Internet - World Wide Web


Internet Privacy - Internet Safety - Child Safety - Internet Education - Safe Browsing - Privacy

Data Protection - Internet Scams - Open Internet - Info - Censorship - Consumer Safety - Spam

Previous SubjectNext Subject

Learning how to Safely and Effectively use the Internet. Learning how to Effectively and Efficiently Navigate the Internet.

Baby in front of A Computer Warning: When visiting other websites be very careful what you click on because some software downloads are very dangerous to your computer, so be absolutely sure what you are downloading. Read the '.exe file name by either mousing over the link and reading the bottom browser bar or by reading the file name in the download box. Even search engines can link directly to websites that have viruses, malicious software, key stroke recorders, parasites, tracking cookies and many other vulnerabilities and threats, so be very aware of the websites you are visiting. And don't click on links in e-mails too, unless you know for sure, because they could also take you to fraudulent and threatening websites. Don't ever click on Links in social networks unless you are absolutely positive. Disclosure.


Internet Network Explained


Internet is an interconnected network of computers all over the world that connects people and information 24 hours a day. The internet is a computer network consisting of a worldwide network of servers that use the TCP/IP Network Protocols to facilitate data transmission and exchange and to communicate between networks and devices. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing.

Of course the internet is a lot more than its definition. Simply trying to define what the internet is, is almost impossible. It's the biggest and the most important human advancement ever. Second only to the advancements in computers, and right before that, the advancements in language and the written word, which was our first defining moment. And because of this early Writing System, we learned to communicate much more effectively, and convey a lot more knowledge and information. And now with computers, and the Internet, and the digitizing of language, we are now transmitting more knowledge and information then any other time in our history. So just like when we look back at see how language changed our world, future generations will look back at the internet and see how the internet transformed our world. A world that will be greatly improved.

The internet is a lot bigger than you think, literally, figuratively and philosophically. But instead of listing the thousands of benefits that are coming from this internet network, I want to talk briefly about an interesting similarity. It seems that the internet is just a natural process of life. Just like the internet, life wants to branch out and make connections. Similar to the root systems Mycorrhiza found in Mushrooms located in Michigan’s Upper Peninsula. And also like the Quaking Aspen's, or Pando Trees, in Utah and Colorado. But life not only branches out and makes more connections, life also lives Symbiotically, and learns how to adapt. If not, that life form eventually dies, as history has proven. And when that happens, then you become a fossil for future life to look back on and say, "Hey, I wonder what happened to these creatures, they seemed to have had a brain, but I guess they never learned how to use it? I will write more about the internet, but for now, I like analyzing the similarities between life and the internet, it reminds me of the similarities between the human brain and computers. The internet is a human's way of mimicking biology. Human intelligence is advancing faster then any other time in human history, and Artificial Intelligence is just another tool that we have created to enhance our abilities and increase our potential. (The first internet message was sent from UCLA's campus on Oct. 29, 1969).

The Wood Wide Web, are Plants Inter-Connected by a Subterranean Fungal Network?

Network Roots Mycorrhizal Network are underground hyphal networks created by mycorrhizal fungi that connect individual plants together and transfer water, carbon, nitrogen, and other nutrients and minerals. The formation of these networks is context dependent, and can be influenced by soil fertility, resource availability, host or myco-symbiont genotype, disturbance and seasonal variation. Humongous Fungus.

Clonal Colony is a group of genetically identical individuals, such as plants, fungi, or bacteria, that have grown in a given location, all originating vegetatively, not sexually, from a single ancestor. In plants, an individual in such a population is referred to as a ramet. Pando tree (wiki).

Rhizoid are protuberances that extend from the lower epidermal cells of bryophytes and algae. They are similar in structure and function to the root hairs of vascular land plants. Similar structures are formed by some fungi. Rhizoids may be unicellular or multicellular. Roots are multicellular organs composed of multiple tissues that collectively carry out a common function.

Matrix - Internet of Things - Weaving

Populus Tremuloides often propagates through its roots to form large groves originating from a shared system of rhizomes.

Internet is Human Intelligence in Action

Internet Infrastructure

A Brief History of the Internet - First Website, First Meme (youtube).

Internet Brain Networks Hyperlinks link documents and information. Synapses in the human brain are connections between neurons through which "information" flows from one neuron to another. Some hypertext hyperlinks can be bidirectional: they can be followed in two directions, so both ends act as anchors and as targets. More complex arrangements exist, such as many-to-many links.

Anchor Text is the link label, link text, or link title is the visible, clickable text in a hyperlink.

Artificial Neural Network - DNA

Neurobiology is the study of cells of the nervous system and the organization of these cells into functional circuits that process information and mediate behavior. It is a subdiscipline of both biology and neuroscience.

Intranet is a private network accessible only to an organization's staff.

Internet Connected World Extranet is a website that allows controlled access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet. An extranet is similar to a DMZ in that it provides access to needed services for authorised parties, without granting access to an organization's entire network. An extranet is a private network organization. Historically the term was occasionally also used in the sense of two organizations sharing their internal networks over a VPN.

LAN, or Local Area Network, is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building and has its network equipment and interconnects locally managed. By contrast, a wide area network (WAN), not only covers a larger geographic distance, but also generally involves leased telecommunication circuits or Internet links. Wi-Fi.

Internet Protocol is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the Internet.

Internet Protocol Suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks. It is commonly known as TCP/IP because the foundational protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP).

Making the internet more energy efficient through systemic optimization using smart, error-correcting data chip circuits, which they refined to be 10 times less energy consumptive.

List of TCP and UDP Port Numbers used by protocols of the transport layer of the Internet protocol suite for the establishment of host-to-host connectivity. Originally, port numbers were used by the Network Control Program (NCP) in the ARPANET for which two ports were required for half-duplex transmission. Later, the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) needed only one port for full-duplex, bidirectional traffic. The even-numbered ports were not used, and this resulted in some even numbers in the well-known port number range being unassigned. The Stream Control Transmission Protocol (SCTP) and the Datagram Congestion Control Protocol (DCCP) also use port numbers. They usually use port numbers that match the services of the corresponding TCP or UDP implementation, if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses. However, many unofficial uses of both well-known and registered port numbers occur in practice. Similarly many of the official assignments refer to protocols that were never or are no longer in common use. This article lists port numbers and their associated protocols that have experienced significant uptake.

Reasons why some people don't use the internet Internet Connection using Cellphone Towers
Cell Reception
Wi-Fi Jetpack (RSSI signal) Mobile Hotspot
Weboost Signal Booster
Directional Wi-Fi Antenna
Wi-Fi Warnings

"How could we become so connected and yet be so disconnected at the same time?"

Social Networks
Search Engines
Internet Searching Tips
Human Search Engine
Language Translations

The main reason why most people don't use the internet is because most people do not understand the value, the importance or the potential that the internet offers. So when the other 3/4's of the worlds population does get access, they should know better on how to use the internet, as well as know why, when and where to access the internet.

Los Alguiens - El Internet (ORIGINAL VERSION) (Internet Song on youtube) - Lyrics Translated: If you want to download a song, download it from internet, If you want a girlfriend, look for her in internet. You want to host a party, host it on internet, If you want to read the news, do it on internet, The internet, the internet, the internet, the internet, the internet, the internet, the internet, the internet.

World Internet Usage 4 Billion People Still Don't Have Internet Access in 2016, and most of the 3 billion who do have Internet Access, are not using the internet effectively or efficiently. Just having access does not say anything. 60 percent of the world isn’t online. There is more mobile phone coverage.

List of Countries by Number of Internet Users (wiki)
Internet Use Demographics (PDF)
How Many Computers?

44% of offline adults have asked a friend or family member to look something up or complete a task on the internet for them.
50 million people in America don't log on. - Laptops for Senior Citizens

Pew Internet - Internet Society - Project Link

F the Internet (youtube) Funny video about this women's idea what the internet is.


What people are Searching for on the Internet


Top Internet Searches from each State in America Of course people will never know the true details of what search engines know about what people are looking for on the internet. Or will people know what information Google is selling, or know who is buying this information, or know what certain people plan to do with that information?  So what do our internet searches say about us? What does your Search History say about you? What does your Browser History say about you?

Google will display their pretty trends, but they will not share the most important information. So people will only see the stupid stuff that people search for on Google. The amount of Things that happen in one day are enormous.

2001 Top Internet Queries: 1. Nostradamus   2. CNN  3. World Trade Center  4. Harry Potter  5. Anthrax  6. Windows XP  7. Osama Bin Laden 8. Audiogalaxy  9. Taliban  10. Loft Story  11. Afghanistan  12. Nimba  13. American Airlines  14. American Flag. 15. Aaliyah.  16. FBI  17. Kazaa  18. Lord of the Rings  19. Jennifer Lopez  20. Xbox.

The 2013 list of top-trending searches (global) included Nelson Mandela, Paul Walker, iPhone 5s, Cory Monteith, Harlem Shake, Boston Marathon, Royal Baby, Samsung Galaxy s4, PlayStation 4 and North Korea.

Most searched beauty question: How to get rid of acne. Most searched dog question: Why do dogs eat grass? Top-trending memes search: Tim Howard memes. Top-trending natural events search: Hurricane Arthur. Most searched places on Google maps: Wal-Mart. Top-trending podcast search: Serial. Top-trending book search: Boy, Snow, Bird.

Top internet searches are most related to what's happening in the media, and since the media is mostly irrelevant, that means people are not learning as much as they should be from the internet, which is extremely alarming. There is nothing more damaging to a person then the belief that they are learning enough in order to be accurately aware of themselves and the world around them. This is what is happening in our education system, as well as the media, and now the internet. And this false sense of learning enough, is demonstrated throughout the world in the form of violence, wars, crimes and mental disorders. So your biggest mass murderers are not just the people who control the media, your largest mass murders are the people who control education and what is being taught in schools. But try to explain that to people is almost impossible, considering the amount of damage that has been afflicted on them from our media outlets and from our schools. You can't speak or understand a language that you never heard of. And this language is called intelligence, where knowledge and information is clearly understood. Teach the language of intelligence and you will eventually solve every problem in the world.

Google indexes no more than 16 percent of the surface Web and misses all of the Deep Web. Any given search turns up just 0.03 percent of the information that exists online (one in 3,000 pages)  Much of the Deep Web’s unindexed material lies in mundane data­bases such as LexisNexis or the rolls of the U.S. Patent Office.

Wikipedia Statistics

"The internet connects more then just computers, the internet connects minds. And when people finally do understand this ability, the saying "the word travels fast" will be an understatement."

Web at 25

"Most people don't understand the internet, they don't realize the potential of the internet, or what it means to be connected to the worlds most valuable knowledge and information."

"The world is moving so fast these days that the man who says it can't be done is generally interrupted by someone doing it."



Disclaimer - Discloser - Confidentiality


Basic Knowledge 101.com does not share our users personal information. But that does not mean that your personal information is secure because we cannot control other websites privacy policies and what they do with your personal information. So we encourage our members and site visitors to be aware of the privacy policies of the other websites that we link too. When a new browser window opens we encourage our users to be aware of the privacy statements of each website that collects personally identifiable information. Please be aware that Basic Knowledge 101.com can not be responsible for Links that no longer point to the original site on which it was intended because the Domain name, or ULR, was sold or high jacked by the people where the domain name was registered. We apologize and will remove the link as soon as we are notified. If a site we link to is found to be fraudulent in any way we will remove it and no longer link to that website. If a website that we link to does not want us to link to them we will remove it and no longer link to that site. 

Editor's Warning - Discretion Advised - Arbitration Clause

Personal Information - Confidentiality - Consent

BK101 does not indorse every opinion or every action that other people do. Nor does BK101 indorse every opinion or every action that BK101 does because mistakes happen. BK101 likes to confirm the accuracy of opinions and actions through the process of intelligent consensuses. But even then, this will still not guarantee that you wont learn anything new, which would ultimately change your opinion, or change your action.

BK101 does not agree with everything that is portrayed in Documentaries, Movies, TV Shows or any other media outlets. BK101 assimilates the most logical parts of information and puts them together to form an understanding. Then BK101 writes down these understandings so that this information can be shared with others. Every person must learn how to recognize what information is accurate and valuable. So what is your procedure for filtering and assimilating information? Media Literacy.

Disclaimer is a statement intended to specify or delimit the scope of rights and obligations that may be exercised and enforced by parties in a legally recognized relationship. In contrast to other terms for legally operative language, the term disclaimer usually implies situations that involve some level of uncertainty, waiver, or risk.

For Entertainment Purposes Only is the denial, refusal, or rejection of a right, power, or responsibility. A disclaimer is a defensive measure, used generally with the purpose of protection from unwanted claims or liability. A disclaimer of Warranty, which is provided for in the Uniform Commercial Code, limits a warranty in the sale of goods. Negligence.

Disclosure is the act of making something evident, to make visible. To make known to the public information that can be misinterpreted. To make vulnerabilities known.

Full Disclosure is the acknowledgement of possible conflicts of interest in one's work.

Fine Print - Adhesion Contract - Contract Law - Non Disclosure Agreement (keep things private).

Non-Disclosure Agreement or Confidentiality Agreement is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to or by third parties. It is a contract through which the parties agree not to disclose information covered by the agreement. An NDA creates a confidential relationship between the parties to protect any type of confidential and proprietary information or trade secrets. As such, an NDA protects non-public business information.

Hush Money - Gag Order - Suppression - Censorship - Freedom of Speech - Whistleblower

Non-Disparagement Clause is when a former employee gives up the right to sue the employer in exchange for compensation and also agrees not to make negative statements that cause real damage to the other party or the publication of false and injurious statements that are derogatory of another's property, business, or product. The answers to these questions depend on how your state and your local courts and judges defines the term.

Attorney–Client Privilege (loopholes for wealthy criminals)

Computer Security Full Disclosure are flaws in software that can be abused to cause unintended behavior, these flaws are called vulnerabilities.

Terms of Service are rules by which one must agree to abide in order to use a service. Terms of service can also be merely a disclaimer, especially regarding the use of websites.

Release Form is a legal instrument that acts to terminate any legal liability between the releasor and the releasee(s), signed by the releasor.

Waiver is the voluntary relinquishment or surrender of some known right or privilege. A waiver is a legally binding provision where either party in a contract agrees to voluntarily forfeit a claim without the other party being liable. Waivers can either be in written form or some form of action. Examples of waivers include the waiving of parental rights, waiving liability, tangible goods waivers, and waiver for grounds of inadmissibility or unacceptability as a consequence of not being admissible or deserving to be admitted. Waiving of Parental Rights: In cases involving the custody of a child, a biological parent may choose to waive their legal rights as a parent, making that person ineligible to make determinations regarding the child's upbringing. This also allows a guardian who is not a biological parent to attempt to assert their right over a child through actions such as adoption. Waivers of Liability: Before participating in an activity that could lead to injury or death, a person may be required to sign a waiver as a form of expressed consent to the risks that exist, due to the inherent nature of the activity. This waiver would release the company facilitating the activity from liability should the participant be injured or killed during his participation. Such waivers may be used prior to participating in extreme sports, such as BMX racing, or other activities, such as skydiving. Waivers and Tangible Goods: In the case of most tangible goods or personal property, a person may waive the right to continue to make a claim on the item. This can apply to goods that are sold to a new buyer or donated to a particular entity. A transfer of vehicle ownership functions as a waiver of any claim to the item by the seller, and it gives the right to the buyer as the new owner. Exemption.

Do you have to make a disclosure even when you're not misleading anyone? Almost all information can be misinterpreted. But if you intentionally present information that can be misinterpreted, then that's propaganda, those are when disclosures are absolutely necessary. But you never see disclosures in the news, on TV, in books or in the movies. Even if you do see disclosures they too can be misleading, so the disclosure needs a disclosure. And you wonder why learning information literacy and media literacy are extremely important.

Privacy Policy is a statement or a legal document (in privacy law) that discloses some or all of the ways a party gathers, uses, discloses, and manages a customer or client's data. It fulfills a legal requirement to protect a customer or client's privacy. Personal information can be anything that can be used to identify an individual, not limited to the person's name, address, date of birth, marital status, contact information, ID issue and expiry date, financial records, credit information, medical history, where one travels, and intentions to acquire goods and services. In the case of a business it is often a statement that declares a party's policy on how it collects, stores, and releases personal information it collects. It informs the client what specific information is collected, and whether it is kept confidential, shared with partners, or sold to other firms or enterprises. Privacy policies typically represent a broader, more generalized treatment, as opposed to data use statements, which tend to be more detailed and specific. The exact contents of a certain privacy policy will depend upon the applicable law and may need to address requirements across geographical boundaries and legal jurisdictions. Most countries have their own legislation and guidelines of who is covered, what information can be collected, and what it can be used for. In general, data protection laws in Europe cover the private sector as well as the public sector. Their privacy laws apply not only to government operations but also to private enterprises and commercial transactions.

Licensing Agreements are a set of terms under which one party can use property owned by another party. The property involved in a licensing agreement can be real, personal or intellectual, but licensing agreements are most often used for intellectual property.

Software License is a legal instrument of contract law, with or without printed material) governing the use or redistribution of software.

Free Software License is a notice that grants the recipient of a piece of software extensive rights to modify and redistribute that software. These actions are usually prohibited by copyright law, but the rights-holder (usually the author) of a piece of software can remove these restrictions by accompanying the software with a software license which grants the recipient these rights. Software using such a license is free software (or free and open source software) as conferred by the copyright holder. Free software licenses are applied to software in source code as also binary object code form, as the copyright law recognizes both forms.

End-User License Agreement is the Contract between the licensor and purchaser, establishing the purchaser's right to use the software. The license may define ways under which the copy can be used, in addition to the automatic rights of the buyer including the first sale doctrine and 17 U.S.C. § 117 (freedom to use, archive, re-sale, and backup). Many form contracts are only contained in digital form, and only presented to a user as a click-through where the user must "accept". As the user may not see the agreement until after he or she has already purchased the software, these documents may be contracts of adhesion. Software companies often make special agreements with large businesses and government entities that include support Contracts and specially drafted warranties, which provides assurance by one party to the other party that specific facts or conditions are true or will happen. This factual guarantee may be enforced regardless of materiality which allows for a legal remedy if that promise is not true or followed.

Clickwrap or clickthrough agreement is a digital prompt that offers individuals the opportunity to accept or decline a digital media policy, which outlines specific rules for the use of social media at Interior.


Fair Use - Permissions


BK101 contains copyrighted material, the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of issues of humanitarian significance. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. Bk101 does not claim ownership of any Intellectual Property that was not personally created.

Humanitarian is marked by humanistic values and devotion to human welfare. Someone devoted to the promotion of human welfare and to social reforms. An advocate of the principles of humanism and someone who is concerned with the interests and the welfare of humans. Assistance - Defender.

Social Service - Big 5 Needs - Humanism - Civics - Free Speech

Welfare
is something that aids or promotes well-being. A satisfied state of being happy and healthy and prosperous.

Creative Commons-License Attribution 4.0 International (CC BY 4.0)
Share — copy and redistribute the material in any medium or format.
Adapt — remix, transform, and build upon the material for any purpose, even commercially.

Free to Copy does not mean that something is free. All information has a responsibility. Share with accountability.

You must give appropriate credit to the millions of people who shared their work and knowledge that helped the human race survive and thrive. We must give thanks to the printing press that was built over 500 years ago. And we also must give thanks to the millions of our ancestors who helped preserve language and helped pass it on, for without language, humans would have never survived. But even with all the technological advances that humans have made in the last 200 years, we are just beginning to understand how extremely important language and communication is. Human civilization is at a turning point. When all humans finally realize the power of knowledge, then people will stop falling victim to the lack of knowledge, and the ignorance that is destroying each other and destroying our only home.



Internet Education


Get Net Wise
Seniors Guide to using Computers and Software
Child Technology Education
Technology Addiction
Tek Mom
Inter Lingo, Acronyms, Jargon and Text Message Shorthand
Internet 101
Internet Basic Knowledge
Internet History begins with the development of electronic computers in the 1950s.
Advanced Research Projects Agency Network (ARPANET)
Net Smartz
Computer Definitions
Printout Definitions
Computer Knowledge



Keeping Kids Safe on The Internet


Baby or small child in front of a computer Internet Safety is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general. Oversight.

Childre's Online Privacy Protection Act is a United States federal law, located at 15 U.S.C. §§ 6501–6506 (Pub.L. 105–277, 112 Stat. 2681-728, enacted October 21, 1998). The act, effective April 21, 2000, applies to the online collection of personal information by persons or entities under U.S. jurisdiction about children under 13 years of age including children outside the U.S., if the company is U.S.-based. It details what a website operator must include in a privacy policy, when and how to seek verifiable consent from a parent or guardian, and what responsibilities an operator has to protect children's privacy and safety online including restrictions on the marketing of those under 13. While children under 13 can legally give out personal information with their parents' permission, many websites—particularly social media sites, but also other sites that collect most personal info—disallow children under 13 from using their services altogether due to the cost and work involved in complying with the law.

Child Online Protection Act was a law in the United States of America, passed in 1998 with the declared purpose of restricting access by minors to any material defined as harmful to such minors on the Internet. The law, however, never took effect, as three separate rounds of litigation led to a permanent injunction against the law in 2009. The law was part of a series of efforts by US lawmakers legislating over Internet pornography. Parts of the earlier and much broader Communications Decency Act had been struck down as unconstitutional by the Supreme Court in 1997 (Reno v. ACLU); COPA was a direct response to that decision, narrowing the range of material covered. COPA only limits commercial speech and only affects providers based within the United States. COPA required all commercial distributors of "material harmful to minors" to restrict their sites from access by minors. "Material harmful to minors" was defined as material that by "contemporary community standards" was judged to appeal to the "prurient interest" and that showed sexual acts or nudity (including female breasts). This is a much broader standard than obscenity.

Children's Ombudsman is a public authority in various countries charged with the protection and promotion of the rights of children and young people, either in society at large, or in specific categories such as children in contact with the care system. The agencies usually have a substantial degree of independence from the executive, and generally operate as specialised ombudsman offices or national human rights institutions, dealing with individual complaints, intervening with other public authorities, conducting research, and – where their mandate permits them to engage in advocacy – generally promoting children's rights in public policy, law and practice. The first children's commissioner was established in Norway in 1981. The creation of such institutions has been promoted by the United Nations Committee on the Rights of the Child, and, from 1990 onwards, by the Council of Europe. (children's commissioner, youth commissioner, child advocate, children's commission, youth ombudsman or equivalent body).

Stay Safe Online.org
On Guard Online.gov
Safe Browsing Tools
Enough
Internet Safety 101
Online Family Norton
Safe Kids.com
Safe Kids.org
Google Safety Tips
Kidoz Kid Safe Internet Browser
Connect Safely.org
Wired Safety.org

The World Wide Web is one of the greatest tools ever invented and literally the biggest library in the world. But the Internet is not a safe and secure place so be aware of the dangers and take some time to educate yourself on How to be Safer on the Internet. Whatever your age your personal information can be exploited and used against you, so be careful.

There is a strong privacy law that protects your cable viewing habits, but there is no such law that protects records of what you buy online or is there a law that protects information that is collected by other services such as social networks or advertising networks.

FCC Rules offer protections against your mobile phone company selling the location data it has on you from tracking your cell phone all over town and beyond, but at the same time you are not protected under these same rules given by the USA Patriot Act.


Bullying - Trolls


101 East: Web of Hate (youtube)

Cyber-Bullying is a form of bullying or harassment using electronic forms of contact.

Stop Bullying - Bully Knowledge - Crime Help (bullies)

Critics - Social Network Comments

Troll is a person who sows discord on the Internet by starting arguments or upsetting people, by posting inflammatory, extraneous, or off-topic messages in an online community (such as a newsgroup, forum, chat room, or blog) with the intent of provoking readers into an emotional response or of otherwise disrupting normal, on-topic discussion, often for the troll's amusement. Patent Troll - Trolling is what the Media does sometimes.

Imposters - Scammers - Sextortion

Apps:
Stop it Cyber Bully

Stalking Amanda Todd : The Man in the Shadows (youtube)
The Fifth Estate (youtube 40:52)

Internet Searching Tips
PC Problem Solving
Technology is Just Another Tool
Information Sources
What did I Learn from the Internet
Human Search Engine
Online Education
Family Relationships
Censorship
Media Literacy
Child Development
Bad TV

The Greatest Tool for Internet Safety will always be Knowledge.

Spying on your child is not recommended. Only when all other methods of Communication have failed, and only if you believe that your child may be in danger, should you even try to attempt to violate your child's privacy, because you could easily make the situation worse. All parents need to continually educate themselves and keep up with today's information and knowledge. And let your child know that you are both responsible for each others actions. 

You don't Know Everything - Relationships

Social Network Monitoring is just another word for Spying. If you want to know a person you have to talk to that person and have an open and honest conversation with them. Just listening in on someone's conversations, or watching them from a distance, and then judging them, or exploiting that information, without the decency of a fair and open trial, that is not just insane and insultingly ignorant, it is very dangerous. The damage that could come from these types of errors could be catastrophic. Spying is not a productive process for learning, it is flawed and vulnerable. You create more problems then you solve.

Make sure all computers are well-positioned so they cannot be pulled over by inquisitive children. Also make sure that cables are dressed and secured properly to avoid being tripped on.


Social Network Dangers


Assange talks about Facebook, called Facebook the "most appalling spying machine that has ever been invented." Face Book is the world's most comprehensive database about people, their relationships, their names, their addresses, their locations, their communications with each other, their relatives, all sitting within the United States, all accessible to U.S. intelligence. And ten years later, Cambridge Analytica was just another reminder that your information is still being sold.

Social Network Dangers - Social Network Comments - Critics

Facebook and the CIA - Facebook is tracking you whether you use it or not. Even if you've never signed up for Facebook or have logged out of your account, the social networking company is likely tracking your virtual movements — and it doesn't offer any way for you to opt out. Facebook doesn't curb hate speech in developing countries, where misinformation and hate speech can fuel real-world attacks.

Facebook is a good Social Network but it does have dangers. Facebook is not a secure website. It has hundreds of vulnerabilities and sometimes when using Facebook it does more harm then good. Facebook is not a BK101 indorsed social network. I do use it, but only sparingly, and I definitely don't share a lot info or comments. So please use it wisely. Be safe. Be aware. Propaganda and Fake News.

Facebook FTC 5 Billion Settlement is a Joke. Years of privacy practices in violation and forbidden user data collection of a previous order does not correspond to the harm done or rewards reaped. The investigation was rushed and incomplete. No charges or consequences and executives get immunity. Oversight is toothless and changes nothing, and endorses Facebook’s continued monetization of mass surveillance.

Global Disinformation Order. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically. Government actors are using social media to manufacture consensus, automate suppression, and undermine trust in the liberal international order. Leveraging social media to shape public opinion, set political agendas, and propagate ideas. Weaponization of social media. Deceiving perceived enemies and influencing public opinion.

Social Network Scams and Vulnerabilities - Imposters

Privacy Concerns with Social Networking Services (wiki)

Social Network Safety - Chat Room Dangers

Social Media Etiquette - Morals

Internet Addiction

Kids Growing up Online (PBS) - DVD

Social Network Knowledge and Information

Internet Security Alliance

Dunbar Number is a suggested cognitive limit to the number of people with whom one can maintain stable social relationships. These are relationships in which an individual knows who each person is and how each person relates to every other person.



Fraud - Scams


Fraud, Fake, Scam, Rip-Off Fraud is deliberate deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud itself can be a civil wrong. The remedies for fraud may include rescission (i.e., reversal) of a fraudulently obtained agreement or transaction, the recovery of a monetary award to compensate for the harm caused, punitive damages to punish or deter the misconduct, and possibly others. Throughout the United States fraud charges can be misdemeanors or felonies depending on the amount of loss involved. High value fraud can also trigger additional penalties. For example, in California, losses of $500,000 or more will result in an extra two, three, or five years in prison in addition to the regular penalty for the fraud. Although elements may vary by jurisdiction and the specific allegations made by a plaintiff who files a lawsuit that alleged fraud, typical elements of a fraud case in the United States are that: Somebody misrepresents a material fact in order to obtain action or forbearance by another person; The other person relies upon the misrepresentation; and The other person suffers injury as a result of the act or forbearance taken in reliance upon the misrepresentation. To establish a civil claim of fraud, most jurisdictions in the United States require that each element of a fraud claim be pleaded with particularity and be proved by a preponderance of the evidence. The U.S. government's 2006 fraud review concluded that fraud is a significantly under-reported crime, and while various agencies and organizations were attempting to tackle the issue, greater co-operation was needed to achieve a real impact in the public sector. The scale of the problem pointed to the need for a small but high-powered body to bring together the numerous counter-fraud initiatives that existed. The measure of damages in fraud cases is normally computed using one of two rules: The "benefit of bargain" rule, which allows for recovery of damages in the amount of the difference between the value of the property had it been as represented and its actual value; Out-of-pocket loss, which allows for the recovery of damages in the amount of the difference between the value of what was given and the value of what was received. Negligence.

Mail Fraud and Wire Fraud is any fraudulent scheme to intentionally deprive another of property or honest services via mail or wire communication. It has been a federal crime in the United States since 1872. Lying.

Ponzi Scheme - Confidence Trick - Phone Scams - False Advertising - Fine Print

False Pretenses is when a thief intentionally misrepresents past and present facts which the thief knows to be false, in order to defraud a person and obtain their money, goods, services or property. But if a thief makes a statement about something that they mistakenly believe to be untrue, there is no false representation, the thief just tried to lie but they failed.

FBI Scam Alerts - Watch out for bogus IRS agents, fake offers from tech support, and faux beaus or fake friends.

Scam Busters - Victims of Fraud Help - Watch Dogs

Fight Fraud - Fraud is a multi-billion dollar criminal industry, costing Americans more than the combined annual spending of many countries around the world. Fight Fraud in Connecticut - Crime Help Websites.

How to Report Fraud - Whistle Blowers

FBI Crime Reporting - Department of Justice

Internet Crime Complaint Center

Federal Trade Commission click on Consumer Protection.

Report Spam and Unsolicited E-Mails - Phone Fraud

Contact your States Attorney General

Travel Scams & Fraudulent Travel Deals - Vacation Rentals Scams and Complaints

Corporate Crimes - Healthcare Fraud - Food Fraud

Computer Crime is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.

Internet Security Alliance - Computer Viruses

Information Protection Tools - Privacy Rights

Misappropriation is the unauthorized use of another's name, likeness, or identity without that person's permission, resulting in harm to that person.

Remember that the internet is not the only place where you can be scammed and have your identity stolen. Be cautious of suspicious phone calls, suspicious letters in the US mail and suspicious e-mails.

CAN-SPAM Act: A Compliance Guide for Business - CAN-SPAM Act of 2003 (wiki)

"The first principle is that you must not fool yourself -- and you are the easiest person to fool." (Richard Feynman)

Government Accountability

Better Business Bureau mission is to focus on advancing marketplace trust. The Better Business Bureau is not affiliated with any governmental agency. Businesses that affiliate with the BBB and adhere to its standards do so through industry self-regulation. To avoid bias, the BBB's policy is to refrain from recommending or endorsing any specific business, product or service. The organization has been the subject of controversy, particularly related to the allegation of giving higher ratings to businesses that pay a membership fee. bbb.org.



Consumer Protection


consumer protection word cloud Consumer Protection is a group of laws and organizations designed to ensure the rights of consumers as well as fair trade, competition and accurate information in the marketplace. The laws are designed to prevent the businesses that engage in fraud or specified unfair practices from gaining an advantage over competitors or consumers of a certain product or goods. They may also provide additional protection for those most vulnerable in society. Consumer protection laws are a form of government regulation that aim to protect the rights of consumers. For example, a government may require businesses to disclose detailed information about products—particularly in areas where safety or public health is an issue, such as food. Consumer protection is linked to the idea of consumer rights and to the formation of consumer organizations, which helps consumers make better choices in the marketplace and get help with consumer complaints. Other organizations that promote consumer protection include government organizations and self-regulating business organizations such as consumer protection agencies and organizations, the Federal Trade Commission in America and Better Business Bureaus in America, Canada, England, etc. A consumer is defined as someone who acquires goods or services for direct use or ownership rather than for resale or use in production and manufacturing. Consumer interests can also serve consumers, consistent with economic efficiency, but this topic is treated in competition law. Consumer protection can also be asserted via non-government organizations and individuals as consumer activism.

Consumer Dangers - Public Interest Research Groups - Online Buying Tips

Consumer Product Safety (gov) - Product Consumer Safety - Children

Consumer Action - Injuries from Window Blinds Send Two Children to the Emergency Department Every Day.

Consumer Watchdog focuses on insurance, health care, political reform, privacy and energy. consumerwatchdog.org.

Dangerous Goods are solids, liquids, or gases that can harm people, other living organisms, property, or the environment.

Consumer Education is the preparation of an individual to be capable of making informed decisions when it comes to purchasing products in a consumer culture. It generally covers various consumer goods and services, prices, what the consumer can expect, standard trade practices, etc. While consumer education can help consumers to make more informed decisions, some researchers have found that its effects can drop off over time, suggesting the need for continual education. New dimensions of consumer education are also beginning to emerge as people become more aware of the need for ethical consumerism and sustainable consumer behaviour in our increasingly globalized society.

Drug Warnings - Ways that People Die

Consumer Complaint Form for Ct. (PDF)

Consumer Complaints - Top 10 Consumer Complaints for 2014

Consumer Protection - Consumer Safety

U.S. Consumer Product Safety Commission

Safer Products - Consumer Affairs

Comparitech research's, tests, reviews and compares consumer tech products and services so you can make a more informed decision before you buy. Technology News.

National Consumers League
National Association of Consumer Advocates 
Safer Chemicals - Green Science Policy
Consumer Info - Consumer Lab

Lead, if ingested or inhaled, its compounds are poisonous to animals and humans. Lead is a neurotoxin that accumulates both in soft tissues and the bones, damaging the nervous system and causing brain disorders. Excessive lead also causes blood disorders in mammals. Lead poisoning has been documented since ancient Rome, ancient Greece, and ancient China.

Water Pollution - Air Pollution - Soil Pollution - Food Safety

Phthalate are used in a wide range of common products, and are released into the environment. high doses have been shown to change hormone levels and cause birth defects.

Toxins (hazardous chemicals)

Perfectly Safe - One Step Ahead

Recalls - National Institute of Environmental Health Sciences

US won't seek recall of 56 million Takata air bag inflators. At least 25 people have been killed worldwide by Takata inflators and more than 300 have been injured. Problems with the company's products touched off the largest string of automotive recalls in U.S. history with around 50 million inflators recalled. About 100 million are being recalled worldwide. The decision announced Thursday involves newer inflators that contain a moisture-absorbing chemical. It means that millions of drivers will never know if they have Takata inflators in their vehicles, nor will they be repaired unless problems surface. It also means that up to 19 auto companies will avoid the huge expense of additional recalls. Takata had used the volatile chemical ammonium nitrate to create a small explosion to inflate air bags in a crash. But it was discovered that the chemical can deteriorate over time when exposed to high heat and humidity. It can explode with too much force, blowing apart a metal canister and hurling shrapnel into drivers and passengers. In most cases they won't fail for at least 25 years, well beyond the life cycle of most vehicles, he said. But in extreme heat in South Florida, limited tests showed failure was possible in 14-23 years.

American Chemistry - Consumer Info - E Opinions

Educational Toys and Games that Teach
Green Products - Physical Health News
Mental Health News - Lawyers, Court Information and Legal Help
Government Agencies - Trigger Warnings

Nearly 700 Children Have Perished In Hot Cars Since 1998.

Quality Control - Safety Engineering

According to The Internet Crime Complaint Center victims of Internet-related crimes lost $559 million in 2009, which is more because not all crimes are reported. The mission of most Social Networks like Facebook, is to get you to share as much information as possible so it can be shared with advertisers. Playing some of those free online games is one way to get people to share information. A few times a year Facebook puts your privacy settings back to a default setting, which essentially makes all of your information to be made public. And on top of that, your security is only as good as your friend's security. So if your friend is hacked you are at risk. Plus 40 percent of all Facebook profiles are fake, so please know your friends. Facebook has not been able to screen all of its ads either. Some ads have Malicious Code Embedded in them. And be absolutely sure what you are downloading because some antivirus software is actually a virus. Facebook reported that hackers using stolen username and password credentials try to break into at least 600,000 accounts every day. More Tech News.



Protecting the Internet Information Highway


Internet Connects the World Net Neutrality is the principle that Internet service providers should treat all transmission of data over the Internet equally and not discriminate or charge differently based on user, content, website, platform, application, type of equipment, or method of communication. When net neutrality is required, Internet service providers (ISPs) may not intentionally block, slow down, or charge money for specific online content. Conversely, without net neutrality regulations, ISPs may prioritize certain types of traffic, meter others, or potentially block traffic from specific services, while charging consumers for various tiers of service.

Go FCC Yourself.com - Keep Title II Net Neutrality Rules Strong. Protect Net Neutrality. No censorship and no deliberate slowing down of Data. Speed and accuracy is extremely important. (click on express). State officials have moved to keep net neutrality rules in place on their turf. Governors in six states — New Jersey, New York, Montana, Rhode Island, Vermont and Hawaii — have signed executive orders upholding net neutrality, and three – Washington, Vermont and Oregon — have enacted legislation that does so. In January, attorneys general in 22 states and the District of Columbia filed a protective petition for review of the order. Save the Internet.

Access is the right to enter and obtain and to make use of and to take advantage of a shared resource, such as Knowledge and Information. To obtain or retrieve Knowledge and Information from a storage device, like from a network computer. Access in computer science is the operation of reading or writing stored information.

Net Competition
Internet Innovation
Center for Democracy and Technology
Internet Freedom
Info War Monitor
Open Net

Internet Association is committed to promoting policies that protect the internet’s future. We are continuously updating so stay with us and check back for more.


Unused Airways - Transmission Space


White Spaces in radio are different frequencies for specific uses, and in most cases license the rights to broadcast over these frequencies. This frequency allocation process creates a bandplan, which for technical reasons assigns white space between used radio bands or channels to avoid interference. In this case, while the frequencies are unused, they have been specifically assigned for a purpose, such as a guard band. Most commonly however, these white spaces exist naturally between used channels, since assigning nearby transmissions to immediately adjacent channels will cause destructive interference to both. In addition to white space assigned for technical reasons, there is also unused radio spectrum which has either never been used, or is becoming free as a result of technical changes. In particular, the switchover to digital television frees up large areas between about 50 MHz and 700 MHz. This is because digital transmissions can be packed into adjacent channels, while analog ones cannot. This means that the band can be "compressed" into fewer channels, while still allowing for more transmissions. In the United States, the abandoned television frequencies are primarily in the upper UHF "700-megahertz" band, covering TV channels 52 to 69 (698 to 806 MHz). U.S. television and its white spaces will continue to exist in UHF frequencies, as well as VHF frequencies for which mobile users and white-space devices require larger antennas. In the rest of the world, the abandoned television channels are VHF, and the resulting large VHF white spaces are being reallocated for the worldwide (except the U.S.) digital radio standard DAB and DAB+, and DMB.

Free the TV White Space - Free the Airwaves (youtube) Video

Free the Airwaves - FCC White Space Rules - White Space - White Noise

Free-space Optical Communication is an optical communication technology that uses light propagating in free space to wirelessly transmit data for telecommunications or computer networking. "Free space" means air, outer space, vacuum, or something similar. This contrasts with using solids such as optical fiber cable or an optical transmission line. The technology is useful where the physical connections are impractical due to high costs or other considerations.

Freedom Tower - Free Network Foundation

Ad Busters - Scan Eye - Outernet - Lantern

Hacker - Hakerspaces - Can You Hack It? (video)

Li-Fi - EMF - Satellite Internet Access

FSO uses visible or infrared light to wirelessly transmit data through open air as opposed to using cables.

Improving Internet with Mid-Wavelength Infrared

High-Speed, Affordable, and Accessible Broadband

LTE telecommunication is a standard for high-speed wireless communication for mobile phones and data terminals. It is based on the GSM/EDGE and UMTS/HSPA network technologies, increasing the capacity and speed using a different radio interface together with core network improvements.

Affordable High-Speed Broadband for All Americans (youtube)
Lifeline Program for Low-Income Consumers (affordable internet access)
Google Fiber Connecting Public Housing at Gigabit Speeds
Connect Home
List of Countries by Internet Connection Speeds (wiki)
How to Connect to the internet when access is Limited

Mesh Networking is a network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network.

Wireless Mesh Network is a communications network made up of radio nodes organized in a mesh topology. It is also a form of wireless ad hoc network. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. The mesh clients are often laptops, cell phones and other wireless devices while the mesh routers forward traffic to and from the gateways which may, but need not, be connected to the Internet. The coverage area of the radio nodes working as a single network is sometimes called a mesh cloud. Access to this mesh cloud is dependent on the radio nodes working in harmony with each other to create a radio network. A mesh network is reliable and offers redundancy. When one node can no longer operate, the rest of the nodes can still communicate with each other, directly or through one or more intermediate nodes. Wireless mesh networks can self form and self heal. Wireless mesh networks can be implemented with various wireless technologies including 802.11, 802.15, 802.16, cellular technologies and need not be restricted to any one technology or protocol.

Channel Bonding is a computer networking arrangement in which two or more network interfaces on a host computer are combined for redundancy or increased throughput. Channel bonding is differentiated from load balancing in that load balancing divides traffic between network interfaces on per network socket (OSI model layer 4) basis, while channel bonding implies a division of traffic between physical interfaces at a lower level, either per packet (OSI model Layer 3) or a data link (OSI model Layer 2) basis.

OSI Model Open Systems Interconnection Model is when a layer serves the layer above it and is served by the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that comprise the contents of that path. Two instances at the same layer are visualized as connected by a horizontal connection in that layer.

Load Balancing in computing improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives. Load balancing aims to optimize resource use, maximize throughput, minimize response time, and avoid overload of any single resource. Using multiple components with load balancing instead of a single component may increase reliability and availability through redundancy. Load balancing usually involves dedicated software or hardware, such as a multilayer switch or a Domain Name System server process. Load balancing differs from channel bonding in that load balancing divides traffic between network interfaces on a network socket (OSI model layer 4) basis, while channel bonding implies a division of traffic between physical interfaces at a lower level, either per packet (OSI model Layer 3) or on a data link (OSI model Layer 2) basis with a protocol like shortest path bridging.

Connection Types

H.R. 2454: Aaron’s Law Act of 2013
Was Aaron Swartz Murdered?
Guerilla Open Access Manifesto
Activism
UK Parliament calls for internet to be classified as a Public Utility
Vodafone Communications

Named Data Networking: Instead of numbers, use names. Focus not on the locations of things, but on the things themselves by retrieving information from the nearest computer that has it, rather than wait to get it from a heavily-trafficked centralized servers.

From a Point to Point system to a Peer to Peer system. 

The Case for a Decentralized Internet: Tamas Kocsis (video and text)

Decentralized Computing is the allocation of resources, both hardware and software, to each individual workstation, or office location. In contrast, centralized computing exists when the majority of functions are carried out, or obtained from a remote centralized location. Decentralized computing is a trend in modern-day business environments. This is the opposite of centralized computing, which was prevalent during the early days of computers. A decentralized computer system has many benefits over a conventional centralized network. Desktop computers have advanced so rapidly, that their potential performance far exceeds the requirements of most business applications. This results in most desktop computers remaining idle (in relation to their full potential). A decentralized system can use the potential of these systems to maximize efficiency. However, it is debatable whether these networks increase overall effectiveness. All computers have to be updated individually with new software, unlike a centralised computer system. Decentralised systems still enable file sharing and all computers can share peripherals such as printers and scanners as well as modems, allowing all the computers in the network to connect to the internet. A collection of decentralized computers systems are components of a larger computer network, held together by local stations of equal importance and capability. These systems are capable of running independently of each other.

Bitcoin (decentralized currency)

European Parliament has copyright protection law Article 13

Decentralized Network 42 is a decentralized peer-to-peer network built using VPNs and software/hardware BGP routers. While other darknets try to establish anonymity for their participants, that is not what dn42 aims for. It is a network to explore routing technologies used in the Internet and tries to establish direct non-NAT-ed connections between the members. The network is not fully meshed. dn42 uses mostly tunnels instead of physical links between the individual networks. Each participant is connected to one or more other participants. Over the VPN or the physical links, BGP is used for inter AS routing. While OSPF is the most commonly used protocol for intra AS routing, each participant is free to choose any other IGP for his AS.

E band waveguide s the range of radio frequencies from 60 GHz to 90 GHz in the electromagnetic spectrum, corresponding to the recommended frequency band of operation of WR12 waveguides. These frequencies are equivalent to wave lengths between 5 mm and 3.333 mm. The E band is in the EHF range of the radio spectrum.

Waveguide is a structure that guides waves, such as electromagnetic waves or sound, with minimal loss of energy by restricting the transmission of energy to one direction. Without the physical constraint of a waveguide, wave amplitudes decrease according to the inverse square law as they expand into three dimensional space.

Broadband is wide bandwidth data transmission which transports multiple signals and traffic types.

Bandwidth is the difference between the upper and lower frequencies in a continuous band of frequencies. It is typically measured in hertz.



Internet Access Rights


Internet Access is a Human Right Right to Internet Access states that all people must be able to access the Internet in order to exercise and enjoy their rights to Freedom of expression and opinion and other fundamental human rights, that states have a responsibility to ensure that Internet access is broadly available, and that states may not unreasonably restrict an individual's access to the Internet.

Media Literacy
Stop Online Piracy Act (wiki)
SOPA Info (youtube)
Net Coalition (twitter)
PIPA - Protect IP Act (wiki)
Support a  Free and Open Internet
ITU - International Telecommunication Union - Film
Protect IP Act (youtube)
Controlling the Web (youtube)
Internet Society
Protect Internet Freedom

Center for Democracy & Technology global online civil liberties and human rights, driving policy outcomes that keep the internet open, innovative, and free.

Fight for the Future

F2C2012: Aaron Swartz keynote - "How we stopped SOPA" (youtube)

Pirate Bay (youtube)

Petitioning (start a petition or sign a petition)

How Iran Censors Internet
A2K Network

Why Sopa is a Bad Idea (video)

Firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the Internet, that is assumed not to be secure or trusted.

Proxy Server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Proxies were invented to add structure and encapsulation to distributed systems. Today, most proxies are web proxies, facilitating access to content on the World Wide Web and providing anonymity.

Virtual Private Network

DNS Blocking is not the same as Domain Name Filtering used by Internet Browsers for Kids. Censoring Links.

Web Content Control Software or Web Filtering Software is another form of Censorship.

Copyright Information

From July to December 2012, Google Received 2,285 Government Requests to remove 24,179 pieces of content, which is an increase from the 1,811 requests to remove 18,070 pieces of content that we received during the first half of 2012.

United States Computer Emergency Readiness Team

Internet Engineering Task Force

Web Engineering focuses on the methodologies, techniques, and tools that are the foundation of Web application development and which support their design, development, evolution, and evaluation. Web application development has certain characteristics that make it different from traditional software, information system, or computer application development.

Media Literacy - Information Literacy

Internet Infrastructure

Denial-of-Service Attack (wiki)

Internet System Consortium

Bandwidth (signal processing photonics)
Internet Declaration
Kopimism (Missionary Church)
Chaos Communication Congress (wiki)

IT industry consumes between three and five percent of the world’s energy budget. The cost of powering the Internet, which is 1.5% of global electricity, is 8.5 billion dollars annually and is growing at an incredible rate. There are 2.4 billion internet users today, which means more backbone bandwidth, more content, more data centers, more applications, more computers.


Internet Connection Types


Internet Connection Types Super Wi-Fi is using the unused broadcast spectrum. Instead of using the 2.4 GHz radio frequency of Wi-Fi, the "Super Wi-fi" proposal uses the lower-frequency white spaces between television channel frequencies. These lower frequencies allow the signal to travel further and penetrate walls better than the higher frequencies previously used. The FCC's plan was to allow those white space frequencies to be used for free, as happens with shorter-range Wi-Fi and Bluetooth. Rice University, in partnership with the nonprofit organization Technology For All, installed the first residential deployment of Super Wi-Fi in east Houston in April 2011. The network uses white spaces for backhaul and provides access to clients using 2.4 GHz Wi-Fi. A month later, a public Super Wi-Fi network was developed in Calgary, Alberta. Calgary based company WestNet Wireless launched the network for free and paid subscribers. The United States' first public Super Wi-Fi network was developed in Wilmington, North Carolina, on January 26, 2012. Florida based company Spectrum Bridge, Inc. launched the network for public use with access at Hugh MacRae park. West Virginia University launched the first campus Super WiFi network on July 9, 2013.

WiMAX is a family of wireless broadband communication standards based on the IEEE 802.16 set of standards, which provide multiple physical layer (PHY) and Media Access Control (MAC) options.

LVX System

IPv6 is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to replace IPv4. In December 1998, IPv6 became a Draft Standard for the IETF, who subsequently ratified it as an Internet Standard on 14 July 2017.

Radiation (electromagnetic)

White Space (alternate transmission space)

Federal Communications Commission (FCC)

Universal Service Fund (wiki)

A Human Right
Public Knowledge 
Internet.org
Internet Modem Battery Backup (brck)
Ushahidi
Open Garden
Broadband Across America

Internet Access is the process that enables individuals and organisations to connect to the Internet using computer terminals, computers, mobile devices, sometimes via computer networks. Once connected to the Internet, users can access Internet services, such as email and the World Wide Web. Internet service providers (ISPs) offer Internet access through various technologies that offer a wide range of data signaling rates (speeds).

Satellite Internet Access is Internet access provided through communications satellites. Modern consumer grade satellite Internet service is typically provided to individual users through geostationary satellites that can offer relatively high data speeds, with newer satellites using Ka band to achieve downstream data speeds up to 50 Mbps.
ViaSat-1

High-Altitude Platform is a station on an object at an altitude of 20 to 50 km and at a specified, nominal, fixed point relative to the Earth.

Google Loon
Universal Service Administrative Company

Fiber-Optic Communication is a method of transmitting information from one place to another by sending pulses of light through an optical fiber. The light forms an electromagnetic carrier wave that is modulated to carry information. Fiber is preferred over electrical cabling when high bandwidth, long distance, or immunity to electromagnetic interference are required.

Optical Fiber Cable - Li-Fi

Passive Optical Network is a telecommunications technology that implements a point-to-multipoint architecture, in which unpowered fiber optic splitters are used to enable a single optical fiber to serve multiple end-points such as customers, without having to provision individual fibers between the hub and customer.

Spectrum Access

NG-PON2 adding new colors of light onto the existing fiber.

In 2015, 2.1 Million People Still Use AOL Dial-Up.

Phone Network - Home Plug

Your Karma WiFi

Hotspot Wi-Fi is a physical location where people may obtain Internet access, typically using Wi-Fi technology, via a wireless local area network (WLAN) using a router connected to an internet service provider.

ZeusPro - Wireless Network Solution Universal non-Electrical Wi-Fi Amplifier. WiFi signal Anywhere.

Fingbox - Network Security & Wi-Fi Troubleshooting.

Beartooth is a handheld device that works with your smartphone to keep you connected when there is no cell service. Your phone connects to your Beartooth using Bluetooth, and your Beartooth connects to other Beartooth devices up to 10 miles away over the 900 MHz ISM band.

Freedom of Speech - First Amendment

Government Websites - About Information Sources

Broadband Subscribership

Information Protection - Is a Website Down or is My Connection a Problem?


Internet Infrastructure


Critical Internet Infrastructure is a collective term for all hardware and software systems that constitute essential components in the operation of the Internet. Physical transmission lines of all types, such as wired, fiber optic and microwave links, along with routing equipment, the accompanying critical software services like the Domain Name System (DNS), Email, website hosting, authentication and authorization, storage systems, and database servers are considered critical Internet components. If any of these systems and services were to be interrupted for a significant period of time "[t]he Internet...as we know it would collapse. Infrastructure.

World Network Map of the Internet Infrastructure Connections and Internet Hubs

Internet Topology Map

Internet Backbone are the principal data routes between large, strategically interconnected computer networks and core routers on the Internet.

Backbone Network is a part of computer network that interconnects various pieces of network, providing a path for the exchange of information between different LANs or subnetworks. A backbone can tie together diverse networks in the same building, in different buildings in a campus environment, or over wide areas. Normally, the backbone's capacity is greater than the networks connected to it.

Network Access Point was a public network exchange facility where Internet service providers (ISPs) connected with one another in peering arrangements.

Core Router is a router designed to operate in the Internet backbone, or core. To fulfill this role, a router must be able to support multiple telecommunications interfaces of the highest speed in use in the core Internet and must be able to forward IP packets at full speed on all of them. It must also support the routing protocols being used in the core. A core router is distinct from an edge router: edge routers sit at the edge of a backbone network and connect to core routers.

Core Network is the central part of a telecommunications network that provides various services to customers who are connected by the access network. One of the main functions is to route telephone calls across the PSTN.

Coding - Networks

Telegeography (telemetry)

How the Internet works: Submarine fibre, brains in jars, and coaxial cables

Internet Connection Speed Testing
Broadband Speed Test
Test My Internet Connection Speed
DSL Reports
Page Loading Speed Test
Webpage Test
Website Speed Test by Country

International Cable Protection Committee

Submarine Communications Cable is a cable laid on the sea bed between land-based stations to carry telecommunication signals across stretches of ocean. The first submarine communications cables, laid in the 1850s, carried telegraphy traffic. Subsequent generations of cables carried telephone traffic, then data communications traffic. Modern cables use optical fiber technology to carry digital data, which includes telephone, Internet and private data traffic.  Submarine Cable Map.



Rights to Information - Public Information


Right to Information Freedom of Information Act in the United States is a federal freedom of information law that allows for the full or partial disclosure of previously unreleased information and documents controlled by the United States government. The Act defines agency records subject to disclosure, outlines mandatory disclosure procedures and grants nine exemptions to the statute. Right to Information mandates a timely response to a citizens request for government information.

Public Records are documents or pieces of information that are not considered confidential and generally pertain to the conduct of government. Information includes Records of law court proceedings. Records of births, marriages, and deaths. Records of land ownership. Statistics regarding population and the economic activity of a country, to name a few. Public records refers to information that has been filed or recorded by public agencies, such as corporate and property records. Public records are created by the federal and local government, (vital records, immigration records, real estate records, driving records, criminal records, etc.) or by the individual.

Right to Know - Need to Know - Public Interest - Open Governance

Transparency - Accountability - Journalism - Watchdogs

Public Information is any information, regardless of form or format, that an agency discloses, disseminates, or makes available to the public.

Public Document can be court records, land deeds, and public registers authenticated by a public officer and made available for public reference and use. Statements by public officers in such documents in their official capacity are admissible evidence of fact in civil matters. Also called public record.

Public Domain consists of all the creative work to which no exclusive intellectual property rights apply. Those rights may have expired, been forfeited, expressly waived, or may be inapplicable.

Center for the Study of the Public Domain - On January 1, 2021, works from 1925 finally enter the U.S. public domain.

Emre Hasan Akbayrak Librarian Blog

Federal Register is the official journal of the federal government of the United States that contains government agency rules, proposed rules, and public notices. It is published every weekday, except on federal holidays. The final rules promulgated by a federal agency and published in the Federal Register are ultimately reorganized by topic or subject matter and codified in the Code of Federal Regulations (CFR), which is updated annually. The Federal Register is compiled by the Office of the Federal Register (within the National Archives and Records Administration) and is printed by the Government Publishing Office. There are no copyright restrictions on the Federal Register; as a work of the U.S. government, it is in the public domain.

Freedom of Information Laws by Country (wiki) - National Freedom of Information Coalition - European Digital Rights

Internal information is any information, oral or recorded in electronic or paper format, maintained by the District or used by the District or its employees.

Access to Knowledge should be linked to fundamental principles of justice, freedom, and economic development.

How to Make an Open Records Request: First review the laws in your state at State Sunshine Laws - How To. Come up with as precise a description as you can of the documents or records you want. Figure out which office -- school district, city government, state agency, etc. -- will have the records or documents you want. Contact that unit of government and ask them who at the agency is responsible for providing copies of documents. Prepare your request using the fully automated, fill-in-the-blanks, state open records letter generator. Mail or email your request, or deliver it in person. Make a note on your calendar of the deadline for the agency to provide you with the documents you've requested. Making any Record Available to a Person under this paragraph, an agency shall provide the record in any form or format requested by the person if the record is readily reproducible by the agency in that form or format. Each agency shall make reasonable efforts to maintain its records in forms or formats that are reproducible for purposes of this section.

California Public Records Act requires inspection or disclosure of governmental records to the public upon request.

Note: Peoples access to information and knowledge is incredibly important. The Freedom of Information Act is under constant attack and our Right to Information is being denied, and even worse, it's also being Manipulated and Censored. With the Internet being filtered and manipulated means that our information is in jeopardy. You have to be diligent and prolific if you want to stay informed and educated about the truth.

Expect professional behavior from the custodians of the records you seek, and behave professionally yourself. If you encounter resistance, document what happened. State Sunshine Laws has information about each state's open records law, including contact information sorted by state for many school districts and city and county governments. Many states have organizations devoted to freedom of information. Don't hesitate to ask for help. If you will want to share information about the documents you receive--what the documents say or reveal--consider starting a blog.

Town Hall Records - All documents are recorded in the clerk's office of the Town or City where the property is located. Land Records itself is a generic expression and can include records such as, the register of lands, Records of Rights (RoRs), tenancy and crop inspection register, mutation register, disputed cases register, etc. Town Clerk's Office serves as a keeper of the records for all documents that pertain to a City. Town Clerk's primary functions is the recording, processing, archiving and retrieval of land records, deeds, mortgages, attachments, tax liens, judgments, maps, floor plans, probate certificates, death notices, variances and all other legal documents pertaining to land use and transfers. The Town Clerk records, and keeps permanent documentation and indices of all transactions.

Criminal Background Checks - Public Records For Arrests, Criminal, Address, Marriage, Property & More! Search Arrest Records. Dark Web Scan. Background Check. Find Anyone's Address. Types: Arrest Records, Traffic Tickets, Addresses, Phone Numbers, Background Checks.

Historical Records - Historical Documents - A record or narrative description of past events. Knowledge Preservation.

Ancestral knowledge - Family Tree

Library of Congress Archives - The Library of Congress Web Archive manages, preserves, and provides access to archived web content selected by subject experts from across the Library, so that it will be available for researchers today and in the future. Websites are ephemeral and often considered at-risk born-digital content. Libraries - Library of Congress.

National Archives and Records Administration is the nation's record keeper. Of all documents and materials created in the course of business conducted by the United States Federal government, only 1%-3% are so important for legal or historical reasons that they are kept by us forever. Those valuable records are preserved and are available to you, whether you want to see if they contain clues about your family’s history, need to prove a veteran’s military service, or are researching a historical topic that interests you. (NARA).

U.S. Government Information is a service of the United States Government Publishing Office, which is a Federal agency in the legislative branch. Gov Info provides free public access to official publications from all three branches of the Federal Government.

Homeland Security Digital Library - Securing the homeland through the power of information.

Public Knowledge does not mean that the knowledge is available to everyone. It means that there is knowledge, but only if you know where to find it. And only if you know what questions to ask, and know which people to talk to. Knowledge Gap.

What would you consider to be public information? I have been asking that question for over 12 years, and here's what I found.

Public Relations is the practice of managing the spread of information between an individual or an organization and the public. (PR).

To Be Informed - Knowledge Management - Information Sources

Education is a Human Right, because it's the right thing to do, it's just common sense. Education Reform.

Open Rights Group protects the digital rights of people in the UK including privacy and free speech online. We are powered by more than 20,000 members and supporters like you.

Open Records is a blog about freedom of information, open records and access to public documents. It is associated with WikiFoia, is sponsored by the Lucy Burns Institute and is written by Leslie Graves and Joshua Meyer.

Demand Progress - We work to win progressive policy changes for ordinary people through organizing and grassroots lobbying. We focus on issues of civil liberties, civil rights, and government reform. We run online campaigns to rally people to take action on the news that affects them — by contacting Congress and other leaders, funding pressure tactics, and spreading the word in their own communities. We work in Washington to provide an advocate for the public in all the decisions that affect our lives.



Censorship - Suppression


Censored Content ControlCensorship is the suppression of free speech and public communication or other information without logical reasons.

Profiling - Discrimination - Free Speech Abuse - Blacklisting - Denial - Secrecy

Censorship is not the same as Filtering or protecting someone from inappropriate material. Whether it's an Adult Mind or a Child's Mind, the lack of knowledge will always create vulnerabilities, risks and dangers. Just because you have a lack of censorship, this does not mean that freedom of speech is protected, because lies and propaganda in the media does a lot of harm and damage to peoples perceptions of reality.

Whistle Blowing - Freedom of Information Act - Right to Information - Everyone is on a Need to Know Basis.

Censorship in the United States is when certain information may be considered objectionable, harmful, sensitive, politically incorrect or inconvenient by governments, media outlets, authorities or other groups or institutions. Censorship is Genocide of the mind if it is used to keep people from knowing the truth. Violence against Journalists.

Internet Censorship is blocking access to websites. Dumbing Down Education (Genocide carried out on paper).

Censure is an expression of strong disapproval or harsh criticism. Rebuke. Banned Books - Challenge Literature.

Media Blackout refers to the censorship of news related to a certain topic, particularly in mass media, for any reason. And when they do talk it is sometimes just propaganda. The Freedom of Information Act is being violated continually.

Muzzled is to prevent a person or a group from expressing their opinions freely. To put a muzzle on an animal. Muzzle is a restraint put into a person's mouth to prevent speaking or shouting. Tie a gag around someone's mouth in order to silence them. Muzzle is a leather or wire restraint that fits over an animal's snout that prevents it from eating or biting, especially a dog's nose and jaws.

Block Internet is a technical measure intended to restrict access to information or resources. Blocking and its inverse, unblocking, may be implemented by the owners of computers using software. Some countries, including China and Singapore, block access to certain news information. In the United States, the Children's Internet Protection Act requires schools receiving federal funded discount rates for Internet access to install filter software that blocks obscene content, pornography, and, where applicable, content "harmful to minors". Blocking may also refer to denying access to a web server based on the IP address of the client machine. In certain websites, including social networks such as Facebook or editable databases like Wikimedia projects and other wikis, users can apply blocks (based in either IP number or account) on other users deemed undesirable to prevent them from performing certain actions. Blocks of this kind may occur for several reasons and produce different effects: in social networks, users can unrestrictedly block other users, typically by preventing them from sending messages or viewing the blocker's information or profile. Privileged users can apply blocks that affect the access of the undesirables to the entire website. Blocking is used by moderators and administrators of social media and forums to deny access to users that have broken their rules and will likely do so again, in order to ensure a peaceful and orderly discussion place. Common reasons for blocking are spamming, trolling, and flaming. Some criticize cases of the use of bans by administrators of large websites, such as Twitter, saying that these bans may be politically or financially motivated. However, websites have a legal right to decide who is allowed to post, and users often respond by "voting with their feet" and going to a place where the administrators see their behavior as acceptable.

Blocked Websites by Country (wiki) - Banned Websites Awareness - Comment Section Policing

History being Censored and Propagandized - Book Burning

When people read or hear something that challenges their beliefs, they can ignorantly censor that information without any verification of its accuracy. That is called bias and prejudice. A person needs to be educated in information literacy in order to avoid being biased or prejudice. If not, then they will abuse themselves and abuse other people with devastating consequences, such as death and destruction. Discretion Advised (ratings)

Censorship is a form of terrorism. If you stop people from having access to valuable knowledge and information that could save their life, then that is murder. 

Humans use language to transmit information and process information, and when language is controlled or manipulated by the media or by educational institutions, then someone can control your mind. And that is a fact that people have confirmed and witnessed. Human language is under attack, which is terrorism of the worst kind, an attack from within.

The Real Danger is not the Internet, the real danger is ignorance. We must learn to balance freedom of expression with the rights of an individual. If people were afraid to speak because they feared being misunderstood, then no one would say anything valuable and everyone would be even more ignorant then they are now. Activism.

The Protection from Online Falsehoods and Manipulation Act is to issue corrections or remove content that the government deems false. Media companies that fail to comply face a fine of up to a 1 million Singapore dollars (about $722,000). Individuals found guilty of violating the law, both inside and outside the tiny Southeast Asian country, could face fines of up to $60,000 or prison for up to 10 years. Opposition lawmakers and free speech advocates in Singapore and around the region say the law will stifle public discussion and hamstring journalists in a country they say is steadily marching further toward authoritarianism.

Bleep Censor has been used for many years as a means of censoring TV programs to remove content not deemed suitable for "family", "daytime", "broadcasting", or "international" viewing and personal information for privacy. The bleep censor is a software module, manually operated by a broadcast technician. A bleep is sometimes accompanied by a digital blur or box over the speaker's mouth in cases where the removed speech may still be easily understood by lip reading.

Profanity - Movie Rating System - Time Delay

Broadcast Delay is an intentional delay when broadcasting live material. Such a delay may be short (often seven seconds) to prevent mistakes or unacceptable content from being broadcast. Longer delays lasting several hours can also be introduced so that the material is aired at a later scheduled time (such as the prime time hours) to maximize viewership. Tape delays lasting several hours can also be edited down to remove filler material or to trim a broadcast to the network's desired run time for a broadcast slot, but this isn't always the case.

Family Viewing Hour had a responsibility to air "family-friendly" programming during the first hour of the prime time lineup (8 to 9 p.m. Eastern Time). The hour disappeared in 1977 after the policy was overturned in court; however, the concept has continued to be used by some viewers who still believe that the 8:00 p.m. time slot in primetime has an obligation to have family-friendly programming.

Self-Censorship is the act of censoring or classifying one's own discourse. This is done out of fear of, or deference to, the sensibilities or preferences (actual or perceived) of others and without overt pressure from any specific party or institution of authority. Self-censorship is often practiced by film producers, film directors, publishers, news anchors, journalists, musicians, and other kinds of authors including individuals who use social media. Self-Censorship is not saying something or writing something because you fear being misunderstood or attacked. Conformity.

You can’t fight diseases, or in this case the dangers of the Internet, by simply isolating, blocking and filtering websites or quarantining children because eventually people will be infected. You fight diseases or dangers by building the immune system just like a vaccine does by giving a small amount of the disease so that the body builds up its immunity to that particular disease. The immune system in this case is a child’s capacity to think logically and to possess extensive knowledge about vulnerabilities and hazards that are on TV, the Internet and at the Library. A teacher or parent needs to explain why certain things are inappropriate, and If a teacher or parent can not teach this then they must learn. Everyone must learn about the importance of moral practices and ethical standards but they must also learn why some things in this world do not have moral practices or ethical standards.

American Censorship - Public Knowledge - Stop Censorship

Media Literacy (human language is under attack)

Copyright Infringement Protection should not violate Constitutional Rights.

Freedom of Speech and The First Amendment (Journalism)

Redaction Redact is to prepare a publication or presentation by correcting, revising, adapting or editing text. To censor or obscure part of a text for legal or security purposes or because someone put text inappropriate text in a publication. (merging the layers).

Redaction is a form of editing in which multiple source texts are combined (redacted) and altered slightly to make a single document. Often this is a method of collecting a series of writings on a similar theme and creating a definitive and coherent work. The term is also used to describe removal of some document content, replacing it typically with black rectangles which indicate the removal.

Sanitization of classified information is the process of removing sensitive information from a document or other message (or sometimes encrypting it), so that the document may be distributed to a broader audience. When the intent is secrecy protection, such as in dealing with classified information, sanitization attempts to reduce the document's classification level, possibly yielding an unclassified document. When the intent is privacy protection, it is often called data anonymization. Originally, the term sanitization was applied to printed documents; it has since been extended to apply to computer media and the problem of data remanence as well. Redaction in its sanitization sense (as distinguished from its other editing sense) is the blacking out or deletion of text in a document, or the result of such an effort. It is intended to allow the selective disclosure of information in a document while keeping other parts of the document secret. Typically the result is a document that is suitable for publication or for dissemination to others than the intended audience of the original document. For example, when a document is subpoenaed in a court case, information not specifically relevant to the case at hand is often redacted.

Content-Control Software is software designed to restrict or control the content a reader is authorized to access, especially when utilized to restrict material delivered over the Internet via the Web, e-mail, or other means. Content-control software determines what content will be available or be blocked.

Children must learn the difference between being funny and what is insensitive and cruel. Children must also learn that just because something is called entertainment does not mean that it is safe or that it will not have any repercussions or undesirable affects on the human mind. I'm all for Protecting Children from Inappropriate Material as long as someone teaches them why it's not suitable and dangerous. But controlling, limiting or censoring children’s freedoms is not teaching, you are just delaying the fact that they will make mistakes and most likely never learn from their mistakes, with some children being ultimately devastated by their mistakes. The only real protection children have against vulnerabilities and hazards in our world is a very comprehensive and a very effective education. Educate children, communicate with children and learn from children.

Money is a form of Censorship - Human Rights

National Coalition Against Censorship

Lambasted is to censure severely or angrily. Censure is harsh criticism or disapproval.

Exclusion is the act of forcing out someone or something. The state of being excluded. the state of being excommunicated. A deliberate act of omission.

Excluded is to prevent from being included, considered or accepted. Prevent from entering; shut out. Lack or fail to include. Disallow membership or entry. Put out or expel from a place.

Omission is any process whereby sounds or words are left out of spoken words or phrases. Neglecting to do something; leaving out or passing over something. A mistake resulting from neglect.

Omitted is to prevent from being included, considered or accepted. Leave undone or leave out.

Ejected is to put out or expel from a place. Eliminate. Leave an aircraft rapidly, using an ejection seat or capsule. Rejection.

Eliminate is to terminate, end, or take out. Do away with. Dismiss from consideration or a contest. Expel from the body.

Expel is to force to leave or move out. Force to leave or move out. Cause to flee. Expelled. Booted out and remove from a position or office.

Withholding is the act of holding something back or keeping within your possession or control. To hold something back and refuse to hand over or share. To retain and refrain from disbursing payments. Withholding Evidence.

Censorship from Internet Service Providers.

If you see any connection errors on any of the pages on BK101, that means the website might be being blocked and censored. Your right to be knowledgeable and educated might be restricted and denied by criminals.

406 Not Acceptable or Server Not Found The Connection was Reset, the connection to the server was reset while the page was loading. Webpage doesn't load, shows only a blank white screen, while other websites load normally.

Not Acceptable: An appropriate representation of the requested resource could not be found on this server. Error 406 sometimes due to Mod Security updates on the server. (Refresh Browser Window).

Browser Errors are giving warnings saying that the connection is not secure? Most people don't know how to fix these types of errors, so they might believe they can't access the website. Fear Mongering.

Connection Not Secure Warning: Your connection is not private and the information you share on this site can be viewed by others. But why is there a warning on pages that have no inputs? (there may be link on the page that has tracking software, and all they need is authentication from the tracking link to remove the error).
SSL Error is actually just a warning and can be just an information error, so how is a person supposed to know?
HTTP is a system for transmitting information from a web server to your browser. HTTP is not secure, so when you visit a page served over HTTP, your connection is open for eavesdropping and man-in-the-middle attacks. Most websites are served over HTTP because they don't involve passing sensitive information back and forth and do not need to be secured.
When you visit a page fully transmitted over HTTPS, such as your bank, you'll see a green padlock icon in the address bar (For details, see How do I tell if my connection to a website is secure?). This means that your connection is authenticated and encrypted, and thus safeguarded from both eavesdroppers and man-in-the-middle attacks.
However, if the HTTPS page you visit includes HTTP content, the HTTP portion can be read or modified by attackers, even though the main page is served over HTTPS. When an HTTPS page has HTTP content, we call that content “mixed”. The page you are visiting is only partially encrypted and even though it appears to be secure, it isn't.
Content Blocking? Some browsers may protect you from attacks by blocking potentially harmful, insecure content on web pages that are supposed to be secure. (what does that mean?) No Blockable content detected on this page? Some content not secure like images?
The page contains mixed active content? Some browsers do not block insecure elements. That page is open to eavesdropping and attacks where your personal data from the site could be stolen. Unless you’ve unblocked mixed content using the instructions in the next section. Look for Icons.
Not blocking insecure passive content, such as images? By default, Some browsers do not block mixed passive content; you will simply see a warning that the page isn't fully secure. Attackers may be able to manipulate parts of the page like displaying misleading or inappropriate content, but they should not be able to steal your personal data from the site.

Distributed Denial of Service is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. DDoS) attacks. This type of attack takes advantage of the specific capacity limits that apply to any network resources – such as the infrastructure that enables a company's website. DDoSing is an Illegal cybercrime in the United States. A DDoS attack could be classified as a federal criminal offense under the Computer Fraud and Abuse Act (CFAA). The use of booter services and stressers also violates this act. DDoS Madory, BackConnect had regularly spoofed internet addresses through a technique known as a “BGP hijack,” an aggressive tactic that pushes the bounds of accepted cyber-security industry practices. "Zombie” machines, referred to as botnets. A botnet is formed of personal computers in homes or offices infected with malicious code which, upon the request of a hacker, can start flooding a web server with data. One or two machines wouldn’t be an issue, but if tens or hundreds of thousands fire such data simultaneously, it can be enough to cripple even the most sophisticated of web servers. Dyn incident, the computers targeted were DNS servers.



Protecting Internet Communications during Protests


Haystack Software program intended for network traffic obfuscation and encryption. It was promoted as a tool to circumvent internet censorship in Iran. Shortly after the release of the first test version, reviewers concluded the software didn't live up to promises made about its functionality and security, and would leave its users' computers more vulnerable.

Fire Chat App - Bitcoin

Mesh Networking is a network topology in which each node relays data for the network. All mesh nodes cooperate in the distribution of data in the network.

Wireless Mesh Network is a communications network made up of radio nodes organized in a mesh topology. It is also a form of wireless ad hoc network. Wireless mesh networks often consist of mesh clients, mesh routers and gateways. The mesh clients are often laptops, cell phones and other wireless devices while the mesh routers forward traffic to and from the gateways which may, but need not, be connected to the Internet. The coverage area of the radio nodes working as a single network is sometimes called a mesh cloud. Access to this mesh cloud is dependent on the radio nodes working in harmony with each other to create a radio network. A mesh network is reliable and offers redundancy. When one node can no longer operate, the rest of the nodes can still communicate with each other, directly or through one or more intermediate nodes. Wireless mesh networks can self form and self heal. Wireless mesh networks can be implemented with various wireless technologies including 802.11, 802.15, 802.16, cellular technologies and need not be restricted to any one technology or protocol. MN.

Glasswire firewall software reveals threats your antivirus missed.

Peer to Peer computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the application. They are said to form a peer-to-peer network of nodes.

Peer-to-peer file sharing is the distribution and sharing of digital media using peer-to-peer (P2P) networking technology. P2P file sharing allows users to access media files such as books, music, movies, and games using a P2P software program that searches for other connected computers on a P2P network to locate the desired content. The nodes (peers) of such networks are end-user computers and distribution servers (not required).

Bulletproof Hosting is a service provided by some domain hosting or web hosting firms that allows their customer considerable leniency in the kinds of material they may upload and distribute.

TOR: Private Communications
Anonymous Internet Web Browsing
Identity Obfuscation (PDF)
Mega Proxy
Be-Bound app connects to the Internet even when you have no data connection or WiFi

Private Messaging
Tox
Briar Project
Invisible
Cuban youth build secret computer network despite Wi-Fi ban

Hola is one of the most popular ways to access geo-blocked websites. How to Geek

VPN's or a Virtual Private Network is another option. These allow you to tunnel your traffic through an encrypted connection and come out on the other side.
Shellfire Box VPN Evolution

SIPRNet is "a system of interconnected computer networks used by the U.S. Department of Defense and the U.S. Department of State to transmit classified information (up to and including information classified SECRET) by packet switching over the 'completely secure' environment". It also provides services such as hypertext document access and electronic mail. As such, SIPRNet is the DoD's classified version of the civilian Internet.

Keezel: Protect your privacy and security online! Portable WiFi solution that unblocks content worldwide

Turris Omnia: Hi-Performance Open-Source Router
Code Words

HOLY $H!T - Long Distance Wi-Fi (Up to 25 KILOMETER range!?) (youtube)
Ubiquiti Networks
Linus Tech Tips (youtube channel)

How to Unblock US Websites using DNS Proxy
Protecting The Information Highway

Lantern is a free desktop App that delivers fast, reliable and secure access to the open Internet.

Secure My Email - Smartphones.

Freebrowser is a free App gives access to websites even if they are blocked by national or corporate firewalls.



Data Protection - Safe Web Surfing - Encryption


Data Protection Data Protection Act 1998 defines the law on the processing of data on identifiable living people and is the main piece of legislation that governs the data protection. Data Protection Act - Bitcoin.

Are You Safe?

Information Privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally identifiable information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. Improper or non-existent disclosure control can be the root cause for privacy issues. Data privacy issues may arise in response to information from a wide range of sources, such as: Healthcare records, Criminal justice investigations and proceedings, Financial institutions and transactions, Biological traits, such as genetic material, Residence and geographic records, Privacy breach, Location-based service and geolocation, Web surfing behavior or user preferences using persistent cookies. The challenge of data privacy is to utilize data while protecting individual's privacy preferences and their personally identifiable information. The fields of computer security, data security, and information security design and utilize software, hardware, and human resources to address this issue. Since the laws and regulations related to Privacy and Data Protection are constantly changing, it is important to keep abreast of any changes in the law and to continually reassess compliance with data privacy and security regulations. Privacy Protection (gov).

Data Protection Directive is the protection of individuals with regard to the processing of personal data and on the free movement of such data.

Information Assurance is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data. IA encompasses not only digital protections but also physical techniques. These protections apply to data in transit, both physical and electronic forms, as well as data at rest . IA is best thought of as a superset of information security (i.e. umbrella term), and as the business outcome of information risk management.

Information Security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. The information or data may take any form, e.g. electronic or physical. Information security's primary focus is the balanced protection of the confidentiality, integrity and availability of data (also known as the CIA triad) while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a multi-step risk management process that identifies assets, threat sources, vulnerabilities, potential impacts, and possible controls, followed by assessment of the effectiveness of the risk management plan. Physical Security.

Privacy Rights - Privacy Policies

None of Your Business or Mind your own Business is a term used to say that something is private and is not your concern, and you should respect other people's privacy. Stop meddling in peoples private affairs. This is a private matter.

Data Breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.

Cyberwarfare actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption.

Cyber Security Standards are techniques generally set forth in published materials that attempt to protect the cyber environment of a user or organization.

Login is the process by which an individual gains access to a computer system by identifying and authenticating themselves. The user credentials are typically some form of "username" and a matching "password".

Access Control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization. Locks and login credentials are two analogous mechanisms of access control.

Security Engineering is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to other systems engineering activities in that its primary motivation is to support the delivery of engineering solutions that satisfy pre-defined functional and user requirements, but with the added dimension of preventing misuse and malicious behavior. These constraints and restrictions are often asserted as a security policy.

Data Remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that does not remove data previously written to the media, or through physical properties of the storage media that allow previously written data to be recovered. Data remanence may make inadvertent disclosure of sensitive information possible should the storage media be released into an uncontrolled environment (e.g., thrown in the trash or lost).

How Hackers Could Wirelessly Bug Your Office (youtube)

VAULTCARD Protection from RFID Fraud. Pocket-sized protection against RFID fraud, shielding credit cards to keep personal data safe.

Data - Knowledge Management - Freedom to Information

Confidentiality, Integrity, and Availability. Health Records.

Secure Internet Communications
Protecting Internet Communications during Protests
Protecting the Internet - Laws

Replay Attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and re-transmits it, possibly as part of a masquerade attack by IP packet substitution. This is one of the lower tier versions of a "Man-in-the-middle attack". Another way of describing such an attack is: "an attack on a security protocol using replay of messages from a different context into the intended (or original and expected) context, thereby fooling the honest participant(s) into thinking they have successfully completed the protocol run."



Privacy - Anonymity


Internet Privacy - Guy Fawkes Mask Anonymity on the Internet, most commentary on the Internet is essentially done anonymously, using unidentifiable pseudonyms. While these usernames can take on an identity of their own, they are frequently separated and anonymous from the actual author. Anonymizing services such as I2P and Tor address the issue of IP tracking. In short, they work by encrypting packets within multiple layers of encryption. The packet follows a predetermined route through the anonymizing network. Each router sees the immediate previous router as the origin and the immediate next router as the destination. Thus, no router ever knows both the true origin and destination of the packet. This makes these services more secure than centralized anonymizing services (where a central point of knowledge exists. Bitcoin.

Right to Privacy is to restrain governmental and private actions that threaten the privacy of individuals. - Privacy.

I2P, the Invisible Internet Project (I2P) is an overlay network and darknet that allows applications to send messages to each other pseudonymously and securely. Uses include anonymous Web surfing, chatting, blogging and file transfers. The software that implements this layer is called an I2P router and a computer running I2P is called an I2P node.

Tor anonymity network is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis.

Tor Project - Tor Browser - Tor Servers

Whisper Systems Signal App Scalable Encryption Tool.

Crypto Party goal is to pass on knowledge about protecting yourself in the digital space. This can include encrypted communication, preventing being tracked while browsing the web, and general security advice regarding computers and smartphones.

Crypto Christmas - Cutealism

Anonymizer is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information by hiding the client computer's identifying information.

Anonysurfer

Pseudonymity meaning 'false name', is a state of disguised identity. The pseudonym identifies a holder, that is, one or more human beings who possess but do not disclose their true names (that is, legal identities). Most pseudonym holders use pseudonyms because they wish to remain anonymous, but anonymity is difficult to achieve, and is often fraught with legal issues. True anonymity requires unlinkability, such that an attacker's examination of the pseudonym holder's message provides no new information about the holder's true name.

Online Tracking Web Privacy Measurement (PDF)

Freedom Hosting - Bit-Coin

Deep Web - Dark Internet - Virus Protection

Encryption Software -Cryptography - Decode - IP Cloaking

Cypherpunk is any activist advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change.

VPN - Virtual Private Networks (safe browsing)

Anonabox Tor & VPN Router For Privacy, Bypassing Censorship & Deterring Hackers to Fund Draper Bio. Project Blue:
Flter: Privacy & Security Router - VPN protection, malicious ad blocking, and Tor anonymity on all the devices in your home.
Betterspot: A Smart VPN Router or secure online surfing and unblocking websites for All Devices.
InvizBox Go: Privacy & security, wherever you are. Use public Wi-Fi safely. Protect your browsing. Stream blocked shows at home. Block ads. Power bank.

Windscribe desktop application and browser extension to block ads and trackers.

How do you know it's Me?

Authentication is the act of confirming the truth of an attribute of a single piece of data (a datum) claimed true by an entity. In contrast with identification which refers to the act of stating or otherwise indicating a claim purportedly attesting to a person or thing's identity, authentication is the process of actually confirming that identity. It might involve confirming the identity of a person by validating their identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product is what its packaging and labeling claim to be. In other words, authentication often involves verifying the validity of at least one form of identification.

Authentication Methods (wiki) - Identity (who am I?)

Password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.

Retinal Scan is a biometric technique that uses the unique patterns on a person's retina blood vessels. It is not to be confused with another ocular-based technology, iris recognition, commonly called an "iris scanner."

Facial Recognition is a computer application capable of identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database.

Voice Recognition is the identification of a person from characteristics of voices (voice biometrics). It is also called voice recognition. There is a difference between speaker recognition (recognizing who is speaking) and Speech Recognition (recognizing what is being said).

Identity Management Systems refers to an information system, or to a set of technologies that can be used for enterprise or cross-network identity management. Additional terms are used synonymously with "identity management system" including; Access governance system. Identity and access management system. Entitlement management system. User provisioning system.

Identity Management is the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons". It addresses the need to ensure appropriate access to resources across increasingly heterogeneous technology environments and to meet increasingly rigorous compliance requirements. The terms "identity management" (IdM) and "identity and access management" are used interchangeably in the area of Identity access management. "Identity management" comes under the umbrella of IT security. Identity-management systems, products, applications and platforms manage identifying and ancillary data about entities that include individuals, computer-related hardware, and software applications. IdM covers issues such as how users gain an identity, the protection of that identity and the technologies supporting that protection (e.g., network protocols, digital certificates, passwords, etc.).

Open ID is an open standard and decentralized authentication protocol.

Identity Provider provides identifiers for users looking to interact with a system. Asserts to such a system that such an identifier presented by a user is known to the provider. Possibly provide other information about the user that is known to the provider.

Cookies and Profiling

Researcher ID provides a solution to the author ambiguity problem within the scholarly research community. Each member is assigned a unique identifier to enable researchers to manage their publication lists, track their times cited counts and h-index, identify potential collaborators and avoid author misidentification. In addition, your ResearcherID information integrates with the Web of Science and is ORCID compliant, allowing you to claim and showcase your publications from a single one account. Search the registry to find collaborators, review publication lists and explore how research is used around the world!

Public Key Infrastructure is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

Public-Key Cryptography is any cryptographic system that uses pairs of keys: public keys that may be disseminated widely paired with private keys which are known only to the owner. There are two functions that can be achieved: using a public key to authenticate that a message originated with a holder of the paired private key; or encrypting a message with a public key to ensure that only the holder of the paired private key can decrypt it.

Bitcoin - Browsers (virus protection) - Code Words

Public Key Certificate - Digital Certificates - Scalable Provable Data Possession - Dynamic Provable Data Possession.

Lattice-Based Access Control

Privacy and Protecting of Personal Information (data mining)
Privacy Rights - Privacy Policies

Enigma Machine were a series of electro-mechanical rotor cipher machines developed and used in the early- to mid-twentieth century to protect commercial, diplomatic and military communication.

Proton Mai - Electronic Privacy Center - Collusion - Life Lock

Data Retention defines the policies of persistent data and records management for meeting legal and business data archival requirements; although sometimes interchangeable, not to be confused with the Data Protection Act 1998.

Staats Trojaner

The National Security Archive

Public Data Sources - Filtering

Heartbleed Bug is a security bug in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security (TLS) protocol. It was introduced into the software in 2012 and publicly disclosed in April 2014. Heartbleed may be exploited regardless of whether the vulnerable OpenSSL instance is running as a TLS server or client. It results from improper input validation (due to a missing bounds check) in the implementation of the TLS heartbeat extension. Thus, the bug's name derives from heartbeat. The vulnerability is classified as a buffer over-read, a situation where more data can be read than should be allowed.

Crowd Strike

ICANN - Internet Corporation for Assigned Names and Numbers.

Computers - Computer Crimes

Use 256 encryption and a Wpa/wpa2 password - Quantum Key Distribution (wiki)

Dangers of Anonymity and the Psychological Effects of being Anonymous.

Information Security Operations Center is a facility where enterprise information systems are monitored, assessed, and defended, such as web sites, applications, databases, data centers and servers, networks, desktops and other endpoints.



Private Information - Do Not Follow - Do Not Share


Proprietary information Agreement also known as a confidentiality agreement (CA), confidential disclosure agreement (CDA), proprietary information agreement (PIA), or secrecy agreement (SA), is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to or by third parties. It is a contract through which the parties agree not to disclose information covered by the agreement. An NDA creates a confidential relationship between the parties to protect any type of confidential and proprietary information or trade secrets. As such, an NDA protects non-public business information.

Sensitive Information is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others. Loss, misuse, modification, or unauthorized access to sensitive information can adversely affect the privacy or welfare of an individual, trade secrets of a business or even the security and international relations of a nation depending on the level of sensitivity and nature of the information.

Family Educational Rights and Privacy Act is a law that governs the access of educational information and records.
Privacy Waiver.

Information Rights Management is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or Enterprise Digital Rights Management. This can cause confusion, because digital rights management (DRM) technologies are typically associated with business to consumer systems designed to protect rich media such as music and video. IRM is a technology which allows for information (mostly in the form of documents) to be ‘remote controlled’. This means that information and its control can now be separately created, viewed, edited & distributed. A true IRM system is typically used to protect information in a business-to-business model, such as financial data, intellectual property and executive communications. IRM currently applies mainly to documents and emails.

Classified Information Procedures

Classified Information is material that a government body claims is sensitive information that requires protection of confidentiality, integrity, or availability. Access is restricted by law or regulation to particular groups of people, and mishandling can incur criminal penalties and loss of respect. A formal security clearance is often required to handle classified documents or access classified data.

Data Protection Facts - Privacy Blog - Media Literacy

Information Privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally identifiable information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. Improper or non-existent disclosure control can be the root cause for privacy issues. Data privacy issues can arise in response to information from a wide range of sources, such as: Healthcare records, Criminal justice investigations and proceedings, Financial institutions and transactions, Biological traits, such as genetic material, Residence and geographic records, Ethnicity, Privacy breach, Location-based service and geolocation, Web surfing behavior or user preferences using persistent cookies. The challenge of data privacy is to utilize data while protecting individual's privacy preferences and their personally identifiable information. The fields of computer security, data security and information security design and utilize software, hardware and human resources to address this issue. As the laws and regulations related to Privacy and Data Protection are constantly changing, it is important to keep abreast of any changes in the law and continually reassess compliance with data privacy and security regulations.

List of Personal Information Managers (wiki)

Judicial Watch is an American conservative activist group and self-styled watchdog group that files Freedom of Information Act lawsuits to investigate claimed misconduct by government officials.

Confidentiality - Privacy Rights - Anonymity

Information Rights - Journalism Tools

Copyright Information Websites

The Hacker Wars (Full HD Video 91 min.) - Director: Vivien Lesnik Weisman.

National Security Archive is an investigative journalism center, open government advocate, international affairs research institute, and is the largest repository of declassified U.S. documents outside of the federal government. The National Security Archive has spurred the declassification of more than 10 million pages of government documents by being the leading non-profit user of the U.S. Freedom of Information Act (FOIA), filing a total of more than 50,000 FOIA and declassification requests in its nearly 30-year history. History.

Declassified is the process of documents that used to be classified as secret ceasing to be so restricted, often under the principle of freedom of information. Procedures for declassification vary by country. Papers may be withheld without being classified as secret, and eventually made available.



Privacy Rights - Surveillance Abuses and Dangers


NSA Espionage is the obtaining of information considered secret or confidential without the permission of the holder of the information. Do you still think that you have nothing to hide?

Spying is secretly watching someone to collect information. Not the same as an investigation.

False Flag - Espionage Act of 1917 (wiki)

Treason is the crime of betraying one's country, especially by attempting to kill the sovereign or overthrow the government, or its Constitution.

Traitor is someone who betrays his country by committing treason. Counterintelligence?

Treachery is betrayal of a trust. An act of deliberate betrayal.

Betrayal is aiding an enemy against the interest of one's country. Disloyal. Racket of War.

Sell Out is someone who compromises their integrity, morality, authenticity, or principles in exchange for personal gain, such as money, usually at the expense of other people and at the expense of the environment. Judas betrayed Jesus (wiki).

Stab Someone in the Back is to criminally attack someone when they are not looking and not suspecting that someone is doing harmful things behind their back, something out of view and without their knowledge. Backstabber is a traitor or hypocrite, such as a co-worker or friend assumed trustworthy but who figuratively attacks when one's back is turned.

Two Faced - Ass Kisser - Ponzi - Just following orders - Conformity - Ignorance.

Voyeurism is when a person gets sexual pleasure from watching others who are engaged in intimate behaviors, such as undressing, sexual activity, or other actions that are usually considered to be of a private nature. Hidden Camera.

Private are things deeply personal that should be concealed or hidden from the presence or view of others. Privy is something hidden from general view or use. To be informed about something secret or not generally known.

Privacy - Privacy Policies (disclaimers) - Privileged Information - Discretion - Anonymity

Mind Your Own Business means to respect other people's privacy and stop meddling in other peoples affairs that do not concern you.

Sensitive is being susceptible to the attitudes, feelings, or circumstances of others. Pertaining to classified information.


Infiltration is the action of entering or gaining access to an organization or place surreptitiously, especially in order to acquire secret information or cause damage. Dark Web.

Data Exfiltration occurs when malware and/or a malicious actor carries out an unauthorized data transfer from a computer. It is also commonly called data extrusion or data exportation. Data exfiltration is also considered a form of data theft. Types of data that are targeted includes: Usernames, associated passwords, and other system authentication related information. Information associated with strategic decisions. Cryptographic keys. Personal financial information. Social security numbers and other personally identifiable information (PII). Mailing addresses. United States National Security Agency hacking tools. Three main categories of preventive measures may be the most effective: Preventive, Detective and Investigative.

Data Theft is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information.

War Crimes - Secrecy - Monopolies - Whistle Blowing

Confidentiality involves a set of rules or a promise that limits access or places restrictions on certain types of information.

Confidential
is being entrusted with private and secret information and the having the confidence of another. The level of official classification for documents next above restricted and below secret and available only to persons authorized to see documents so classified.

Classified is information declare unavailable, as for security reasons. Classification of information or documents that are withheld from general circulation. Restriction imposed by the government on documents or technologies that are available only to certain authorized people.

Declassified is having had security classification removed. Lift the restriction on and make available again.

Big Data - Mobile Phone Tracking - Profiling - Cookies - Facial Recognition

Patriot Act is a backronym that stands for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism, such as expand the abilities of law enforcement to expend surveillance, including by tapping domestic and international phones; eased interagency communication to allow federal agencies to more effectively use all available resources in counterterrorism efforts; and increased penalties for terrorism crimes and an expanded list of activities which would qualify someone to be charged with terrorism. Patriot Act is an Act of the United States Congress that was signed into law by U.S. President George W. Bush on October 26, 2001. Roving wiretaps, searches of business records, and conducting surveillance of "lone wolves"—individuals suspected of terrorist-related activities not linked to terrorist groups, now called the USA Freedom Act. - Republican Terrorism.

Diplomatic Cable is a confidential text-based message exchanged between a diplomatic mission, like an embassy or a consulate, and the foreign ministry of its parent country. A diplomatic cable is a type of dispatch. Other dispatches may be sent as physical documents in a diplomatic bag. The term cable derives from the time when the medium for such communications was telegraphs travelling along international submarine communications cables, though over time they have progressed into other formats and pathways. The term cablegram is also sometimes used. Due to the importance and sensitive nature of the subject matter, diplomatic cables are protected by the most elaborate security precautions to prevent unfettered access by the public, and unauthorized interception by foreign governments. Generally digital in format, they are always encrypted, frequently by unbreakable one time pad ciphers using key material distributed using diplomatic couriers.

Non-Disclosure Agreement is a contract through which the parties agree not to disclose information covered by the agreement. It is a legal contract between at least two parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to or by third parties. Doctor–patient confidentiality or physician–patient privilege, attorney–client privilege, priest–penitent privilege, and bank–client confidentiality agreements are examples, often not enshrined in a written contract between the parties. (Non-Disclosure agreement is also known as a confidentiality agreement, confidential disclosure agreement, proprietary information agreement or secrecy agreement).

Your Private Information is being Stolen and Sold. Almost everything that you say or do over a cellphone and the internet can be recorded. And that information can be sold to someone who can then use your information to manipulate you and used to manipulate other people who have also shared similar information that they naively thought was private and secure. These Profiles are being used as a source of violence instead of being used as a source for improvements. "What kind of person would profit from your personal information and then not share that profit with you? Everything that Information exploiters have is from other people. But some how they believe that they earned it, when in fact they just used other people. That's called being a scrounge and a moocher. It's time for the users to give back to the producers. No more free rides. Everyone is responsible for life and the maintenance that we all must do in order to live a beautiful life. No one should be above the law.

Why do some people confide in strangers but not trust a family member or friend with personal information. People will reveal personal information about themselves to strangers, but not reveal anything to their own family. There are some people you can trust and some people you can't trust with personal information, and there are some people we consider to be on a need to know basis. Personal information in the wrong hands is risky. Either you prove that the personal information will never be used in any criminal activity, or you give it back. It's not yours. I am the source of those details, my activities created those details. You went fishing in my pond on my personal property. I added the fish to the pond. Those are my fish. You don't need to steal my fish, you have your own fish and your own pond on your own personal property. So what are you doing? You can tell me. You can trust me and tell me anything, I'm not here to judge you, and I'm not interested in your personal information. Are you safe?

Information Broker is a company which specializes in collecting information about individuals from public records and private sources, including census and change of address records, motor vehicle and driving records, user-contributed material to social networking sites, media and court reports, voter registration lists, consumer purchase histories, most-wanted lists and terrorist watch lists, bank card transaction records, health care authorities, and Web browsing histories. The data are aggregated to create individual profiles, often made up of thousands of pieces of information, such as a person's age, race, gender, height, weight, marital status, religious affiliation, political affiliation, occupation, household income, net worth, home ownership status, investment habits, product preferences and health-related interests. Brokers then sell the profiles to other organizations that use them mainly to target advertising and marketing towards specific groups, to verify a person's identity including for purposes of fraud detection, and to sell to individuals and organizations so they can research people for various reasons. Data brokers also often sell the profiles to government agencies, such as the FBI, thus allowing law enforcement agencies to circumvent laws that protect privacy.

When a corporation says "We were Hacked" or we experienced a Security Breach, this is just another way of saying, "We sold your personal information and blamed it on Hackers", just like when a False Flag Attack blames terrorists. N.S.A. Hacking Tools Stolen? if you want to create a war, you have to give other people weapons. This war tactic is nothing new, it's been used for 100's of years. Shadow Brokers or state sponsored leaks.

Total Information Awareness was a program of the United States Information Awareness Office that began during the 2003 fiscal year. It operated under this title from February until May 2003, before being renamed as the Terrorism Information Awareness.

DARPA LifeLog was a project of the Information Processing Techniques Office of the Defense Advanced Research Projects Agency (DARPA) of the U.S. Department of Defense (DOD).

Information Awareness Office are several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security by achieving "Total Information Awareness" (TIA). This was achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States without any requirement for a search warrant. Data Collected Included every personal phone call and e-mail, cellphone tracking data, places and countries visited, passports and licenses held, date and place of birth, social network posts, personal photos, likes and dislikes and things you hate, your habits, your biases, books you like, reviews by people who think they know you, dating website profiles, recording of private conversations made in the presence of voice activated technologies or cellphones and pc's, bank accounts, offshore banking accounts, credit cards, late payments, bank records, income records, tax returns, credit history, stocks and bonds, assets, land and property owned, guns and weapons owned, court records, liens & lawsuits, traffic tickets, car accidents, social security number, passwords, user names and aliases, employment history, energy use, medical records, blood type, DNA test results, health information from health tracking devices, race or ethnicity, education back ground, school grades, IQ level, purchases and food buying records, internet searches, every website visited, movies and TV shows watched, background checks on friends and family, family names, friends names, business associates, marriages, sexual orientation, clubs and organizations involved in, voting records, political affiliations, religious background, hair and eye color, height, weight, physical weaknesses, allergies, dental records, and numerous other sources. This information was then analyzed to look for suspicious activities, connections between individuals, and possible threats. Additionally, the program included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras, and other methods. Following public criticism that the development and deployment of this technology could potentially lead to a mass surveillance system, the IAO was defunded by Congress in 2003. However, several IAO projects continued to be funded and merely run under different names, as revealed by Edward Snowden during the course of the 2013 mass surveillance disclosures. Paranoid delusions has turned into madness and power has corrupted the weak and fragile minds of people who are responsible for protecting Unites States Citizens and also protecting vulnerable people around the world. We have not just lost our way, we have lost our minds. It's time to return to reality. But returning to reality will not happen naturally on its own. We must learn how to return to reality and take the necessary actions to encourage learning. So add that to your data collection.

Industrial Espionage is a form of espionage conducted for commercial purposes instead of purely national security.

Foreign Agents Registration Act requiring that agents representing the interests of foreign powers in a "political or quasi-political capacity" disclose their relationship with the foreign government and information about related activities and finances. The purpose is to facilitate "evaluation by the government and the American people of the statements and activities of such persons."

Foreign Agent is anyone who actively carries out the interests of a foreign country while located in another host country, generally outside the protections offered to those working in their official capacity for a diplomatic mission. Foreign agents may be citizens of the host country.

Counter-intelligence refers to information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons or international terrorist activities, sometimes including personnel, physical, document or communications security programs.

Any criminal with money can buy surveillance equipment, so your government is not the only corporation that you need to worry about. Scams are worldwide.

EncroChat Secure Communication Tool. THE HAGUE, Netherlands (AP) — European police delivered a major blow to organized crime after cracking an encrypted communications network, allowing them to covertly watch “over the shoulder” of criminals in real time as they planned drug trafficking, arms sales, assassinations and torture, officers announced Thursday. The massive cross-border probe started in 2017 when French police began investigating phones using the EncroChat secure communication tool and ultimately were able to work around the encryption to gain direct access to users’ communications. “It was as though we were sitting at the table where criminals were chatting among themselves really,” said Jannine van den Berg, chief of the Dutch National Police Force. The encrypted platform was used by 60,000 people worldwide, including around 10,000 in Britain, British police said.

Right to Privacy is to restrain governmental and private actions that threaten the privacy of individuals.

Privacy Association is the largest and most comprehensive global information privacy community and resource. Founded in 2000, the IAPP is a not-for-profit organization that helps define, promote and improve the privacy profession globally.


Surveillance Abuses


Surveillance Abuse is the use of surveillance methods or technology to monitor the activity of an individual or group of individuals in a way which violates the social norms or laws of a society. Films about Surveillance Abuses.

Mass Surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens, often for corrupt purposes. The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA and the FBI, but may also be carried out by corporations (either on behalf of governments or at their own initiative). Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is often distinguished from targeted surveillance. To sell the high cost of security cameras, safety is being used as an excuse to invade peoples privacy, which makes people less safe and less secure.

Profiling - Facial Recognition - TSA

Keep Tabs On Someone is to watch someone carefully or keep under observation and monitor the activities or any development. To make a conscience effort to know what that person is doing.

How many Cameras does your city have? The total number of cameras in the world could reach 45 billion by 2022, when the global video-surveillance industry is forecast to reach $63 billion. New York City has an estimated 9,000 cameras linked to a system the New York Police Department calls the "Domain Awareness System." But there are more cameras that aren't linked to the system.

Surveillance is the monitoring of behavior, activities, or other changing information for the purpose of influencing, managing, directing, or sometimes protecting people. This can include observation from a distance by means of electronic equipment (such as closed-circuit television (CCTV) cameras) or interception of electronically transmitted information such as Internet traffic or phone calls. It can also include simple no- or relatively low-technology methods such as human intelligence agents and postal interception.

Foreign Intelligence Surveillance Act prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of espionage or terrorism).

Computer Surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.

Targeted Surveillance is a form of surveillance that is targeted on specific persons of interest and distinguished from mass surveillance (or bulk interception). Untargeted surveillance is routinely accused of treating innocent people as suspects in ways that are unfair, of violating human rights, international treaties and conventions as well as national laws and of failing to pursue security effectively. Mobile Phones.

FISA Section 702 is a controversial law that permits U.S. intelligence to Spy on Americans without a warrant when they are detected talking with foreigners overseas who were under surveillance.

How the US Government Spies on People who Protest — including you (video and interactive text)

Operation CHAOS or MH-CHAOS was a Central Intelligence Agency domestic espionage project targeting the American people from 1967 to 1974, established by President Lyndon B. Johnson and expanded under President Richard Nixon, whose mission was to uncover possible foreign influence on domestic race, anti-war and other protest movements. The operation was launched under Director of Central Intelligence (DCI) Richard Helms by chief of counter-intelligence James Jesus Angleton, and headed by Richard Ober. The "MH" designation is to signify the program had a worldwide area of operations.

Interception refers to the facilities in telecommunications and telephone networks that allow law enforcement agencies with court order or other legal authorization to selectively wiretap individual subscribers. Most countries require licensed telecommunications operators to provide their networks with Legal Interception gateways and nodes for the interception of communications. The interfaces of these gateways have been standardized by telecommunication standardization organizations. With the legacy public switched telephone network (PSTN), wireless, and cable systems, lawful interception (LI) was generally performed by accessing the mechanical or digital switches supporting the targets' calls. The introduction of packet switched networks, softswitch technology, and server-based applications the past two decades fundamentally altered how LI is undertaken. Lawful interception differs from the dragnet-type mass surveillance sometimes done by intelligence agencies, where all data passing a fiber-optic splice or other collection point is extracted for storage or filtering. It is also separate from the data retention of metadata that has become a legal requirement in some jurisdictions. Mobile phones are kind of like ankle monitors. they know when you left the house and where you traveled.

Signals Intelligence is intelligence-gathering by interception of signals or communications between people.

Global Surveillance Disclosures

Automatic Number Plate Recognition is a technology that uses optical character recognition on images to read vehicle registration plates. It can use existing closed-circuit television, road-rule enforcement cameras, or cameras specifically designed for the task.


Cellphone Tracking - Wiretaps - Eavesdropping on Conversations


Telephone Tapping is the monitoring of telephone and Internet conversations by a third party, often by covert means.

Eavesdropping is secretly listening to the private conversation of others without their consent. Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent. The practice is widely regarded as unethical, and in many jurisdictions is illegal.

Covert Listening Device is more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and police investigations.

IMSI-Catcher is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking movement of mobile phone users. Essentially a fake mobile tower acting between the target mobile phone and the service provider's real towers, it is considered a man-in-the-middle (MITM) attack. IMSI-catchers are used in some countries by law enforcement and intelligence agencies, but their use has raised significant civil liberty and privacy concerns and is strictly regulated in some countries such as under the German Strafprozessordnung (German) (StPO / Code of Criminal Procedure). Some countries do not even have encrypted phone data traffic (or very weak encryption), thus rendering an IMSI-catcher unnecessary.

WatchHound Cell Phone Monitor - Patriot Act

Electronic Tagging is a form of surveillance which uses an electronic device, fitted to the person. In some jurisdictions, an electronic tag fitted above the ankle is used for people as part of their bail or probation conditions. It is also used in healthcare settings and in immigration contexts in some jurisdictions. Electronic tagging can be used in combination with the global positioning system (GPS). For short-range monitoring of a person that wears an electronic tag, radio frequency technology is used.

House Arrest - Internment - Slave Labor

Mobile Phone Tracking is the ascertaining of the position or location of a mobile phone, whether stationary or moving. Localization may occur either via multilateration of radio signals between (several) cell towers of the network and the phone, or simply via GPS. To locate a mobile phone using multilateration of radio signals, it must emit at least the roaming signal to contact the next nearby antenna tower, but the process does not require an active call. The Global System for Mobile Communications (GSM) is based on the phone's signal strength to nearby antenna masts.

Stingray Phone Tracker is an IMSI-catcher, a controversial cellular phone surveillance device, manufactured by Harris Corporation. Initially developed for the military and intelligence community, the StingRay and similar Harris devices are in widespread use by local and state law enforcement agencies across the United States and possibly covertly in the United Kingdom.

17 Fake Cell Towers - Hailstorm.

Triggerfish Surveillance describes a technology of cell phone interception and surveillance using a mobile cellular base station (microcell or picocell). The devices are also known as cell-site simulators or digital analyzers.

Pegasus is spyware that can be installed on devices running some versions of iOS, Apple's mobile operating system, as well on devices running Android. It was developed by the Israeli cyberarms firm NSO Group. Discovered in August 2016 after a failed attempt at installing it on an iPhone belonging to a human rights activist, an investigation revealed details about the spyware, its abilities, and the security vulnerabilities it exploited. Pegasus is capable of reading text messages, tracking calls, collecting passwords, mobile phone tracking, accessing and activating microphone and video camera, as well as, gathering information from apps.

NSO Group is an Israeli technology firm whose spyware called Pegasus enables the remote surveillance of smartphones. It was founded in 2010.

WhatsApp snooping scandal on October 30, 2019, WhatsApp's parent company Facebook confirmed that Pegasus, a sophisticated snooping software developed by Israel's NSO Group, was used to target Indian journalists, activists, lawyers and senior government officials. The journalists and activists are believed to have been targets of surveillance for a two-week period until May, when the Indian national election was held.

NSA collected more than 151 million records of Americans' phone calls in 2016, even after Congress limited its ability to collect bulk phone records.

Zero-Click mobile phone attacks require no e-mail link to click on, it simply calls your number to take control of your phone. Zero-click attacks often target apps that provide messaging or voice calling because these services are designed to receive and parse data from untrusted sources. Attackers generally use specially formed data, such as a hidden text message or image file, to inject code that compromises the device. Zero-click attacks, also known as interactionless or fully remote attacks, bypass the need for social engineering entirely, giving threat actors the ability to take over a smartphone in real time without any interaction with the target.

Thin Thread program involved wiretapping and sophisticated analysis of the resulting data.

Warrant a specific type of authorization which permits an otherwise illegal act that would violate individual rights and affords the person executing the writ protection from damages if the act is performed. FISA Warrant - Search Warrant.

United States Foreign Intelligence Surveillance Court is a U.S. federal court established and authorized under the Foreign Intelligence Surveillance Act of 1978 (FISA) to oversee requests for surveillance warrants against foreign spies inside the United States by federal law enforcement and intelligence agencies. Such requests are made most often by the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI). Congress created FISA and its court as a result of the recommendations by the U.S. Senate's Church Committee. Its powers have evolved to the point that it has been called "almost a parallel Supreme Court.

Infiltrate is to enter a group or organization in order to spy on the members.

Indefinite Detention without Trial is the incarceration of an arrested person by a national government or law enforcement agency without a trial, and violates many national and international laws, including human rights laws. Indefinite detention of United States citizens on U.S. soil and abroad without due process. This allows the government to hold anyone deemed to be a threat to be held without a trial, which is a clear violation of the US Constitution that denies the basic rights of a free people. Restore the 4th.

Gamma International

Trading with the Enemy Act says don't help or support scumbags who violate Human Rights, including people and leaders in your own country. Immunity?

Trading with the Enemy Act of 1917 restrict trade with countries hostile to the United States, that includes American Corporations.

Official Secrets Act is legislation that provides for the protection of state secrets and official information, mainly related to national security.

Foreign Intelligence Surveillance Act prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of espionage or terrorism). It has been repeatedly amended since the September 11. attacks. Hacking Team.

Means, Motive, and Opportunity

Eye in the Sky - The Alan Parsons Project - I am the eye in the sky, Looking at you I can read your mind, I am the maker of rules, Dealing with fools, I can cheat you blind.

Tempora is the codeword for a formerly secret computer system that is used by the British Government Communications Headquarters (GCHQ).

Privacy Law refers to the laws that deal with the regulation of personal information about individuals, which can be collected by governments and other public as well as private organizations and its storage and use. Privacy laws are considered in the context of an individual's privacy rights or reasonable expectation of privacy.

Data Mining (Information Overload)

Under International Maritime Law, every passenger boat must be equipped with an automatic identification system that is to remain on at all times. This allows for tracking boats in real time and helps prevent collisions in fog and bad weather. Anyone with a computer and an Internet connection can click to see what kind of vessels are sailing, where they've recently been and which country they are from. people have figured out that they are being tracked through their transponders, which is a device that, upon receiving a signal, emits a different signal in response.

Citizen Lab studies information controls—such as network surveillance and content filtering—that impact the openness and security of the Internet and that pose threats to human rights. The Citizen Lab collaborates with research centres, organizations, and individuals around the world, and uses a "mixed methods" approach, which combines computer-generated interrogation, data mining, and analysis with intensive field research, qualitative social science, and legal and policy analysis methods.

Electronic Frontier Foundation provides funds for legal defense in court, presents amicus curiae briefs, defends individuals and new technologies from what it considers abusive legal threats, works to expose government malfeasance, provides guidance to the government and courts, organizes political action and mass mailings, supports some new technologies which it believes preserve personal freedoms and online civil liberties, maintains a database and web sites of related news and information, monitors and challenges potential legislation that it believes would infringe on personal liberties and fair use and solicits a list of what it considers abusive patents with intentions to defeat those that it considers without merit.

Amnesty International has more than seven million members and supporters around the world with a stated mission to campaign for a world in which every person enjoys all of the human rights enshrined in the Universal Declaration of Human Rights and other international human rights instruments. Amnesty International is a non-governmental organization founded in London in 1961.


Tracking Your Internet Browsing Activity


Cookie is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing. Cookies were designed to be a reliable mechanism for websites to remember stateful information (such as items added in the shopping cart in an online store) or to record the user's browsing activity (including clicking particular buttons, logging in, or recording which pages were visited in the past). They can also be used to remember arbitrary pieces of information that the user previously entered into form fields such as names, addresses, passwords, and credit card numbers. The tracking cookies, and especially third-party tracking cookies, are commonly used as ways to compile long-term records of individuals' browsing histories – a potential privacy concern that prompted European and U.S. lawmakers to take action in 2011.

Super Cookie is a type of browser cookie that is designed to be permanently stored on a user’s computer. Super cookies are generally more difficult for users to detect and remove from their devices because they cannot be deleted in the same fashion as regular cookies. Super cookies serve the same function as regular cookies in that they can contain just about any information including browsing history, authentication details or ad-targeting data. Cookie Central.

3rd Party Cookies, you only need them on certain websites when you are accessing certain information that requires 3rd party cookies to be excepted in order for certain software functions to work properly, like forms or windows that need to open.

Virus Protection - Profiling Dangers - TSA

Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometrics are body measurements and calculations related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers are often categorized as physiological versus behavioral characteristics. Physiological characteristics are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Behavioral characteristics are related to the pattern of behavior of a person, including but not limited to typing rhythm, gait, keystroke, signature, behavioral profiling, and voice. Some researchers have coined the term behaviometrics to describe the latter class of biometrics. More traditional means of access control include token-based identification systems, such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification number. Since biometric identifiers are unique to individuals, they are more reliable in verifying identity than token and knowledge-based methods; however, the collection of biometric identifiers raises privacy concerns about the ultimate use of this information. It is possible that data obtained during biometric enrollment may be used in ways for which the enrolled individual has not consented. One advantage of passwords over biometrics is that they can be re-issued. Private biometrics is a form of encrypted biometrics. False match rate is the probability that the system incorrectly matches the input pattern to a non-matching template in the database. False non-match rate is the probability that the system fails to detect a match between the input pattern and a matching template in the database.

Biopower relates to the practice of modern nation states and their regulation of their subjects through "an explosion of numerous and diverse techniques for achieving the subjugations of bodies and the control of populations.

Biopolitics the strategies and mechanisms through which human life processes are managed under regimes of authority over knowledge, power, and the processes of subjectivation.

User Profile is a visual display of personal data associated with a specific user, or a customized desktop environment. A profile refers therefore to the explicit digital representation of a person's identity. A user profile can also be considered as the computer representation of a user model.

Biodata is biographical data, factual kinds of questions about life and work experiences, as well as items involving opinions, values, beliefs, and attitudes that reflect a historical perspective.

Digital Footprint refers to one's unique set of traceable digital activities, actions, contributions and communications manifested on the Internet or on digital devices. Digital footprints can be classified as either passive or active. The former is composed of a user's web-browsing activity and information stored as cookies, while the latter is often released deliberately by a user with the intent of sharing information on websites or social media. While the term usually applies to an individual person, digital footprint can also refer to a business, organization or corporation. The use of a digital footprint has both positive and negative consequences. On one hand, it is the subject of many privacy issues. For example, without an individual’s authorization, strangers are able to piece together information about that individual by simply using search engines, and corporations are also able to produce customized ads based on browsing history. On the other hand, others can reap the benefits by profiting off their digital footprint as social media influencers. Furthermore, employers use a candidate’s digital footprint for online vetting and assessing fit due to its reduced cost and accessibility—between two equal candidates, a candidate with a positive digital footprint may have an advantage. As technology usage becomes more widespread, even children are generating larger digital footprints with potential positive and negative consequences such as college admissions. Since it is hard to not have a digital footprint, it is in one’s best interest to create a positive one. Passive digital footprints can be stored in many ways depending on the situation. In an online environment, a footprint may be stored in an online data base as a "hit". This footprint may track the user IP address, when it was created, and where they came from; with the footprint later being analyzed. In an offline environment, a footprint may be stored in files, which can be accessed by administrators to view the actions performed on the machine, without seeing who performed them. Active digital footprints can also be stored in many ways depending on the situation. In an online environment, a footprint can be stored by a user being logged into a site when making a post or change, with the registered name being connected to the edit. In an offline environment a footprint may be stored in files, when the owner of the computer uses a keylogger, so logs can show the actions performed on the machine, and who performed them. One feature of keylogger monitors the clipboard for any changes. This may be problematic as the user may copy passwords or take screenshots of sensitive information which is then logged. Digital footprints are not a digital identity or passport, but the content and meta data collected impacts internet privacy, trust, security, digital reputation, and recommendation. Digital Footprint is created when data is collected without the owner knowing, where as active digital footprints are created when personal data is released deliberately by a user for the purpose of sharing information about oneself by means of websites or social media.

Lifelog is the phenomenon whereby people record their own daily life in varying amount of detail, for a variety of purposes. The record contains a more or less comprehensive dataset of a human's life and activities. The data could be mined to increase knowledge about how people live their lives. In recent years the data is usually captured automatically by wearable technology or mobile devices. People who keep lifelogs about themselves are known as lifeloggers (or sometimes lifebloggers or lifegloggers).

Metadata is "data that provides information about other data, relating to emails, telephone calls, web pages, video traffic, IP connections and cell phone locations. Descriptive metadata describes a resource for purposes such as discovery and identification. It can include elements such as title, abstract, author, and keywords. Structural metadata indicates how compound objects are put together, for example, how pages are ordered to form chapters. Administrative metadata provides information to help manage a resource, such as when and how it was created, file type and other technical information, and who can access it.

Tag Metadata - Keywords - Profiling - Patriot Act

General Data Protection Regulation is a regulation in EU law on data protection and privacy for all individuals within the European Union and the European Economic Area. It also addresses the export of personal data outside the EU and EEA. The GDPR aims primarily to give control to citizens and residents over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU.

What is GDPR? - BBC Click (youtube)

Datacoup is a personal data marketplace connect data from the apps and services you already use.

Information Broker collects information about individuals from public records and private sources including census and change of address records, motor vehicle and driving records, user-contributed material to social networking sites such as Facebook, Twitter and LinkedIn, media and court reports, voter registration lists, consumer purchase histories, most-wanted lists and terrorist watch lists, bank card transaction records, health care authorities, and web browsing histories. The data are aggregated to create individual profiles, often made up of thousands of individual pieces of information such as a person's age, race, gender, height, weight, marital status, religious affiliation, political affiliation, occupation, household income, net worth, home ownership status, investment habits, product preferences and health-related interests. Brokers then sell the profiles to other organizations that use them mainly to target advertising and marketing towards specific groups, to verify a person's identity including for purposes of fraud detection, and to sell to individuals and organizations so they can research people for various reasons. Data brokers also often sell the profiles to government agencies, such as the FBI, thus allowing law enforcement agencies to circumvent laws that protect privacy.

Intelligence Analysis is the application of individual and collective cognitive methods to weigh data and test hypotheses within a secret socio-cultural context. The descriptions are drawn from what may only be available in the form of deliberately deceptive information; the analyst must correlate the similarities among deceptions and extract a common truth. Although its practice is found in its purest form inside national intelligence agencies, its methods are also applicable in fields such as business intelligence or competitive intelligence.

Electronic Communications Privacy Act is to extend government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer.

Senate votes to let ISPs sell your Web browsing history to advertisers. The US Senate today voted to eliminate broadband privacy rules that would have required ISPs to get consumers' explicit consent before selling or sharing Web browsing data and other private information with advertisers and other companies.

Online Tracking - Web Privacy Measurement (PDF)

Behavioral Targeting comprises a range of technologies and techniques used by online website publishers and advertisers aimed at increasing the effectiveness of advertising using user web-browsing behavior information. In particular, "behavioral targeting uses information collected from an individual's web-browsing behavior (e.g., the pages that they have visited or searched) to select advertisements to display".

Tailored Access Operations is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA).

Suspicious Activity Database - NSA Warrantless Surveillance Controversy (wiki)

Cellebrite is an Israeli company that manufactures data extraction, transfer and analysis devices for cellular phones and mobile devices.

PRISM surveillance program under which the NSA collects internet communications from at least nine major US internet companies.

ECHELON is a surveillance program (signals intelligence / SIGINT collection and analysis network) operated on behalf of the five signatory nations to the UKUSA Security Agreement—Australia, Canada, New Zealand, the United Kingdom and the United States, also known as the Five Eyes.

Stellar Wind is the code name of information collected under the President's Surveillance Program (PSP)

The Nationwide SAR Initiative - Tripwire

Google Is a Dragnet for the Police. Google geofence warrants done in secret, sometimes leading to false accusations. Google location services and sweeping searches of phone data of 100's of people to find one person.

Level 3 Communications operated a Tier 1 network, which is an Internet Protocol (IP) network that can reach every other network on the Internet solely via settlement-free interconnection (also known as settlement-free peering). Tier 1 networks can exchange traffic with other Tier 1 networks without having to pay any fees for the exchange of traffic in either direction, while some Tier 2 networks and all Tier 3 networks must pay to transmit traffic on other networks.

Police officers across the country misuse confidential law enforcement databases to get information on romantic partners, business associates, neighbors, journalists and others for reasons that have nothing to do with daily police work, an Associated Press investigation has found.

Trailblazer Project is a program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail.

More Corporate Crimes - Health Records

Smith Act set criminal penalties for advocating the overthrow of the U.S. government and required all non-citizen adult residents to register with the government.

Pentagon to boost cyber security force

Computer Security is the protection of computer systems from the theft or damage to the hardware, software or the information on them, as well as from disruption or misdirection of the services they provide.

Burglars Use Bluetooth Scanners to Find Laptops and Phones. Bluetooth Smart Scanner is the fastest app to find all Bluetooth Smart devices around you. It shows detailed information that Bluetooth Smart devices advertise, including device name, signal strength (RSSI), supported services, battery level, etc.

"The Insider threat is our own Government, and the corporations who own our politicians. Together they're subverting the Constitution."

First comes Mass Surveillance then the Police State

FBI Criminal, Cyber, Response, and Services Branch was created in 2002 as part of the U.S. government's post-911 response, the CCRSB is responsible for investigating financial crime, white-collar crime, violent crime, organized crime, public corruption, violations of individual civil rights, and drug-related crime. In addition, the Branch also oversees all computer-based crime related to counterterrorism, counterintelligence, and criminal threats against the United States.

Let us avoid another Shit Storm. This mass collection of information is the same thing that the Nazi's did. Our Government claims it's for Security reasons, which we know is a white lie. You're not using this information on peoples behalf, or to benefit people, or to protect people, you're using this information to profit from it, just like any scumbag corporation would. And you're also selling this information to other scumbag criminals at a hefty price. And on top of that you're also using this information to manipulate people, to control people, to blackmail people, and to incriminate people. You have raped humankind for the last time. It's time for your rehabilitation, your education, your realization. You are now going to feel like a child who just realized that the world is not what they thought it was. And that you're not in power, you're just living in a delusional dream, which is a reality and a nightmare for everyone else. But the good news is that you can wake up. Brain Plasticity + Learning = Change. So all is not lost, we can turn this clusterf*ck around and use this information, and our information collection abilities, for good instead of using it for evil purposes. We have a lot to learn, but luckily humans have brains with enormous memory capacity. Sounds familiar?

I Know There's Something Going On - Frida (youtube)

"What are you planning to calculate with those details?"

National Security Letter is an administrative subpoena issued by the United States federal government to gather information for national security purposes. NSLs do not require prior approval from a judge. The Stored Communications Act, Fair Credit Reporting Act, and Right to Financial Privacy Act authorize the United States federal government to seek such information that is "relevant" to authorized national security investigations. By law, NSLs can request only non-content information, for example, transactional records and phone numbers dialed, but never the content of telephone calls or e-mails. NSLs typically contain a nondisclosure requirement, frequently called a "gag order", preventing the recipient of an NSL from disclosing that the FBI had requested the information. The nondisclosure order must be authorized by the Director of the FBI, and only after he or she certifies "that otherwise there may result a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person." Even then, the recipient of the NSL may still challenge the nondisclosure order in federal court. The constitutionality of such nondisclosure orders has been repeatedly challenged. The requirement was initially ruled to be unconstitutional as an infringement of free speech in the Doe v. Gonzales case, but that decision was later vacated in 2008 by the Second Circuit Court of Appeals after it held the USA PATRIOT Improvement and Reauthorization Act gave the recipient of an NSL that included a nondisclosure order the right to challenge the nondisclosure order in federal court. In March 2013, district court judge Susan Illston of Federal District Court in San Francisco struck down the law, writing that the prohibition on disclosure of receipt of an NSL made the entire statute impermissibly overbroad under the First Amendment. On August 24, 2015, the Ninth Circuit Court of Appeals vacated the district court's decision and remanded the case back to the district court for further proceedings.

Administrative Subpoena a subpoena issued by a federal agency without prior judicial oversight. Critics say that administrative subpoena authority is a violation of the Fourth Amendment to the United States Constitution.

Stored Communications Act is a law that addresses voluntary and compelled disclosure of "stored wire and electronic communications and transactional records" held by third-party internet service providers (ISPs). It was enacted as Title II of the Electronic Communications Privacy Act of 1986 (ECPA).

Fair Credit Reporting Act is U.S. Federal Government legislation enacted to promote the accuracy, fairness, and privacy of consumer information contained in the files of consumer reporting agencies.

Right to Financial Privacy Act gives the customers of financial institutions the right to some level of privacy from government searches.

Information Awareness Office in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security by achieving "Total Information Awareness" (TIA).

FinFisher also known as FinSpy, is surveillance software marketed by Lench IT solutions PLC with a UK-based branch Gamma International Ltd in Andover, England, and a Germany-based branch Gamma International GmbH in Munich, which markets the spyware through law enforcement channels.

NSA Theme Song - Every Breath You Take, By the Police (youtube)
Glenn Greenwald: Why Privacy Matters (video)

The Third-Party Doctrine is a United States legal theory that holds that people who voluntarily give information to third parties—such as banks, phone companies, internet service providers (ISPs), and e-mail servers—have "no reasonable expectation of privacy. A lack of privacy protection allows the United States government to obtain information from third parties without a legal warrant and without otherwise complying with the Fourth Amendment prohibition against search and seizure without probable cause and a judicial search warrant. Libertarians typically call this government activity unjustified spying and a violation of individual and privacy rights.


Films about Surveillance Abuse


Naked Citizens - World (youtube)
Edward Snowden: Here is how we take back the Internet (video)
State of Surveillance' with Edward Snowden and Shane Smith (FULL EPISODE) (youtube)
Heather Brooke: My Battle to Expose Government Corruption (youtube) 
Hubertus Knabe: The Dark Secrets of a Surveillance State (video)
Your Cell Phone Company is Watching (video) 
Mikko Hypponen: Three Types of Online Attack (video)
Avi Rubin: All your Devices can be Hacked (video)
VICE Meets Glenn Greenwald: Snowden's Journalist of Choice (youtube)
Big Brother Big Business: Another film about Data Mining and the information War (video)
Activist Repression, FBI Activities, & the AR Movement - Ryan Shapiro (youtube)
A Video about how your personal information is being sold - Dispatches - The Data Theft Scandal (video)
Filming Police.
Surveillance Cameras don't reduce Crime, they just cause more crime to happen in other places, like in our Government.
America’s Surveillance State 1 (The Surveillance Machine) (youtube)
TalkingStickTV - Robert Scheer - They Know Everything About You (youtube 1:08:40)  Robert Scheer
An Eye on You: Citizens Under Surveillance Citizens of the 21st century are the focus of prying eyes, whether they agree to it or not. This investigation identifies the stakes and scandals of global surveillance and opens up the debate on our threatened individual freedoms. Aired: 03/27/2016 | 54 min..
Citizens Under Surveillance (youtube)
The Haystack Documentary Investigation into 21st century surveillance in the UK and the Investigatory Powers (IP) Bill currently before Parliament.
How China is creating the world’s largest prison | Four Corners (youtube).

Citizens' Commission to Investigate the FBI: 1971 (youtube) - On March 8, 1971, a group of citizens (aka The Citizens' Commission to Investigate the FBI) broke into a small FBI office in Media Pennsylvania, took every file, and shared them with the public and news outlets. Their actions exposed the FBI's illegal Surveillance Program of law-abiding Americans. Now, these previously anonymous Americans publicly share their story for the first time.  The Camden 28 (wiki).

COINTELPRO was a series of covert, and at times illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrating, discrediting, and disrupting domestic political organizations.

Mass Surveillance - Observation Flaws - Espionage - Power Corruption

Panopticon concept of the design is to allow all (pan-) inmates of an institution to be observed (-opticon) by a single watchman without the inmates being able to tell whether or not they are being watched. Although it is physically impossible for the single watchman to observe all cells at once, the fact that the inmates cannot know when they are being watched means that all inmates must act as though they are watched at all times, effectively controlling their own behaviour constantly. The name is also a reference to Panoptes from Greek mythology; he was a giant with a hundred eyes and thus was known to be a very effective watchman.

Drones (automatous)

Time to turn those cameras around and start filming the real criminals. Since officers started wearing body cameras complaints against officers fell 88%, and the use of force dropped 60%. So if cameras worked in controlling that criminal behavior of police, then they will also help control criminal behavior of bankers, presidents, politicians and corporations. And since we already have enough cameras, it's just a matter of direction and focus.

Nanny State are policies that are overprotective and interfering unduly with personal choice. The term "nanny state" likens government to the role that a nanny has in child rearing.

Mosaic Theory is a method used by American intelligence analysts.

Social Engineering refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.

Home Monitoring (security)

The only effective counterterrorism is improving education and public knowledge

Google was Asked to Remove 345 Million Pirate Links in 2014  (who's verifying all these requests?)

Cyber Intelligence Sharing and Protection Act (CISPA) is a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies.

United States Foreign Intelligence Surveillance Court is to oversee requests for surveillance warrants against foreign spies inside the United States by federal law enforcement and intelligence agencies.

Computer Fraud and Abuse Act limiting federal jurisdiction to cases "with a compelling federal interest-i.e., where computers of the federal government or certain financial institutions are involved or where the crime itself is interstate in nature."

Songs about secretly watching someone.
Every Breath You Take, I'll be watching you - The Police (youtube)
Somebody's Watching Me - Rockwell (youtube)

Cyber Threats or Cyber Hackers actually make our computer systems safer and more stable because hackers make us more aware of our vulnerabilities and software flaws. This way we can secure them properly, and make sure our systems have backups, as well as, Fail Safe methods that include protections against total power failure. Where human manual labor is the final step in guaranteeing that systems operate normally. So this is not just a software issue, this is a human issue. People need to be educated about system failures and vulnerabilities, and the options and choices that we have during these failures. We don't need another 911 where Cyber Warfare is used as an excuse for the government and the military to attack citizens and the internet. "They cause the problem, and then they try to sell us a cure, which is not a cure, just part of the same problem." So a Cyber War is not our biggest threat, corruption is our biggest threat, and corruption has been our biggest threat for a very long time. Exploit Sales and Government Corruption, or Corporate Corruption, are the same thing. Malware and Government Corruption are the same thing. Both Actions exploit the system for profit, just like wall street and the major banks do. Zero Days is just another vulnerability in a world that has thousands of vulnerabilities. And knowledge is our best defense against ignorance, and vulnerabilities.

Human Rights

"The spying is not all about National Security, or even Malicious Greed, the Spying that is the most disturbing is the spying related to Paranoia. So you have to ask the question, what are they paranoid about? Why do they feel weak and insecure? You got caught with your hands in the cookie jar, but there's no cookie jar. You know how manipulating and dangerous misinformation can be, but can they tell when it's their own misinformation? When you're asking the wrong questions, you will never find the answers that you're hoping to find, so why continue to ask the wrong questions? You're wasting precious time Lord of the Flies. The only way this will work, is when we work together.



Whistle Blowing - Hero's who Blow the Whistle on Corrupt Activity


whistle blowerWhistleblower is a person who exposes any kind of information or activity that is deemed illegal, unethical, or not correct within an organization that is either private or public. Blowing the whistle is Not the Same thing as leaking information or being a backstabber.

Public Interest Defense allows a defendant who disclosed classified or protected information to avoid criminality by establishing that the public interest in disclosure of the information outweighs the public interest in nondisclosure. It is aimed at protecting whistleblowers of government misconduct. Non-Disclosure Agreements being used to protect criminals.

Good Samaritan Law offers legal protection to people who give reasonable assistance to those who are, or who they believe to be, injured, ill, in peril, or otherwise incapacitated. The protection is intended to reduce bystanders' hesitation to assist, for fear of being sued or prosecuted for unintentional injury or wrongful death. Duty to Rescue  - Watch Dogs.

False Claims Act is an American federal law that imposes liability on persons and companies (typically federal contractors) who defraud governmental programs. It is the federal Government's primary litigation tool in combating fraud against the Government. The law includes a qui tam provision that allows people who are not affiliated with the government, called "relators" under the law, to file actions on behalf of the government (informally called "whistleblowing" especially when the relator is employed by the organization accused in the suit). Persons filing under the Act stand to receive a portion (usually about 15–25 percent) of any recovered damages. As of 2012, over 70 percent of all federal Government FCA actions were initiated by whistleblowers. Claims under the law have typically involved health care, military, or other government spending programs, and dominate the list of largest pharmaceutical settlements. The government recovered $38.9 billion under the False Claims Act between 1987 and 2013 and of this amount, $27.2 billion or 70% was from qui tam cases brought by relators.

Witness Immunity is when a prosecutor grants immunity to a witness in exchange for testimony or production of other evidence. Above the Law?

Witness Protection Program is designed to protect threatened witnesses before, during, and after a trial.

Informant is a person who provides privileged information about a person or organization to an agency. Source.

Turn State's Evidence is for an accused or convicted criminal to testify as a witness for the state against his associates or accomplices. Turning state's evidence is occasionally a result of a change of heart or feelings of guilt, but is more often in response to a generous offer from the prosecution, such as a reduced sentence or a favorable location for serving time. In particularly high-profile or dangerous cases such as organized crime trials and other federal crimes trials, witnesses may be offered immunity from prosecution even if they have committed serious crimes themselves, sometimes even murder. The state may also offer the witness a place in the witness protection program, giving them a new identity, so they need not fear retaliation from their former accomplices. Corruption in the Justice System (bad judges and lawyers).

List of Whistleblowers (wiki) - Famous Infamous Whistleblowers 

Russ Tice (wiki) - Thomas Andrews Drake (wiki)

Daniel Ellsberg (wiki) - Edward Snowden (wiki)

Julian Assange (wiki) - Wiki Leaks - Aaron Swartz (wiki)

5 New Whistleblowers Speak on Exposing Corruption Since Snowden (video)
War on Whistleblowers (ft. Edward Snowden & David Carr) 2015 (youtube)

Gary Webb was an American investigative journalist who is best known for his "Dark Alliance" series, which appeared in The Mercury News in 1996. The series examined the origins of the crack cocaine trade in Los Angeles and claimed that members of the anti-communist Contra rebels in Nicaragua had played a major role in creating the trade, using cocaine profits to support their struggle. It also suggested that the Contras may have acted with the knowledge and protection of the Central Intelligence Agency (CIA). The series provoked outrage, particularly in the Los Angeles African-American community, and led to four major investigations of its charges. (Gary Webb - August 31, 1955 – December 10, 2004).

CIA and Contras Cocaine Trafficking in the US (wiki)

Allegations of CIA Drug Trafficking (wiki) - Drug War

Iran-Contra Affair is when Senior Reagan Administration officials secretly facilitated the sale of arms to the Khomeini government of the Islamic Republic of Iran, which was the subject of an arms embargo. The administration hoped to use the proceeds of the arms sale to fund the Contras in Nicaragua. Under the Boland Amendment, further funding of the Contras by the government had been prohibited by Congress.

Philip Agee was a Central Intelligence Agency (CIA) case officer and writer, best known as author of the 1975 book, Inside the Company: CIA Diary, detailing his experiences in the CIA. Agee joined the CIA in 1957, and over the following decade had postings in Washington, D.C., Ecuador, Uruguay and Mexico. After resigning from the Agency in 1968, he became a leading opponent of CIA practices. A co-founder of CovertAction Quarterly, which was an American publication focused on and critical of the US Central Intelligence Agency. Covert Action relaunched in May 2018 as Covert Action Magazine. Philip died in Cuba in January 2008.

Activism - Activists - Journalism Hero's

Letting the Cat Out of the Bag means to reveal facts that were previously hidden.

Whistle blowing can be misused by the media to spread propaganda. Just like when the media calls something a conspiracy theory when in fact its just more propaganda or a tactic to silence a real whistle blower.

Reporting to police that you were raped is kind of like whistle blowing. It carries similar risks. Reporting a crime should not be risky or dangerous and should not ruin your life.



If you See Something, Say Something


If you know something, then say something. If you don't know something, then learn something. Just because you see something, this does not mean that you know something. Know what you see and see what you know.

Whistleblower Protection Act is a United States federal law that protects federal whistleblowers who work for the government and report the possible existence of an activity constituting a violation of law, rules, or regulations, or mismanagement, gross waste of funds, abuse of authority or a substantial and specific danger to public health and safety. A federal agency violates the Whistleblower Protection Act if agency authorities take (or threaten to take) retaliatory personnel action against any employee or applicant because of disclosure of information by that employee or applicant.

Whistleblowers Protection Program - Whistleblower Rights (PDF)

Whistle Blowers Center - Whistleblower

Freedom of the Press - Freedom of Speech

Government Watchdogs - Key Words

Expose Facts - I Paid a Bribe - The Intercept

Pentagon Papers (wiki) - National Security Archive (wiki)

Workplace Fairness

Congress 1998

"Sometimes Hero's Reap Rewards that were never intended for them, and other times the rewards are not even rewards at all."

Implicated - Legal Terms - Conformity Dangers

You are not a rat or a snitch or a tattletale when you report a crime, but that's not how criminals see it. Reporting a crime has its risks. That's because criminals can act like they are above the law, especially when the law doesn't act. The justice system does not work the way it should. When women are raped, police don't always investigate the crime. And when you report a white collar crime, there is no guarantee that the justice system will seek justice. And on top of that, you have to deal with retaliations and threats that comes from reporting a crime. So instead of being a hero, you're the one who ends up getting treated like a criminal. The justice system does not work the way it should. We know that the justice system does seek justice, it's just that it's not for everyone or all the time. Sometimes they even seek justice against innocent people. So in order to get justice you have to know someone on the inside of the justice system. If you want justice, you have to know the politics of the system and know how to negotiation and communicate. If you really want justice you have to do a lot of the work yourself, which millions of people have done and still do. This is not saying to take justice into your own hands, it's just saying that you should at least be in the car, even if you can't totally steer it. People need to educate themselves and be proactive and stand up for what is right. Every luxury and every freedom that people have today is from people acting and standing up for what is right. If people did not act, there would be no human life. So standing up is not just every citizens responsibility, it is a privilege and an honor to even have the chance.

When you hear someone talk about fraud, theft, or corruption that they have witnessed, that is a cry for help. And people need to respond, because we cannot always be reliant on a justice system that is corrupt itself, if we don't act who will? If you have a chance to correct flaws and mistakes, you should. Even if your search for justice or change comes up short, we can still benefit from that experience of seeking change. Things that you learn can be used towards other methods of communication. Things that you learn can also be used to correct other injustices, now and in the future. Sadly we don't even have one trusted source for information, there's not one source for trusted information, how can that be? Communication is our greatest strength. Collectively our power is limitless, but when we can't communicate effectively, we lose a tremendous amount of power, wealth and potential. And these are the things that all humans seek, but the problem is that we have not yet figured out how to correct our communication flaws. Our ability to transfer knowledge using language is a gift, we should not take this ability for granted. Communication is a power that everyone can share and benefit from. Lawsuits.



Nothing to Hide


Every person on the planet has things about themselves that they would like to keep private, especially knowing that things can be misinterpreted or used maliciously. You have nothing to worry about just as long as you think that you're not doing anything wrong is an ignorant belief and misleading assumption. It's not 'if ' you're doing anything wrong, it's knowing that anything that you say or do can be used against you, either to manipulate you or to exploit you, and 90% of people will never know that they've been victimized. So don't be a fool. Privacy is like freedom, if you don't protect your privacy, then you don't have privacy. And if you don't protect your freedom, then you don't have freedom. Welcome to reality. NOTHING TO HIDE documentary (Eng, 2017) (youtube). Mobile Phone Eavesdropping.

What if you were having a private conversation with someone and then some total stranger came and stood next to you? You would either move away from the total stranger, or you would stop talking about anything personal. But what if a stranger was invisible and did not know that someone was listening? You have nothing to hide until someone uses your personal information to manipulate you without you even knowing it. Information can also be used to slander you or blackmail you. Then the only thing that you were hiding was your naive ignorance. Not only did you selfishly think of just yourself and your own perceived lack of vulnerabilities, your were not thinking about your family, your friends, or other peoples vulnerabilities. One weak link in a chain can break the chain. Just like with herd immunity. One infected person can do a lot of damage. Intellectual Freedom.

Even when people here about famous peoples privacy invasion, people still don't get it. How would you like it if a total stranger came up to you and pretended to know you just because they have access to some of your personal information. They know nothing about you, other than their personal interpretation of some details about you. Usually if someone accuses you of a crime, they have to produce evidence and witnesses, and also convince 12 jurors to see what they believe they see, like a Ponzi scam. Cherry Picking Data.

Who is Who? Who's asking and what for? Labels and profiles can be misused and abused, especially by people who have criminal intent. When we were kids in the early 70's we would scare our friends and say as a joke that "The FBI has a File on you". Then everyone forgot about this type of privacy intrusion and suffered mass amnesia, so here we are again.

nothing to hide If you have nothing to hide then you have nothing to worry about. Most all of us have friends that we can trust and feel comfortable with, friends who we don't mind sharing our personal thoughts or secrets with. But what if you had a friend who was a deviate criminal who couldn't be trusted? A person who wouldn't mind sharing your personal information or secrets with other people in order to manipulate them. Then you would most likely not share any personal information with that person. So the real question is, what if that deviate criminal was able to spy on you and document almost every move that you make or every word you speak? That would suck because you would be always worrying about what information and knowledge could be exploited and used against you, or, used against some other innocent people. Nothing to hide is one thing, something that can be misconstrued is another, after all, we're talking about criminals. So I would not want you to be too complacent about the possible dangers and scams that are on the Internet or any where else. So please educate yourself, and if you are concerned about something then please get as many opinions as you can, and always ask for help from a well trusted source.

I have nothing to hide so I why should I worry? Which actually means that you have nothing to hide because you have nothing between your ears. So yes, you have nothing to hide except your own ignorance. Maybe you have nothing to hide because you have nothing of value to add to society, or that you just don't care about the victims of crimes or the vulnerabilities of our society. Hiding this shame is easy when you're ignorant.

Privacy is also about being protected from criminals. Protection from peeping toms, protection from slander, protection from unlawful search and seizures, protection from unfair competition and unfair monopolies, protection from unfair regulations and laws. I want to do what is right and good for everyone, and not just do what is perceived to be right and good for some criminal corporation or for some corrupt state or government. Everyone is supposed to be innocent until proven guilty, and not be guilty just because some corrupt organization believes that your not innocent.

Voyeurism is spying on people engaged in intimate behaviors, such as undressing, sexual activity, or other actions usually considered to be of a private nature.

There is no such thing as Nothing, because nothing doesn't exist, there's always something. A person can see you acting weird and then ask you "what's wrong?" And then you say "Nothing", which is a lie. There is something wrong with you and you may be to embarrassed to say what's wrong with you or that you have no idea what's wrong with you. So all you can say is "I don't know what's wrong or that you would rather not say what's wrong." Space is never empty.

The law-abiding citizens have nothing to fear from government surveillance... unless the government begins to break the law.

You don't have to worry about your personal information being exploited by normal and respectable people, because those people don't care about your personal information, unless that information provided something of value to society, in that case they would just ask for your consent. The real danger is criminals, and those criminals can be from your government, your businesses, your associates, or any one involved with criminal activities. So you have nothing to worry about except criminals. And knowing who exactly the criminals are is not easy, but not impossible. People should be Paid for their Information.

Teaching the public extensively about how and where personal information can be exploited can greatly increase their protection. Criminals and persons that are steeling and manipulating personal information are everywhere, in almost every type of business, legal and illegal. So start educating the young about how this morally destructive behavior, which in most cases are fueled by greed and power, is wrong on so many levels that it not just threatens our character, but our survival. Though the freedom to information is highly essential to our growth, we must know that criminal minds are not going away anytime soon. So back up your data and secure it with a trusted friend or relative. It’s not just about your personal information falling into the wrong hands, it’s more about your personal information never being found when needed. 

Information Brokers or Data Brokers have information on you that's similar to your Personal FBI Files. Your Personal Dossier Profile can have over 1,500 separate pieces of information: Political Views, Voting History, Medical History, Psychiatric Problems, Religion, Friends Names, Family Names, Race, Income, Credit Report, Bank Accounts, SS #'s, Credit Card #'s, Properties owned, Cars, Weapons, Police Reports, Drug Problems, Driving Record, Lawsuits, Jobs you had, Sexual Orientation, Restaurants, Items Purchased, Websites you visited over the years, Search Words you used, Geo-Location Data from Cell Phones, and so on and so on. This Information is mostly used by scumbag marketing advertisers who ignorantly believe that they are actually necessary, not even close. You are a defect in the system that lives off another defect in the system, none of which benefits people in the ways it should.

Epsilon - Acxiom - Dataium - Lotame - Spokeo

The word 'Hacker' is just another stereotyping keyword that the media uses to manipulate and distract the public from the facts. A Hacker is just someone who has a unique set of computer skills and knowledge, which does not make them a criminal. When someone uses advanced knowledge to commit a crime that does not make having that knowledge a crime, it only suggests that someone committed a crime, which still needs to be determined in a court of law, a court of law that is not corrupt or manipulated. Corporations and Governments are involved in criminal activities everyday. Committing the same crimes that so called Hackers commit. And corporations and governments are much more destructive and dangerous to society then any hacker or terrorist could ever dream of being. So don't allow yourself to be distracted.



Anonymity - You Don't Need to Know My Name


People need Anonymity, but not to hide deviate behavior, but to protect themselves from idiots and criminals.

Anonymity is being anonymous and being non-identifiable, unreachable, untrackable and untraceable. Anonymity is seen as a technique, or a way of realizing, certain other values, such as privacy, or liberty. Anonymity means "without a name" or "namelessness". Proxy Server - TOR Browser - VPN.

Anonymous is someone or something not known or lacking marked individuality. Nameless. Being or having an unknown or unnamed source. Anonymous - Guy Fawkes Mask.

Inconspicuous
is someone or something not prominent or readily noticeable, Not drawing attention.

Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share common themes. When something is private to a person, it usually means that something is inherently special or sensitive to them. The domain of privacy partially overlaps security and confidentiality, which can include the concepts of appropriate use, as well as protection of information. Privacy may also take the form of bodily integrity. The right not to be subjected to unsanctioned invasions of privacy by the government, corporations or individuals is part of many countries' privacy laws, and in some cases, constitutions. In the business world, a person may volunteer personal details, including for advertising, in order to receive some sort of benefit. Public figures may be subject to rules on the public interest. Personal information which is voluntarily shared but subsequently stolen or misused can lead to identity theft. The concept of universal individual privacy is a modern construct primarily associated with Western culture, British and North American in particular, and remained virtually unknown in some cultures until recent times. Most cultures, however, recognize the ability of individuals to withhold certain parts of their personal information from wider society, such as closing the door to one's home. Not to be Confused with Secrecy, which is people hiding criminal activity. Being Popular or Famous.

Right to Privacy is to restrain governmental and private actions that threaten the privacy of individuals. Search Warrant.

Laws Protecting Privacy - Invasion of Privacy is a tort based in common law allowing an aggrieved party to bring a lawsuit against an individual who unlawfully intrudes into his/her private affairs, discloses his/her private information, publicizes him/her in a false light, or appropriates his/her name for personal gain. Invasion of privacy is the intrusion into the personal life of another person without consent. However, invasion of privacy is not the cause of action or tort that you would sue another person. For these reasons, it's important to check your state's laws or consult with a local attorney before filing a lawsuit. False Light is similar to a defamation claim in that it allows an individual to sue for the public disclosure of information that is misleading (or puts that person in a "false light"). The right of privacy is: the right of a person to be free from unwarranted publicity, the unwarranted appropriation or exploitation of one’s personality, the publicizing of one’s private affairs with which the public has no legitimate concern, or the wrongful intrusion into one’s private activities in such manner as to outrage or cause mental suffering, shame or humiliation to a person of ordinary sensibilities. The right of privacy has two main aspects: the general law of privacy, which affords a tort action for damages resulting from an unlawful invasion of privacy; and
the constitutional right of privacy which protects personal privacy against unlawful governmental invasion.In an action for recovering damages for a privacy right violation, a plaintiff must allege the following elements: that there was an unwarranted invasion of individual privacy; that there was an intentional intrusion on his/her private concerns; that publication was without plaintiff’s written consent, where written consent is required; and that plaintiff’s name or picture was used for trade or advertising purposes, where privacy invasion is alleged by publication of one’s name or likeness for trade and advertising purposes.
right to be left alone”. Privacy Laws allow an aggrieved party to bring a lawsuit against an individual who unlawfully intrudes into their private affairs, discloses their private information, publicizes them in a false light, or appropriates their name for personal gain.

Your Data can still be Identified even if it’s Anonymized. Urban planners and researchers at MIT found that it’s shockingly easy to “reidentify” the anonymous data that people generate all day, every day in cities.

Concealment - Shielded
is to protect, hide, or conceal from danger or harm. Protected. Kept safe or defended from danger or injury or loss. Camouflage.

Window Film or Tinted Windows are used for heat and glare reduction, thermal insulation, UV filtration, safety and security, privacy, decoration, signage and branding and protection from graffiti.

Discretion
is the freedom to act or judge on one's own. Knowing how to avoid embarrassment or distress. The power of making free choices unconstrained by external agencies. The trait of judging wisely and objectively.

You can use a Disposable Identity or Fake Identity if you feel the need.

Fake Your Identity Online (wiki how) - Identity Forgery (wiki)

Privacy Tools - Safe Browsing on the Internet

Your Digital Identity has Three Layers, and you can only protect one of them. The first layer is your profile information, your public posts and private messages, likes, search queries, uploaded photos, tests and surveys you took, events you attended, websites you visited, and other types of conscious interactions. The second layer is made of behavioral observations. These are not so much choices you consciously make, but the metadata that gives context to those choices. It contains things that you probably do not want to share with everybody, like your real-time location and a detailed understanding of your intimate and professional relationships. (By looking at location patterns that reveal devices that often meet in the same office buildings or “sleep” together in the same houses, tech companies can tell a lot about who you spend your time with.) It also tracks your patterns of when you’re online and offline, content you clicked on, time you spent reading it, shopping patterns, keystroke dynamics, typing speed, and movements of your fingers on the screen (which some companies believe reveal emotions and various psychological features). The third layer is composed of interpretations of the first and second. Your data are analyzed by various algorithms and compared with other users’ data for meaningful statistical correlations. This layer infers conclusions about not just what we do but who we are based on our behavior and metadata. It is much more difficult to control this layer, as although you can control the inputs (posting photos of your newborn), you don’t know the algorithm that is spitting the output (that you might need to order nappies). The task of these profile-mapping algorithms is to guess things that you are not likely to willingly reveal. These include your weaknesses, psychometric profile, IQ level, family situation, addictions, illnesses, whether we are about to separate or enter in a new relationship, your little obsessions (like gaming), and your serious commitments (like business projects). When your Data Double is Wrong. The troubling thing is that we as users might not like or recognize ourselves in the profiles that are created for us. How would it feel if you discovered your “data double” is sick or emotionally unstable, not credit worthy, or not simply not cool enough, all because of the way you type, your search queries, or any “strange” relationships you may have? People should be Paid for their Information.

Tor Anonymity Network is free and open-source software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". Tor's intended use is to protect the personal privacy of its users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities unmonitored. Tor does not prevent an online service from determining when it is being accessed through Tor. Tor protects a user's privacy, but does not hide the fact that someone is using Tor. Some websites restrict allowances through Tor. For example, Wikipedia blocks attempts by Tor users to edit articles unless special permission is sought. Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of an onion. Tor encrypts the data, including the next node destination IP address, multiple times and sends it through a virtual circuit comprising successive, random-selection Tor relays. Each relay decrypts a layer of encryption to reveal the next relay in the circuit to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing or knowing the source IP address. Because the routing of the communication was partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination. An adversary may try to de-anonymize the user by some means. One way this may be achieved is by exploiting vulnerable software on the user's computer. The NSA had a technique that targets a vulnerability – which they codenamed "EgotisticalGiraffe" – in an outdated Firefox browser version at one time bundled with the Tor package and, in general, targets Tor users for close monitoring under its XKeyscore program. Attacks against Tor are an active area of academic research which is welcomed by the Tor Project itself. The bulk of the funding for Tor's development has come from the federal government of the United States, initially through the Office of Naval Research and DARPA. Safe Browsing.

Onion Routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination. When the final layer is decrypted, the message arrives at its destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes. There are methods to break the anonymity of this technique, e.g. timing analysis. Utilising timing analysis, the anonymity of TORs can be broken. One of the reasons typical Internet connections are not considered anonymous, is the ability of Internet service providers to trace and log connections between computers. For example, when a person accesses a particular website, the data itself may be secured through a connection like HTTPS such that the user's password, emails, or other content is not visible to an outside party, but there is a record of the connection itself, what time it occurred, and the amount of data transferred. Onion routing creates and obscures a path between two computers such that there's no discernible connection directly from a person to a website, but there still exist records of connections between computers. Traffic analysis searches those records of connections made by a potential originator and tries to match timing and data transfers to connections made to a potential recipient. For instance, one can change the timings of the packets of a flow according to a specific pattern and look for that pattern on the other side of the network. Also, a person may be seen to have transferred exactly 51 kilobytes of data to an unknown computer just three seconds before a different unknown computer transferred exactly 51 kilobytes of data to a particular website. Factors that may facilitate traffic analysis include nodes failing or leaving the network and a compromised node keeping track of a session as it occurs when chains are periodically rebuilt. Garlic Routing is a variant of onion routing associated with the I2P network that encrypts multiple messages together to make it more difficult for attackers to perform traffic analysis and to increase the speed of data transfer. Exit node vulnerability. Although the message being sent is transmitted inside several layers of encryption, the job of the exit node, as the final node in the chain, is to decrypt the final layer and deliver the message to the recipient. A compromised exit node is thus able to acquire the raw data being transmitted, potentially including passwords, private messages, bank account numbers, and other forms of personal information. Dan Egerstad, a Swedish researcher, used such an attack to collect the passwords of over 100 email accounts related to foreign embassies. Exit node vulnerabilities are similar to those on unsecured wireless networks, where the data being transmitted by a user on the network may be intercepted by another user or by the router operator. Both issues are solved by using a secure end-to-end connection.

Public-key Cryptography is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner. The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way functions. Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security. In such a system, any person can encrypt a message using the receiver's public key, but that encrypted message can only be decrypted with the receiver's private key. Robust authentication is also possible. A sender can combine a message with a private key to create a short digital signature on the message. Anyone with the corresponding public key can combine a message, a putative digital signature on it, and the known public key to verify whether the signature was valid, i.e. made by the owner of the corresponding private key. Public key algorithms are fundamental security ingredients in modern cryptosystems, applications and protocols assuring the confidentiality, authenticity and non-repudiability of electronic communications and data storage. They underpin various Internet standards, such as Transport Layer Security (TLS), S/MIME, PGP, and GPG. Some public key algorithms provide key distribution and secrecy (e.g., Diffie–Hellman key exchange), some provide digital signatures (e.g., Digital Signature Algorithm), and some provide both (e.g., RSA).



PC Threats - Vulnerabilities - Protection Tools


Vulnerability in computing is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness. In this frame, vulnerability is also known as the attack surface. Hacked.
Threats to Computers
"Making sure that the virus protection doesn't turn into a virus itself"

Nothing to Hide - Privacy - Safe Surfing - Anonymity - Data Protection

Keep your Operating System updated To avoid Threats & Vulnerabilities.

PC Problem Solving

Banking Online: If you do online banking: If you use your bank account to send and receive money make sure it is not linked to any other bank accounts that you have. This way you can keep the minimal money needed in your online account so that you do not risk having all your money being stolen. When typing in personal information make sure you see the 'S' after the http ( https:// ) in the browser address bar. S stands for SSL certificate which is short for Secure Sockets Layer. You should see this when putting in personal information like credit card numbers, social security numbers and passwords. The SSL help protects you from hackers seeing what you are typing because what you type is Encrypted. But still this does not guarantee that your information is safe because of other vulnerabilities like hackers, key stroke recorders, viruses and fake websites.

A Video about how your personal information is being sold - Dispatches - The Data Theft Scandal (video)
Big Brother Big Business another film about Data Mining and the information War (video)

Credit Cards: If you use a credit card for online purchases: Please have a low credit limit and try to use only one credit card on the internet. So if that credit card information is stolen thieves will not be able to make any big charges on your credit card. If you do need to increase your credit limit to buy something expensive, then you can call your credit card provider to increase your credit limit. This will also keep you from doing any impulse purchases because you now have to make a phone call first to ask for the credit increase.

Warning:
If you have good credit and you are financially secure you must take extra steps in order to secure your personal information and finances. One step is to put a freeze on new accounts being open so that thieves are not able to get credit cards in your name.

ID Theft Affidavit (FTC) - Identity Theft - Monitoring Credit Scores

Money Management Education

Track your Laptop, Cell Phone and Tablet whenever stolen or missing: Open source software with full and remote control, 24/7 - Tracking Devices.


Browsers - Safe Internet Surfing


Temporary Internet files, Cookies, Virus Protection and Browser Settings: It's a good idea to delete your temporary internet files as well as your Cookies, especially knowing that some tracking cookies record every website you visit. This way advertisers can manipulate what adds you see on websites, manipulate what websites you see in your internet searches and also know what kind of spam e-mails to send you. They can also sell this information to others. The Wall Street Journal measured 50 of the most popular websites and found that they installed a total of 3,180 tracking files on a test computer. This is very annoying and intrusive but there are ways to minimize these types of attacks on your privacy. Each browser has a different way of clearing these files and cookies so please learn how to do this yourself so that you can do it once a month. At the top of your browser window look for 'Tools' and then 'Options' and learn how to adjust your security settings (Like Private Browsing, Note: Certain privacy browser settings 'Like Private Browsing' and not allowing cookies can cause some of your usernames & passwords from working). Before you clear the passwords from your browser make sure you write each one down incase you need to retype them in later. Always have at least 2 internet browsers on your PC incase one does not work or gets infected. 

Privacy Choice - ULR Query

Private Browsing gets more Private. New system patches security holes left open by web browsers’ private-browsing functions. System uses JavaScript decryption algorithms embedded in web pages and code obfuscation to patch security holes left open by web browsers' private-browsing functions.

Tor (safe browsing)

Internet Browsers for Kids

Mozilla Firefox Lightbeam (see who's tracking you online) - Lightbeam

Disconnect.me (stop online advertiser tracking)

Cookies (tracking and profiling)

Browser Usage Stats
Usage Share of Web Browsers
Avecto: Windows Vulnerabilities

Internet Searching Tips - Internet Access Tools

Browsers for the Internet that are Free: Mozilla Firefox - Chrome - Opera - Apple Safari - Hatdex RUMPEL Web Browser

Web Browser is one of the most efficient and effective tools for navigating through information.

Anansi Browser is a lightweight Windows utility designed to help users navigate on the Internet in a clean and intuitive working environment.


Computer Viruses - Computer Vulnerabilities


Computer Virus Word Cloud Computer Virus is a type of malicious software program ("malware") that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them. Infecting computer programs can include as well, data files, or the "boot" sector of the hard drive. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.

System Restore - Reboot Computer - Hacked - Threats

Malware is any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising. Stuxnet Malware.

Spyware is software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent, or that asserts control over a device without the consumer's knowledge.

Keystroke Logging is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.

Keystroke Dynamics is the detailed timing information which describes exactly when each key was pressed and when it was released as a person is typing at a computer keyboard.

Computer Worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

Backdoor in computing is a typically covert method of bypassing normal authentication or encryption in a computer, to gain remote access to a computer. Any computer product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology), can be taken over. Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks. A backdoor may take the form of a hidden part of a program, a separate program (e.g. Back Orifice may subvert the system through a rootkit), code in the firmware of the hardware, or parts of an operating system such as Windows. Trojan horses can be used to create vulnerabilities in a device. A Trojan horse may appear to be an entirely legitimate program, but when executed, it triggers an activity that may install a backdoor. Although some are secretly installed, other backdoors are deliberate and widely known. These kinds of backdoors have "legitimate" uses such as providing the manufacturer with a way to restore user passwords. Many systems that store information within the cloud fail to create accurate security measures. If many systems are connected within the cloud, hackers can gain access to all other platforms through the most vulnerable system. Default passwords (or other default credentials) can function as backdoors if they are not changed by the user. Some debugging features can also act as backdoors if they are not removed in the release version. In 1993, the United States government attempted to deploy an encryption system, the Clipper chip, with an explicit backdoor for law enforcement and national security access. The chip was unsuccessful.

Trojan Horse in computing is any malware which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. Trojans may allow an attacker to access users' personal information such as banking information, passwords, or personal identity. It can also delete a user's files or infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan. Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves. For example, a user is duped into executing an e-mail attachment disguised to appear not suspicious, (e.g., a routine form to be filled in), or by clicking on some fake advertisement on social media or anywhere else.

Pwn is to compromise or control, specifically another computer (server or PC), website, gateway device, or application. It is synonymous with one of the definitions of hacking or cracking, including iOS jailbreaking. The Pwnie Awards are awarded by a group of security researchers.

Hacker (definitions) - Spying on the Scammers [Part 1/4] (youtube)

The Shadow Brokers is a hacker group originating in summer 2016. They published several leaks of some of the National Security Agency (NSA) hacking tools including zero-day exploits. Specifically, exploits and vulnerabilities targeting enterprise firewalls, anti-virus products and Microsoft products, tied to the Equation Group threat actor, NSA's Tailored Access Operations (TAO). DNS.

Ransomware Malware is computer malware that installs covertly on a victim's device (e.g., computer, smartphone, wearable device) and that either mounts the cryptoviral extortion attack from cryptovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim's data, until a ransom is paid. Ransomware is a type of malware from cryptovirology that threatens to perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system so that it is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult. A more recent redefinition of the term 'ransomware' to include theft of the victim's data and an attendant threat to publicize it unless ransom is paid actually bears little resemblance to the original intent. Indeed, any theft of data--an incredibly general and diverse class of attack, to be certain--could be accompanied by an extortive threat if the data is of sufficient value, for example, as proprietary intellectual property. 'Ransomware' defense would then require complete protection against theft of any data whatsoever, an unbounded and theoretically insoluble problem. Ransomware attacks are typically carried out using a Trojan disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. However, one high-profile example, the WannaCry worm, traveled automatically between computers without user interaction. Starting from around 2012, the use of ransomware scams has grown internationally. There were 181.5 million ransomware attacks in the first six months of 2018. This record marks a 229% increase over this same time frame in 2017. In June 2014, vendor McAfee released data showing that it had collected more than double the number of ransomware samples that quarter than it had in the same quarter of the previous year. CryptoLocker was particularly successful, procuring an estimated US$3 million before it was taken down by authorities, and CryptoWall was estimated by the US Federal Bureau of Investigation (FBI) to have accrued over US$18 million by June 2015. Ransom Kidnapping - Bail.

We were not hacked, we sold your private information. The ransomware attack was in inside job. People steal money from their own company and then make it look like someone else did it.

Computer Fraud and Abuse Act was enacted by Congress in 1986 as an amendment to existing computer fraud law (18 U.S.C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984.

Electronic Communications Privacy Act was enacted by the United States Congress to extend government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer.

Storm Botnet is a remotely controlled network of "zombie" computers (or "botnet") that have been linked by the Storm Worm, a Trojan horse spread through e-mail spam.

Botnet is a number of Internet-connected devices used by a botnet owner to perform various tasks. Botnets can be used to perform Distributed Denial Of Service Attack, steal data, send spam, allow the attacker access to the device and its connection. The owner can control the botnet using command and control (C&C) software. The word botnet is a combination of the words robot and network. The term is usually used with a negative or malicious connotation.


Virus Protection


Keep your Virus Software Up to Date because that will also help protect your private information, though it is not a guarantee. 1 in 1,000 Websites are infected with Malicious Software. The moment you visit these infected websites malicious software or viruses are downloaded to your PC without you even knowing, so stay protected and be careful what you click on. The best virus protection is education.

Free Virus Protection - Spyware Protection Software - Security Essentials - Avira - AVG - Avast - Trend Micro

Computer Resources

Protect yourself from 15 Million Malicious Computer Programs

Lava Soft Ad-Ware - Spybot Search and Destroy - CCleaner - Malwarebytes - Hijack This - Spyware Blaster
Download.com has the software above.

Identify Programs Running on PC - Stop Badware

Be very careful not to click on the wrong download item. Please Verify the correct ".exe file."

ZMap is a free and open-source security scanner that was developed as a faster alternative to Nmap. ZMap was designed for information security research and can be used for both white hat and black hat purposes. The tool is able to discover vulnerabilities and their impact, and detect affected IoT devices. Using one gigabit per second of network bandwidth, ZMap can scan the entire IPv4 address space in 44 minutes on a single port.

ULR Query detecting and analyzing web-based malware. It provides detailed information about the activities a browser does while visiting a site and presents the information for further analysis.

Know when someone spies on you.

Tip: Make up fake answers to the most common security questions. Use a VPN or virtual private network. Routing your internet traffic through a middleman server.

Disk Encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. It is used to prevent unauthorized access to data storage.


Spam


Spamming is the use of electronic messaging systems to send an unsolicited message (spam) over and over again, especially advertising, as well as sending messages repeatedly on the same site. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, spam mobile apps, television advertising and file sharing spam.

Email Spam also known as junk email, is a type of electronic spam where unsolicited messages are sent by email.

Email Marketing is the act of sending a commercial message, typically to a group of people, using email. Marketing Madness

Market Researchers say nearly 300 Billion e-mails are sent each day. Information Overload.

E-Mail Software to Help Control Spam - Spamato - Spam Bayes - Get pop file - Mail Washer - Sane Box - Google Priority-inbox Email Filter.

Anti-Spam Techniques are used to prevent email spam or unsolicited bulk email. Block specific email addresses.

Filtering Information - Propaganda - Clickbait

Grey Listing is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will "temporarily reject" any email from a sender it does not recognize. If the mail is legitimate, the originating server will try again after a delay, and if sufficient time has elapsed, the email will be accepted. A server employing greylisting deliberately degrades mail service for unknown or suspect sources, over a short period of time. Typically, it records three pieces of data, known as a "triplet", for each incoming mail message: The IP address of the connecting host. The envelope sender address. The envelope recipient address(es), or just the first of them.

Junk Mail: Stop Junk Mail from your Mailman.

Unsolicited means not asked for, or given without being requested. Things that are unwelcome or uninvited. Like Rape, Sexual Harassment, junk mail and most of the things on the News.


Phone Calls - Stop Annoying Calls


Robocalls and spam phone calls have reached epidemic levels. Unwanted calls are by far the largest source of consumer complaints to the FTC, up to 7.1 million in 2017 versus 5.3 million in 2016. YouMail estimated that there were 3.4 billion robocalls placed in April of 2018, up from 2.5 billion in April of 2017. Phone-verification service Truecaller reports that while in 2014 the average American received 15 spam phone calls a month, by 2018 the average American was getting slammed with 23 spam phone calls a month. The Fix: Make it so every phone has a certificate of authenticity attached to it — a kind of digital signature — that allows you to once again trust your caller ID. The (greatly) simplified way this would work: Someone would place an outbound call. That call would contain a certificate verifying that the call is indeed coming from the number it claims to be coming from. The phone call is passed along to the incoming carrier (e.g., AT&T), which would then check the certificates public key against a heavily encrypted private key. A policy administrator, run by the telecom industry with oversight from the FCC, would be in charge of handing out certificates and making sure everything is on the level. Google.

Do not Call - Complaint Database

Robo Call is a phone call that uses a computerized autodialer to deliver a pre-recorded message, as if from a robot. Robocalls are often associated with political and telemarketing phone campaigns, but can also be used for public-service or emergency announcements. Some robocalls use personalized audio messages to simulate an actual personal phone call. Stop Robocalls.

Connecticut residents still getting around 470 million robo-calls in 2020 and U.S. telephone customers are bombarded with nearly 46 billion robocalls last year in 2020.

The Federal Trade Commission lists tips on how to block unwanted calls.

Youmail has an app for cellphones to reduce robocalls.

Reverse Phone Number Lookup - Call Them All

Robocalls: Last Week Tonight with John Oliver (HBO) (youtube)

Mass Calling System Delivers phone messages to thousands of call recipients at once.

Caller ID Spoofing is when caller ID displays a different number or a fake number and name of the caller so as to trick you into answering the phone call. A criminal is hacking the telephone network to indicate to the receiver of a call that the originator of the call is a station other than the true originating station. For example, a caller ID display might display a phone number different from that of the telephone from which the call was placed. The term is commonly used to describe situations in which the motivation is considered malicious by the originator. What if someone knocks on your door and pretends to be someone else?

Impersonation is an act of falsely portraying oneself as a member of an organization or institution, for the purpose of deception. In the vast majority of countries, the practice is illegal and carries a custodial sentence. Actor - Front Group.

Home Invasion is an illegal and usually forceful entry to an occupied, private dwelling with intent to commit a violent crime against the occupants, such as robbery, assault, rape, murder, or kidnapping. False Advertising.

Identity Fraud is the use by one person of another person's personal information, without authorization, to commit a crime or to deceive or defraud that other person or a third person.

Marketing Madness Hang-up when you are talking, this way they will think that you were cut off and lost connection.

Telemarketing is a method of direct marketing in which a salesperson solicits prospective customers to buy products or services, either over the phone or through a subsequent face to face or Web conferencing appointment scheduled during the call. Telemarketing can also include recorded sales pitches programmed to be played over the phone via automatic dialing.

Auto Dialer is an electronic device or software that automatically dials telephone numbers. Once the call has been answered, the autodialer either plays a recorded message or connects the call to a live person.

SIM-Swap Scams Expose Risks Of Using Phones For Secondary I.D. SIM-swap is a "social engineering" trick fraudsters use to take control of somebody else's phone number. A type of account takeover fraud that generally targets a weakness in two-factor authentication and two-step verification in which the second factor or step is a text message (SMS) or call placed to a mobile telephone. There are a couple of ways to do this. Sometimes they'll fool the phone company into believing they're the number's rightful owner, who lost the phone and needs to transfer service to a new device. And sometimes it's an inside job, with phone company staffers helping to make the switch, as alleged by federal prosecutors in a case this spring. Once scammers control your number, they can get your text messages — including the verification codes many online services send when customers reset their passwords. These are different from verification codes generated by two-factor apps or hardware keys, which are more secure because they don't depend on a phone number. But companies often use the text-message version because it's simple to use. Scammers used text-message verification codes to get into email accounts, and from there it is open season. The big prize can be a Bitcoin account. It's not clear exactly how they used his phone number to log in, but once they did, they can steal Bitcoin. People who are using phones as their only source of two-factor identification are inviting identity theft.

Get a Human Direct Company Phone Numbers without Menu.

Don't forget, before you hang up the phone, make this request below, by law they have to remove you from the call list.....

Please Put Me On Your Do Not Call List..or put me me on the do not waste my f*cking time list, especially if you are just wasting valuable time, energy, resources, people and money.



Previous Subject Up Top Page Next Subject



The Thinker Man