numbers and disposable email addresses on ANY form you fill out electronically, it will haunt you forever ( https://www.the-sun.com/news/284784/pornstar-data-breach-massive-leak-bank-details/ )
– Every train, plane and cruise line records you constantly and checks the covert pictures they take of you against global databases. Corporations grab your collateral private data that those Princess Cruises and United Airlines companies take and use them to build files on you ( https://www.silive.com/news/2020/01/report-new-app-can-id-strangers-with-a-single-photo.html )
– The people who say “nobody would be interested in me” are the most at risk because their naiveté puts them at the top-of-the-list for targeting and harvesting ( https://www.cnet.com/news/clearview-app-lets-strangers-find-your-name-info-with-snap-of-a-photo-report-says/ )
– Silicon Valley tech companies don’t care about your rights, they care about enough cash for their executives to buy hookers and private islands with. Your worst enemy is the social media CEO. They have a hundred thousand programmers trying to figure out more and more extreme ways to use your data every day and nobody to stop them
– The government can see everyplace you went to in the last year ( https://www.protocol.com/government-buying-location-data )
There have been over 15,000 different types of hacks used against over 3 billion “average” consumers. EVERY one of them thought they were safes and that nobody would hack them because “nobody cared about them”. History has proven every single one of them to have been totally wrong!
If you are smart, and you read the news, you will know that you should ditch all of your electronic devices and “data-poison” any information about you that touches a network by only putting fake info in all conceivable forms and entries on the internet. You, though, may be smart but lazy, like many, and not willing to step outside of the bubble of complacency that corporate advertising has surrounded you with.
Did you know that almost every dating and erotic site sends your most private life experiences and chat messages to Google’s and Facebook’s investors? https://www.businessinsider.com/facebook-google-quietly-tracking-porn-you-watch-2019-7
Do you really want all of those Silicon Valley oligarchs that have been charged with sexual abuse and sex trafficking to know that much about you?
Never, Ever, put your real information on Youtube, Netflix, Linkedin, Google, Twitter, Comcast, Amazon and any similar online service because it absolutely, positively will come back and harm you!
Always remember: Anybody that does not like you can open, read and take any photo, data, email or text on EVERY phone, computer, network or electronic device you have ever used no matter how “safe” you think your personal or work system is! They can do this in less than a minute. Also: Hundreds of thousands of hackers scan every device, around the clock, even if they never heard of you, and will like your stuff just for the fun of causing trouble. Never use an electronic device unless you encrypt, hide and code your material! One of the most important safety measures you can take is to review the security info at: https://www.privacytools.io/
Those people who think: “I have nothing to worry about..I am not important” ARE the people who get hacked the most. Don’t let naivete be your downfall. ( https://www.eff.org/deeplinks/2019/07/when-will-we-get-full-truth-about-how-and-why-government-using-facial-recognition )
All of your info on Target, Safeway, Walgreens has been hacked and read by many outsiders. NASA, The CIA, The NSA, The White House and all of the federal background check files have been hacked. The Department of Energy has been hacked hundreds of times. All of the dating sites have been hacked and their staff read all of your messages. Quest labs blood test data and sexual information reports have been hacked and published to the world. There is no database that can’t be easily hacked. Every computer system with Intel, AMD, Juniper Networks, Cisco and other hardware in it can be hacked in seconds with the hardware back-doors soldered onto their electronic boards. All of the credit reporting bureaus have been hacked. Wells Fargo bank is constantly hacked. YOU ARE NOT SAFE if you put information on a network. NO NETWORK is safe! No Silicon Valley company can, or will, protect your data; mostly because they make money FROM your data!
Every single modern cell phone and digital device can be EASILY taken over by any hacker and made to spy on you, your family, your business and your friends in thousands of different ways. Taking over the microphone is only a small part of the ways a phone can be made to spy on you. Your phone can record your location, you voice vibrations, your mood, your thoughts, your sexual activity, your finances, your photos, your contacts (who it then goes off and infects) and a huge number of other things that you don’t want recorded.
Privacy watchdog under pressure to recommend facial recognition ban…
Alarming Rise of Smart Camera Networks…
AMAZON’s Ring Doorbell Secretly Shares Private User Data With FACEBOOK…
The worst abusers of your privacy, personal information, politics and psychological information intentions are: Google, Facebook, Linkedin, Amazon, Netflix, Comcast, AT&T, Xfinity, Match.com & the other IAC dating sites, Instagram, Uber, Wells Fargo, Twitter, Paypal, Hulu, Walmart, Target, YouTube, PG&E, The DNC, Media Matters, Axciom, and their subsidiaries. Never, ever, put accurate information about yourself on their online form. Never, ever, sign in to their sites using your real name, phone, address or anything that could be tracked back to you.
If you don’t believe that every government hacks citizens in order to destroy the reputation of anyone who makes a public statement against the current party in power then read the public document at: https://www.cia.gov/library/readingroom/docs/CIA-RDP89-01258R000100010002-4.pdf
That document shows you, according to the U.S. Congress, how far things can go.
A program called ACXIX hunts down all of your records from your corner pharmacy, your taxi rides, your concert tickets, your grocery purchases, what time you use energy at your home, your doctor records…and all kinds of little bits of info about you and puts that a file about you. That file about you keeps growing for the rest of your life. That file sucks in other files from other data harvesting sites like Facebook and Google: FOREVER. The information in that file is used to try to control your politics and ideology.
In recent science studies cell phones were proven to exceed radiation safety limits by as high as 11 times the 2-decade old allowable U.S. radiation limits when phones touch the body. This is one of thousands of great reasons to always remove the battery from your cell phone when you are not talking on it. A phone without a battery in it can’t spy on you and send your data to your enemies.
If you are reading this notice, the following data applies to you:
1. EVERY network is known to contain Intel, Cisco, Juniper Networks, AMD, QualComm and other hardware which has been proven to contain back-door hard-coded access to outside parties. This is a proven, inarguable fact based on court records, FISA data, IT evidence, national news broadcasts, Congressional presented evidence and inventory records, ie: Krebs On Security, FireEye, ICIJ, Wikileaks Vault 9, EU, Global IT services, FBI.
2. Chinese, Russian FSB, Iranian and other state-sponsored hacking services as well as 14 year old domestic boys are able to easily enter your networks, emails and digital files because of this. They can enter your network at any time, with less than 4 mouse clicks, using software available to anyone. This is a proven, inarguable fact based on court records, FISA data, IT evidence and inventory records, ie: Krebs On Security, FireEye, ICIJ, Wikileaks Vault 9, EU, Global IT services, FBI.
3. Your financial office is aware of these facts and has chosen not to replace all of the at-risk equipment, nor sue the manufacturers who sold your organization this at risk equipment. They believe that the hassle and cost of replacement and litigation is more effort than the finance department is willing to undertake. This is a proven, inarguable fact based on court records, FISA data, IT evidence, national news broadcasts, Congressional presented evidence and inventory records, ie: Krebs On Security, FireEye, ICIJ, Wikileaks Vault 9, EU, Global IT services, FBI.
4. In addition to the existing tools that were on the internet, in recent years, foreign hackers have released all of the key hacking software that the CIA, DIA and NSA built to hack into any device. These software tools have already been used hundreds of times. Now the entire world has access to these tools which are freely and openly posted across the web. This is a proven, inarguable fact based on court records, FISA data, IT evidence, national news broadcasts, Congressional presented evidence and inventory records, ie: Krebs On Security, FireEye, ICIJ, Wikileaks Vault 9, EU, Global IT services, FBI.
5. The computers, servers, routers, cell phones, IP cameras, IP microphones, Smart Meters, Tesla’s, “Smart Devices:”, etc. and other devices openly broadcast their IP data and availability on the internet. In other words, many of your device broadcast a “HERE I AM” signal that can be pinged, scanned, spidered, swept or, otherwise, seen, like a signal-in-the-dark from anywhere on Earth and from satellites overhead. Your devices announce that they are available to be hacked, to hackers. This is a proven, inarguable fact based on court records, FISA data, IT evidence, national news broadcasts, Congressional presented evidence and inventory records, ie: Krebs On Security, FireEye, ICIJ, Wikileaks Vault 9, EU, Global IT services, FBI.
6. It is bad policy for your organization, or any organization, to think they are immune or have IT departments that can stop these hacks. NASA, The CIA, The White House, EQUIFAX, The Department of Energy, Target, Walmart, American Express, etc. have been hacked hundreds of times. This is a proven, inarguable fact based on court records, FISA data, IT evidence, national news broadcasts, Congressional presented evidence and inventory records, ie: Krebs On Security, FireEye, ICIJ, Wikileaks Vault 9, EU, Global IT services, FBI.
7. The thinking: “Well, nobody would want to hack us”, or “We are not important enough to get hacked” is the most erroneous and negligent thinking one could have in the world today. Chinese, Russian and Iranian spy agencies have a global “Facebook for blackmail” and have been sucking up the data of every entity on Earth for over a decade. If the network was open, they have the data and are always looking for more. The same applies to Google and Facebook who have based their entire business around domestic spying and data re-sale. This is a proven, inarguable fact based on court records, FISA data, IT evidence, national news broadcasts, Congressional presented evidence and inventory records, ie: Krebs On Security, FireEye, ICIJ, Wikileaks Vault 9, EU, Global IT services, FBI.
8. You are a “Stepping Stone” doorway to other networks and data for targeted individuals and other entities. Your networks provide routes into other people’s networks. The largest political industry today is called “Doxing” and “Character Assassination”. Billions of dollars are expended by companies such as IN-Q-Tel – (DNC); Gawker Media – (DNC); Jalopnik – (DNC); Gizmodo Media – (DNC); K2 Intelligence – (DNC); WikiStrat – (DNC); Podesta Group – (DNC); Fusion GPS – (DNC/GOP); Google – (DNC); YouTube – (DNC); Alphabet – (DNC); Facebook – (DNC); Twitter – (DNC); Think Progress – (DNC); Media Matters – (DNC); Black Cube – (DNC); Mossad – (DNC); Correct The Record – (DNC); Sand Line – (DNC/GOP); Blackwater – (DNC/GOP); Stratfor – (DNC/GOP); ShareBlue – (DNC); Wikileaks (DNC/GOP); Cambridge Analytica – (DNC/GOP); Sid Blumenthal- (DNC); David Brock – (DNC); PR Firm Sunshine Sachs (DNC); Covington and Burling – (DNC), Buzzfeed – (DNC) Perkins Coie – (DNC); Wilson Sonsini – (DNC) and hundreds of others to harm others that they perceive as political, personal or competitive threats. Do not under-estimate your unintended role in helping to harm others. This is a proven, inarguable fact based on court records, FISA data, IT evidence, national news broadcasts, Congressional presented evidence and inventory records, ie: Krebs On Security, FireEye, ICIJ, Wikileaks Vault 9, EU, Global IT services, FBI.
9. NEVER believe that you are too small to be noticed by hackers. Parties who believe that are the hackers favorite targets. This is a proven, inarguable fact based on court records, FISA data, IT evidence, national news broadcasts, Congressional presented evidence and inventory records, ie: Krebs On Security, FireEye, ICIJ, Wikileaks Vault 9, EU, Global IT services, FBI.
10. NEVER believe that because the word “DELL” or “IBM” or “CISCO” is imprinted on the plastic cover of some equipment that you are safe. Big brands are targeted by every spy agency on Earth and are the MOST compromised types of equipment. This is a proven, inarguable fact based on court records, FISA data, IT evidence, national news broadcasts, Congressional presented evidence and inventory records, ie: Krebs On Security, FireEye, ICIJ, Wikileaks Vault 9, EU, Global IT services, FBI.
11. YOU may not personally care about getting exposed but the person, or agency, you allow to get exposed will be affected for the rest of their lives and they will care very much and could sue you for destroying them via negligence. Be considerate of others in your “internet behavior”. Do not put anything that could hurt another on any network, ever. This is a proven, inarguable fact based on court records, FISA data, IT evidence, national news broadcasts, Congressional presented evidence and inventory records, ie: Krebs On Security, FireEye, ICIJ, Wikileaks Vault 9, EU, Global IT services, FBI.
12. Never post your real photograph online, or on a dating site social media or on any network. There are thousands of groups who scan every photo on the web and cross check those photos in their massive databases to reveal your personal information via every other location your photo is posted. These “image harvesters” can find out where you, who your friends and enemies are and where your kids are in minutes using comparative image data that they have automated and operating around the clock. This is a proven, inarguable fact based on court records, FISA data, IT evidence, national news broadcasts, Congressional presented evidence and inventory records, ie: Krebs On Security, FireEye, ICIJ, Wikileaks Vault 9, EU, Global IT services, FBI.
13. If you think using web security measures like this makes you “paranoid”, then think again. Cautious and intelligent people use these security measures because these dangers are proven in the news headlines daily. Uninformed, naive and low IQ people are the types of people who do not use good web hygiene and who suffer because they are not cautious and are not willing to consider the consequences of their failure to read the news and stay informed.
‘Gotham’ software written by Palantir shows how government agencies, or anybody, can use very little information to obtain quick access to anyone’s personal minutiae.
VICE NEWS Motherboard via public records request has revealed shocking details of capabilities of California law enforcement involved in Fusion Centers, once deemed to be a conspiracy theory like the National Security Agency (NSA) which was founded in 1952, and its existence hidden until the mid-1960s. Even more secretive is the National Reconnaissance Office (NRO), which was founded in 1960 but remained completely secret for 30 years.
Some of the documents instructing California law enforcement (Northern California Regional Intelligence Center) “Fusion Center” are now online, and they show just how much information the government can quickly access with little or no knowledge of a person of interest.
“The guide doesn’t just show how Gotham works. It also shows how police are instructed to use the software,” writes Caroline Haskins. “This guide seems to be specifically made by Palantir for the California law enforcement because it includes examples specific to California.”
According to DHS, “Fusion centers operate as state and major urban area focal points for the receipt, analysis, gathering, and sharing of threat-related information between federal; state, local, tribal, territorial (SLTT); and private sector partners” like Palantir. Further, Fusion Centers are locally owned and operated, arms of the “intelligence community,” i.e. the 17 intelligence agencies coordinated by the National Counterterrorism Center (NCTC). However, sometimes the buildings are staffed by trained NSA personnel like what happened in Mexico City, according to a 2010 Defense Department (DOD) memorandum.
Palantir is a private intelligence data management company mapping relationships between individuals and organizations alike founded by Peter Thiel and CEO Alex Karp and accused rapist Joe Lonsdale. You may remember Palantir from journalist Barrett Brown, Anonymous’ hack of HBGary, or accusations that the company provided the technology that enables NSA’s mass surveillance PRISM. Founded with early investment from the CIA and heavily used by the military, Palantir is a subcontracting company in its own right. The company has even been featured in the Senate’s grilling of Facebook, when Washington State Senator Maria Cantwell asked CEO Mark Zuckerberg, “Do you know who Palantir is?” due to Peter Thiel sitting on Facebook’s board.
In 2011, Anonymous’ breach exposed HBGary’s plan, conceived along with data intelligence firm Palantir, and Berico Technologies, to retaliate against WikiLeaks with cyber attacks and threaten the journalism institutions supporters. Following the hack and exposure of the joint plot, Palantir attempted to distance itself from HBGary, which it blamed for the plot.
Bank of America/Palintir/HBGary combined WikiLeaks attack plan. You can find more here: https://t.co/85yECxFmZu pic.twitter.com/huNtfJp8gl — WikiLeaks (@wikileaks) November 29, 2016
This was in part because Palantir had in 2011 scored $250 million in deals ; its customers included the CIA, FBI, US Special Operations Command, Army, Marines, Air Force, LAPD and even the NYPD. So the shady contractor had its reputation to lose at the time being involved in arguably criminal activity against WikiLeaks and its supporters.
Palantir describes itself as follows based on its website:
Palantir Law Enforcement supports existing case management systems, evidence management systems, arrest records, warrant data, subpoenaed data, RMS or other crime-reporting data, Computer Aided Dispatch (CAD) data, federal repositories, gang intelligence, suspicious activity reports, Automated License Plate Reader (ALPR) data, and unstructured data such as document repositories and emails.
Palantir’s software, Bloomberg reports,
combs through disparate data sources—financial documents, airline reservations, cellphone records, social media postings—and searches for connections that human analysts might miss. It then presents the linkages in colorful, easy-to-interpret graphics that look like spider webs.
Motherboard shows how Fusion Center police can now utilize similar technology to track citizens beyond social media and online web accounts with people record searches, vehicle record searches, a Histogram tool, a Map tool, and an Object Explorer tool. (For more information on each and the applicable uses see the Vice News article here.)
Police can then click on an individual in the chart within Gotham and see every personal detail about a target and those around them, from email addresses to bank account information, license information, social media profiles, etc., according to the documents.
Palantir’s software in many ways is similar to the Prosecutor’s Management Information System (PROMIS) stolen software Main Core and may be the next evolution in that code, which allegedly predated PRISM. In 2008, Salon.com published details about a top-secret government database that might have been at the heart of the Bush administration’s domestic spying operations. The database known as “Main Core” reportedly collected and stored vast amounts of personal and financial data about millions of Americans in event of an emergency like Martial Law.
The only difference is, again, this technology is being allowed to be deployed by Fusion Center designated police and not just the National Security Agency. Therefore, this expands the power that Fusion Center police — consisting of local law enforcement, other local government employees, as well as Department of Homeland Security personnel — have over individual American citizens.
This is a huge leap from allowing NSA agents to access PRISM database search software or being paid by the government to mine social media for “terrorists.”
Fusion Centers have become a long-standing target of civil liberties groups like the EFF, ACLU, and others because they collect and aggregate data from so many different public and private sources.
On a deeper level, when you combine the capabilities of Palantir’s Gotham software, the abuse of the Department of Motor Vehicles (DMV) database for Federal Bureau of Investigations/Immigration and Customs Enforcement, and facial recognition technology, you have the formula for a nightmarish surveillance state. Ironically, or perhaps not, that nightmare is the reality of undocumented immigrants as Palantir is one of several companies helping sift through data for the raids planned by ICE, according to journalist Barrett Brown.
YOU HAVE BEEN WARNED:
According to the world’s top internet security experts: “…Welcome to the new digital world. Nobody can ever type anything on the internet without getting scanned, hacked, privacy abused, data harvested for some political campaign, spied on by the NSA and Russian hackers and sold to marketing companies. You can’t find a corporate or email server that has not already been hacked. For $5000.00, on the Dark Web, you can now buy a copy of any person’s entire dating files from match.com, their social security records and their federal back-ground checks. These holes can never be patched because they exist right in the hardware of 90% of the internet hardware on Earth. Any hacker only needs to find one hole in a network in order to steal everything in your medical records, your Macy’s account, your credit records and your dating data. Be aware, these days, Mr. & Ms. Consumer. Facebook, Google, Twitter and Amazon have turned out to be not-what-they-seem. They manipulate you and your personal information in quite illicit manners and for corrupt purposes. Avoid communicating with anybody on the internet because you will never know who you are really talking to. Only communication with people live and in-person…”
SPREAD THE WORD. TELL YOUR FRIENDS. COPY AND PASTE THIS TO YOUR SOCIAL MEDIA. SEE MORE PROOF IN THESE ARTICLES:
https://www.i-programmer.info/news/149-security/12556-google-says-spectre-and-meltdown-are-too-difficult-to-fix.html
https://sputniknews.com/us/201902231072681117-encryption-keys-dark-overlord-911-hack/
https://www.businessinsider.com/nest-microphone-was-never-supposed-to-be-a-secret-2019-2
https://thehill.com/policy/technology/430779-google-says-hidden-microphone-was-never-intended-to-be-a-secret
https://news.ycombinator.com/item?id=19210727
https://www.davidicke.com/article/469484/israel-hardware-backdoored-everything
https://www.scmp.com/economy/china-economy/article/2186606/chinas-social-credit-system-shows-its-teeth-banning-millions
https://youtu.be/lwoyesA-vlM
https://www.zdnet.com/article/critical-vulnerabilities-uncovered-in-popular-password-managers/
https://files.catbox.moe/jopll0.pdf
https://files.catbox.moe/ugqngv.pdf
https://arstechnica.com/tech-policy/2019/02/att-t-mobile-sprint-reportedly-broke-us-law-by-selling-911-location-data/
https://www.blacklistednews.com/article/71200/smartphone-apps-sending-intensely-personal-information-to-facebook–whether-or-not-you-have-an.html
https://www.stripes.com/news/us/feds-share-watch-list-with-1-400-private-groups-1.569308
https://voat.co/v/news/3053329
https://voat.co/v/technology/3075724
https://www.theregister.co.uk/2019/02/26/malware_ibm_powershell/
https://fossbytes.com/facebook-lets-anyone-view-your-profile-using-your-phone-number/
https://www.iottechtrends.com/vulnerability-ring-doorbell-fixed/
https://voat.co/v/technology/3077896
https://sg.news.yahoo.com/whatsapp-hack-latest-breach-personal-data-security-135037749.html
https://metro.co.uk/2019/05/14/whatsapp-security-attack-put-malicious-code-iphones-androids-9523698/
https://www.thesun.co.uk/tech/9069211/whatsapp-surveillance-cyber-attack-glitch/
———————————————-
THE PROMIS BACKDOOR
Beyond embedded journalists, news blackouts, false flag events, blacklisted and disappeared Internet domains the plotline of America’s “free press” there are now ISP-filtering programs subject to Homeland Security guidelines that sift through emails and toss some into a black hole. Insiders and the NSA-approved, however, can get around such protections of networks by means of the various hybrids of the PROM IS backdoor. The 1980s theA of the Prosecutor’s Management Information System (PROMIS) software handed over the golden key that would grant most of the world to a handful of criminals. In fact, this one crime may have been the final deal with the devil that consigned the United States to its present shameful descent into moral turpitude. PROMIS began as a COBOL-based program designed to track multiple offenders through multiple databases like those of the DOJ, CIA, U.S. Attorney, IRS, etc. Its creator was a former NSA analyst named William Hamilton. About the time that the October Surprise Iranian hostage drama was stealing the election for former California governor Ronald Reagan and former CIA director George H.W. Bush in 1980, Hamilton was moving his Inslaw Inc. from non-profit to for-profit status.
His intention was to keep the upgraded version of PROM IS that Inslaw had paid for and earmark a public domain version funded by a Law Enforcement Assistance Administration (LEAA) grant for the government. With 570,000 lines of code, PROMIS was able to integrate innumerable databases without any reprogramming and thus turn mere data into information.
With Reagan in the White House, his California cronies at the DOJ offered Inslaw a $9.6 million contract to install public-domain PROMIS in prosecutors’ offices, though it was really the enhanced PROM IS that the good-old-boy network had set its sights on. In February 1983, the chief of Israeli antiterrorism intelligence was sent to Inslaw under an alias to see for himself the DEC VAX enhanced version. He recognized immediately that this software would revolutionize Israeli intelligence and crush the Palestine Inti fada. Enhanced PROMIS could extrapolate nuclear submarine routes and destinations, track assets, trustees, and judges. Not only that, but the conspirators had a CIA genius named Michael Riconosciuto who could enhance the enhanced version one step further, once it was in their possession. To install public domain PROMIS in ninety-four U.S. Attorney offices as per contract, Inslaw had to utilize its enhanced PROMIS.
The DOJ made its move, demanding temporary possession of enhanced PROMIS as collateral to ensure that all installations were completed and that only Inslaw money had gone into the enhancements. Na’ively, Hamilton agreed. The rest is history: the DOJ delayed payments on the $9.6 million and drove Inslaw into bankruptcy. With Edwin Meese III as Attorney General, the bankruptcy system was little more than a political patronage system, anyway. The enhanced PROMIS was then passed to the brilliant multivalent computer and chemical genius Riconosciuto, son of CIA Agent Marshall Riconosciuto.5 Recruited at sixteen, Michael had studied with Nobel Prize-winning physicist and co-inventor of the laser Arthur Shallo. Michael was moved from Indio to Silver Springs to Miami as he worked to insert a chip that would broadcast the contents of whatever database was present to collection satellites and monitoring vans like the Google Street View van, using a digital spread spectrum to make the signal look like computer noise. This Trojan horse would grant key-club access to the backdoor of any person or institution that purchased PROM IS software as long as the backdoor could be kept secret. Meanwhile, the drama between Hamilton and the conspirators at DOJ continued. A quiet offer to buy out Inslaw was proffered by the investment banking firm Allen & Co., British publisher (Daily Mirror) Robert Maxwell, the Arkansas corporation Systematics, and Arkansas lawyer (and Clinton family friend) Webb Hubbell.
Hamilton refused and filed a $50 million lawsuit in bankruptcy court against the DOJ on June 9, 1986. Bankruptcy Judge George F. Bason, Jr. ruled that the DOJ had indeed stolen PROMIS through trickery, fraud, and deceit, and awarded Inslaw $6.8 million. He was unable to bring perjury charges against government officials but recommended to the House Judiciary Committee that it conduct a full investigation of the DOJ. The DOJ’s appeal failed, but the Washington, D.C. Circuit Court of Appeals reversed everything on a technicality. Under then-President George H.W. Bush (1989 — 1993), Inslaw’s petition to the Supreme Court in October 1991 was scorned. When the IRS lawyer requested that Inslaw be liquidated in such a way that the U.S. Trustee program (AG Meese’s feeding trough between the DOJ and IRS) could name the trustee who would convert the assets, oversee the auction, and retain the appraisers, Judge Bason refused.
Under then-President William Jefferson Clinton (1993 — 2001), the Court of Federal Claims whitewashed the DOJ’s destruction of Inslaw and theA of PROMIS on July 31, 1997. Judge Christine Miller sent a 186-page advisory opinion to Congress claiming that Inslaw’s complaint had no merit a somber message to software developers seeking to do business with Attorney Generals and their DOJ. For his integrity, Judge Bason lost his bench seat to the IRS lawyer. T
hroughout three administrations, the mainstream Mockingbird media obediently covered up the Inslaw affair, enhanced PROMIS being a master tool of inference extraction able to track and eavesdrop like nothing else. Once enhanced PROMIS was being sold domestically and abroad so as to steal data from individuals, government agencies, banks, and corporations everywhere, intelligence-connected Barry Kumnick~ turned PROMIS into an artificial intelligence (AI) tool called SMART (Special Management Artificial Reasoning Tool) that revolutionized surveillance. The DOJ promised Kumnick $25 million, then forced him into bankruptcy as it had Hamilton. (Unlike Hamilton, Kumnick settled for a high security clearance and work at military contractors Systematics and Northrop.) Five Eyes / Echelon and the FBI’s Carnivore / Data Collection System 1000 were promptly armed with SMART, as was closed circuit satellite highdefinition (HD) television. With SMART, Five Eyes / Echelon intercepts for UKUSA agencies became breathtaking.
The next modification to Hamilton’s PROMIS was Brainstorm, a behavioral recognition software, followed by the facial recognition soAware Flexible Research System (FRS); then Semantic Web, which looks not just for link words and embedded code but for what it means that this particular person is following this particular thread. Then came quantum modification. The Department of Defense paid Simulex, Inc. to develop Sentient World Simulation (SWS), a synthetic mirror of the real world with automated continuous calibration with respect to current real-world information. The SEAS (Synthetic Environment for Analysis and Simulations) soAware platform drives SWS to devour as many as five million nodes of breaking news census data, shiAing economic indicators, real world weather patterns, and social media data, then feeds it proprietary military intelligence and fictitious events to gauge their destabilizing impact. Research into how to maintain public cognitive dissonance and learned helplessness (psychologist Martin Seligman) help SEAS deduce human behavior.
———————————————————
There are legitimate reasons ( http://www.learnliberty.org/videos/edward-snowden-surveillance-is-about-power/ )to want to avoid being tracked and spied-on while you’re online. But aside from that, doesn’t it feel creepy knowing you’re probably being watched every moment that you’re online and that information about where you go and what you do could potentially be sold to anyone at any time–to advertisers, your health insurance company, a future employer, the government, even a snoopy neighbor? Wouldn’t you feel better not having to worry about that on top of everything else you have to worry about every day?
You can test to what extent your browser is transmitting unique information using these sites: panopticlick.com, Shieldsup, and ip-check.info.
https://panopticlick.eff.org/
https://www.grc.com/shieldsup
https://cheapskatesguide.org/articles/ip-check.info?/lang=en
These sites confirm that browsers transmit a lot of data that can be used for fingerprinting. From playing around with these sites, I have noticed that turning off javascript in my browser does help some. Also the TOR browser seems to transmit less data than most, but even it is not completely effective. The added benefit that you get from the TOR browser and especially the TAILS operating system is that they block your IP address from the websites you visit. You want to try several browsers to see which one transmits the least information. Perhaps you will be lucky enough to find a browser that transmits less information than the TOR browser.
The next thing to be aware of is that corporations have methods other than tracking to spy on you. There is a saying that if a corporation is offering you their product for free, you are their product. This means that corporations that offer you free services are selling the data they collect from you in order to be able to provide you with these services. So, chances are that companies that provide you with free email are reading your email. We know that, in addition to tracking you, Facebook reads your posts and knows who your friends are, and that is just the beginning of Facebook’s spying methods. Free online surveys are just ways of collecting more data from you. Companies also monitor your credit card transactions and sell your online dating profiles. If you have a Samsung TV that is connected to the internet, it’s probably recording what you watch and may even be listening to your private conversations in your home. In fact, anything that you have in your home that is connected to the internet may be spying on you, right down to your internet-connected light bulb. With a few exceptions, online search engines monitor and log your searches. One of the exceptions is the ixquick.com search engine, which is headquartered in Europe. The steps to counter the nearly ubiquitous activities of free service providers would be to pay for services you receive online, read website privacy agreements, and not buy products that are known to be spying on you. However, the only way to be really secure from corporations using the internet to spy on you is to never connect to the internet or buy any internet-connected appliances. Welcome back to the 1980’s.
Protecting yourself from government spying while you are on the internet is the hardest and requires the most knowledge. The biggest problem is that unless a whistle-blower like Edward Snowden tells us, we have no way of knowing how governments may potentially be spying on us. That means that we have no way of protecting ourselves 100% of the time from government spying. Some things whistle-blowers have revealed ( https://secureswissdata.com/9-ways-government-spying-on-internet-activity/ ) are that the US government logs the meta data from all phone calls (who calls who and when), secretly forces internet service providers and providers of other services to allow it to “listen in on” and record all traffic going through their servers, reads nearly all email sent from everywhere in the world, and tracks the locations of all cell phones (even when they’re turned off). And, although I am not aware of any specific whistle-blower revelations on this, there is every reason to believe that the US government (and perhaps others, including China’s) has backdoors built into all computer hardware and operating system software for monitoring everything we do on our cell phones, tablets, laptops, desktop computers, and routers. ( https://www.eteknix.com/nsa-may-backdoors-built-intel-amd-processors/ ) See also this. Because Lenovo computers are manufactured in China, the US government has issued warnings to all US government agencies and subcontractors to strongly discourage them from using Lenovo computers. And the US government probably has backdoors ( https://www.atlasobscura.com/articles/a-brief-history-of-the-nsa-attempting-to-insert-backdoors-into-encrypted-data ) into all commercially-available encryption software, with the possible exception of Truecrypt version 7.1a. I hope you are understanding now the magnitude of the lengths that governments are going to (using your tax money) to spy on you. In truth, we are now approaching the level of government spying that George Orwell warned about in his book, 1984
So what can we practically do to protect ourselves from government spying? Seriously, there isn’t much, if we want to use cell phones, credit cards, and the internet. About all we can do, if we absolutely need to have a private conversation, is to have a face-to-face meeting without any electronics within microphone range. That includes cell phones, Samsung TV’s, video cameras, computers, or land-line telephones. And don’t travel to the meeting place using long-distance commercial transportation.
Sending a letter through the US mail is the next best, although it is known that the outsides of all mail sent through the US mail are photographed, and the pictures are stored. So, don’t put your return address on the envelope. ( http://www.abajournal.com/news/article/new_york_times_post_office_photocopies_envelopes_of_all_mail_sent_in_the_us/ ) As far as surfing the internet is concerned, begin with all the precautions that I outlined above to protect yourself from corporate spying (except HTTPS and VPN’s). Then, add the TAILS operating system on a USB stick. As I said, TAILS will not prevent you from being identified and tracked via the fingerprinting method. And who can be sure whether the government has a backdoor in TAILS? As far as I know, the super-paranoid, hoody and sunglasses method I outlined above is is the next step.
———————————————–
Experts warns of ‘epidemic’ of bugging devices used by stalkers – By James Hockaday
Stalkers are using cheap bugging devices hidden in everyday household items
More funding and legal powers are needed for police to stop a surge of stalkers using eavesdropping devices to spy on victims, experts have warned.
Firms paid to detect the bugs say they’re finding more and more of the devices which are readily available on online marketplaces like Amazon and eBay.
Jack Lazzereschi, Technical Director of bug sweeping company Shapestones, says cases of stalking and victims being blackmailed with intimate footage shot in secret has doubled in the past two years.
He told Metro.co.uk: ‘The police want to do something about it, they try to, but usually they don’t have the legal power or the resources to investigate.
‘For us it’s a problem. We try to protect the client, we want to assure that somebody has been protected.’
Advert for a hidden camera device planted inside a fire/smoke alarm sold on Amazon
People are paying as little as £15 for listening devices and spy cameras hidden inside desk lamps, wall sockets, phone charger cables, USB sticks and picture frames.
Users insert a sim card into a hidden slot and call a number to listen in on their unwitting targets.
People using hidden cameras can watch what’s happening using an apps on their phones.
Jack says the devices are so effective, cheap and hard to trace to their users, law enforcement prefer using them over expensive old-school devices.
Although every case is different, in situations where homeowners plant devices in their own properties, Jack says there’s usually a legal ‘grey area’ to avoid prosecution.
The devices themselves aren’t illegal and they are usually marketed for legitimate purposes like protection, making it difficult for cops to investigate.
There is no suggestion online marketplaces like eBay and Amazon are breaking the law by selling them.
But in some instances, images of women in their underwear have been used in listings – implying more sinister uses for the devices.
Even in cases when people are more clearly breaking the law, Jack says it’s unlikely perpetrators will be brought to justice as overstretched police will prioritise resources to stop violent crime.
Jack’s says around 60 per cent of his firm’s non-corporate cases cases involve stalking or blackmail.
He says it’s become an ‘epidemic’ over the past couple of years with the gadgets more readily available than ever before.
Jack Lazzereschi says he’s seen stalking cases double in a few years
Victims are often filmed naked or having sex and threatened with the threat of footage being put online and in the worst cases children are also recorded.
Jack says UK law is woefully unprepared to deal with these devices compared to countries in the Asian-Pacific region.
In South Korea authorities have cracked down on a scourge of perverts planting cameras in public toilets.
James Williams, director of bug sweepers QCC Global says snooping devices used to be the preserve of people with deep pockets and technological know-how.
He said: ‘It’s gone from that to really being at a place where anybody can just buy a device from the internet.
‘Anything you can possibly think of you can buy with a bug built into it. I would say they’re getting used increasingly across the board.’
Suky Bhaker, Acting CEO of the Suzy Lamplugh Trust, which runs the National Stalking Helpline, warned using these gadgets could be a prelude to physical violence.
She said: ‘We know that stalking and coercive control are extremely dangerous and can cause huge harm to the victim, both in terms of their psychological wellbeing and the potential for escalation to physical violence or even murder.
‘The use of surveillance devices or spyware apps by stalkers, must be seen in the context of a pattern of obsessive, fixated behaviour which aims at controlling and monitoring the victim.
She added: ‘There should be clarity for police forces that the use of surveillance equipment by stalkers to monitor their victim’s location or communications is a sign that serious and dangerous abuse may be present or imminent.’
‘All cases of stalking or coercive control should be taken seriously and investigated when reported to police.’
The charity is calling for all police forces across the country to train staff in this area.
Earlier this month a policeman known only by his surname Mills was barred from the profession for life for repeatedly dismissing pleas for help from 19-year-old Shana Grice who was eventually murdered by her stalker ex-boyfriend Michel Lane.
A spokesman for eBay said: ‘The listing of mini cameras on eBay is permitted for legitimate items like baby monitors or doorbell cameras.
‘However, items intended to be used as spying devices are banned from eBay’s UK platform in accordance with the law and our policy.
‘We have filters in place to block prohibited items, and all the items flagged by Metro have now been removed.’
Face-tracking harvesters grab one picture of you and then use AI to find every other digital picture of you on Earth and open every social media post, resume, news clipping, dating account etc. and sell the full dossier on you to Axciom, the NSA, Political manipulators etc. and hack your bank accounts and credit cards. Never put an unsecured photo of yourself online.
===========================
Who’s Watching Your WebEx? Webex has many back-door spy paths built in
KrebsOnSecurity spent a good part of the past week working with Cisco to alert more than four dozen companies — many of them household names — about regular corporate WebEx conference meetings that lack passwords and are thus open to anyone who wants to listen in.
At issue are recurring video- and audio conference-based meetings that companies make available to their employees via WebEx, a set of online conferencing tools run by Cisco. These services allow customers to password-protect meetings, but it was trivial to find dozens of major companies that do not follow this basic best practice and allow virtually anyone to join daily meetings about apparently internal discussions and planning sessions.
Many of the meetings that can be found by a cursory search within an organization’s “Events Center” listing on Webex.com seem to be intended for public viewing, such as product demonstrations and presentations for prospective customers and clients. However, from there it is often easy to discover a host of other, more proprietary WebEx meetings simply by clicking through the daily and weekly meetings listed in each organization’s “Meeting Center” section on the Webex.com site.
Some of the more interesting, non-password-protected recurring meetings I found include those from Charles Schwab, CSC, CBS, CVS, The U.S. Department of Energy, Fannie Mae, Jones Day, Orbitz, Paychex Services, and Union Pacific. Some entities even also allowed access to archived event recordings.
Cisco began reaching out to each of these companies about a week ago, and today released an all-customer alert (PDF) pointing customers to a consolidated best-practices document written for Cisco WebEx site administrators and users.
“In the first week of October, we were contacted by a leading security researcher,” Cisco wrote. “He showed us that some WebEx customer sites were publicly displaying meeting information online, including meeting Time, Topic, Host, and Duration. Some sites also included a ‘join meeting’ link.”
==========================
Quest Diagnostics Says All 12 Million Patients May Have Had Financial, Medical, Personal Information Breached. It includes credit card numbers and bank account information, according to a filing… HOW MANY TIMES DO YOU NEED TO BE TOLD: “NEVER, EVER, GIVE TRUE INFORMATION TO ANY COMPANY THAT USES A NETWORK OR MAKES YOU SIGN-IN TO ANYTHING ONLINE!”
https://khn.org/news/a-wake-up-call-on-data-collecting-smart-beds-and-sleep-apps/
==========================
https://sputniknews.com/science/201906051075646555-chinese-cyborg-future-chip/
https://www.emarketer.com/content/average-us-time-spent-with-mobile-in-2019-has-increased
https://www.baltimoresun.com/maryland/baltimore-city/bs-md-ci-ransomware-20190603-story.html
https://thehill.com/homenews/media/447532-news-industry-joins-calls-for-more-scrutiny-of-big-tech
https://www.bnnbloomberg.ca/the-future-will-be-recorded-on-your-smart-speaker-1.1270598
https://www.washingtontimes.com/news/2019/jun/9/robert-mueller-exploited-cell-phone-gps-track-trum/
https://www.theorganicprepper.com/the-unholy-alliance-between-dna-sites-and-facial-recognition/
Google still keeps a list of everything you ever bought using Gmail, even if you delete all your emails, and provides that data to political parties, the NSA and marketing companies so they can manipulate you
Google and other tech companies have been under fire recently for a variety of issues, including failing to protect user data, failing to disclose how data is collected and used and failing to police the content posted to their services.
Companies such as Google have embedded themselves in our lives with useful services including Gmail, Google Maps and Google Search, as well as smart products such as the Google Assistant which can answer our questions on a whim. The benefits of these tools come at the cost of our privacy, however, because while Google says that privacy should not be a “luxury good, ” it’s still going to great lengths to collect as much detail as possible about its users and making it more difficult than necessary for users to track what’s collected about them and delete it.
Here’s the latest case in point.
In May, I wrote up something weird I spotted on Google’s account management page. I noticed that Google uses Gmail to store a list of everything you’ve purchased, if you used Gmail or your Gmail address in any part of the transaction.
If you have a confirmation for a prescription you picked up at a pharmacy that went into your Gmail account, Google logs it. If you have a receipt from Macy’s, Google keeps it. If you bought food for delivery and the receipt went to your Gmail, Google stores that, too.
You get the idea, and you can see your own purchase history by going to Google’s Purchases page.
Google says it does this so you can use Google Assistant to track packages or reorder things, even if that’s not an option for some purchases that aren’t mailed or wouldn’t be reordered, like something you bought a store.
At the time of my original story, Google said users can delete everything by tapping into a purchase and removing the Gmail. It seemed to work if you did this for each purchase, one by one. This isn’t easy — for years worth of purchases, this would take hours or even days of time.
So, since Google doesn’t let you bulk-delete this purchases list, I decided to delete everything in my Gmail inbox. That meant removing every last message I’ve sent or received since I opened my Gmail account more than a decade ago.
Despite Google’s assurances, it didn’t work.
Like a horror movie villain that just won’t die
On Friday, three weeks after I deleted every Gmail, I checked my purchases list.
I still see receipts for things I bought years ago. Prescriptions, food deliveries, books I bought on Amazon, music I purchased from iTunes, a subscription to Xbox Live I bought from Microsoft — it’s all there.
Google continues to show me purchases I’ve made recently, too.
I can’t delete anything and I can’t turn it off.
When I click on an individual purchase and try to remove it — it says I can do this by deleting the email, after all — it just redirects to my inbox and not to the original email message for me to delete, since that email no longer exists.
So Google is caching or saving this private information somewhere else that isn’t just tied to my Gmail account.
When I wrote my original story, a Google spokesperson insisted this list is only for my use, and said the company views it as a convenience. Later, the company followed up to say this data is used to “help you get things done, like track a package or reorder food.”
But it’s a convenience I never asked for, and the fact that Google compiles and stores this information regardless of what I say or do is a bit creepy.
A spokesperson was not immediately available to comment on this latest development.
But it shows once again how tech companies often treat user privacy as a low-priority afterthought and will only make changes if user outrage forces their hand.
https://www.theregister.co.uk/2019/07/11/google_assistant_voice_eavesdropping_creepy/
https://www.technowize.com/google-home-is-sending-your-private-recordings-to-google-workers/
https://phys.org/news/2019-07-malicious-apps-infect-million-android.html
https://archive.fo/RrnuL#selection-1489.0-1489.170
EVERYTHING IN AMERICA HAS BEEN HACKED OR SOON WILL BE:
In a country of just 7 million people, the scale of the hack means that just about every working adult has been affected.
“We should all be angry. … The information is now freely available to anyone. Many, many people in Bulgaria already have this file, and I believe that it’s not only in Bulgaria,” said Genov, a blogger and political analyst. He knows his data was compromised because, though he’s not an IT expert, he managed to find the stolen files online.
Microsoft says foreign hackers still actively targeting US political targets
The attack is extraordinary, but it is not unique.
Government databases are gold mines for hackers. They contain a huge wealth of information that can be “useful” for years to come, experts say. “You can make (your password) longer and more sophisticated, but the information the government holds are things that are not going to change,” said Guy Bunker, an information security expert and the chief technology officer at Clearswift, a cybersecurity company. “Your date of birth is not going to change, you’re not going to move house tomorrow,” he said. “A lot of the information that was taken was valid yesterday, is valid today, and will probably be valid for a large number of people in five, 10, 20 years’ time.”
Hackers’ paradise
Data breaches used to be spearheaded by highly skilled hackers. But it increasingly doesn’t take a sophisticated and carefully planned operation to break into IT systems. Hacking tools and malware that are available on the dark web make it possible for amateur hackers to cause enormous damage.A strict data protection law that came into effect last year across the European Union has placed new burdens on anyone who collects and stores personal data. It also introduced hefty fines for anyone who mismanages data, potentially opening the door for the Bulgarian government to fine itself for the breach.
Slack is resetting thousands of passwords after 2015 hack
Still, attacks against government systems are on the rise, said Adam Levin, the founder of CyberScout, another cybersecurity firm. “It’s a war right now — one we will win if we make cybersecurity a front-burner issue,” he said. The notion that governments urgently need to step up their cybersecurity game is not new. Experts have been ringing alarm bells for years.
The US Department of Veterans Affairs suffered one of the first major data breaches in 2006, when personal data of more than 26 million veterans and military personnel were compromised. “And it was all, ‘Oh, this is dreadful. We must do things to stop it.’ … And here we are, 13 years later, and an entire country’s data has been compromised, and in between, there’s been incidents of large swathes of citizen data being compromised in different countries,” Bunker said. Out-of-date systems are often the problem. Some governments may have used private companies to manage the data they collected before the array of hacks and breeches brought their attention to cybersecurity. “In many cases, our data was sent to third-party contractors years ago,” Levin said. “The way we looked at data management 10 years ago seems antiquated today, yet that old data is still out there being managed by third parties, using legacy systems.”
Chinese spies stole NSA hacking tools, report finds
If the “old data” hasn’t changed, it’s still valuable to hackers.
The Bulgaria incident is concerning, said Desislava Krusteva, a Bulgarian privacy and data protection lawyer who advises some of the world’s biggest tech companies on how to keep their clients’ information safe.
“These kinds of incidents should not happen in a state institution. It seems like it didn’t require huge efforts, and it’s probably the personal data of almost all Bulgarian citizens,” said Krusteva, a partner at Dimitrov, Petrov & Co., a law firm in Sofia.
The Bulgarian Commission for Personal Data Protection has said it would launch an investigation into the hack.
A National Revenue Agency spokesman would not comment on whether the data was properly protected.
“As there is undergoing investigation, we couldn’t provide more details about reasons behind the hack,” Communications Director Rossen Bachvarov said.
‘Very embarrassing for the government’
A 20-year-old cybersecurity worker has been arrested by the Bulgarian police in connection with the hack. The computer and software used in the attack led police to the suspect, according to the Sofia prosecutor’s office.
The man has been detained, and the police seized his equipment, including mobile phones, computers and drives, the prosecutor’s office said in a statement. If convicted, he could spend as long as eight years in prison.
US indicts two people in China over hacks
“It’s still too early to say what exactly happened, but from political perspective, it is, of course, very embarrassing for the government,” Krusteva said.
The embarrassment is made worse by the fact that this was not the first time the Bulgarian government was targeted. The country’s Commercial Registry was brought down less than a year ago by an attack. “So, at least for a year, the Bulgarian society, politicians, those who are in charge of the country, they knew quite well about the serious cybersecurity problems in the government infrastructures,” Genov said, “and they didn’t do anything about it.”
Hackers posted screenshots of the company’s servers on Twitter and later shared the stolen data with Digital Revolution, another hacking group who last year breached Quantum, another FSB contractor.
This second hacker group shared the stolen files in greater detail on their Twitter account, on Thursday, July 18, and with Russian journalists afterward.
Alexa and Google Home eavesdrop and phish passwords
Amazon- and Google-approved apps turned both voice-controlled devices into “smart spies.”
By now, the privacy threats posed by Amazon Alexa and Google Home are common knowledge. Workers for both companies routinely listen to audio of users—recordings of which can be kept forever—and the sounds the devices capture can be used in criminal trials.
Now, there’s a new concern: malicious apps developed by third parties and hosted by Amazon or Google. The threat isn’t just theoretical. Whitehat hackers at Germany’s Security Research Labs developed eight apps—four Alexa “skills” and four Google Home “actions”—that all passed Amazon or Google security-vetting processes. The skills or actions posed as simple apps for checking horoscopes, with the exception of one, which masqueraded as a random-number generator. Behind the scenes, these “smart spies,” as the researchers call them, surreptitiously eavesdropped on users and phished for their passwords.
“It was always clear that those voice assistants have privacy implications—with Google and Amazon receiving your speech, and this possibly being triggered on accident sometimes,” Fabian Bräunlein, senior security consultant at SRLabs, told me. “We now show that, not only the manufacturers, but… also hackers can abuse those voice assistants to intrude on someone’s privacy.”
The malicious apps had different names and slightly different ways of working, but they all followed similar flows. A user would say a phrase such as: “Hey Alexa, ask My Lucky Horoscope to give me the horoscope for Taurus” or “OK Google, ask My Lucky Horoscope to give me the horoscope for Taurus.” The eavesdropping apps responded with the requested information while the phishing apps gave a fake error message. Then the apps gave the impression they were no longer running when they, in fact, silently waited for the next phase of the attack.
As the following two videos show, the eavesdropping apps gave the expected responses and then went silent. In one case, an app went silent because the task was completed, and, in another instance, an app went silent because the user gave the command “stop,” which Alexa uses to terminate apps. But the apps quietly logged all conversations within earshot of the device and sent a copy to a developer-designated server.
The phishing apps follow a slightly different path by responding with an error message that claims the skill or action isn’t available in that user’s country. They then go silent to give the impression the app is no longer running. After about a minute, the apps use a voice that mimics the ones used by Alexa and Google home to falsely claim a device update is available and prompts the user for a password for it to be installed.
SRLabs eventually took down all four apps demoed. More recently, the researchers developed four German-language apps that worked similarly. All eight of them passed inspection by Amazon and Google. The four newer ones were taken down only after the researchers privately reported their results to Amazon and Google. As with most skills and actions, users didn’t need to download anything. Simply saying the proper phrases into a device was enough for the apps to run.
All of the malicious apps used common building blocks to mask their malicious behaviors. The first was exploiting a flaw in both Alexa and Google Home when their text-to-speech engines received instructions to speak the character “�.” (U+D801, dot, space). The unpronounceable sequence caused both devices to remain silent even while the apps were still running. The silence gave the impression the apps had terminated, even when they remained running.
The apps used other tricks to deceive users. In the parlance of voice apps, “Hey Alexa” and “OK Google” are known as “wake” words that activate the devices; “My Lucky Horoscope” is an “invocation” phrase used to start a particular skill or action; “give me the horoscope” is an “intent” that tells the app which function to call; and “taurus” is a “slot” value that acts like a variable. After the apps received initial approval, the SRLabs developers manipulated intents such as “stop” and “start” to give them new functions that caused the apps to listen and log conversations.
Others at SRLabs who worked on the project include security researcher Luise Frerichs and Karsten Nohl, the firm’s chief scientist. In a post documenting the apps, the researchers explained how they developed the Alexa phishing skills:
- Create a seemingly innocent skill that already contains two intents:
– an intent that is started by “stop” and copies the stop intent
– an intent that is started by a certain, commonly used word and saves the following words as slot values. This intent behaves like the fallback intent. 2. After Amazon’s review, change the first intent to say goodbye, but then keep the session open and extend the eavesdrop time by adding the character sequence “(U+D801, dot, space)” multiple times to the speech prompt. 3. Change the second intent to not react at all When the user now tries to end the skill, they hear a goodbye message, but the skill keeps running for several more seconds. If the user starts a sentence beginning with the selected word in this time, the intent will save the sentence as slot values and send them to the attacker.
To develop the Google Home eavesdropping actions:
- Create an Action and submit it for review. 2. After review, change the main intent to end with the Bye earcon sound (by playing a recording using the Speech Synthesis Markup Language (SSML)) and set expectUserResponse to true. This sound is usually understood as signaling that a voice app has finished. After that, add several noInputPrompts consisting only of a short silence, using the SSML element or the unpronounceable Unicode character sequence “�.” 3. Create a second intent that is called whenever an actions.intent.TEXT request is received. This intent outputs a short silence and defines several silent noInputPrompts. After outputting the requested information and playing the earcon, the Google Home device waits for approximately 9 seconds for speech input. If none is detected, the device “outputs” a short silence and waits again for user input. If no speech is detected within 3 iterations, the Action stops. When speech input is detected, a second intent is called. This intent only consists of one silent output, again with multiple silent reprompt texts. Every time speech is detected, this Intent is called and the reprompt count is reset. The hacker receives a full transcript of the user’s subsequent conversations, until there is at least a 30-second break of detected speech. (This can be extended by extending the silence duration, during which the eavesdropping is paused.) In this state, the Google Home Device will also forward all commands prefixed by “OK Google” (except “stop”) to the hacker. Therefore, the hacker could also use this hack to imitate other applications, man-in-the-middle the user’s interaction with the spoofed Actions, and start believable phishing attacks.
SRLabs privately reported the results of its research to Amazon and Google. In response, both companies removed the apps and said they are changing their approval processes to prevent skills and actions from having similar capabilities in the future. In a statement, Amazon representatives provided the following statement and FAQ (emphasis added for clarity):
Customer trust is important to us, and we conduct security reviews as part of the skill certification process. We quickly blocked the skill in question and put mitigations in place to prevent and detect this type of skill behavior and reject or take them down when identified. On the record Q&A: 1) Why is it possible for the skill created by the researchers to get a rough transcript of what a customer says after they said “stop” to the skill? This is no longer possible for skills being submitted for certification. We have put mitigations in place to prevent and detect this type of skill behavior and reject or take them down when identified. 2) Why is it possible for SR Labs to prompt skill users to install a fake security update and then ask them to enter a password? We have put mitigations in place to prevent and detect this type of skill behavior and reject or take them down when identified. This includes preventing skills from asking customers for their Amazon passwords. It’s also important that customers know we provide automatic security updates for our devices, and will never ask them to share their password.
Google representatives, meanwhile, wrote:
All Actions on Google are required to follow our developer policies, and we prohibit and remove any Action that violates these policies. We have review processes to detect the type of behavior described in this report, and we removed the Actions that we found from these researchers. We are putting additional mechanisms in place to prevent these issues from occurring in the future.
Google didn’t say what these additional mechanisms are. On background, a representative said company employees are conducting a review of all third-party actions available from Google, and during that time, some may be paused temporarily. Once the review is completed, actions that passed will once again become available.
It’s encouraging that Amazon and Google have removed the apps and are strengthening their review processes to prevent similar apps from becoming available. But the SRLabs’ success raises serious concerns. Google Play has a long history of hosting malicious apps that push sophisticated surveillance malware—in at least one case, researchers said, so that Egypt’s government could spy on its own citizens. Other malicious Google Play apps have stolen users’ cryptocurrency and executed secret payloads. These kinds of apps have routinely slipped through Google’s vetting process for years.
There’s little or no evidence third-party apps are actively threatening Alexa and Google Home users now, but the SRLabs research suggests that possibility is by no means farfetched. I’ve long remained convinced that the risks posed by Alexa, Google Home, and other always-listening apps outweigh their benefits. SRLabs’ Smart Spies research only adds to my belief that these devices shouldn’t be trusted by most people.
Dan Goodin Dan is the Security Editor at Ars Technica, which he joined in 2012 after working for The Register, the Associated Press, Bloomberg News, and other publications.
FSB’s secret projects
Per the different reports in Russian media, the files indicate that SyTech had worked since 2009 on a multitude of projects since 2009 for FSB unit 71330 and for fellow contractor Quantum. Projects include:
- Nautilus – a project for collecting data about EVERY social media and dating site user (such as Facebook, Match.com, OKCUPID, Plenty of Fish )MySpace, and LinkedIn).
- Nautilus-S – a project for deanonymizing Tor traffic with the help of rogue Tor servers.
- Reward – a project to covertly penetrate P2P networks, like the one used for torrents.
- Mentor – a project to monitor and search email communications on the servers of Russian companies.
- Hope – a project to investigate the topology of the Russian internet and how it connects to other countries’ network.
- Tax-3 – a project for the creation of a closed intranet to store the information of highly-sensitive state figures, judges, and local administration officials, separate from the rest of the state’s IT networks.
BBC Russia, who received the full trove of documents, claims there were other older projects for researching other network protocols such as Jabber (instant messaging), ED2K (eDonkey), and OpenFT (enterprise file transfer).
Other files posted on the Digital Revolution Twitter account claimed that the FSB was also tracking students and pensioners.
Additional Academic, Federal and Journalism sources providing the citations, assertions, and the evidence proving, the above points herein:
- Anne Broache. “FBI wants widespread monitoring of ‘illegal’ Internet activity”. CNET. Retrieved 25 March 2014.
- “Is the U.S. Turning Into a Surveillance Society?”. American Civil Liberties Union. Retrieved March 13, 2009.
- “Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society” (PDF). American Civil Liberties Union. January 15, 2003. Retrieved March 13, 2009.
- “Anonymous hacks UK government sites over ‘draconian surveillance’ “, Emil Protalinski, ZDNet, 7 April 2012, retrieved 12 March 2013
- Hacktivists in the frontline battle for the internet retrieved 17 June 2012
- Diffie, Whitfield; Susan Landau (August 2008). “Internet Eavesdropping: A Brave New World of Wiretapping”. Scientific American. Retrieved 2009-03-13.
- “CALEA Archive — Electronic Frontier Foundation”. Electronic Frontier Foundation (website). Archived from the original on 2009-05-03. Retrieved 2009-03-14.
- “CALEA: The Perils of Wiretapping the Internet”. Electronic Frontier Foundation (website). Retrieved 2009-03-14.
- “CALEA: Frequently Asked Questions”. Electronic Frontier Foundation (website). Retrieved 2009-03-14.
- Kevin J. Connolly (2003). Law of Internet Security and Privacy. Aspen Publishers. p. 131. ISBN .
- American Council on Education vs. FCC Archived 2012-09-07 at the Wayback Machine, Decision, United States Court of Appeals for the District of Columbia Circuit, 9 June 2006. Retrieved 8 September 2013.
- Hill, Michael (October 11, 2004). “Government funds chat room surveillance research”. USA Today. Associated Press. Retrieved 2009-03-19.
- McCullagh, Declan (January 30, 2007). “FBI turns to broad new wiretap method”. ZDNet News. Retrieved 2009-03-13.
- “First round in Internet war goes to Iranian intelligence”, Debkafile, 28 June 2009. (subscription required)
- O’Reilly, T. (2005). What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. O’Reilly Media, 1-5.
- Fuchs, C. (2011). New Media, Web 2.0 and Surveillance. Sociology Compass, 134-147.
- Fuchs, C. (2011). Web 2.0, Presumption, and Surveillance. Surveillance & Society, 289-309.
- Anthony Denise, Celeste Campos-Castillo, Christine Horne (2017). “Toward a Sociology of Privacy”. Annual Review of Sociology. 43: 249–269. doi:10.1146/annurev-soc-060116-053643.
- Muise, A., Christofides, E., & Demsmarais, S. (2014). ” Creeping” or just information seeking? Gender differences in partner monitoring in response to jealousy on Facebook. Personal Relationships, 21(1), 35-50.
- “How Stuff Works”. Retrieved November 10, 2017.
- [electronics.howstuffworks.com/gadgets/high-tech-gadgets/should-smart-devices-automatically-call-cops.htm. “How Stuff Works”] Check |url= value (help). Retrieved November 10, 2017.
- [time.com/4766611/alexa-takes-the-stand-listening-devices-raise-privacy-issues “Time Alexa Takes the Stand Listening Devices Raise Privacy Issues”] Check |url= value (help). Retrieved November 10, 2017.
- Story, Louise (November 1, 2007). “F.T.C. to Review Online Ads and Privacy”. New York Times. Retrieved 2009-03-17.
- Butler, Don (January 31, 2009). “Are we addicted to being watched?”. The Ottawa Citizen. canada.com. Archived from the original on 22 July 2013. Retrieved 26 May 2013.
- Soghoian, Chris (September 11, 2008). “Debunking Google’s log anonymization propaganda”. CNET News. Retrieved 2009-03-21.
- Joshi, Priyanki (March 21, 2009). “Every move you make, Google will be watching you”. Business Standard. Retrieved 2009-03-21.
- “Advertising and Privacy”. Google (company page). 2009. Retrieved 2009-03-21.
- “Spyware Workshop: Monitoring Software on Your OC: Spywae, Adware, and Other Software”, Staff Report, U.S. Federal Trade Commission, March 2005. Retrieved 7 September 2013.
- Aycock, John (2006). Computer Viruses and Malware. Springer. ISBN .
- “Office workers give away passwords for a cheap pen”, John Leyden, The Register, 8 April 2003. Retrieved 7 September 2013.
- “Passwords are passport to theft”, The Register, 3 March 2004. Retrieved 7 September 2013.
- “Social Engineering Fundamentals, Part I: Hacker Tactics”, Sarah Granger, 18 December 2001.
- “Stuxnet: How does the Stuxnet worm spread?”. Antivirus.about.com. 2014-03-03. Retrieved 2014-05-17.
- Keefe, Patrick (March 12, 2006). “Can Network Theory Thwart Terrorists?”. New York Times. Retrieved 14 March 2009.
- Albrechtslund, Anders (March 3, 2008). “Online Social Networking as Participatory Surveillance”. First Monday. 13 (3). Retrieved March 14, 2009.
- Fuchs, Christian (2009). Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance (PDF). Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. ISBN . Archived from the original (PDF) on February 6, 2009. Retrieved March 14, 2009.
- Ethier, Jason (27 May 2006). “Current Research in Social Network Theory” (PDF). Northeastern University College of Computer and Information Science. Retrieved 15 March 2009.[permanent dead link]
- Marks, Paul (June 9, 2006). “Pentagon sets its sights on social networking websites”. New Scientist. Retrieved 2009-03-16.
- Kawamoto, Dawn (June 9, 2006). “Is the NSA reading your MySpace profile?”. CNET News. Retrieved 2009-03-16.
- Ressler, Steve (July 2006). “Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research”. Homeland Security Affairs. II (2). Retrieved March 14, 2009.
- McNamara, Joel (4 December 1999). “Complete, Unofficial Tempest Page”. Archived from the original on 1 September 2013. Retrieved 7 September 2013.
- Van Eck, Wim (1985). “Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?” (PDF). Computers & Security. 4 (4): 269–286. CiteSeerX 10.1.1.35.1695. doi:10.1016/0167-4048(85)90046-X.
- Kuhn, M.G. (26–28 May 2004). “Electromagnetic Eavesdropping Risks of Flat-Panel Displays” (PDF). 4th Workshop on Privacy Enhancing Technologies. Toronto: 23–25.
- Asonov, Dmitri; Agrawal, Rakesh (2004), Keyboard Acoustic Emanations (PDF), IBM Almaden Research Center
- Yang, Sarah (14 September 2005), “Researchers recover typed text using audio recording of keystrokes”, UC Berkeley News
- “LA Times”. Retrieved November 10, 2017.
- Adi Shamir & Eran Tromer. “Acoustic cryptanalysis”. Blavatnik School of Computer Science, Tel Aviv University. Retrieved 1 November 2011.
- Jeremy Reimer (20 July 2007). “The tricky issue of spyware with a badge: meet ‘policeware'”. Ars Technica.
- Hopper, D. Ian (4 May 2001). “FBI’s Web Monitoring Exposed”. ABC News.
- “New York Times”. Retrieved November 10, 2017.
- “Stanford University Clipper Chip”. Retrieved November 10, 2017.
- “Consumer Broadband and Digital Television Promotion Act” Archived 2012-02-14 at the Wayback Machine, U.S. Senate bill S.2048, 107th Congress, 2nd session, 21 March 2002. Retrieved 8 September 2013.
- “Swiss coder publicises government spy Trojan”. News.techworld.com. Retrieved 25 March 2014.
- Basil Cupa, Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware), LISS 2013, pp. 419-428
- “FAQ – Häufig gestellte Fragen”. Ejpd.admin.ch. 2011-11-23. Archived from the original on 2013-05-06. Retrieved 2014-05-17.
- “Censorship is inseparable from surveillance”, Cory Doctorow, The Guardian, 2 March 2012
- The Enemies of the Internet Special Edition : Surveillance Archived 2013-08-31 at the Wayback Machine, Reporters Without Borders, 12 March 2013
- “When Secrets Aren’t Safe With Journalists”, Christopher Soghoian, New York Times, 26 October 2011
- Everyone’s Guide to By-passing Internet Censorship, The Citizen Lab, University of Toronto, September 2007
- Diffie, Whitfield; Susan Landau (August 2008). “Internet Eavesdropping: A Brave New World of Wiretapping”. Scientific American. Retrieved March 13, 2009.
- “CALEA Archive – Electronic Frontier Foundation”. Electronic Frontier Foundation (website). Archived from the original on May 3, 2009. Retrieved March 14, 2009.
- “CALEA: The Perils of Wiretapping the Internet”. Electronic Frontier Foundation (website). Retrieved March 14, 2009.
- “CALEA: Frequently Asked Questions”. Electronic Frontier Foundation (website). September 20, 2007. Retrieved March 14, 2009.
- Hill, Michael (October 11, 2004). “Government funds chat room surveillance research”. USA Today. Associated Press. Retrieved March 19, 2009.
- McCullagh, Declan (January 30, 2007). “FBI turns to broad new wiretap method”. ZDNet News. Retrieved September 26, 2014.
- “FBI’s Secret Spyware Tracks Down Teen Who Made Bomb Threats”. Wired Magazine. July 18, 2007.
- Van Eck, Wim (1985). “Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?” (PDF). Computers & Security. 4 (4): 269–286. CiteSeerX 10.1.1.35.1695. doi:10.1016/0167-4048(85)90046-X.
- Kuhn, M.G. (2004). “Electromagnetic Eavesdropping Risks of Flat-Panel Displays” (PDF). 4th Workshop on Privacy Enhancing Technologies: 23–25.
- Risen, James; Lichtblau, Eric (June 16, 2009). “E-Mail Surveillance Renews Concerns in Congress”. New York Times. pp. A1. Retrieved June 30, 2009.
- Ambinder, Marc (June 16, 2009). “Pinwale And The New NSA Revelations”. The Atlantic. Retrieved June 30, 2009.
- Greenwald; Ewen, Glen; MacAskill (June 6, 2013). “NSA Prism program taps in to user data of Apple, Google and others” (PDF). The Guardian. Retrieved February 1, 2017.
- Sottek, T.C.; Kopfstein, Janus (July 17, 2013). “Everything you need to know about PRISM”. The Verge. Retrieved February 13, 2017.
- Singel, Ryan (September 10, 2007). “Rogue FBI Letters Hint at Phone Companies’ Own Data Mining Programs – Updated”. Threat Level. Wired. Retrieved March 19, 2009.
- Roland, Neil (March 20, 2007). “Mueller Orders Audit of 56 FBI Offices for Secret Subpoenas”. Bloomberg News. Retrieved March 19, 2009.
- Piller, Charles; Eric Lichtblau (July 29, 2002). “FBI Plans to Fight Terror With High-Tech Arsenal”. LA Times. Retrieved March 14, 2009.
- Schneier, Bruce (December 5, 2006). “Remotely Eavesdropping on Cell Phone Microphones”. Schneier On Security. Retrieved December 13, 2009.
- McCullagh, Declan; Anne Broache (December 1, 2006). “FBI taps cell phone mic as eavesdropping tool”. CNet News. Archived from the original on November 10, 2013. Retrieved March 14, 2009.
- Odell, Mark (August 1, 2005). “Use of mobile helped police keep tabs on suspect”. Financial Times. Retrieved March 14, 2009.
- “Telephones”. Western Regional Security Office (NOAA official site). 2001. Retrieved March 22, 2009.
- “Can You Hear Me Now?”. ABC News: The Blotter. Archived from the original on August 25, 2011. Retrieved December 13, 2009.
- Coughlin, Kevin (December 13, 2006). “Even if they’re off, cellphones allow FBI to listen in”. The Seattle Times. Retrieved December 14, 2009.
- Hampton, Brittany (2012). “From Smartphones to Stingrays: Can the Fourth Amendment Keep up with the Twenty-First Century Note”. University of Louisville Law Review. Fifty One: 159–176 – via Law Journal Library.
- “Tracking a suspect by mobile phone”. BBC News. August 3, 2005. Retrieved March 14, 2009.
- Miller, Joshua (March 14, 2009). “Cell Phone Tracking Can Locate Terrorists – But Only Where It’s Legal”. FOX News. Archived from the original on March 18, 2009. Retrieved March 14, 2009.
- Zetter, Kim (December 1, 2009). “Threat Level Privacy, Crime and Security Online Feds ‘Pinged’ Sprint GPS Data 8 Million Times Over a Year”. Wired Magazine: Threat Level. Retrieved December 5, 2009.
- “Greenstone Digital Library Software”. snowdenarchive.cjfe.org. Retrieved June 3, 2017.
- Sanger, David (September 26, 2014). “Signaling Post-Snowden Era, New iPhone Locks Out N.S.A”. New York Times. Retrieved November 1, 2014.
- Gellman, Barton (December 4, 2013). “NSA tracking cellphone locations worldwide, Snowden documents show”. The Washington Post. Retrieved November 1, 2014.
- Nye, James (October 26, 2014). “British spies can go through Americans’ telephone calls and emails without warrant revelas legal challenge in the UK”. Mail Online. Retrieved November 1, 2014.
- “Rise of Surveillance Camera Installed Base Slows”. May 5, 2016. Retrieved January 5, 2017.
- “Smart cameras catch man in 60,000 crowd”. BBC News. April 13, 2018. Retrieved April 13, 2018.
- Spielman, Fran (February 19, 2009). “Surveillance cams help fight crime, city says”. Chicago Sun Times. Retrieved March 13, 2009.[permanent dead link]
- Schorn, Daniel (September 6, 2006). “We’re Watching: How Chicago Authorities Keep An Eye On The City”. CBS News. Retrieved March 13, 2009.
- “The Price of Privacy: How local authorities spent £515m on CCTV in four years” (PDF). Big Brother Watch. February 2012. p. 30. Retrieved February 4, 2015.
- “FactCheck: how many CCTV cameras?”. Channel 4 News. June 18, 2008. Retrieved May 8, 2009.
- “You’re being watched: there’s one CCTV camera for every 32 people in UK – Research shows 1.85m machines across Britain, most of them indoors and privately operated”. The Guardian. March 2, 2011. Retrieved January 7, 2017; “In the press: How the media is reporting the 1.85 million cameras story”. Security News Desk. March 3, 2011. Retrieved January 7, 2017.
- “CCTV in London” (PDF). Retrieved July 22, 2009.
- “How many cameras are there?”. CCTV User Group. June 18, 2008. Archived from the original on October 23, 2008. Retrieved May 8, 2009.
- Den Haag. “Camera surveillance”. Archived from the original on October 8, 2016. Retrieved December 2, 2016.
- Klein, Naomi (May 29, 2008). “China’s All-Seeing Eye”. Rolling Stone. Archived from the original on March 26, 2009. Retrieved March 20, 2009.
- “Big Brother To See All, Everywhere”. CBS News. Associated Press. July 1, 2003. Retrieved September 26, 2014.
- Bonsor, K. (September 4, 2001). “How Facial Recognition Systems Work”. Retrieved June 18, 2006.
- McNealy, Scott. “Privacy is (Virtually) Dead”. Retrieved December 24, 2006.
- Roebuck, Kevin (October 24, 2012). Communication Privacy Management. ISBN .
- “WIKILEAKS: Surveillance Cameras Around The Country Are Being Used In A Huge Spy Network”. Retrieved October 5, 2016.
- “EPIC Video Surveillance Information Page”. EPIC. Retrieved March 13, 2009.
- Hedgecock, Sarah (August 14, 2012). “TrapWire: The Less-Than-Advertised System To Spy On Americans”. The Daily Beast. Retrieved September 13, 2012.
- Keefe, Patrick (March 12, 2006). “Can Network Theory Thwart Terrorists?”. New York Times.
- Albrechtlund, Anders (March 3, 2008). “Online Social Networking as Participatory Surveillance”. First Monday. 13 (3). Retrieved March 14, 2009.
- Fuchs, Christian (2009). Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance (PDF). Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. ISBN . Retrieved July 28, 2012.
- Ethier, Jason. “Current Research in Social Network Theory”. Northeastern University College of Computer and Information Science. Archived from the original on November 16, 2004. Retrieved March 15, 2009.
- Marks, Paul (June 9, 2006). “Pentagon sets its sights on social networking websites”. New Scientist. Retrieved March 16, 2009.
- Kawamoto, Dawn (June 9, 2006). “Is the NSA reading your MySpace profile?”. CNET News. Retrieved March 16, 2009.
- Ethier, Jason. “Current Research in Social Network Theory”. Northeastern University College of Computer and Information Science. Archived from the original on February 26, 2015. Retrieved March 15, 2009.
- Ressler, Steve (July 2006). “Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research”. Homeland Security Affairs. II (2). Retrieved March 14, 2009.
- “DyDAn Research Blog”. DyDAn Research Blog (official blog of DyDAn). Retrieved December 20, 2009.
- Singel, Ryan (October 29, 2007). “AT&T Invents Programming Language for Mass Surveillance”. Threat Level. Wired. Retrieved March 19, 2009.
- Singel, Ryan (October 16, 2007). “Legally Questionable FBI Requests for Calling Circle Info More Widespread than Previously Known”. Threat Level. Wired. Retrieved March 19, 2009.
- Havenstein, Heather (September 12, 2008). “One in five employers uses social networks in hiring process”. Computer World. Archived from the original on September 23, 2008. Retrieved March 14, 2009.
- Woodward, John; Christopher Horn; Julius Gatune; Aryn Thomas (2003). Biometrics: A Look at Facial Recognition. RAND Corporation. ISBN . Retrieved March 15, 2009.
- Frank, Thomas (May 10, 2007). “Face recognition next in terror fight”. USA Today. Retrieved March 16, 2009.
- Vlahos, James (January 2008). “Surveillance Society: New High-Tech Cameras Are Watching You”. Popular Mechanics. Archived from the original on December 19, 2007. Retrieved March 14, 2009.
- Nakashima, Ellen (December 22, 2007). “FBI Prepares Vast Database Of Biometrics: $1 Billion Project to Include Images of Irises and Faces”. Washington Post. pp. A01. Retrieved May 6, 2009.
- Arena, Kelly; Carol Cratty (February 4, 2008). “FBI wants palm prints, eye scans, tattoo mapping”. CNN. Retrieved March 14, 2009.
- Gross, Grant (February 13, 2008). “Lockheed wins $1 billion FBI biometric contract”. IDG News Service. InfoWorld. Retrieved March 18, 2009.
- “LAPD: We Know That Mug”. Wired Magazine. Associated Press. December 26, 2004. Retrieved March 18, 2009.
- Mack, Kelly. “LAPD Uses Face Recognition Technology To Fight Crime”. NBC4 TV (transcript from Officer.com). Archived from the original on March 30, 2010. Retrieved December 20, 2009.
- Willon, Phil (September 17, 2009). “LAPD opens new high-tech crime analysis center”. LA Times. Retrieved December 20, 2009.
- Dotinga, Randy (October 14, 2004). “Can’t Hide Your Lying … Face?”. Wired Magazine. Retrieved March 18, 2009.
- Boyd, Ryan. “MQ-9 Reaper”. Retrieved October 5, 2016.
- Friedersdorf, Conor (March 10, 2016). “The Rapid Rise of Federal Surveillance Drones Over America”. Retrieved October 5, 2016.
- Edwards, Bruce, “Killington co-founder Sargent dead at 83” Archived September 4, 2015, at the Wayback Machine, Rutland Herald, November 9, 2012. Retrieved December 10, 2012.
- McCullagh, Declan (March 29, 2006). “Drone aircraft may prowl U.S. skies”. CNet News. Retrieved March 14, 2009.
- Warwick, Graham (June 12, 2007). “US police experiment with Insitu, Honeywell UAVs”. FlightGlobal.com. Retrieved March 13, 2009.
- La Franchi, Peter (July 17, 2007). “UK Home Office plans national police UAV fleet”. Flight International. Retrieved March 13, 2009.
- “No Longer Science Fiction: Less Than Lethal & Directed Energy Weapons”. International Online Defense Magazine. February 22, 2005. Retrieved March 15, 2009.
- “HART Overview” (PDF). IPTO (DARPA) – Official website. August 2008. Archived from the original (PDF) on December 5, 2008. Retrieved March 15, 2009.
- “BAA 04-05-PIP: Heterogeneous Airborne Reconnaissance Team (HART)” (PDF). Information Processing Technology Office (DARPA) – Official Website. December 5, 2003. Archived from the original (PDF) on November 27, 2008. Retrieved March 16, 2009.
- Sirak, Michael (November 29, 2007). “DARPA, Northrop Grumman Move Into Next Phase of UAV Control Architecture”. Defense Daily. Archived from the original on March 9, 2012. Retrieved March 16, 2009.
- Saska, M.; Chudoba, J.; Preucil, L.; Thomas, J.; Loianno, G.; Tresnak, A.; Vonasek, V.; Kumar, V. Autonomous Deployment of Swarms of Micro-Aerial Vehicles in Cooperative Surveillance. In Proceedings of 2014 International Conference on Unmanned Aircraft Systems (ICUAS). 2014.
- Saska, M.; Vakula, J.; Preucil, L. Swarms of Micro Aerial Vehicles Stabilized Under a Visual Relative Localization. In ICRA2014: Proceedings of 2014 IEEE International Conference on Robotics and Automation. 2014.
- Anthony, Denise (2017). “Toward a Sociology of Privacy”. Annual Review of Sociology. 43 (1): 249–269. doi:10.1146/annurev-soc-060116-053643.
- Hildebrandt, Mireille; Serge Gutwirth (2008). Profiling the European Citizen: Cross Disciplinary Perspectives. Dordrecht: Springer. ISBN .
- Clayton, Mark (February 9, 2006). “US Plans Massive Data Sweep”. Christian Science Monitor. Retrieved March 13, 2009.
- Flint, Lara (September 24, 2003). “Administrative Subpoenas for the FBI: A Grab for Unchecked Executive Power”. The Center For Democracy & Technology (official site). Archived from the original on March 8, 2009. Retrieved March 20, 2009.
- “”National Network” of Fusion Centers Raises Specter of COINTELPRO”. EPIC Spotlight on Surveillance. June 2007. Retrieved March 14, 2009.
- anonymous (January 26, 2006). “Information on the Confidential Source in the Auburn Arrests”. Portland Indymedia. Archived from the original on December 5, 2008. Retrieved March 13, 2009.
- Myers, Lisa (December 14, 2005). “Is the Pentagon spying on Americans?”. NBC Nightly News. msnbc.com. Retrieved March 13, 2009.
- “The Use of Informants in FBI Domestic Intelligence Investigations”. Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp. 225–270. Retrieved March 13, 2009.
- “Secret Justice: Criminal Informants and America’s Underground Legal System | Prison Legal News”. www.prisonlegalnews.org. Retrieved October 5, 2016.
- Ross, Brian (July 25, 2007). “FBI Proposes Building Network of U.S. Informants”. Blotter. ABC News. Retrieved March 13, 2009.
- “U.S. Reconnaissance Satellites: Domestic Targets”. National Security Archive. Retrieved March 16, 2009.
- Block, Robert (August 15, 2007). “U.S. to Expand Domestic Use Of Spy Satellites”. Wall Street Journal. Retrieved March 14, 2009.
- Gorman, Siobhan (October 1, 2008). “Satellite-Surveillance Program to Begin Despite Privacy Concerns”. The Wall Street Journal. Retrieved March 16, 2009.
- “Fact Sheet: National Applications Office”. Department of Homeland Security (official website). August 15, 2007. Archived from the original on March 11, 2009. Retrieved March 16, 2009.
- Warrick, Joby (August 16, 2007). “Domestic Use of Spy Satellites To Widen”. Washington Post. pp. A01. Retrieved March 17, 2009.
- Shrader, Katherine (September 26, 2004). “Spy imagery agency watching inside U.S.” USA Today. Associated Press. Retrieved March 17, 2009.
- Kappeler, Victor. “Forget the NSA: Police May be a Greater Threat to Privacy”.
- “Section 100i – IMS I-Catcher” (PDF), The German Code Of Criminal Procedure, 2014, pp. 43–44, archived from the original (PDF) on September 25, 2015, retrieved November 27, 2015
- “Two Stories Highlight the RFID Debate”. RFID Journal. July 19, 2005. Retrieved March 23, 2012.
- Lewan, Todd (July 21, 2007). “Microchips in humans spark privacy debate”. USA Today. Associated Press. Retrieved March 17, 2009.
- McCullagh, Declan (January 13, 2003). “RFID Tags: Big Brother in small packages”. CNET News. Retrieved July 24, 2012.
- Gardener, W. David (July 15, 2004). “RFID Chips Implanted In Mexican Law-Enforcement Workers”. Information Week. Retrieved March 17, 2009.
- Campbell, Monica (August 4, 2004). “Law enforcement in Mexico goes a bit bionic”. Christian Science Monitor. Retrieved March 17, 2009.
- Lyman, D., Micheal. Criminal Investigation: The Art and the Science. 6th ed. Pearson, 2010. p249
- Crowder, Stan, and Turvery E. Brent. Ethical Justice: Applied Issues for Criminal Justice Students and Professionals. 1st ed. Academic Press, 2013. p150. Print.
- Claburn, Thomas (March 4, 2009). “Court Asked To Disallow Warrantless GPS Tracking”. Information Week. Retrieved March 18, 2009.
- Hilden, Julie (April 16, 2002). “What legal questions are the new chip implants for humans likely to raise?”. CNN.com (FindLaw). Retrieved March 17, 2009.
- Wolf, Paul. “COINTELPRO”. (online collection of historical documents). Retrieved March 14, 2009.
- “U.S. Army Intelligence Activities” (PDF). Archived from the original (PDF) on August 8, 2015. Retrieved 25 May 2015.
- “Domestic CIA and FBI Mail Opening Programs” (PDF). Final Report: Book III, Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans. U.S. Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities. April 23, 1976. pp. 559–678. Archived from the original (PDF) on May 5, 2011. Retrieved March 13, 2009.
- Goldstein, Robert (2001). Political Repression in Modern America. University of Illinois Press. ISBN .
- Hauser, Cindy E.; McCarthy, Michael A. (July 1, 2009). “Streamlining ‘search and destroy’: cost-effective surveillance for invasive species management”. Ecology Letters. 12 (7): 683–692. doi:10.1111/j.1461-0248.2009.01323.x. ISSN 1461-0248. PMID 19453617.
- Holden, Matthew H.; Nyrop, Jan P.; Ellner, Stephen P. (June 1, 2016). “The economic benefit of time-varying surveillance effort for invasive species management”. Journal of Applied Ecology. 53 (3): 712–721. doi:10.1111/1365-2664.12617. ISSN 1365-2664.
- Flewwelling, Peter; Nations, Food and Agriculture Organization of the United (January 1, 2003). Recent Trends in Monitoring Control and Surveillance Systems for Capture Fisheries. Food & Agriculture Org. ISBN .
- Yang, Rong; Ford, Benjamin; Tambe, Milind; Lemieux, Andrew (January 1, 2014). Adaptive Resource Allocation for Wildlife Protection Against Illegal Poachers. Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems. AAMAS ’14. Richland, SC: International Foundation for Autonomous Agents and Multiagent Systems. pp. 453–460. ISBN .
- Mörner, T.; Obendorf, D. L.; Artois, M.; Woodford, M. H. (April 1, 2002). “Surveillance and monitoring of wildlife diseases”. Revue Scientifique et Technique (International Office of Epizootics). 21 (1): 67–76. doi:10.20506/rst.21.1.1321. ISSN 0253-1933. PMID 11974631.
- Sprenger, Polly (January 26, 1999). “Sun on Privacy: ‘Get Over It'”. Wired Magazine. Retrieved March 20, 2009.
- Baig, Edward; Marcia Stepanek; Neil Gross (April 5, 1999). “Privacy”. Business Week. Archived from the original on October 17, 2008. Retrieved March 20, 2009.
- Solove, Daniel (2007). “‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy”. San Diego Law Review. 44: 745. SSRN 998565.
- “Is the U.S. Turning Into a Surveillance Society?”. American Civil Liberties Union. Retrieved March 13, 2009.
- “Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society” (PDF). American Civil Liberties Union. January 15, 2003. Retrieved March 13, 2009.
- “Privacy fears over online surveillance footage broadcasts in China”. December 13, 2017.
- Marx, G. T., & Muschert, G. W. (2007). Personal information, borders, and the new surveillance studies Archived August 11, 2017, at the Wayback Machine. Annual Review of Law and Social Science, 3, 375–395.
- Agre, Philip E. (2003), “Your Face is not a bar code: arguments against automatic face recognition in public places”. Retrieved November 14, 2004.
- Foucault, Michel (1979). Discipline and Punish. New York: Vintage Books. pp. 201–202.
- Chayko, Mary (2017). Superconnected: the internet, digital media, and techno-social life. New York, NY: Sage Publications.
- Nishiyama, Hidefumi (2017). “Surveillance as Race Struggle: On Browne’s Dark Matters”. Theory & Event. Johns Hopkins University Press. 20 (1): 280–285 – via Project MUSE.
- Browne, Simone (October 2, 2015). Dark Matters: On the Surveillance of Blackness. Duke University Press Books. p. 224. ISBN .
- Court of Appeal, Second District, Division 6, California. (July 30, 2008). “People vs. Diaz”. FindLaw. Retrieved February 1, 2017.
- California Fourth District Court of Appeal (June 25, 2014). “Riley v. California”. Oyez – IIT Chicago-Kent College of Law. Retrieved February 1, 2013.
- “The Secrets of Countersurveillance”. Security Weekly. June 6, 2007.
- Birch, Dave (July 14, 2005). “The age of sousveillance”. The Guardian. London. Retrieved August 6, 2007.
- Eggers, David (2013). The Circle. New York: Alfred A. Knopf, McSweeney’s Books. pp. 288, 290–291, 486. ISBN .
How Artists And Fans Stopped Facial Recognition From Invading Music Festivals
The surveillance dystopia of our nightmares is not inevitable — and the way we kept it out of concerts and festivals is a lesson for the future.
Imagine showing up at a music festival or concert and being required to stand in front of a device that scans and analyzes your face.
Once your facial features are mapped and stored in a database, a computer algorithm could then decide that you are drunk and should be denied entry, or that you look “suspicious” and should be flagged for additional screening. If you make it through security, facial recognition technology could then be used to track the minute details of your movements once inside.
Face scanning software could be used to police behavior — constantly scanning the crowd for drug use or rule-breaking — or for strictly commercial purposes, like showing you targeted ads, monitoring which artists you came to see, or tracking how many times you go to the bar or the bathroom. Festival organizers could be forced to hand this trove of sensitive biometric data over to law enforcement or immigration authorities, and armed officers could pull people out of the crowd because they have an outstanding warrant or a deportation order. If you’re a person of color, or your gender presentation doesn’t conform to the computer’s stereotypes, you’d be more likely to be falsely flagged by the system.
This surveillance nightmare almost became a reality at US music events. Industry giants like Ticketmaster invested money in companies like Blink Identity, a startup run by ex–defense contractors who helped build the US military’s facial recognition system in Afghanistan. These vendors, and the venture capitalists who backed them, saw the live music industry as a huge potential market for biometric surveillance tech, marketed as a convenient ticketing option to concertgoers.
But now, it seems they’ll be sorely disappointed — and there’s a lesson in the story of how we dashed their dystopian profit dreams. A future where we are constantly subjected to corporate and government surveillance is not inevitable, but it’s coming fast unless we act now.
Over the last month, artists and fans waged a grassroots war to stop Orwellian surveillance technology from invading live music events. Today we declare victory. Our campaign pushed more than 40 of the world’s largest music festivals — like Coachella, Bonnaroo, and SXSW — to go on the record and state clearly that they have no plans to use facial recognition technology at their events. Facing backlash, Ticketmaster all but threw Blink Identity under the bus, distancing itself from the surveillance startup it boasted about partnering with just a year ago. This victory is the first major blow to the spread of commercial facial recognition in the United States, and its significance cannot be overstated.
In a few short weeks, using basic grassroots activism tactics like online petitions, social media pressure, and an economic boycott targeting festival sponsors, artists and fans killed the idea of facial recognition at US music festivals. Now we need to do the same for sporting events, transportation, public housing, schools, law enforcement agencies, and all public places. And there’s no time to lose.
Facial recognition is spreading like an epidemic. It’s being deployed by police departments in cities like Detroit, disproportionately targeting low-income people of color. Immigration and Customs Enforcement (ICE) are using it to systematically comb through millions of driver’s license photos and target undocumented people for apprehension and deportation. Cameras equipped with facial recognition software are scanning thousands of people’s faces right now in shopping malls, casinos, big box stores, and hotels. Schools are using it to police our children’s attendance and behavior, with black and Latinx students most likely to end up on watch lists. Major airlines are rapidly adopting it as part of the boarding process. France is about to institute a national facial recognition database. Police and corporate developers in the UK are defending their use of the tech. In China, where authorities have already used facial recognition to arrest people out of crowds at music festivals, the government is making a face scan mandatory to access the Internet.
But in almost all of these cases, facial recognition is still in its early stages. It’s an experiment. And we’re the test subjects. If we accept ubiquitous biometric monitoring and normalize the idea of getting our faces scanned to get on a plane or pick up our kids from school, the experiment works and our fate is sealed. But if we organize — if we refuse to be lab rats in a digital panopticon — we can avert a future where all human movements and associations are tracked by artificial intelligence algorithms trained to look for and punish deviations from authoritarian norms.
Opposition to facial recognition is spreading almost as quickly as the tech itself. More than 30 organizations, ranging from the Council on American Islamic Relations to Greenpeace, have endorsed Fight for the Future’s BanFacialRecognition.com campaign, pushing lawmakers at the local, state, and federal level to halt face surveillance. Four cities have already banned government use of biometric spy tech. California banned its use in police body cameras. States like Michigan, Massachusetts and New York are considering legislation. Sweden recently banned facial recognition in schools after getting slapped with a fine under the GDPR data privacy regime. Leading 2020 candidates like Bernie Sanders and Beto O’Rourke have echoed grassroots calls for a ban, and there’s rare bipartisan agreement in Congress, where lawmakers as diametrically opposed as Alexandria Ocasio-Cortez and Jim Jordan agree that facial recognition poses a unique threat to privacy and civil liberties.
When it comes to automated and insidious invasions of our personal lives and most basic rights, tech lobbyists and politicians sell a calculated brand of cynicism. They want us to believe that the widespread use of deeply creepy technology like facial recognition is a forgone conclusion, that we should get used to it, and that the only questions to address are how, where, and how quickly to roll it out. We can prove them wrong, by channeling our ambient anxiety and online outrage into meaningful action and political power.
Surveillance profiteers who hope to make a lot of money selling facial recognition software to governments and private interests are now on high alert. They’re watching closely for public reactions, running tests to see just how much intrusive monitoring we’re willing to put up with. They’re manipulatively calling for regulation –– a trap intended to assuage public fears while hastening adoption. They’re promising that facial recognition can be done in an “opt-in,” manner, ignoring the inherent dangers in corporate harvesting and storing of biometric data. But we can draw a line in the sand now, and shut down this unethical human experiment by pushing for legislation to ban facial recognition, and refusing to support corporations who use it.
We have a chance to stop the proliferation of surveillance technology that rivals nuclear weapons in the threat that it poses to the future of humanity. The clock is ticking.
THE LATEST DANGERS OF FACE-TRACKING
Face-tracking harvesters grab one picture of you and then use AI to find every other digital picture of you on the web. They open every social media post, resume, news clipping, dating account etc. and sell the full dossier on you to Axciom, the NSA, Political manipulators etc. and hack your bank accounts and credit cards. Never put an unsecured photo of yourself online. Anybody can take a screen grab of your photo on here, put it in Google’s or Palantir’s reverse image search, find all your other images and social media accounts online and get into your bank account or medical records in 30 minutes. The fact of the internet’s failed security is in the headlines every day. The danger of posting pictures on the web is pretty clearly covered in every major newspaper. Fusion GPS, Black Cube and political operatives harvest every photo on here every hour and use the data to spy on people for political dirty tricks. The FBI, CIA, NSA and most 3-letter law enforcement spy operations copy everything on this site and analyze it. Don’t you wonder why you never see anybody famous, political, in public service or in law on a dating site? Read Edward Snowden’s book ‘Permanent Record’ or any weekly report at Krebs On Security. Huge numbers of the profiles on here are fake Nigerian scammer type things. 2D pictures have no bearing on 3D experiences of people in person. I am only interested in meeting people in person. Nobody has ever been killed at a Starbucks! There is nothing unsafe about meeting at a highly public Starbucks or Peets. I learned my lessons. There are hundreds of thousands of bait profiles on here. The real people show up for the coffee. The fake ones in Nigeria, and the political spies never show up in person and have a million carefully prepared excuses why not.
For example: Yandex is by far the best reverse image search engine, with a scary-powerful ability to recognize faces, landscapes, and objects. This Russian site draws heavily upon user-generated content, such as tourist review sites (e.g. FourSquare and TripAdvisor) and social networks (e.g. dating sites), for remarkably accurate results with facial and landscape recognition queries. To use Yandex, go to images.yandex.com, then choose the camera icon on the right. From there, you can either upload a saved image or type in the URL of one hosted online.
If you get stuck with the Russian user interface, look out for Выберите файл (Choose file), Введите адрес картинки (Enter image address), and Найти (Search). After searching, look out for Похожие картинки (Similar images), and Ещё похожие (More similar). The facial recognition algorithms used by Yandex are shockingly good. Not only will Yandex look for photographs that look similar to the one that has a face in it, but it will also look for other photographs of the same person (determined through matching facial similarities) with completely different lighting, background colors, and positions. Google and Bing also look for other photographs showing a person with similar clothes and general facial features, Yandex will search for those matches, and also other photographs of a facial match.
Any stranger could snap your picture on the sidewalk or on Match.com then use an app to quickly discover your name, address and other details? A startup called Clearview AI has made that possible, and its app is currently being used by hundreds of law enforcement agencies in the US, including the FBI, says a report in The New York Times.
The app, says the Times, works by comparing a photo to a database of more than 3 billion pictures that Clearview says it’s scraped off Facebook, Venmo, YouTube and other sites. It then serves up matches, along with links to the sites where those database photos originally appeared. A name might easily be unearthed, and from there other info could be dug up online.
The size of the Clearview database dwarfs others in use by law enforcement. The FBI’s own database, which taps passport and driver’s license photos, is one of the largest, with over 641 million images of US citizens.
Political spies have even better programs than this do…watch out! The web is not safe!
You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. PrivacyTools provides services, tools and knowledge to protect your privacy against global mass surveillance.
Privacy Tools
Prefer the classic site? View a single-page layout.
Providers
Discover privacy-centric online services, including email providers, VPN operators, DNS administrators, and more!
Web Browsers
Find a web browser that respects your privacy, and discover how to harden your browser against tracking and leaks.
Software
Discover a variety of open source software built to protect your privacy and keep your digital data secure.
Operating Systems
Find out how your operating system is compromising your privacy, and what simple alternatives exist.
PrivacyTools Services
The PrivacyTools team is proud to launch a variety of privacy-centric online services, including a Mastodon instance, search engine, and more!
Privacy? I don’t have anything to hide.
Over the last 16 months, as I’ve debated this issue around the world, every single time somebody has said to me, “I don’t really worry about invasions of privacy because I don’t have anything to hide.” I always say the same thing to them. I get out a pen, I write down my email address. I say, “Here’s my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you’re doing online, read what I want to read and publish whatever I find interesting. After all, if you’re not a bad person, if you’re doing nothing wrong, you should have nothing to hide.” Not a single person has taken me up on that offer. Why privacy matters – TED Talk The primary reason for window curtains in our house, is to stop people from being able to see in. The reason we don’t want them to see in is because we consider much of what we do inside our homes to be private. Whether that be having dinner at the table, watching a movie with your kids, or even engaging in intimate or sexual acts with your partner. None of these things are illegal by any means but even knowing this, we still keep the curtains and blinds on our windows. We clearly have this strong desire for privacy when it comes to our personal life and the public. The Crypto Paper […] But saying that you don’t need or want privacy because you have nothing to hide is to assume that no one should have, or could have, to hide anything — including their immigration status, unemployment history, financial history, and health records. You’re assuming that no one, including yourself, might object to revealing to anyone information about their religious beliefs, political affiliations, and sexual activities, as casually as some choose to reveal their movie and music tastes and reading preferences. Permanent Record
Read also:
- Nothing to hide argument (Wikipedia)
- How do you counter the “I have nothing to hide?” argument? (reddit.com)
- ‘I’ve Got Nothing to Hide’ and Other Misunderstandings of Privacy (Daniel J. Solove – San Diego Law Review)
Quotes
Ultimately, saying that you don’t care about privacy because you have nothing to hide is no different from saying you don’t care about freedom of speech because you have nothing to say. Or that you don’t care about freedom of the press because you don’t like to read. Or that you don’t care about freedom of religion because you don’t believe in God. Or that you don’t care about the freedom to peacably assemble because you’re a lazy, antisocial agoraphobe. Permanent Record The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife’s phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards. I don’t want to live in a society that does these sort of things… I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under. The Guardian We all need places where we can go to explore without the judgmental eyes of other people being cast upon us, only in a realm where we’re not being watched can we really test the limits of who we want to be. It’s really in the private realm where dissent, creativity and personal exploration lie. Huffington Post
More Privacy Resources
Guides
- Surveillance Self-Defense by EFF – Guide to defending yourself from surveillance by using secure technology and developing careful practices.
- The Crypto Paper – Privacy, Security and Anonymity for Every Internet User.
- Email Self-Defense by FSF – A guide to fighting surveillance with GnuPG encryption.
- The Ultimate Privacy Guide – Excellent privacy guide written by the creators of the bestVPN.com website.
- IVPN Privacy Guides – These privacy guides explain how to obtain vastly greater freedom, privacy and anonymity through compartmentalization and isolation.
- The Ultimate Guide to Online Privacy – Comprehensive “Ninja Privacy Tips” and 150+ tools.
Information
- Freedom of the Press Foundation – Supporting and defending journalism dedicated to transparency and accountability since 2012.
- Erfahrungen.com – German review aggregator website of privacy-related services.
- Open Wireless Movement – a coalition of Internet freedom advocates, companies, organizations, and technologists working to develop new wireless technologies and to inspire a movement of Internet openness.
- privacy.net – What does the US government know about you?
- r/privacytoolsIO Wiki – Our Wiki on reddit.com.
- Security Now! – Weekly Internet Security Podcast by Steve Gibson and Leo Laporte.
- TechSNAP – Weekly Systems, Network, and Administration Podcast. Every week TechSNAP covers the stories that impact those of us in the tech industry.
- Terms of Service; Didn’t Read – “I have read and agree to the Terms” is the biggest lie on the web. We aim to fix that.
- The Great Cloudwall – Critique and information on why to avoid Cloudflare, a big company with a huge portion of the internet behind it.
Tools
- ipleak.net – IP/DNS Detect – What is your IP, what is your DNS, what informations you send to websites.
- The ultimate Online Privacy Test Resource List – A collection of Internet sites that check whether your web browser leaks information.
- PRISM Break – We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.
- Security in-a-Box – A guide to digital security for activists and human rights defenders throughout the world.
- SecureDrop – An open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. It was originally created by the late Aaron Swartz and is currently managed by Freedom of the Press Foundation.
- Reset The Net – Privacy Pack – Help fight to end mass surveillance. Get these tools to protect yourself and your friends.
- Security First – Umbrella is an Android app that provides all the advice needed to operate safely in a hostile environment.
- Osalt – A directory to help you find open source alternatives to proprietary tools.
- AlternativeTo – A directory to help find alternatives to other software, with the option to only show open source software
Note: Just being open source does not make software secure!
Participate with suggestions and constructive criticism
It’s important for a website like PrivacyTools to stay up-to-date. Keep an eye on software updates for the applications listed on our site. Follow recent news about providers that we recommend. We try our best to keep up, but we’re not perfect and the internet is changing fast. If you find an error, or you think a provider should not be listed here, or a qualified service provider is missing, or a browser plugin is not the best choice anymore, or anything else… Talk to us please. You can also find us on our own Mastodon instance or on Matrix at #general:privacytools.io.
WASHINGTON (AP) — A government watchdog is launching a nationwide probe into how marketers may be getting seniors’ personal Medicare information aided by apparent misuse of a government system, officials said Friday.
The audit will be formally announced next week said Tesia Williams, a spokeswoman for the Health and Human Services inspector general’s office. It follows a narrower probe which found that an electronic system for pharmacies to verify Medicare coverage was being used for potentially inappropriate searchers seemingly tied to marketing. It raised red flags about possible fraud.
The watchdog agency’s decision comes amid a wave of relentlessly efficient telemarketing scams targeting Medicare recipients and involving everything from back braces to DNA cheek swabs.
For years, seniors have been admonished not to give out their Medicare information to people they don’t know. But a report on the inspector general’s initial probe,also released Friday, details how sensitive details can still get to marketers. It can happen even when a Medicare beneficiary thinks he or she is dealing with a trustworthy entity such as a pharmacy or doctor’s office.
Key personal details gleaned from Medicare’s files can then be cross-referenced with databases of individual phone numbers, allowing marketers to home in with their calls.
The initial audit focused on 30 pharmacies and other service providers that were frequently pinging a Medicare system created for drugstores.
The electronic system is intended to be used for verifying a senior’s eligibility at the sales counter. It can validate coverage and personal details on millions of individuals. Analyzing records that covered 2013-15, investigators discovered that most of the audited pharmacies, along with a software company and a drug compounding service also scrutinized, weren’t necessarily filling prescriptions.
Instead, they appeared to have been tapping into the system for potentially inappropriate marketing.
Medicare stipulates that the electronic queries — termed “E1 transactions”— are supposed to be used to bill for prescriptions. But investigators found that some pharmacies submitted tens of thousands of queries that could not be matched to prescriptions. In one case, a pharmacy submitted 181,963 such queries but only 41 could be linked to prescriptions.
The report found that on average 98% of the electronic queries from 25 service providers in the initial audit “were not associated with a prescription.” The inspector general’s office did not identify the pharmacies and service providers.
Pharmacies are able to access coverage data on Medicare recipients by using a special provider number from the government.
But investigators found that four of the pharmacies they audited allowed marketing companies to use their provider numbers to ping Medicare. “This practice of granting telemarketers access to E1 transactions, or using E1 transactions for marketing purposes puts the privacy of the beneficiaries’ (personal information) at risk,” the report said.
Some pharmacies also used seniors’ information to contact doctors treating those beneficiaries to see if they would write prescriptions. Citing an example, the report said, “The doctor often informed (one) provider that the beneficiary did not need the medication.”
The inspector general’s office said it is investigating several health care providers for alleged fraud involving E1 transactions. Inappropriate use of Medicare’s eligibility system is probably just one of many paths through which telemarketers and other sales outfits can get sensitive personal information about beneficiaries, investigators said.
A group representing independent drugstores expressed support for the investigation. “It’s about time,” said Douglas Hoey, CEO of the National Community Pharmacists Association. “We welcome the effort to clean up this misbehavior.” Hoey said some local pharmacists have complained of what appear to be sophisticated schemes to poach customers who take high-cost drugs.
The watchdog agency began looking into the matter after the Centers for Medicare and Medicaid Services, or CMS, asked for an audit of a mail order pharmacy’s use of Medicare’s eligibility verification system.
In a formal response to the report, CMS Administrator Seema Verma said CMS retooled its verification system last year so it automatically kicks out queries that aren’t coming from a pharmacy. More than a quarter-million such requests have been rejected, she wrote.
Medicare is committed to ensuring that the system is used appropriately, Verma added. The agency can revoke access for pharmacies that misuse the privilege and is exploring other enforcement options.
The inspector general’s office acknowledged Medicare’s countermeasures but said it wants to see how effective they’ve been.
Health care fraud is a pervasive problem that costs taxpayers tens of billions of dollars a year. Its true extent is unknown, and some cases involve gray areas of complex payment policies.
In recent years, Medicare has gotten more sophisticated, adapting techniques used by financial companies to try to head off fraud. Law enforcement coordination has grown, with strike forces of federal prosecutors and agents, along with state counterparts, specializing in health care investigations.
Officials gave no timetable for completing the audit.