Showing posts with label Google. Show all posts
Showing posts with label Google. Show all posts

Tuesday, April 9, 2013

The Internet is a Surveillance State

Brandontward - h/t to Joe Miller

I'm going to start with three data points.

One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. government and corporations were identified because they accessed Facebook from the same network infrastructure they used to carry out their attacks.

Two: Hector Monsegur, one of the leaders of the LulzSac hacker movement, was identified and arrested last year by the FBI. Although he practiced good computer security and used an anonymous relay service to protect his identity, he slipped up.

And three: Paula Broadwell,who had an affair with CIA director David Petraeus, similarly took extensive precautions to hide her identity. She never logged in to her anonymous e-mail service from her home network. Instead, she used hotel and other public networks when she e-mailed him. The FBI correlated hotel registration data from several different hotels -- and hers was the common name.

The Internet is a surveillance state. Whether we admit it to ourselves or not, and whether we like it or not, we're being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads. One reporter used a tool called Collusion to track who was tracking him; 105 companies tracked his Internet use during one 36-hour period.

Increasingly, what we do on the Internet is being combined with other data about us. Unmasking Broadwell's identity involved correlating her Internet activity with her hotel stays. Everything we do now involves computers, and computers produce data as a natural by-product. Everything is now being saved and correlated, and many big-data companies make money by building up intimate profiles of our lives from a variety of sources.

Facebook, for example, correlates your online behavior with your purchasing habits offline. And there's more. There's location data from your cell phone, there's a record of your movements from closed-circuit TVs.

This is ubiquitous surveillance: All of us being watched, all the time, and that data being stored forever. This is what a surveillance state looks like, and it's efficient beyond the wildest dreams of George Orwell.

Sure, we can take measures to prevent this. We can limit what we search on Google from our iPhones, and instead use computer web browsers that allow us to delete cookies. We can use an alias on Facebook. We can turn our cell phones off and spend cash. But increasingly, none of it matters.

There are simply too many ways to be tracked. The Internet, e-mail, cell phones, web browsers, social networking sites, search engines: these have become necessities, and it's fanciful to expect people to simply refuse to use them just because they don't like the spying, especially since the full extent of such spying is deliberately hidden from us and there are few alternatives being marketed by companies that don't spy.

This isn't something the free market can fix. We consumers have no choice in the matter. All the major companies that provide us with Internet services are interested in tracking us. Visit a website and it will almost certainly know who you are; there are lots of ways to be tracked without cookies.

Cellphone companies routinely undo the web's privacy protection. One experiment at Carnegie Mellon took real-time videos of students on campus and was able to identify one-third of them by comparing their photos with publicly available tagged Facebook photos.

Maintaining privacy on the Internet is nearly impossible. If you forget even once to enable your protections, or click on the wrong link, or type the wrong thing, and you've permanently attached your name to whatever anonymous service you're using. Monsegur slipped up once, and the FBI got him. If the director of the CIA can't maintain his privacy on the Internet, we've got no hope.

In today's world, governments and corporations are working together to keep things that way.

Governments are happy to use the data corporations collect -- occasionally demanding that they collect more and save it longer -- to spy on us. And corporations are happy to buy data from governments. Together the powerful spy on the powerless, and they're not going to give up their positions of power, despite what the people want.

Fixing this requires strong government will, but they're just as punch-drunk on data as the corporations. Slap-on-the-wrist fines notwithstanding, no one is agitating for better privacy laws.

So, we're done. Welcome to a world where Google knows exactly what sort of porn you all like, and more about your interests than your spouse does. Welcome to a world where your cell phone company knows exactly where you are all the time. Welcome to the end of private conversations, because increasingly your conversations are conducted by e-mail, text, or social networking sites.

And welcome to a world where all of this, and everything else that you do or is done on a computer, is saved, correlated, studied, passed around from company to company without your knowledge or consent; and where the government accesses it at will without a warrant.

Welcome to an Internet without privacy, and we've ended up here with hardly a fight. - CNN

Sunday, March 31, 2013

Google Honors Cesar Chavez on Easter

Dedicated  to those who don’t think there is a war on Easter or Christmas, Christianity and America’s values, traditions and the U.S.  Constitution:

clip_image001

By: Terresa Monroe-Hamilton – the NoisyRoom

Feeling lucky comrade? It’s exactly what you would expect from Google, whose motto is “Don’t be evil.” If they ever meant that, they failed miserably as proven by today’s home page which honors Socialist Cesar Chavez on Easter Sunday. It is a slap in the face to every Christian on the planet and is just downright evilly blasphemous. Google has been known for dissing the Founder’s birthdays and American history in favor of Marxist ideals and Islamic tradition. This time, they really let their mask fall.

Take a trip down Marxist memory lane to Veteran’s Day 2010:

clip_image002

TIME Newsfeed – Veteran’s Day 2010

Here is a link to Google’s Doodles. Let’s just say it is enlightening.

At least Bing was not as bad – they displayed a beautiful picture of Ukrainian Easter Eggs for their chosen page today. I can live with that – but an avowed Alinsky Socialist who was honored by our Marxist president? That just pisses me off. I’m not the only one either.

clip_image004

The late Cesar Chavez was a labor organizer who founded the United Farm Workers Union. President Barack Obama released a statement in 2011 proclaiming March 31st “Cesar Chavez Day,” declaring, “I call upon all Americans to observe this day with appropriate service, community, and educational programs to honor Cesar Chavez’s enduring legacy.” It’s his 86th birthday and all the Marxists are celebrating one of the premier community organizers of their lifetimes.

Some background on Cesar Chavez is in order here:

The late United Farm Workers leader was trained by the famous Chicago agitator, Saul Alinsky. Obama’s mentor and idol. Marxists of a feather…

KeyWiki:

In 1947, Saul Alinsky hired Fred Ross, an experienced organizer among California’s migrant farmworkers. Ross built the Community Service Organization in several cities, mostly among Latinos, recruiting new members and identifying potential leaders through house meetings and one-on-one conversations. In San Jose, California, one of the people Ross recruited was César Chávez, whom Ross hired and trained as an organizer. Chávez would later adopt these organizing ideas in starting the United Farm Workers union.

Chavez linked arms with Communist Party USA members such as Bert Corona. He was closely tied to Democratic Socialists of America as well.

New Zeal:

Trained for several years in Chicago, by the great agitator Saul Alinsky, an inspiration to DSA, Hillary Clinton and Obama himself, Cesar Chavez worked with communists and socialists his entire career.

Chavez marched under the infamous slogan “Si se puede!” – later translated into English to become Obama’s 2008 campaign slogan “Yes we can!” Many of the same radicals that marched with Chavez wound up working with Barack Obama. An identical Marxist ideology was carried forward into the Obama Administration. Among the biggest names in the Alinsky/communist/socialist movement include former Obama Labor Secretary Hilda Solis, DSA icon Dolores Huerta and Los Angeles Mayor Anthony Villaraigosa. California’s 32nd District Rep. Judy Chu also has Chavez ties and was a long-time affiliate of the now defunct Communist Workers Party.

I have long said that if you can, don’t use Google. Use Bing or another search engine. Google is so prevalent though, it is difficult to do this. If you are a Christian or a Conservative Constitutionalist, your principles may dictate that you find a way to get away from this Marxist propaganda tool that is being wielded by Obama and his cronies.

Some will say Google is doing this just to get attention. No, they don’t need the attention. This is who they are. Google has only once honored Easter and that was in 2000. Must have been a slow year for Marxists.

Glenn Beck got it right as so many did on Twitchy:

clip_image005

So, let me get this straight… Google, which is a propaganda arm for Obama, celebrates a socialist radical and disses Easter and the Resurrection. That is Google’s right and it is our right to tell them to pound sand and go elsewhere. Bing is looking better and better these days.

Ben Shapiro at Breitbart had this to say:

This is not the first time that Google has chosen to honor leftists over tradition. Back on July 4, Google plastered the words “This Land Was Made For You And Me” in its logo, in honor of Communist fellow-traveler Woody Guthrie’s This Land Is Your Land. On Christmas, Google featured a holiday-themed logo that popped up this window: “Happy Holidays from Google!”

Google can, and likely will switch out to an Easter logo sometime today. But as millions of Christians return home from Easter vigil on the holiest day of their calendar, they are currently being greeted by Cesar Chavez in a white suit.

Remember, Obama, the Department of Education and the Common Core Standards are teaching in our schools that Cesar Chavez is a “hero of the people.” Only if you are Marxist is this true. And now you see the U.S. government in true fascist style, place ideologues over faith. Every time I see pictures such as Cesar Chavez or more commonly Barack Obama’s arrogant visage, I see snapshots of Stalin, Mao, Lenin and Hitler in my mind’s eye. The faces have changed, but not the Google evil message.

As Edward Bernays would remind us… Controlling the hearts and minds of the masses is all in the messaging:

Edward Bernays – From Bacon and Eggs to Mind Control

Are You Being Brainwashed by The Media?

How Did This Happen? The Left Corrupted the Language, Undermined Morality — and There was No Pushback

The Media is the Real Enemy

VAN JONES MEDIA MOUTHPIECE GETS RUSSIAN CASH

The War on Easter: A Reminder That Jesus Is Coming Soon

So Where Is the War on Christmas Coming From? – A Worthwhile Read!

War on Christianity

Monday, March 19, 2012

NO PLACE TO HIDE AFTER THE 2012 ELECTION

This video series presents where we were just five short years ago.

No Place To Hide part 1

http://youtu.be/fIOc2YpxhxI

No Place To Hide part 2

http://youtu.be/WAA59LPuVfE

No Place To Hide part 3

http://youtu.be/qvkr9RxSot4

No Place To Hide part 4

http://youtu.be/LF8_hrpGQpI

The Obama regime and DHS have come a long way since then...

“We Are This Far From A Turnkey Totalitarian State" - Big Brother Goes Live September 2013

http://www.zerohedge.com/news/%E2%80%9Cwe-are-far-turnkey-totalitarian-state-big-brother-goes-live-september-2013

"George Orwell was right. He was just 30 years early.

In its April cover story, Wired has an exclusive report on the NSA's Utah Data Center, which is a must read for anyone who believes any privacy is still a possibility in the United States: "A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks.... Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.”... The heavily fortified $2 billion center should be up and running in September 2013." In other words, in just over 1 year, virtually anything one communicates through any traceable medium, or any record of one's existence in the electronic medium, which these days is everything, will unofficially be property of the US government to deal with as it sees fit.

The codename of the project: Stellar Wind"... Read more on Stellar Wind Here

Wired: NSAs New Data Collection Center and Details on Its Public Eavesdropping Capabilites

An interesting look at Derek Smith; he was the CEO of Choicepoint (as shown in the video). Guess what this globalist is up to these days... global pre-science...

Derek V. Smith

http://geek.net/index.php/about/directors/derek-smith/

Chairman and CEO, Institute of Global Prescience

"Derek Smith is Chairman and CEO of the Institute of Global Prescience, an interdisciplinary non-profit research, education and service organization dedicated to the pursuit of prescience – foreknowledge that anticipates global events and trends that are yet unseen. The Institute seeks to harness the passion of individuals to anticipate issues through clue detection engines that identify inflection points in technological, financial and social systems"...

Smith goes from CEO to futurist

http://www.bizjournals.com/atlanta/stories/2009/04/20/story3.html

"At the institute, students are using computer models to study such topics as whether bandwidth will be able to keep up with the growth of data flow and when the United States might elect its first atheist president.

Other topics include the future of cell phones, obesity, how attitudes will affect climate change and when the world will run out of oil"...

Take a look at the Institute of Global Prescience Board of Directors HERE. (http://www.prescienceintl.com/cti_ab.html) Notice the Federal and state government connections:

à Amy Zimpfer, Regional Deputy Director, EPA

à Anthony Eggert, Senior Policy Advisor, Office of the Chair California Air Resources Board

à Jeffrey Byron, Commissioner, CEC

à Paul Douglas, Supervisor, Renewable Procurement and Resource Planning, California Public Utilities Commission (CPUC)

à Trina Martynowicz, Clean Air Emerging Technologies and West Coast Collaborative, Clean Energy and Climate Change Office, U.S. Environmental Protection Agency (EPA)

Google and PG&E (think ‘SMART Meters’) are also represented.

The Institute of Global Prescience is but one of many, many non-profits, NGO’s and individuals seeking to destroy our country from within.

Is it the intention of American tax-payers to have their hard earned dollars spent on the development of a turnkey Totalitarian State? Do we support massive government spending on programs that are in direct violation of our right to privacy under the 4th Amendment? Do Americans understand that current elected officials are facilitating and funding these endeavors with our tax dollars? Will enough Americans wake up, organize and vote the career politicians out of office in November?

The real revolution must take place at the ballot box. Until enough of us can vote against the career politicians who are aiding and abetting the overthrow of our Constitutional Republic, we will have no place to hide once they turn that key. What you do for the 2012 election will determine our fate and that of future generations.

By AJ - h/t to MJ

**We all know that Big Brother is watching us 24/7 with cameras almost everywhere and through our TV cable box and the GPS system in your car, but today on Fox, Shep Smith pointed out and discussed with Judge Napolitano that Panetta and the CIA verified that they can also monitor us through our refrigerator, microwaves and other appliances.  (Have not been able to find the video yet, but check back later).

Friday, January 27, 2012

To Google, Facebook, Twitter…. Or Not? - Perhaps Time to Assess Your Use and Membership? - Updated

googile_irish_hq_thumb[2]

Google

Many of you may have received the email below…

Dear Google user,

We're getting rid of over 60 different privacy policies across Google and replacing them with one that's a lot shorter and easier to read. Our new policy covers multiple products and features, reflecting our desire to create one beautifully simple and intuitive experience across Google.

We believe this stuff matters, so please take a few minutes to read our updated Privacy Policy and Terms of Service at http://www.google.com/policies. These changes will take effect on March 1, 2012.

One policy, one Google experience

Easy to work across Google

Our new policy reflects a single product experience that does what you need, when you want it to. Whether reading an email that reminds you to schedule a family get-together or finding a favorite video that you want to share, we want to ensure you can move across Gmail, Calendar, Search, YouTube, or whatever your life calls for with ease.

Tailored for you

If you're signed into Google, we can do things like suggest search queries – or tailor your search results – based on the interests you've expressed in Google+, Gmail, and YouTube. We'll better understand which version of Pink or Jaguar you're searching for and get you those results faster.

Easy to share and collaborate

When you post or create a document online, you often want others to see and contribute. By remembering the contact information of the people you want to share with, we make it easy for you to share in any Google product or service with minimal clicks and errors.

Protecting your privacy hasn't changed

Our goal is to provide you with as much transparency and choice as possible, through products like Google Dashboard and Ads Preferences Manager, alongside other tools. Our privacy principles remain unchanged. And we'll never sell your personal information or share it without your permission (other than rare circumstances like valid legal requests).

Understand how Google uses your data

If you want to learn more about your data on Google and across the web, including tips and advice for staying safe online, check out http://www.google.com/goodtoknow

Got questions?
We got answers.

Visit our FAQ at http://www.google.com/policies/faq to read more about the changes. (We figured our users might have a question or twenty-two.)

Notice of Change

March 1, 2012 is when the new Privacy Policy and Terms will come into effect. If you choose to keep using Google once the change occurs, you will be doing so under the new Privacy Policy and Terms of Service.

Please do not reply to this email. Mail sent to this address cannot be answered. Also, never enter your Google Account password after following a link in an email or chat to an untrusted site. Instead, go directly to the site, such as mail.google.com or www.google.com/accounts. Google will never email you to ask for your password or other sensitive information.

Many people are thinking of leaving Google and its tentacle services because this is just another consolidated grouping of information for Big Brother to monitor us and Google, like facebook, and others turn all their (your) information to the government.

Remaining with them or changing is something everyone should consider!

Here some really helpful links.  If you want to close your account, from what I read, they will delete everything… at least that is what they claim… guess we will see if they really do or if if you information ends up in digital space forever:


How to close your Google Account

FAQ: Google’s new privacy policy

Poll: Will you cancel your account?

Google faces backlash over privacy changes

Rea lMan's Computer Room_thumb[3]

The continuing onslaught against individual freedoms and the intrusion of government into our lives has inspired computer room like this one…

Additional Information:

Google announces privacy settings change across products; users can't opt out

Global Search - Cuil!
http://www.cuil.pt/
Search
Is not powered by google, and not hosted in USA.
Every .com is.
http://www.cuil.pt/
Use Scroogle - very cool.
https://ssl.scroogle.org/
Read about it here:
www.scroogle.org
https://ixquick.com/
USE https://ixquick.com/ FOR PRIVACY
www.startpage.com
I've been using duckduckgo.com recently instead of Google and I like it.
www.duckduckgo.com
and their privacy policy[link to donttrack.us]
http://freenetproject.org/
http://www.godlikeproductions.com/forum1/message1764993/reply29288017

Not sure if this has been mentioned or not...

But I work in a web agency and EVERY single one of the sites we produce uses google hosted code. Its mainly for analytic data for our customers. If you've ever seen google analytic data and understand that 100% of our sites (and I'm sure its almost 100% of any other agency's sites) use this code... that means the scope of this is so huge I can't think straight! Google can very easily track people's web usage through this analytic code.

It doesn't matter if you are on a google made site or not, if the use google hosted code then they know!

Heck even GLP uses it. If you know how to view source look at the bottom of this site.
https://apis.google.com/js/plusone.js
http://www.google.com/enterprise/government/

Google announces privacy changes across products; users can’t opt out
http://www.washingtonpost.com/business/technology/google-tracks-consumers-across-products-users-cant-opt-out/2012/01/24/gIQArgJHOQ_story.html

Google will soon know far more about who you are and what you do on the Web.

The Web giant announced Tuesday it is planning to follow the activities of users across nearly all of its ubiquitous sites, including YouTube, Gmail and its leading search engine.

Google has already been collecting some of this information. But for the first time, it is combining data across its Web sites to stitch together a fuller portrait of users.

Consumers won’t be able to opt out of the changes, which take effect March 1. And experts say the policy shift will invite greater scrutiny from federal regulators of the company’s privacy and competitive practices.

The move will help Google better tailor its ads to people’s tastes. If someone watches an NBA clip online and lives in Washington, the firm could advertise Washington Wizards tickets in that person’s Gmail account.

Consumers could also benefit, the company said. When someone is searching for the word “jaguar,” Google would have a better idea of whether the person was interested in the animal or the car. Or the firm might suggest e-mailing contacts in New York when it learns you are planning a trip there.

But, say consumer advocates, the new policy might upset people who never expected their information would be shared across so many different Web sites.

A user, for instance, may not want Google to use your social network to alert estranged friends — or your boss — that you are around the corner at a bar.

“Google’s new privacy announcement is frustrating and a little frightening,” said Common Sense Media chief executive James Steyer. “Even if the company believes that tracking users across all platforms improves their services, consumers should still have the option to opt out — especially the kids and teens who are avid users of YouTube, Gmail and Google Search.”

Google can collect information about users when they activate an Android mobile phone, sign into their accounts online or enter search terms. It can also store cookies on people’s computers to see which Web sites they visit or use its popular maps program to estimate their location.

The change to its privacy policies come as Google is facing stiff competition for the fickle attention of Web surfers. It recently disappointed investors for the first time in several quarters, failing last week to meet earnings predictions. Apple, in contrast, reported record earnings Tuesday that blew past even the most optimistic expectations.

Some analysts said Google’s move is aimed squarely at Apple and Facebook — which have been successful in building unified ecosystems of products that capture people’s attention. Google, in contrast, has adopted a more scattered approach, but an executive said in interviews that the company wants to create a much more seamless environment across its various offerings.

“If you’re signed in, we may combine information you’ve provided from one service with information from other services,” Alma Whitten, Google’s director of privacy for product and engineering wrote in a blog post.

“In short, we’ll treat you as a single user across all our products which will mean a simpler, more intuitive Google experience,” she said.

Google said it would notify its hundreds of millions of users of the change through an e-mail and a message on its Web sites. It will apply to all of its services except for Google Wallet, Chrome browser and Google Books.

The company said the change would simplify the company’s privacy policy — a move that was encouraged by regulators.

Still, some consumer advocates and lawmakers remained skeptical.

“There is no way anyone expected this,” said Jeffrey Chester, executive director of privacy advocacy group the Center for Digital Democracy. “There is no way a user can comprehend the implication of Google collecting across platforms for information about your health, political opinions and financial concerns.”

Added Rep. Edward J. Markey (D-Mass): “It is imperative that users will be able to decide whether they want their information shared across the spectrum of Google’s offerings.”

Google has increasingly been a focus of Washington regulators.

The company recently settled a privacy complaint by the Federal Trade Commission after it allowed users of its now defunct social network Google Buzz to see contacts lists from its e-mail program.

And a previous decision to use its social network data in search results has been included in a broad Federal Trade Commission investigation, according to a person familiar with the matter who spoke on the condition of anonymity because the investigation is private.

Federal officials are also looking at whether Google is running afoul of antitrust rules by using its dominance in online search to favor its other business lines.

Claudia Farrell, a spokeswoman at the FTC, declined to comment on any interaction between Google and regulators on its new privacy changes.

More on this story:

How to close your Google Account

FAQ: Google’s new privacy policy

Poll: Will you cancel your account?

Google faces backlash over privacy changes

PHOTOS | What products are impacted by new policy?

Twitter, Facebook, MySpace cry foul on Google search

Google updates social-networking name policy

European privacy proposal includes ‘right to be forgotten’

A couple of comments that I thought were interesting.

http://www.godlikeproductions.com/forum1/message1764993/reply29288156

Google has been doing this all along as does Apple, MS and so on. Limit or don't use their services in your first line of defense. If not possible then learn all you can about your device and take FULL control of it, flash it, root it, kernel secure it and spank those apps and daemons who are like little children leaking sensitive info about you to these data collectors without your knowledge.

Don't forget to learn to really disable gps, mic and your cam when necessary cause they are bugged. At this point you will be half way secure and well on your way to freedom. However there is a whole another world of hidden service, exploit and leak potentials within your device that are publically unspoken of and that you will need to discover over time.

Last piece of advice, learn to game the algorithm that is at all times trying to predict who you are and what your next move is.
http://www.godlikeproductions.com/forum1/message1764993/reply29289587   (Did you know could block a website this way?)
I just went to my internet options and blocked www.google.com signed out of you tube and tried signing back in, got a notice, you have disabled your cookies please turn them back on..But it is not March 1, yet is it?

Facebook

Look at timing with Google’s announcement—perhaps time to flee them both!

Facebook Timeline Mandatory For All Users - With Just 7 Days To 'Clean Up'

Facebook's Timeline - a new look for people's Profile pages which exposes their entire history on the site - will become mandatory for all users.

The 'new look' has been voluntary up until now.

From now, users will simply be notified that they are being 'updated' via an announcement at the top of their home page, which users click on to activate Timeline.

As with voluntary switches to Timeline, those who are 'updated' will have just seven days to select which photos, posts and life events they want to advertise to the world.

Via the official Facebook blog, the site announced, 'Last year we introduced timeline, a new kind of profile that lets you highlight the photos, posts and life events that help you tell your story.'

'Over the next few weeks, everyone will get timeline. When you get timeline, you'll have 7 days to preview what's there now.

'This gives you a chance to add or hide whatever you want before anyone else sees it.'

Timeline has been criticized for showing off pictures and posts that people might have wanted to forget.

The new look also pairs with 'timeline apps', such as Spotify, which post every time people listen to a song, or eat a recipe or visit somewhere.

'You can learn more about these new features by taking the quick tour available at the top of your timeline,' says Facebook.

'If you want to get timeline now, go to the Introducing Timeline page and click 'Get Timeline.'Or you can wait until you see an announcement at the top of your home page.'

Mark Zuckerberg described timeline as letting you 'tell the whole story of your life on a single page'.

The redesigned pages have a more magazine-like photo-heavy feel, with a large 'cover photo' at the top of the page.

On the right of the page there will be a timeline that breaks down all posts from a person's time on Facebook and allows viewers to jump back to people's earliest posts with a break down month-by-month.

Some were puzzled by the abrupt roll-out of the change, which is one of the biggest changes to Facebook - all the more so when paired with the new Timeline apps, such as Spotify, which posts a continuous stream of all songs listened to to your Timeline.

A user listening to Spotify on a smartphone, for instance, will default to posting every song to their Timeline for all to see. As with all Timeline features, there are various opt-outs, but they can be fiddly to find and use.

Likewise, e-book readers such as Kobo and video services such as Netflix can post every book and film people consume to Timeline.

Many sites published guides to how to 'hide' controversial content. Twitter users had mixed reactions.

Reactions included, 'I don’t want a timeline on my facebook - why do you force me to have one?' and 'I hate Facebook timeline design with a vengeance. More frippery and less function. Why are they forcing it on us?'

Many were shocked by how rapidly timeline had become compulsory.

Tech site Mashable said, 'Facebook must know that putting a ticking clock in front of users is bound to make very few of them happy, yet here it is, stop watch in hand. Here’s my theory.'
'Timeline apps aren't very effective without it. Conducting most of your day-to-day activities, like watching movies, sharing content, reading news, eating out, and more — that’s new. None of this has quite the same impact without Timeline.'

So far, Facebook has announced a few dozen Timeline apps.

Many sites recommend vetting apps carefully to see what they will post, and creating lists of friends to 'share' certain updates with, rather than bombarding your whole friends list.
Tech site CNET warns, 'Once you install an app and authorize it to post stories on your profile and News Feed, it'll never ask for your permission again.'

'If you love to cook, you can add the Foodily app to your timeline and share your latest dishes. If your friends have added the Foodily app, you can discover new recipes with each other, as you'll see their updates in the ticker and their timeline, and possibly News Feed.'
Facebook says that more Timeline apps, covering more interests will launch soon.

'Our vision for Timeline and our vision for the application platform is whatever you love and whatever story you want to tell, you can add that to your Timeline,' said Carl Sjogreen, Facebook's product management director.

Facebook Timeline with Apps and Ticker:
'Our message to developers is 'start your engines',' said Sjogreen.

Read more: http://www.dailymail.co.uk/sciencetech/article-2091735/Facebook-Timeline-mandatory-users--just-7-days-clean-up.html#ixzz1kb0jJtmF

SIDEBAR

PROTECTING YOUR PROFILE FROM PRYING EYES - WHAT TO DO IN THE SEVEN DAYS FACEBOOK ALLOWS YOU

Once timeline is activated on your profile, you have seven days to 'clean up' - and you will probably want to.

Things from your past that may have been previously hidden deep within your photos or timeline can be much more visible.

If there is anything particularly you don’t want shown, such as your relationship status from five years ago - which will be public by default - you’re best to click on the right hand side to the year it occurred, such as 2006, find the post and choose to either delete or hide it.

It all has to be done manually.

You can now choose directly from the right-hand side of nearly every section on profile who sees what for individual sections (such as photos, posts, likes etc). When you click on the item, you can choose whether it is seen publicly, by friends or by a customized list.

If you enable any timeline apps, be sure to read their privacy policies thoroughly - many will not ask again before posting information to your profile. Spotify, for instance, will default to filling your timeline with what you listen to, unless you tell it not to.

Facebook now has the ‘View profile as’ feature on the main page, rather than in privacy settings. This lets you check how different people can see your profile so you can then customize it as you wish.

For those looking to DELETE their facebook accounts permanently not just deactivate remove the spaces and copy paste this into your browser

If your doing it too replace your existing facebook account make sure your change your email address and password to something else first so you can use your original email. Funny how they hide this form.... HAH found youuuu!


https://ssl.facebook.com/help/contact.php?show_form=delete_account

Read more: http://www.dailymail.co.uk/sciencetech/article-2091735/Facebook-Timeline-mandatory-users--just-7-days-clean-up.html#ixzz1kb125TKI

· Twitter to selectively 'censor' tweets by country

Friday, January 27, 2012 2:42:33 AM · by EnglishCon · 4 replies

BBC News ^ | 01/27/12 | BBC News

Twitter has announced that it now has the technology to selectively block tweets on a country by country basis. In its blog, Twitter said it could "reactively withhold content from users in a specific country". But it said the removed content would be available to the rest of the world. Previously when Twitter deleted a tweet, it would disappear worldwide. --- In its blog post, Twitter explained that its international growth meant entering countries "that have different ideas about the contours of freedom of expression", citing France or Germany which ban pro-Nazi content as examples.

Tuesday, January 3, 2012

Afghanistan's dancing boys

It really just doesn’t stop… Remember the horrible info on child brides and abuse of women and girls under Sharia Law? Now get a load of this:

Human Cattle and the "Muslims" of Afghanistan's Gentlemen of Perversion… Not only in Afghanistan is the "Muslim" tradition of pedophilia perversion rampant, but so is it in Saudi Arabia.  What is even more interesting is that the whole world is aware of this "Muslim" perversion yet the "Arabic Muslim" world seems to be unaffected.  This in itself demonstrates the strangle hold that the "Islamic" world already has on the power elite and over those who abhor such practices.  As with many distasteful practices in the "Islamic" world (like stoning) so is the case of the use and abuse of Muslim women, but also women from the Slavic regions, Europe, and even the U.S. Those who either do not make the grade as sexual servants or slave labor, in one form or another end up being the victims of a jealous lead wife, are used as unwilling organ donors for a never ending market, or left to wander in the desert to die… never be heard of again. A~

"Watch the video below"

clip_image001

THURSDAY, 22 APRIL 2010

Frontline: Dancing Boys of Afghanistan

clip_image002

On Tuesday night, I watched the harrowing Frontline: The Dancing Boys of Afghanistan which exposed an ancient practice known as as "bacha bazi" which, literally translated, means 'boys' play'.

This illegal practice exploits orphans and street boys, and has been revived by powerful warlords, businessmen and military commanders in Afghanistan. These men dress the boys in women's clothes, who are trained to sing and dance for their enjoyment. The dancing boys are also used sexually by these men.

This is outstanding journalism by Afghan journalist Najibullah Quraishi, and my hat's off to PBS and to the Frontline producers for doing such an admirable job. I was particularly impressed by Quraishi and his producers' attempts to arrange the rescue of one of the dancing boys profiled in the film, an 11-year-old boy bought from an impoverished rural family.

In contrast with other productions (see my post of yesterday, for instance) the 11-year boy's face was blurred throughout the film to preserve his anonymity and self-respect.

Homosexuality is forbidden in Islam, and yet pederasty and boy concubinage has had a long history in the Persian cultural world which includes much of Afghanistan.

Video: The Dancing Boys of Afghanistan - CLOVER-FILMS

Related:

Australia: Sharia – Sanctioned Polygamy and Child Marriage

Saudi Cleric Issues Fatwa Defending Pedophilia as Marriage

BBC:   The Sexually Abused Boys of Afhanistan

Pam Geller on Fox Business: Mainstreaming Sharia and Islamic Gender Apartheid

German View of Islam

Lambs to the Slaughter

Check out “Muslim Leader Admits Islam Not a Religion of Peace”…

Women, children of both sexes, animals, Christians, Jews… who is not in line for their abuse? Yet, these are the people we are allowing to use the (our) U.S. Constitution against us… Wake-up America! You just need to look at practices in the Middle East and Europe to see what is coming!! You can continue to look away, but this won’t get better or go away… in fact it will come to your neighborhood!

However we better start speaking up soon… or it may be to late!  Today courts in India… tomorrow?

clip_image001[5]

clip_image002[6]

“On Saturday a Delhi Court ordered 22 social networking sites, including Yahoo and Microsoft, to wipe the objectionable and defamatory contents and file compliance reports by February 6, 2012.”

“A Google spokesperson told the website: 'We comply with valid court orders wherever possible, consistent with our long standing policy.”

Court orders Google and Facebook to remove all anti-Islamic content

Social websites including Google and Facebook have been ordered by an Indian court to remove all 'anti-religious' and 'anti-social' content within six weeks.

On Saturday a Delhi Court ordered 22 social networking sites, including Yahoo and Microsoft, to wipe the objectionable and defamatory contents and file compliance reports by February 6, 2012.

Additional Civil Judge Mukesh Kumar passed the order on a suit filed by Mufti Aijaz Arshad Qasmi seeking to restrain the websites from circulating objectionable and defamatory contents.

Qasmi had objected to a number of images on the websites which he complained would cause 'irreparable loss and injury to the people who are offended by them'.

He argued that some of the images defamed Hindu gods, Prophet Mohammed and other religious figures, India Today website reported.

The order will raise serious questions about how users' posts and opinions will be edited, censorship and freedom of expression.

On December 22 Judge Kumar had issued summonses to the social networking sites, demanding they remove photographs, videos or texts that might offend religious sentiments, the Hindustan Times website reported.

The order comes a day after a criminal court issued summonses to the sites for facing trial for allegedly webcasting objectionable contents.

Santosh Pandey, appearing for complainant Mufti Aijaz Arshad Qasmi, told The Hindu Times after the court hearing that the websites have to submit a report to the court by February 6 describing the action they had taken to remove the contents from the websites.

Representatives of Yahoo India Pvt Ltd and Microsoft told the court that they had not got copies of the order and complaint against them, but Qasmi's counsel told the court that he would supply the relevant documents to them, according to the Hindustan Times.

The order comes at a controversial time as IT minister Kapil Sibal had recently discussed with representatives of some of the companies ways to guarantee the offensive contents are not posted.

India Today quoted him as saying: 'There were some demeaning, degrading, clearly pornographic depictions of gods and goddesses which no reasonable, sensible person anywhere in the world would accept, on any site.

The minister insisted he was not smothering free speech but was suggesting screening possible 'incendiary' material.

The Hindu Times reported Facebook India, Facebook, Google India Pvt Ltd, Google Orkut, Youtube, Blogspot, Microsoft India Pvt Ltd, Microsoft, Zombie Time, Exboii, Boardreader, IMC India, My Lot, Shyni Blog and Topix were all given the order.

A Google spokesperson told the website: 'We comply with valid court orders wherever possible, consistent with our long standing policy.

'We're yet to receive the details of this order and can't comment on this specific case.'

-----------

Mark Hass

Director@EducateUSA.com

www.EducateUSA.org

View current list of Signatories to the Briefing document

Tolerance becomes a crime when applied to evil. Thomas Mann

Thursday, September 22, 2011

GOP Presidential Debate - Updated

Rick Perry

Frank Luntz Poll:  Mitt Romney was the Winner but overall debate was good for all.

Republican Presidential Debate pt.1

September 22, 2011 News Corp

Republican Presidential Debate pt.1 -  I think this is numbered incorrectly and it is part 2

September 22, 2011 News Corp

Republican Presidential Debate pt.3

September 22, 2011 News Corp

Republican Presidential Debate pt.4

September 22, 2011 News Corp

Republican Presidential Debate pt.5

September 22, 2011 News Corp

Republican Presidential Debate pt.6

September 22, 2011 News Corp

Republican Presidential Debate pt.7

September 22, 2011 News Corp

Republican Presidential Debate pt.8

September 22, 2011 News Corp

Republican Presidential Debate pt.9

September 22, 2011 News Corp

Republican Presidential Debate pt.10

September 22, 2011 News Corp

Watch the full CNN/Tea Party debate here

Cancer Survivor Herman Cain: ‘I Would Be Dead’ on Obamacare

WATCH Cancer Survivor Herman Cain: ‘I Would Be Dead’ on Obamacare

Government bureaucrats can't be the ones in charge of your cancer treatment.

Read More »

Johnson: My Neighbor’s Dogs ‘Created More Shovel-Ready Jobs Than This Current Administration’

WATCH Johnson: My Neighbor’s Dogs ‘Created More Shovel-Ready Jobs Than This Current Administration’
POLITICS
Read More »

It was his "moment."

Santorum: Obama is ‘The New King George III’

WATCH Santorum: Obama is ‘The New King George III’
POLITICS

The president "doesn't understand what America is all about..."

Read More »

Mitt Romney: ‘I Want Everybody in America to Be Rich’

WATCH Mitt Romney: ‘I Want Everybody in America to Be Rich’
POLITICS

And Michele Bachmann does not want Americans to pay income tax.

Read More »

Perry: ‘I Don’t Think You Have a Heart’ If You Oppose In-State Tuition for Children of Illegal Immigrants

Perry: ‘I Don’t Think You Have a Heart’ If You Oppose In-State Tuition for Children of Illegal Immigrants
POLITICS

Read More »

Herman Cain: If You Mess With Israel, You’re Messing With the USA

WATCH Herman Cain: If You Mess With Israel, You’re Messing With the USA
POLITICS

Candidates weighed in on the Palestinians' unilateral bid for a UN recognized state.

Read More »

Romney and Perry Spar Over Whose Book is Worse Politically

WATCH Romney and Perry Spar Over Whose Book is Worse Politically
POLITICS

"I actually wrote my book," Romney quipped.

Read More »

Ron Paul won the FOX News' after debate online poll with nearly 40% of the over 70,000 votes cast...

Tuesday, June 28, 2011

Microsoft Files Patent For Software That Allows The Government To Spy on All Personal Digital Communications

Microsoft Files Patent For Software That Allows The Government Spy On All Personal Digital CommunicationsA patent filed by Microsoft reveals the company has voluntarily created software that provides the Government and other agencies seeking to spy on you  with the ability to easily intercept,  re-route and record all forms of personal digital communications, including Skype calls which are directly named in the patent.

A patent filed by Microsoft seeks to give the company exclusive rights to intercept personal electronic communications and resend them directly to the Government and other agencies who may be seeking to spy on you.

By filing the patent, Microsoft clearly shows they have voluntarily created the software,  instead of waiting for a Government mandate to do so. The patent states that “the  government or one of its agencies may need to monitor communications” and software acts as a “recording agent” that is able to silently record the communication”.

The patent specifically names certain types of communications, such as Skype calls, instant messaging, video conferencing software, and even meeting software but does not stop there. Instead it goes on to label just about all electronic devices you can think of as a computer and requests for a patent to be able to intercept digital communications from those devices, and even access data stored in a variety of other storage mediums, and forward the to the Government.

A Gizmodo article on the patent points out that Microsoft appears to trying to patent Skype spying,  which is specifically named within the patent,  but the scope of patent goes far beyond the ability to just spy on Skype calls.

Only by digging into the patent can you see the deceptiveness in Microsoft’s the labeling of certain technologies and realize the true scope of what the software company is trying to provide the Government easy access to spy on.

For example, the label all packet-based communication as VoIP, which clearly nothing is further from the truth. All data that can be sent over the internet is a “packet-based communication”.

[...] the term VoIP is used to refer to standard VoIP as well as any other form of packet-based communication that may be used to transmit audio over a wireless and/or wired network. For example, VoIP may include audio messages transmitted via gaming systems, instant messaging protocols that transmit audio, Skype and Skype-like applications, meeting software, video conferencing software, and the like.

The patent goes on and deceptively labels all digital electronic devices as computers, say that everything from computers, to printers, gaming devices, automobile systems, even printers, home appliances and all other mobile based electronics are computers. The patent even applies to microcontroller which are often the brain of electronic devices and used in products ranging from automobile engine control systems, implantable medical devices, remote controls, office machines, appliances, power tools, and even toys.

A computer may include any electronic device that is capable of executing an instruction[...]

Examples of well known computing systems, environments, or configurations that may be suitable for use [include] personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microcontroller-based systems, set-top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, personal digital assistants (PDAs), smartphones, gaming devices, printers, appliances including set-top, media center, or other appliances, automobile-embedded or attached computing devices, other mobile devices, distributed computing environments that include any of the above systems or devices, and the like.

The patent also doesn’t stop with computers or even communications for that matter. It targets a variety of offline mediums that can used to store data and even computer programs themselves.

[...] a variety of computer-readable media [including] any available media that can be accessed by the computer  removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data.

Computer storage media includes RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile discs (DVDs) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer.

The patent further reveals that the software’s capability includes the ability to intercept all digital communications regardless of the medium, or whether they are online or offline, bluntly including the ability to intercept all modulated data signals.

Communication media typically embodies computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media.

Quoted directly from US patent application 20110153809:

June 23, 2011- Assignee: Microsoft Corporation

Legal Intercept

Aspects of the subject matter described herein relate to silently recording communications. In aspects, data associated with a request to establish a communication is modified to cause the communication to be established via a path that includes a recording agent. Modification may include, for example, adding, changing, and/or deleting data within the data. The data as modified is then passed to a protocol entity that uses the data to establish a communication session. Because of the way in which the data has been modified, the protocol entity selects a path that includes the recording agent. The recording agent is then able to silently record the communication.

Claims


1. A method implemented at least in part by a computer, the method comprising: receiving data regarding establishing a communication session between at least two entities via a switched packet network for a communication that includes audio; locating one or more parameters in the data that indicate one or more local candidate communication points of at least one of the at least two entities; removing the one or more parameters from the data to cause the communication session to be established over a path that includes a recording agent that is capable of silently copying the communication between the at least two entities; and providing the data with the parameters removed to a protocol entity that uses the data to follow a communication protocol to establish the communication session via the path, the protocol entity potentially including one or more of the at least two entities and/or any entity that interacts with one or more of the at least two entities.

2. The method of claim 1, wherein receiving data regarding establishing a communication session between at least two entities comprises receiving the data from a call server that is involved in establishing the communication session, the call server responsible at least for relaying invite requests from a requesting one of the entities to a receiving one of the entities, the call server configurable to provide the data to a recording agent before establishing the communication session.
[...]

20. The apparatus of claim 19, further comprising a recorder manager operable to configure a recording agent to silently copy communication transmitted via the communication session.

Description


BACKGROUND

[0001] Plain old telephone service (POTS) allows people from all over the world to talk to each other through the use of telephones. POTS has been around since the late 19th century and has remained basically the same. In traditional usage, POTS has transmitted voice communications using electrical signals that are transmitted via pairs of wires. Central offices establish connections between callers and those called.

[0002] Sometimes, a government or one of its agencies may need to monitor communications between telephone users. To do this with POTS, after obtaining the appropriate legal permission, a recording device may be placed at a central office associated with a selected telephone number. Electrical signals corresponding to sound to and from the telephones at the selected telephone number may be monitored and transformed into sound. This sound may then be recorded by the recording device without the telephone users being aware of the recording. With new Voice over Internet Protocol (VoIP) and other communication technology, the POTS model for recording communications does not work.

[...]
SUMMARY

[0004] Briefly, aspects of the subject matter described herein relate to silently recording communications. In aspects, data associated with a request to establish a communication is modified to cause the communication to be established via a path that includes a recording agent. Modification may include, for example, adding, changing, and/or deleting data within the data. The data as modified is then passed to a protocol entity that uses the data to establish.

Exemplary Operating Environment

[...]

[0015] Aspects of the subject matter described herein are operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, or configurations that may be suitable for use with aspects of the subject matter described herein comprise personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microcontroller-based systems, set-top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, personal digital assistants (PDAs), smartphones, gaming devices, printers, appliances including set-top, media center, or other appliances, automobile-embedded or attached computing devices, other mobile devices, distributed computing environments that include any of the above systems or devices, and the like.

[0016] Aspects of the subject matter described herein may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, and so forth, which perform particular tasks or implement particular abstract data types. Aspects of the subject matter described herein may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.

[0017] With reference to FIG. 1, an exemplary system for implementing aspects of the subject matter described herein includes a general-purpose computing device in the form of a computer 110. A computer may include any electronic device that is capable of executing an instruction. Components of the computer 110 may include a processing unit 120, a system memory 130, and a system bus 121 that couples various system components including the system memory to the processing unit 120. The system bus 121 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, Peripheral Component Interconnect (PCI) bus also known as Mezzanine bus, Peripheral Component Interconnect Extended (PCI-X) bus, Advanced Graphics Port (AGP), and PCI express (PCIe).

[0018] The computer 110 typically includes a variety of computer-readable media. Computer-readable media can be any available media that can be accessed by the computer 110 and includes both volatile and nonvolatile media, and removable and non-removable media. By way of example, and not limitation, computer-readable media may comprise computer storage media and communication media.

[0019] Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data. Computer storage media includes RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile discs (DVDs) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer 110.

[0020] Communication media typically embodies computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media.

[...]

Legal Intercept

[0028] As mentioned previously, traditional techniques for silently recording telephone communication may not work correctly with VoIP and other network-based communication technology. As used hereafter, the term VoIP is used to refer to standard VoIP as well as any other form of packet-based communication that may be used to transmit audio over a wireless and/or wired network. For example, VoIP may include audio messages transmitted via gaming systems, instant messaging protocols that transmit audio, Skype and Skype-like applications, meeting software, video conferencing software, and the like.

[...]

Source: US Patent Office  -  Posted at AlexanderHiggins.com

Is anyone surprised out there?? Bill Gates… Mr. Bilderberg depopulation guy himself wants to help the government spy on you??

Thursday, May 5, 2011

WikiLeaks founder Julian Assange rails against Facebook, says it's a spy tool for US government… Plus Other Steve Quayle Alerts

The founder of WikiLeaks Julian Assange said that Facebook is the most 'appaling spying machine ever invented'.

Video on the page:  WikiLeaks Founder Julian Assange Rails Against Facebook, Says It's A Spy Tool For US Government  (See other alerts below)

Maybe he's a MySpace guy.

WikiLeaks founder Julian Assange called Facebook "the most appalling spying machine ever invented" in an interview with Russia Today, pointing to the popular social networking site as one of the top tools for the U.S. to spy on its citizens.

"Here we have the world's most comprehensive database about people, their relationships, their names, their addresses, their locations, their communications with each other and their relatives, all sitting within the United States, all accessible to US Intelligence," he said. "Facebook, Google, Yahoo, all these major U.S. organizations have built-in interfaces for US intelligence.

"Everyone should understand that when they add their friends to Facebook they are doing free work for the United States intelligence agencies," he added.

The comments were a bit strange, coming from the founder of a website best known for pushing spilling secret information.

In an email to the Daily News, a Facebook spokesman denied the company was doing anything that they weren't legally obligated to do, saying that "the legal standards for compelling a company to turn over data are determined by the laws of the country, and we respect that standard."

"We don't respond to pressure, we respond to compulsory legal process," the spokesperson wrote. "There has never been a time we have been pressured to turn over data -- we fight every time we believe the legal process is insufficient."

In any event, many Facebook users have been increasingly concerned about the sharing of their information.

In 2010, three Democratic senators asked the FTC to look at the social networking site's information-sharing policies.

The Wall Street Journal has reported that popular Facebook apps like Farmville and Causes also shared users' information with advertising and tracking companies.

Concerns about information-sharing has seemingly done little to dissuade the more than 250 million people who use Facebook - including someone who created an official WikiLeaks page on the site.

More than 1.72 million people clicked that they like it.

Assange is currently in England, awaiting extradition to Sweden to face sexual assault charges.

Get your kids and grandkids off facebook… better yet off all the electronic gadgets.  Did you know that everything you have put on facebook remains there, including photos, even if you close your account?!?

Alerts:  Steve Quayle. - http://stevequayle.com/index1.html (5.4.11)

Paper Silver War Intensifies: Today we witnessed another raid orchestrated by the bankers. They generally wait until the physical markets, in London are put to bed before they strike. Last night,I told you that the Comex initiated a 3rd margin increase as the bankers were scared out of their minds as to the huge demand for silver metal. The on top of that, the bankers called on additional support by the brokerage firms as it was necessary for the bankers to try and force as many longs as possible to pitch their positions so the bankers could cover their short position. Please pay special attention to the following announcement: more

Foreign Military Troops Train in California Desert: I was listening to Hawk's Friday evening broadcast and I wanted to tell you what American soldiers have talked about regarding foreign troops. I live near Fort Irwin here in California. I have been told that Iraqi troops, German troops and other Nato troops train out in the desert. They have mock cities and practice searches and road blocks. These troops are allowed to shop in the PX however, I do not know if they can leave the base. more

WikiLeaks Founder Julian Assange Rails Against Facebook, Says It's A Spy Tool For US Government: WikiLeaks founder Julian Assange called Facebook "the most appalling spying machine ever invented" in an interview with Russia Today, pointing to the popular social networking site as one of the top tools for the U.S. to spy on its citizens. "Here we have the world's most comprehensive database about people, their relationships, their names, their addresses, their locations, their communications with each other and their relatives, all sitting within the United States, all accessible to US Intelligence," he said. "Facebook, Google, Yahoo, all these major U.S. organizations have built-in interfaces for US intelligence. more

Occult Timing Associated With Osamas Hollywood Scripted Assassination From Rob Skiba: Are you kidding me?? Seal Team 6 killed OBL on the 66th anniversary of Hitler's death on the same day the Illuminati was created at 3:30 EST (33) as the result of putting a bullet through his LEFT EYE!! Come on guys! Wake up. They're just mocking your total ignorance if you can't see through this scam. go to archives

Top Secret Stealth Helicopter Program Revealed in Osama Bin Laden Raid: Experts: Before an elite team of U.S. Navy SEALs executed a daring raid that took down Osama bin Laden, the commandos were able to silently sneak up on their elusive target thanks to what aviation analysts said were top secret, never-before-seen stealth-modified helicopters. In the course of the operation that cost the al Qaeda leader his life, one of the two Blackhawk helicopters that carried the SEALs into bin Laden's Pakistani compound grazed one of the compound's wall and was forced to make a hard landing. With the chopper inoperable, at the end of the mission the SEALs destroyed it with explosives. more go to archives