Listen Live

Wed & Fri
10pm EST 7pm PST


Read the Bills Act Coalition


LiveFreeRadio on Twitter





Email Alerts

All subscribe/unsubscribe requests must be confirmed via email.


Contact
We Are on Twitter
We Are on MySpace
Advertise On the Show

Get Informed
The Bill of Rights

Please Support Our Sponsors

  Live Free Patriot Wear
   Live Free Patriot Clothing

  Enter BuyDirectUSA></a><BR>
   <A HREF=Shop Today

The Constitution Party of North Carolina

We Are The New Main Stream Media. We the People will Spread the Truth Since the Corporate Media will not do its job.

Search

May 2019
Sun Mon Tue Wed Thu Fri Sat
      1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31  
 << <   > >>

  XML Feeds

Search

Google Ads

Advanced CMS

Valid XHTML 1.0 Transitional

Category: "Technology"

Pages: 1 3 4 5 ...6 ...7 8 9 10 11 12 ... 47

04/16/13

  01:15:17 pm, by JP   , 223 words,  
Categories: News, The US Constitution, Take Action, laws, Police State, Technology, Obamanation

Call Now: Tell Congress to Reject CISPA -52 hours left to stop CISPA

Call Now: Tell Congress to Reject CISPA

The House is about to vote on the "cybersecurity" bill known as CISPA, the Cyber Intelligence Sharing and Protection Act. Despite recent amendments, CISPA still features dangerously vague language that could put your personal information in the hands of military organizations like the National Security Agency.

While CISPA passed through the House last year, it failed to be enacted after a veto threat. This year's bill fails to solve the fundamental privacy and civil liberties problems with the misguided law. Please speak out! We’re asking individuals to call Representatives and follow up with a tweet.

Click here if you’re not in the United States.
Suggested script:

Hello, my name is [YOUR NAME] and I am a constituent of [Congressperson's name].

Please oppose H.R.624, the Cyber Intelligence Sharing and Protection Act, also known as CISPA. It is a misguided bill that violates my privacy. I believe that the right cybersecurity solution does not involved sacrificing the privacy rights of Internet users.

Thank you for your consideration, and for acting against this dangerous bill.

Spread the word!

Excellent! Now that you've made the call, use our Twitter tool to tell key members of Congress to stand up for your privacy and vote NO on CISPA and to help spread the word.

Source: www.eff.org

 PermalinkLeave a comment

09/13/12

  09:58:12 am, by JP   , 398 words,  
Categories: News, The US Constitution, Take Action, laws, Police State, Technology

House Votes Today to Legalize Warrantless Wiretaps

House Votes Today to Legalize Warrantless Wiretaps
From Devvy Kidd

Activist Post

Only days after a NSA whistleblower has sounded the alarm about the government's massive spying campaign on American citizens, the U.S. Congress who swore an oath to uphold the Constitution are set to legalize warrantless wiretaps with the reauthorization of the secretive FISA Amendments Act.

This legislation is the perfect example of why there is no difference between the political parties. Their rhetoric may differ when it's politically expedient, but when push comes to shove they always vote for tyranny.

Obama said he was against the Patriot Act to get elected because the majority of Americans opposed it, but then he supported its extension not for one year, but for four years. Obama repeatedly attacked Bush's warrantless wiretaps as unconstitutional, but now he's expected to sign this 5-year reauthorization once the unprincipled legislators rubber stamp it today.

It seems the only time Congress acts in a bipartisan way is when they're trampling the Constitutional rights of Americans.

ACLU wrote this about the legislation:

It permits the government to get year-long orders from the secret Foreign Intelligence Surveillance Act (FISA) court to conduct dragnet surveillance of Americans’ international communications—including phone calls, emails, and internet records—for the purpose of collecting foreign intelligence. The orders need not specify who is going to be spied on or even allege that the targets did anything wrong. The only guarantees that the FAA gives are that no specific American will be targeted for wiretapping and that some (classified) rules about the use of intercepted information will be followed.

After four years, you’d hope that some basic information or parameters of such a massive spying program would be divulged to the public, or at least your rank-and-file member of Congress, but they haven’t...

Can you believe that 435 members of Congress who have sworn to uphold the Constitution are about to vote on a sweeping intelligence gathering law without this basic information?

If you hear politicians say that FISA actually provides meaningful oversight, they can't possibly know that due to the secrecy of the approval process. But you may remind them that every single secret surveillance request was approved in 2011 indicating a rubber stamp approval.

Don't be a person of good conscience who remains silent. Call your Congressperson and tell them to vote NO.

US House Switchboard operator: (202) 224-3121

03/18/12

The hysteria over Obama/Soetoro's new Executive order

The hysteria over Obama/Soetoro's new Executive-order
by Devvy Kidd
March 18, 2012

I must have received 200 emails about the EO issued by the putative president declaring martial law is on the way and no election in November.

This one is typical:

"This Obama EO has gone way beyond Communism or a Police State ! This is total insanity ! It's done. We waited ourselves into tyrannical oblivion."

Many read the EO and are concerned as we should be from anything generated by the Red House.

When I first read it, I thought Soetoro didn't write it because he doesn't really concern himself with much except playing basketball, raising money, his Wednesday night music sessions or Hollyweird friends stopping in, and second, it's beyond his abilities in my humble opinion.

In any event, WND has come out with an article about it since the panic has spread like flash mobs:

Executive-order panic: Martial law in U.S.?

http://www.wnd.com/2012/03/executive-order-panic-martial-law-in-america/

"As it turns out, Obama’s executive order is nearly identical to EO 12919, issued by President Clinton on June 7, 1994, which itself was an amendment to EO 10789, issued in 1958 by President Eisenhower, and which in fact, was later amended by EO 13286, issued in 2003 by George W. Bush."

Rest at link above.

As for the issue of martial law, I highly recommend people read the column below by Dr. Edwin Vieira, Ph.D., J.D.

I was under several misconceptions about martial law until I read Edwin's usual scholarly analysis.

Those sending out emails it's time to get your guns locked and loaded, a coup is underway, etc., should get the facts about martial law before they blow a gasket and do something foolish.

A Primer on Martial Law

http://www.newswithviews.com/Vieira/edwin198.htm

09/18/11

E-Verify: De Facto National ID and the End of Privacy

E-Verify: De Facto National ID and the End of Privacy
By John W. Whitehead
9/16/2011

As technology grows more sophisticated and the American government and its corporate allies further refine their methods of keeping tabs on citizens, those of us who treasure privacy increasingly find ourselves engaged in a struggle to maintain our freedoms in the midst of the modern surveillance state.

The latest attack on our right to anonymity and privacy comes stealthily packaged in the form of so-called job protection legislation. Introduced by House Judiciary Committee Chairman Lamar Smith (R-Texas) in June 2011, H.R. 2885 (formerly H.R. 2164), the "Legal Workforce Act," is being marketed as a way to fight illegal immigration and "open up millions of jobs for unemployed Americans and legal immigrants." However, this proposed federal law is really little more than a Trojan horse, a backdoor attempt by the powers-that-be to inflict a de facto National ID card on the American people.

Created under the auspices of securing the borders and preventing illegal immigrants from being hired for "American" jobs, E-Verify challenges the rights of the individual, the rights of labor and the rights of industry. As such, this is not a left or right issue. Anyone who values civil liberties should be alarmed. In fact, E-Verify is being opposed by various civil liberties groups such as the ACLU, American Library Association, The Rutherford Institute, Liberty Coalition and others.

If approved by Congress, this legislation would make the federal government the final authority on who gets hired by American businesses and in the process create a bureaucratic nightmare for already over-burdened and over-regulated small business owners. In a nutshell, H.R. 2885 requires all employers to submit potential employees' names, Social Security numbers and other data to the Department of Homeland Security (DHS) for authorization before the employees can start work. The data would then be run through E-Verify, a government-run database and employment identification verification system.

In other words, the E-Verify system would require all those wanting to be employed by American companies to register the credentials of their citizenship in a government database. What this means, of course, is that in order to be able to verify an applicant's legitimacy, the government would first have to build a massive database to store the biographical information of the entire working population in the United States--a huge undertaking with numerous pitfalls and security flaws, as we have seen with many other government databases. If you think unemployment is a problem now, just wait until your employment hinges on getting government clearance. Under this legislation, if a worker's information is incorrect in E-Verify, he or she can't work until the problem is resolved.

Furthermore, due to the sensitive information contained in the database, it would be a huge target for hackers and identity thieves, while doing little to curb the flow of illegal immigration or illegal immigrants getting jobs. Indeed, with a stolen or faked identity, anyone could bypass the system and secure employment.

This legislation poses even greater threats to privacy, free speech and free association and potentially hinders Americans' ability to travel freely. Because the E-Verify system would apply to everyone eligible to work in the United States and will grow to include biometrics such as fingerprints, DNA and iris scans, it will be used for a host of other purposes by the intelligence community, law enforcement and corporate America.

Private employers will become extensions of the government in that they will eventually be required to verify whether employees are delinquent in the payment of federal, state or local taxes, in compliance with child support or alimony decrees, on a terrorist watch list or convicted or even accused of a crime. Employers, thus, would be enlisted as de facto law enforcement officers for the federal government. Furthermore, errors in the verification process would be practically immune from timely legal redress in violation of constitutional tenets of due process.

Recently, the prohibition in H.R. 2885 on using the E-Verify database for purposes other than employment verification was replaced with a new section that allows the system to be used to "protect critical infrastructure." That term is broadly defined and it's not clear what this would mean in practice--whether screening air travelers or controlling access to federal facilities--but it clearly signals a huge expansion of the program. In one paragraph in the legislation the government states that E-Verify will not be used just for employment but also can be used for verifying identify for national security. What this means is that American citizens would have to have their information correct in E-Verify not just to get a job but also potentially if they need to access "critical infrastructure"--i.e., any kind of public transportation. Ironically, this language comes right after the paragraph saying there will be no National ID card.

Despite assurances to the contrary, E-Verify will become a de facto National ID system. Such a database with vast pools of personal information directly tied to individuals shared across a multitude of government agencies would give the government an alarming amount of control over the average citizen. If government officials so chose, they could easily track any person who had registered in the E-Verify system for whatever reason.

Not only will government agencies know everything about American citizens, but private corporations will become policemen for this system. The E-Verify system--part of a broader trend in American politics, namely, the collusion of government and corporate interests--will allow government and corporate officials to repress dissidents and suspects simply by restricting their access to basic services. Once all of your information is tied together and placed in one grand database, any government or corporate agency can wreak havoc on your life. You might try to buy groceries only to find that your credit card has been denied. You might apply for a job, at ten, twenty, fifty corporations only to find that, despite your being very qualified, there just isn't any room for you at the company. Without a job, you might be forced to tap into the welfare system, only to find that your application was denied. Your property might be confiscated. When you try to move somewhere else and start anew, you might find you can't board the plane because you're on a no-fly list. Make no mistake, these are the tactics of a totalitarian society.

However, the idea of singling out and "identifying" individuals for the sake of national security is nothing new. National identity cards also carry with them a historic risk of oppression and persecution, as they have been used to identify and track ethnic, racial and religious groups and have facilitated oppression and persecution against these groups. And as recently as the 1990s, identity cards played an instrumental role in one of the worst genocides of the twentieth century, second only perhaps to the Holocaust.

With the introduction of an identity card that contains information such as ethnic origin, government agencies will be able to identify people on the basis of race or religion with considerable ease. For example, in the months following the 9/11 attacks, Muslim men from Arab or South Asian countries were rounded up on the basis of religion and ethnicity and detained indefinitely in the United States, often without access to an attorney or a judge. Imagine how much more far-reaching that government detention program might have been with a National ID in place.

Various laws have been enacted over time to guard against unreasonable intrusions by the government into our private lives. One such law is the Privacy Act, which was passed by Congress in 1974 and prohibits the government from forming a database. However, although the fear was that such a database could constitute an invasion of privacy, the law only prevents the government from creating a database, not accessing an already existing database.

At the time the Privacy Act was passed, Congress had no reason to suspect that private corporations would ever have the desire or means to create such databases. The emergence of data collection corporations, however, has enabled government intelligence and police agencies to circumvent the law and gain information on private citizens with the click of a button. Although such tactics clearly contradict the spirit of privacy laws intended to guard against government abuse, it is technically legal for the government to gain access to these databases. Government officials have taken full advantage of this loophole. Due to the fact that these databases are owned and operated by private corporations, they are relatively unregulated and fall outside the scrutiny of privacy watchdog groups. Reports of security breaches at numerous data brokerage companies only serve to fan concerns about the lack of oversight and regulation.

Rest assured that were Congress to approve this E-Verify legislation, it would constitute the ultimate end-run around the Privacy Act and open the door to a National ID. Thus, we have reached a crossroads. Either we limit the reach and power of the government (often in collusion with corporate power) or privacy as we have known it will become extinct.

---------------------------------------------------

Members of House committee to call to oppose Everify

*************************
ARKANSAS

Rep. Griffin, Tim (GOP)
U.S. House of Representatives,
Washington, 205150001
(202-225-2506)

*************************
ARIZONA

Rep. Franks, Trent (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-4576)

Rep. Quayle, Ben (GOP)
U.S. House of Representatives,
Washington, 205150001
(202-225-3361)

*************************
CALIFORNIA

Rep. Gallegly, Elton (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-5811)

Rep. Issa, Darrell (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-3906)

Rep. Lungren, Dan (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-5716)

=========
FLORIDA

Rep. Adams, Sandy (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-2706)

Rep. Ross, Dennis (GOP)
U.S. House of Representatives,
Washington, 205150001
(202-225-1252)

*************************
INDIANA

Rep. Pence, Mike (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-3021)

*************************
IOWA

Rep. King, Steve (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-4426)

*************************
NORTH CAROLINA

Rep. Coble, Howard (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-3065)

*************************
OHIO

Rep. Chabot, Steve (GOP)
441 Vine Street, Suite 3003,
Cincinnati, 452023003
(513-684-2723)

Rep. Jordan, Jim (GOP)
U.S. House of Representatives,
Washington, 205150001
(202-225-2676)

*************************
PENNSYLVANIA

Rep. Marino, Tom (GOP)
U.S. House of Representatives,
Washington, 205150001
(202-225-3731)

*************************
SOUTH CAROLINA

Rep. Gowdy, Trey (GOP)
101 West St. John St.,
Spartanburg, SC 29306
(864-583-3264)

*************************
TEXAS

Rep. Gohmert, Louie (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-3035)

Rep. Poe, Ted (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-6565)

*************************
UTAH

Rep. Chaffetz, Jason (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-7751)

*************************
VIRGINIA

Rep. Forbes, Randy (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-6365)

Rep. Goodlatte, Robert (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-5431)

*************************
WISCONSIN

Rep. Sensenbrenner, James (GOP)
U.S. House of Representatives,
Washington, DC 205150001
(202-225-5101)

*************************

GOD'S WORD FOR TODAY
He will not suffer thy foot to be moved: he that keepeth thee will not slumber. Psalms 121:3 (KJV)

IN THE NEWS
OBAMA NATION

E-Verify 'flags' Obama's Social Security Number
http://bit.ly/pzpXhT

E-VERIFY NEWS

Broad coalitions gather over the Legal Workforce Act markup
http://bit.ly/qW4zae

Legal Workforce Act a Stealth National ID
http://thedc.com/nozA2T

POLICE STATE NEWS

Should Faking a Name on Facebook Be a Felony?
http://on.wsj.com/rfQS2h

BMI Reports On Kids Will Be Required In Michigan
http://bit.ly/pBFVKd

Border deal could erode personal privacy in Canada
http://bit.ly/qj4HAa

Reporter Claims TSA Agent Would Speed People Through Security For $10
http://bit.ly/pHjdkx

TSA officers arrested on drug charges in Conn.
http://nyp.st/qPaNP9

POLITICS & GOVERNMENT

McCaskill attacked on billboard in Springfield LOL
http://bit.ly/mTTzFd

More of the same -- Senate introduces anti-public education bills
http://bit.ly/nsW0qw

Judge blocks Fla. law restricting doctor gun talk
http://bit.ly/p4EDRy

Man Arrested At Honolulu Airport Over Threat To Vice President Biden
http://bit.ly/n1x8xI

Gun store owner had misgivings about ATF sting
http://on.msnbc.com/rndTga

ECONOMIC NEWS

Unemployed, he's selling everything to follow in steps of Dust Bowl migrants
http://bit.ly/nevq3A

Unemployment benefit requests jumped to 428K
http://yhoo.it/po4drH

World's central banks flood market with dollars
http://yhoo.it/nsx3qR

HEALTH NEWS

Buyer Beware high fructose corn syrup getting a new name - don't buy it demand real sugar
http://yhoo.it/oBs6K8

4 Things to Consider Before Moving Move Off-Grid
http://bit.ly/qyNqf6

MORAL DECLINE

UBS $2 billion rogue trade suspect held in London
http://yhoo.it/p7rbst

Wife Performing In Sex Tape Doesn't Know She's A Star
http://yhoo.it/oYWaj8

Boy, 14, brutally beaten in Logan Square
http://yhoo.it/qGA60D

Man hounded for child support for 20 years, but it's not his kid
http://yhoo.it/pEdA6E

08/25/11

Facial Recognition is a Threat to Your Privacy

Facial Recognition is a Threat
to Your Privacy:


A Top Privacy
Issue of Our Time

San Diego, CA, August 25,
2011

Imagine you’re walking down the street and a stranger snaps
your photo with his smartphone. He uses a facial recognition app and within
minutes, he knows your name, age, where you were born, and your Social Security
number. Think it’s a scene from the movie Minority
Report
? Think again.

It’s Possible.

Researchers from Carnegie Mellon University combined three
technologies – facial recognition software, cloud computing, and social
networks – to identify people both online and offline. The team performed three
separate experiments
:

  1. People using pseudonyms on an online dating site were
    identified by comparing Facebook profile photos, which are publicly displayed,
    to the profiles on the dating site. Using facial recognition software to match
    up the photos, 10 percent of the dating site’s users were identified.

  2. Students walking on campus were identified by comparing
    real-time photos taken with a webcam to Facebook profile photos. The facial
    recognition software identified the students 31 percent of the time.

  3. Using only a photo of a person’s face and information
    publicly available online, the researchers figured out the person’s birth date,
    personal interests, and Social Security number.

Many individuals share a tremendous amount of information about
themselves online. As facial recognition software improves, it will inevitably
be easier to link this personal information to you just by taking your photo.

The Threat to Your
Privacy.

Facial recognition technology – especially as the technology
becomes more sophisticated – may be one of the gravest privacy threats of our
time. It has the potential to remove the anonymity we expect in crowds and most
public places. There are the obvious “chilling effects” it could have on
political demonstrations and speech, concerns being monitored by civil
liberties advocates like the ACLU,
EPIC, and EFF.  However, this technology will also very
likely be used in greater capacity in the commercial sector to further target
consumers for advertising and discriminatory pricing purposes.

According to
an article published recently by the Los Angeles Times
, several companies
have already launched, or plan to launch soon, facial recognition technology
that will be used for in-store digital displays and kiosks to make product
suggestions based on the demographics gleaned from your face.  This might include your sex, your age range,
and your race or ethnicity.  

However, the article fails to mention the possibility that
facial recognition software will likely be used for more than demographic
targeting. In his book Niche
Envy
, Joseph Turow, a professor at the University of Pennsylvania, explains
how companies are using increasingly sophisticated market segmentation methods
to offer different prices to different people, a practice known as price
discrimination. The more detailed the profile a company can build on you, the
more accurately it can estimate how much you are willing to spend on a product.

Professor Turow focused primarily on online data collection,
but as the Carnegie Mellon study illustrates, facial recognition technology
makes it possible to connect your offline identity with your online identity
without necessarily obtaining your consent. This may allow for price
discrimination the moment you walk into a store. As facial recognition
technology advances and the number of consumers using social media continues to
increase, it’s not far-fetched to imagine a scenario where, for example, the
kiosk mentioned above identifies you based on information found online. What if
you then receive not only product recommendations, but also prices for those
products based on who it thinks you are? The possibility of such applications for
facial recognition technology are disturbing, to say the least. 

What You Can Do.

We believe  individuals must have control over their personal
information.  This includes who has your
information, how it is kept, and what can be done with it.
 Facial recognition software can enable companies
to identify and target you without your knowledge or permission. Privacy laws
in the U.S. have not kept pace with technology, and we are aware of no laws specifically
governing commercial use of facial recognition technology.  This is unless, of course, a company states
in a privacy policy that it does not use this technology when in fact it does.

Here are three things you can do to fight for your privacy:

  1. Educate yourself. The most important thing you can do is learn
    more about the technology and its privacy implications, so that you are an
    educated and informed consumer. To stay abreast of facial recognition and other
    emerging privacy issues, visit our
    Privacy Today webpage
    .

  2. Support legislation that defends privacy. Write to your elected representatives
    to ask for stronger privacy protections against facial recognition
    technology and other emergent technologies that you believe may be used to
    invade your privacy. Many privacy laws are created on the state level, so stay
    informed and vote for better privacy protection.

  3. Avoid companies with poor privacy practices. When possible,
    don't do business with companies that you believe collect unnecessary
    personal information or fail to protect that information. Take your money
    elsewhere - and let the companies know why.

You can also see this alert on our website at http://www.privacyrights.org/facial-recognition-threat-to-your-privacy-2011.


__________________________________________________________________


GOD'S WORD FOR TODAY

Then Peter said unto them, Repent, and be baptized every one of you in the name of Jesus Christ for the remission of sins, and ye shall receive the gift of the Holy Ghost. ACTS 2:38 (KJV)

1 3 4 5 ...6 ...7 8 9 10 11 12 ... 47