• About
    • Who am I? What am I doing here? How did I get here? (updated 10/29/2013)
  • Contact Form
  • FAIR USE NOTICE

PUMABydesign001's Blog

~ “I hope we once again have reminded people that man is not free unless government is limited. There’s a clear cause and effect here that is as neat and predictable as a law of physics: as government expands, liberty contracts.” Ronald Reagan.

PUMABydesign001's Blog

Tag Archives: Invasion of Privacy

Alexa You Nasty! Tells Customers to “Kill”, Sends Little Kids to Porn

23 Sunday Dec 2018

Posted by bydesign001 in Independent Sentinel, Progressives war on America, Technology

≈ 1 Comment

Tags

Alexa, chat, dangerous, Invasion of Privacy, murderous, vulgar


FOUL-MOUTHED ALEXA

Good grief! There is a reason that I have warned my son and nieces to steer away from Alexa and Alexa-linked devices, numbers of which are frightening on the rise by the day.  The same goes for Google.

This technology has a dark side, as do the people tinkering with it for the good of the collective as ordained by whom?  The bubble-heads living in Silicon Valley.

Independent Sentinel by S. Noble

An Alexa experiment has had some troubling consequences, and a lot of customers are not amused. Alexa can get very nasty.

As people use it to play music and perform basic tasks, the inventors are trying to make Alexa a better communicator.

MURDEROUS, VULGAR ALEXA

That has led to Alexa telling at least one customer to “Kill your foster parents.” Alexa has chatted with users about sex acts and dog excrement. And this summer, a hack Amazon traced back to China may have exposed some customers’ data, according to five people familiar with the events, reports Reuters.

Alexa has recited the Wikipedia entry for masturbation to a customer, according to one researcher.

One bot described sexual intercourse using words such as “deeper,” which on its own is not offensive, but was vulgar in this particular context[…]

Continue Reading

Share this:

  • Facebook
  • Gab.ai
  • MeWe
  • Tea Party Community
  • Tumblr
  • Twitter
  • LinkedIn
  • Pinterest
  • Pocket
  • Reddit
  • Email
  • scoop.it
  • Telegram
  • WhatsApp
  • More
  • Print

Like this:

Like Loading...

Did Twitter REALLY suspend THE House Permanent Select Committee on Intelligence’s acct?

19 Friday Jan 2018

Posted by bydesign001 in Election 2016, National Security, Progressives war on America, Progressives War on Donald Trump, Treason

≈ 4 Comments

Tags

#FISAabuse, #ReleasetheDocuments, #ReleasetheDocuments #ReleasetheMemo #FISAabuse, #ReleasetheMemo, DNC, DOJ, Fake Russian dossier, FBI, Fourth Amendment Violations, government surveillance, Hillary Clinton, Invasion of Privacy, Robert Mueller, weaponizing intel


BREAKING: See my post over at Grumpy Opinions entitled, “GOP Lawmakers: ‘Intel Comm. Must Release Classified Memo on DOJ, FBI #FISAabuse to Public“

This week continues to get stranger by the hour but one thing is certain, Progressives have openly declared war on all of America; and if what I am relaying here is true, Congressional and Senate Committee members along with everyone else are fair game to be preyed upon by Marxists.

UPDATE:

Would Twitter REALLY shut down the twitter account of the “House Permanent Select Committee On Intelligence”? The twitter handle is allegedly @HPSCI.

If @HPSCI is really the twitter handle of the “House Permanent Select Committee On Intelligence,” as of 3:03 a.m. this morning (Friday 1/19/2018) the account remains suspended begging one to ask, why is Twitter censuring/banning a Congressional agency?

Let’s just say for a moment that Twitter intentionally suspended the account…how low will Progressives sink? In light of the insanity, I took the following screenshot just moments ago.

 

ORIGINAL POST:

Did Twitter just shut down the twitter account of the “House Permanent Select Committee On Intelligence”? They’re twitter handle is allegedly @HPSCI.

On Thursday afternoon, early evening reports began to surface across the social media site that Twitter suspended the twitter account of the “House Permanent Select Committee On Intelligence” [@HPSCI] (i) after calls by GOP lawmakers that a four-page classified memo revealing FISA abuses be made public and (ii) calls to #ReleasetheDocument #ReleasetheMemo #FISAabuse heated up as these hashtags began trending well into the night. (Although still trending, twitter as usual has removed the hashtags from the sidebar.)

As of 4:48 EST on Jan. 18, the House Permanent Select Committee on Intelligence’s Twitter account — @HPSCI — is suspended. Why on the day that House members are now having access to classified document regarding FISA abuse?

— John Miller 🇮🇪 🇬🇧 🇫🇷 (@JohnMAGAMiller1) January 18, 2018

Twitter has suspended the account for House Permanent Select Committee on Intelligence AND the @HPsci does not even show up on searches when you type in the handle.
What gives?! pic.twitter.com/ZU0QQWss8N

— Politically Stripped ™️ (@politstrip) January 18, 2018

@JackPosobiec @PrisonPlanet @TuckerCarlson @SaraCarterDC @RepDevinNunes – it seems Twitter has decided that the United States Gov House Permanent Select Committee on Intelligence needs to be suspended and censored-maybe have a talk to @jeffsessions about anti-trust laws? @POTUS https://t.co/XPtsXpsrYj

— Casey (@raphaellaN) January 19, 2018

The memo allegedly exposes alleged government surveillance (FISA) abuses and collusion between members of Hillary Clinton’s campaign, the FBI, the DOJ and quite possibly the Clintons long-time pal, Sydney Blumenthal to undermine the campaign and presidency of President Donald J. Trump.

Apparently, it’s getting a little too hot for some folks and the timing of the alleged suspension of THE “House Permanent Select Committee On Intelligence” [@HPSCI], provided that is the their account is SUSPECT leading one to ask, who was it this time, Jack Dorsey or another disgruntled employee on his or her final day of work? Or is this a hoax intended to divert attention away from Republicans calling for the public release of the memo?

Moving on…for now.

#ReleasetheDocuments

#ReleasetheMemo

#FISAabuse

Share this:

  • Facebook
  • Gab.ai
  • MeWe
  • Tea Party Community
  • Tumblr
  • Twitter
  • LinkedIn
  • Pinterest
  • Pocket
  • Reddit
  • Email
  • scoop.it
  • Telegram
  • WhatsApp
  • More
  • Print

Like this:

Like Loading...

With Rule 41, Little-Known Committee Proposes to Grant New Hacking Powers to the Government

02 Monday May 2016

Posted by bydesign001 in Uncategorized

≈ Comments Off on With Rule 41, Little-Known Committee Proposes to Grant New Hacking Powers to the Government

Tags

Congress, government hacking, government surveillance, government tyranny, Invasion of Privacy, Rule 41 of the Federal Rules of Criminal Procedure, Spying, Supreme Court


Electronic Frontier Foundation (EFF.org) By Rainey Reitman

backlit keyboard

The government hacking into phones and seizing computers remotely? It’s not the plot of a dystopian blockbuster summer movie. It’s a proposal from an obscure committee that proposes changes to court procedures—and if we do nothing, it will go into effect in December.

The proposal comes from the advisory committee on criminal rules for the Judicial Conference of the United States. The amendment would update Rule 41 of the Federal Rules of Criminal Procedure, creating a sweeping expansion of law enforcement’s ability to engage in hacking and surveillance. The Supreme Court just passed the proposal to Congress, which has until December 1 to disavow the change or it becomes the rule governing every federal court across the country. This is part of a statutory process through which federal courts may create new procedural rules, after giving public notice and allowing time for comment, under a “rules enabling act.”1

The Federal Rules of Criminal Procedure set the ground rules for federal criminal prosecutions. The rules cover everything from correcting clerical errors in a judgment to which holidays a court will be closed on—all the day-to-day procedural details that come with running a judicial system.

The key word here is “procedural.” By law, the rules and proposals are supposed to be procedural and must not change substantive rights.

But the amendment to Rule 41 isn’t procedural at all. It creates new avenues for government hacking that were never approved by Congress.

The proposal would grant a judge the ability to issue a warrant to remotely access, search, seize, or copy data when “the district where the media or information is located has been concealed through technological means” or when the media are on protected computers that have been “damaged without authorization and are located in five or more districts.” It would grant this authority to any judge in any district where activities related to the crime may have occurred.

To understand all the implications of this rule change, let’s break this into two segments.

The first part of this change would grant authority to practically any judge to issue a search warrant to remotely access, seize, or copy data relevant to a crime when a computer was using privacy-protective tools to safeguard one’s location. Many different commonly used tools might fall into this category. For example, people who use Tor, folks running a Tor node, or people using a VPN would certainly be implicated. It might also extend to people who deny access to location data for smartphone apps because they don’t feel like sharing their location with ad networks. It could even include individuals who change the country setting in an online service, like folks who change the country settings of their Twitter profile in order to read uncensored Tweets.

There are countless reasons people may want to use technology to shield their privacy. From journalists communicating with sources to victims of domestic violence seeking information on legal services, people worldwide depend on privacy tools for both safety and security. Millions of people who have nothing in particular to hide may also choose to use privacy tools just because they’re concerned about government surveillance of the Internet, or because they don’t like leaving a data trail around haphazardly.

If this rule change is not stopped, anyone who is using any technological means to safeguard their location privacy could find themselves suddenly in the jurisdiction of a prosecutor-friendly or technically-naïve judge, anywhere in the country.

The second part of the proposal is just as concerning. It would grant authorization to a judge to issue a search warrant for hacking, seizing, or otherwise infiltrating computers that may be part of a botnet. This means victims of malware could find themselves doubly infiltrated: their computers infected with malware and used to contribute to a botnet, and then government agents given free rein to remotely access their computers as part of the investigation. Even with the best of intentions, a government agent could well cause as much or even more harm to a computer through remote access than the malware that originally infected the computer. Malicious actors may even be able to hijack the malware the government uses to infiltrate botnets, because the government often doesn’t design its malware securely. Government access to the computers of botnet victims also raises serious privacy concerns, as a wide range of sensitive, unrelated personal data could well be accessed during the investigation. This is a dangerous expansion of powers, and not something to be granted without any public debate on the topic.

Make no mistake: the Rule 41 proposal implicates people well beyond U.S. borders. This update expands the jurisdiction of judges to cover any computer user in the world who is using technology to protect their location privacy or is unwittingly part of a botnet. People both inside and outside of the United States should be equally concerned about this proposal.

The change to Rule 41 isn’t merely a procedural update. It significantly expands the hacking capabilities of the United States government without any discussion or public debate by elected officials. If members of the intelligence community believe these tools are necessary to advancing their investigations, then this is not the path forward. Only elected members of Congress should be writing laws, and they should be doing so in a matter that considers the privacy, security, and civil liberties of people impacted.

Rule 41 seeks to sidestep the legislative process while making sweeping sacrifices in our security. Congress should reject the proposal completely.

Read EFF and Access Now’s joint testimony on Rule 41.

 

Permission to republish granted by Electronic Frontier Foundation.org.

Creative Commons Licensed

Share this:

  • Facebook
  • Gab.ai
  • MeWe
  • Tea Party Community
  • Tumblr
  • Twitter
  • LinkedIn
  • Pinterest
  • Pocket
  • Reddit
  • Email
  • scoop.it
  • Telegram
  • WhatsApp
  • More
  • Print

Like this:

Like Loading...

FBI shares tool for hacking iPhones with local law enforcement

01 Friday Apr 2016

Posted by bydesign001 in Uncategorized

≈ Comments Off on FBI shares tool for hacking iPhones with local law enforcement

Tags

Apple, Encryption, FBI, Invasion of Privacy, Law Enforcement


Okay, so who DID NOT see this coming?

Washington Examiner by Rudy Takala

screenshot

screenshot

The Federal Bureau of Investigation agreed on Wednesday to share a new tool for hacking Apple products with authorities in Arkansas, a sign the bureau is likely to begin sharing the tool with law enforcement officials nationwide.

Faulkner County Prosecuting Attorney Cody Hiland said Wednesday that the FBI had agreed to the request from his office and the Conway Police Department that afternoon, according to an AP report. The agencies are seeking to hack an iPhone and an iPod[…]

Continue Reading — FBI shares tool for hacking iPhones with local law enforcement

Share this:

  • Facebook
  • Gab.ai
  • MeWe
  • Tea Party Community
  • Tumblr
  • Twitter
  • LinkedIn
  • Pinterest
  • Pocket
  • Reddit
  • Email
  • scoop.it
  • Telegram
  • WhatsApp
  • More
  • Print

Like this:

Like Loading...

Yet another bill seeks to weaken encryption-by-default on smartphones

21 Thursday Jan 2016

Posted by bydesign001 in Uncategorized

≈ Comments Off on Yet another bill seeks to weaken encryption-by-default on smartphones

Tags

California, cell phones, Encryption, Fourth Amendment, government tyranny, Invasion of Privacy, legislation, New York, smartphones


Photo courtesy of japanexpertna.se, Flickr (CC BY-SA 2.0)

Photo courtesy of japanexpertna.se, Flickr (CC BY-SA 2.0)

Ars Technica by Cyrus Farivar

A second state lawmaker has now introduced a bill that would prohibit the sale of smartphones with unbreakable encryption. Except this time, despite very similar language to a pending New York bill, the stated rationale is to fight human trafficking, rather than terrorism.

Specifically, California Assemblymember Jim Cooper’s (D-Elk Grove) new bill, which was introduced Wednesday, would “require a smartphone that is manufactured on or after January 1, 2017, and sold in California, to be capable of being decrypted and unlocked by its manufacturer or its operating system provider.”

If the bill passes both the Assembly and State Senate and is signed into law by Gov. Jerry Brown (D) […]

Continue Reading — Yet another bill seeks to weaken encryption-by-default on smartphones

New York State is attempting to push through similar legislation, which comes as no surprise. Between Governor Moonbeam and that Fascist, Andrew Cuomo, it is hard to say who is worse. As for people living in both states, HALT THIS TRAINWRECK!

“The nine most terrifying words in the English language are: I’m from the Government, and I’m here to help.” Ronald Reagan

 

Image source: Japanexperterna.se, Flickr.

 

 

Share this:

  • Facebook
  • Gab.ai
  • MeWe
  • Tea Party Community
  • Tumblr
  • Twitter
  • LinkedIn
  • Pinterest
  • Pocket
  • Reddit
  • Email
  • scoop.it
  • Telegram
  • WhatsApp
  • More
  • Print

Like this:

Like Loading...

USC students required to detail sexual history before registering for classes

12 Tuesday Jan 2016

Posted by bydesign001 in Uncategorized

≈ Comments Off on USC students required to detail sexual history before registering for classes

Tags

Data mining, Invasion of Privacy, sexual assualts, Title Ix, University of Southern California


Students attending the University of California received an email informing them or the requirement to complete a Title IX training course.

The online training course must be completed by February 9 in order for the student to register for spring courses.

screenshot of title ix course survey university of souther california

 

While many students are concerned that the course is too intrusive, failure to complete the Title IX course would put their spring registration on hold until the course has been completed.

Campus Reform by Anthony Gockowski

A mandatory online course at the University of Southern California (USC) asks students to disclose the number of sexual encounters they have had over the past three months and teaches students to ask for consent by saying “how far would you be comfortable going?” and “would you like to try this with me?”

… ‘It was just full of super personal questions,’ Jacob Ellenhorn, a student at USC, told Campus Reform.

Despite some students being uncomfortable with the content of the course, the campus-wide email assured students they would ‘enjoy the assignment.’

‘We believe you’ll enjoy the assignment, and that this training is in line with our shared belief that Trojans care for Trojans….

Continue Reading — USC students required to detail sexual history before registering for classes

In other words, it is not up to the student to reach the conclusion that he or she enjoys (or does not) the course, the decision of which is to be determined by the thought police.

Students are right to be concerned that the information they are asked to provide is a blatant invasion of privacy and none of the school’s business.

screenshot of title ix course survey university of souther california 002

 

Some of the Title IX survey questions ask: “If you had sex (including oral) in the last 3 months, how many times had you used a condom?”

The course interrogates the student about individual’s alcohol, drugs, sex including the number of sexual partners in a three-month period. Followed up by questions about the student’s use of condoms, “If you had sex (including oral) in the last 3 months, how many times had you used a condom?”

Such probing has little to do with the so-called concerns of sexual assaults on campus and more to do with data mining and usurping an individual’s right to privacy.

Share this:

  • Facebook
  • Gab.ai
  • MeWe
  • Tea Party Community
  • Tumblr
  • Twitter
  • LinkedIn
  • Pinterest
  • Pocket
  • Reddit
  • Email
  • scoop.it
  • Telegram
  • WhatsApp
  • More
  • Print

Like this:

Like Loading...
← Older posts

Blog Stats

  • 2,627,361 hits

Google Translate

Archives

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 2,261 other subscribers
  • RSS - Posts
  • RSS - Comments

2016 Cry and Howl Conservative Blog Award

NRA Member

Ammo.com

Veterans’ Tales – A Forum for Veterans & Family Members of Vets

RSS Veterans’ Tales

  • An error has occurred; the feed is probably down. Try again later.

Wow!

WowMagazine

RSS Wow! Magazine — Recent Posts

  • An error has occurred; the feed is probably down. Try again later.

Blogroll

  • 1389 Blog – Counterjihad!
  • Bare Naked Islam
  • Be Sure You're RIGHT, Then Go Ahead
  • Boudica BPI Weblog
  • Cry and Howl
  • Fix Bayonets!
  • FREE NORTH CAROLINA
  • GRUMPY OPINIONS
  • Ike Jakson’s Blog
  • Legal Insurrection
  • LUPUS AND CHRONIC ILLNESS
  • Michelle Malkin
  • Old West Tales (Thoughts from Afar)
  • Pacific Paratrooper
  • PAJAMAS MEDIA
  • Political Clown Parade
  • Publius-Huldah’s Blog
  • Rifleman III Journal
  • The Acceptable Digest
  • The Christian Gazette
  • The Daily Rant
  • The Last Tradition
  • The Mad Jewess
  • The Religion of Peace

Ephesians 6:13

Therefore take up the whole armor of God, that you may be able to withstand in the evil day, and having done all, to stand firm.

Minds.com

Gab.ai – #SpeakFreely – Join Me

@PUMABydesign

Grumpy Opinions Conservative News and Opinions 2016

Grumpy Opinions Conservative News and Opinions 2016

Tweets

My Tweets

Creative Commons License

Creative Commons License
This work by PUMABydesign001's Blog is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Permissions beyond the scope of this license may be available at http://pumabydesign001.com/fair-use-notice/.

CREEPING SHARIA

SAY NO TO ONLINE CENSORSHIP

RSS Front Page Magazine

  • SVB Bailout Forces Americans to Pay Higher Fees to Bail Out Chinese Corps
  • Ex-Marine Shot in Terrorist Attack in Israel, Returns Fire
  • SF Dems Campaigned Against Gun Violence With Gang Member Who Killed 15-Year-Old
  • Elizabeth Warren Wants $10M FDIC Cap to Match Her Net Worth
  • Guilty
©2017 PUMABydesign001’s Blog.

RSS Lifezette

  • An Inconvenient Truth! Tucker Shreds January 6 Lies, Has The Receipts | Ep 527
  • Trump’s Message Needs To Focus On These Things | Biden Has Spent 40% of Term Away From WH | Ep 526
  • The Real Joe Biden, the Fake Pandemic and the Devastating Consequences
  • Time For Real Republicans to Stand Up!
  • War or Threat of War? Either Way It’s a Massive Money and Weapons Laundering Operation

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.com

Create a website or blog at WordPress.com

  • Follow Following
    • PUMABydesign001's Blog
    • Join 474 other followers
    • Already have a WordPress.com account? Log in now.
    • PUMABydesign001's Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...
 

    %d bloggers like this: