Tuesday, December 25, 2012

“We are no longer the land of the free”


An Objective Comparison of the U.S. to Regimes that Everyone Labels Repressive.

How Does America Compare to China, Iran, Saudi Arabia and Other Repressive Regimes?

Top constitutional law expert Jon Turley notes in a must-read Washington Post article called “We are no longer the land of the free” (I have edited slightly to remove parentheses in several places):
Americans often proclaim our nation as a symbol of freedom to the world while dismissing nations such as Cuba and China as categorically unfree. Yet, objectively, we may be only half right. Those countries do lack basic individual rights such as due process, placing them outside any reasonable definition of “free,” but the United States now has much more in common with such regimes than anyone may like to admit.
These countries also have constitutions that purport to guarantee freedoms and rights. But their governments have broad discretion in denying those rights and few real avenues for challenges by citizens — precisely the problem with the new laws in this country.
The list of powers acquired by the U.S. government since 9/11 puts us in rather troubling company.
Assassination of U.S. citizens
[The U.S. assassinates its own citizens.]
Nations such as Nigeria, Iran and Syria have been routinely criticized for extrajudicial killings of enemies of the state.
Indefinite detention
[The U.S. has passed a law allowing indefinite detention of American citizens.]
China recently codified a more limited detention law for its citizens, while countries such as Cambodia have been singled out by the United States for “prolonged detention.”
Arbitrary justice
The president now decides whether a person will receive a trial in the federal courts or in a military tribunal, a system that has been ridiculed around the world for lacking basic due process protections. Bush claimed this authority in 2001, and Obama has continued the practice. (Egypt and China have been denounced for maintaining separate military justice systems for selected defendants, including civilians.)
Warrantless searches
[The U.S. routinely conducts warrantless searches.]
Saudi Arabia and Pakistan operate under laws that allow the government to engage in widespread discretionary surveillance.
***
War crimes
[The U.S. has committed various war crimes, then refused to hold the actors to account.]
Various nations have resisted investigations of officials accused of war crimes and torture. Some, such as Serbia and Chile, eventually relented to comply with international law; countries that have denied independent investigations include Iran, Syria and China.
Secret court
[The U.S. uses secret courts under the guise of national security.]
Pakistan places national security surveillance under the unchecked powers of the military or intelligence services.
Immunity from judicial review
Like the Bush administration, the Obama administration has successfully pushed for immunity for companies that assist in warrantless surveillance of citizens, blocking the ability of citizens to challenge the violation of privacy. (Similarly, China has maintained sweeping immunity claims both inside and outside the country and routinely blocks lawsuits against private companies.)
Continual monitoring of citizens
The Obama administration has successfully defended its claim that it can use GPS devices to monitor every move of targeted citizens without securing any court order or review. It is not defending the power before the Supreme Court — a power described by Justice Anthony Kennedy as “Orwellian.” (Saudi Arabia has installed massive public surveillance systems, while Cuba is notorious for active monitoring of selected citizens.)
Extraordinary renditions
The government now has the ability to transfer both citizens and noncitizens to another country under a system known as extraordinary rendition, which has been denounced as using other countries, such as Syria, Saudi Arabia, Egypt and Pakistan, to torture suspects. The Obama administration says it is not continuing the abuses of this practice under Bush, but it insists on the unfettered right to order such transfers — including the possible transfer of U.S. citizens.
Professor Turley stresses the fact that it is the ability of powerful men to make arbitrary decisions which defines an authoritarian country:

An authoritarian nation is defined not just by the use of authoritarian powers, but by the ability to use them. If a president can take away your freedom or your life on his own authority, all rights become little more than a discretionary grant subject to executive will.
The framers lived under autocratic rule and understood this danger better than we do. James Madison famously warned that we needed a system that did not depend on the good intentions or motivations of our rulers: “If men were angels, no government would be necessary.”
In fact, we go from the land of the free to tyranny the moment we go from a nation of laws to a nation of powerful men arbitrarily making laws in secret.
Indeed, Bush and Obama have claimed some tyrannical powers that even Hitler and Stalin never claimed.
As I pointed out last month, many American leaders appear to be consciously copying China:
The American copyright bill is modeled after the Chinese system. As I noted Monday:
Given that Joe Lieberman said that America needs an internet kill switch like China, that the U.S. economy has turned socialist (at least for friends of those with control of the money spigot), and that the U.S. government used communist Chinese torture techniques specifically designed to produce false confessions in order to sell the Iraq war, I guess that the bill’s Chinese-style censorship is not entirely surprising.

---------------------------------------------------

Here's the original Turley 1/13/12 article from the Washington Post at:
http://www.washingtonpost.com/opinions/is-the-united-states-still-the-land-of-the-free/2012/01/04/gIQAvcD1wP_print.html

10 reasons the U.S. is no longer the land of the free
By Jonathan Turley, Published: January 13
Every year, the State Department issues reports on individual rights in other countries, monitoring the passage of restrictive laws and regulations around the world. Iran, for example, has been criticized for denying fair public trials and limiting privacy, while Russia has been taken to task for undermining due process. Other countries have been condemned for the use of secret evidence and torture.
Even as we pass judgment on countries we consider unfree, Americans remain confident that any definition of a free nation must include their own — the land of free. Yet, the laws and practices of the land should shake that confidence. In the decade since Sept. 11, 2001, this country has comprehensively reduced civil liberties in the name of an expanded security state. The most recent example of this was the National Defense Authorization Act, signed Dec. 31, which allows for the indefinite detention of citizens. At what point does the reduction of individual rights in our country change how we define ourselves?
While each new national security power Washington has embraced was controversial when enacted, they are often discussed in isolation. But they don’t operate in isolation. They form a mosaic of powers under which our country could be considered, at least in part, authoritarian. Americans often proclaim our nation as a symbol of freedom to the world while dismissing nations such as Cuba and China as categorically unfree. Yet, objectively, we may be only half right. Those countries do lack basic individual rights such as due process, placing them outside any reasonable definition of “free,” but the United States now has much more in common with such regimes than anyone may like to admit.
These countries also have constitutions that purport to guarantee freedoms and rights. But their governments have broad discretion in denying those rights and few real avenues for challenges by citizens — precisely the problem with the new laws in this country.
The list of powers acquired by the U.S. government since 9/11 puts us in rather troubling company.
Assassination of U.S. citizens
President Obama has claimed, as President George W. Bush did before him, the right to order the killing of any citizen considered a terrorist or an abettor of terrorism. Last year, he approved the killing of U.S. citizen Anwar al-Awlaqi and another citizen under this claimed inherent authority. Last month, administration officials affirmed that power, stating that the president can order the assassination of any citizen whom he considers allied with terrorists. (Nations such as Nigeria, Iran and Syria have been routinely criticized for extrajudicial killings of enemies of the state.)
Indefinite detention
Under the law signed last month, terrorism suspects are to be held by the military; the president also has the authority to indefinitely detain citizens accused of terrorism. While the administration claims that this provision only codified existing law, experts widely contest this view, and the administration has opposed efforts to challenge such authority in federal courts. The government continues to claim the right to strip citizens of legal protections based on its sole discretion. (China recently codified a more limited detention law for its citizens, while countries such as Cambodia have been singled out by the United States for “prolonged detention.”)
Arbitrary justice
The president now decides whether a person will receive a trial in the federal courts or in a military tribunal, a system that has been ridiculed around the world for lacking basic due process protections. Bush claimed this authority in 2001, and Obama has continued the practice. (Egypt and China have been denounced for maintaining separate military justice systems for selected defendants, including civilians.)
Warrantless searches
The president may now order warrantless surveillance, including a new capability to force companies and organizations to turn over information on citizens’ finances, communications and associations. Bush acquired this sweeping power under the Patriot Act in 2001, and in 2011, Obama extended the power, including searches of everything from business documents to library records. The government can use “national security letters” to demand, without probable cause, that organizations turn over information on citizens — and order them not to reveal the disclosure to the affected party. (Saudi Arabia and Pakistan operate under laws that allow the government to engage in widespread discretionary surveillance.)
Secret evidence
The government now routinely uses secret evidence to detain individuals and employs secret evidence in federal and military courts. It also forces the dismissal of cases against the United States by simply filing declarations that the cases would make the government reveal classified information that would harm national security — a claim made in a variety of privacy lawsuits and largely accepted by federal judges without question. Even legal opinions, cited as the basis for the government’s actions under the Bush and Obama administrations, have been classified. This allows the government to claim secret legal arguments to support secret proceedings using secret evidence. In addition, some cases never make it to court at all. The federal courts routinely deny constitutional challenges to policies and programs under a narrow definition of standing to bring a case.
War crimes
The world clamored for prosecutions of those responsible for waterboarding terrorism suspects during the Bush administration, but the Obama administration said in 2009 that it would not allow CIA employees to be investigated or prosecuted for such actions. This gutted not just treaty obligations but the Nuremberg principles of international law. When courts in countries such as Spain moved to investigate Bush officials for war crimes, the Obama administration reportedly urged foreign officials not to allow such cases to proceed, despite the fact that the United States has long claimed the same authority with regard to alleged war criminals in other countries. (Various nations have resisted investigations of officials accused of war crimes and torture. Some, such as Serbia and Chile, eventually relented to comply with international law; countries that have denied independent investigations include Iran, Syria and China.)
Secret court
The government has increased its use of the secret Foreign Intelligence Surveillance Court, which has expanded its secret warrants to include individuals deemed to be aiding or abetting hostile foreign governments or organizations. In 2011, Obama renewed these powers, including allowing secret searches of individuals who are not part of an identifiable terrorist group. The administration has asserted the right to ignore congressional limits on such surveillance. (Pakistan places national security surveillance under the unchecked powers of the military or intelligence services.)
Immunity from judicial review
Like the Bush administration, the Obama administration has successfully pushed for immunity for companies that assist in warrantless surveillance of citizens, blocking the ability of citizens to challenge the violation of privacy. (Similarly, China has maintained sweeping immunity claims both inside and outside the country and routinely blocks lawsuits against private companies.)
Continual monitoring of citizens
The Obama administration has successfully defended its claim that it can use GPS devices to monitor every move of targeted citizens without securing any court order or review. (Saudi Arabia has installed massive public surveillance systems, while Cuba is notorious for active monitoring of selected citizens.)
Extraordinary renditions
The government now has the ability to transfer both citizens and noncitizens to another country under a system known as extraordinary rendition, which has been denounced as using other countries, such as Syria, Saudi Arabia, Egypt and Pakistan, to torture suspects. The Obama administration says it is not continuing the abuses of this practice under Bush, but it insists on the unfettered right to order such transfers — including the possible transfer of U.S. citizens.

These new laws have come with an infusion of money into an expanded security system on the state and federal levels, including more public surveillance cameras, tens of thousands of security personnel and a massive expansion of a terrorist-chasing bureaucracy.
Some politicians shrug and say these increased powers are merely a response to the times we live in. Thus, Sen. Lindsey Graham (R-S.C.) could declare in an interview last spring without objection that “free speech is a great idea, but we’re in a war.” Of course, terrorism will never “surrender” and end this particular “war.”
Other politicians rationalize that, while such powers may exist, it really comes down to how they are used. This is a common response by liberals who cannot bring themselves to denounce Obama as they did Bush. Sen. Carl Levin (D-Mich.), for instance, has insisted that Congress is not making any decision on indefinite detention: “That is a decision which we leave where it belongs — in the executive branch.”
And in a signing statement with the defense authorization bill, Obama said he does not intend to use the latest power to indefinitely imprison citizens. Yet, he still accepted the power as a sort of regretful autocrat.
An authoritarian nation is defined not just by the use of authoritarian powers, but by the ability to use them. If a president can take away your freedom or your life on his own authority, all rights become little more than a discretionary grant subject to executive will.
The framers lived under autocratic rule and understood this danger better than we do. James Madison famously warned that we needed a system that did not depend on the good intentions or motivations of our rulers: “If men were angels, no government would be necessary.”
Benjamin Franklin was more direct. In 1787, a Mrs. Powel confronted Franklin after the signing of the Constitution and asked, “Well, Doctor, what have we got — a republic or a monarchy?” His response was a bit chilling: “A republic, Madam, if you can keep it.”
Since 9/11, we have created the very government the framers feared: a government with sweeping and largely unchecked powers resting on the hope that they will be used wisely.
The indefinite-detention provision in the defense authorization bill seemed to many civil libertarians like a betrayal by Obama. While the president had promised to veto the law over that provision, Levin, a sponsor of the bill, disclosed on the Senate floor that it was in fact the White House that approved the removal of any exception for citizens from indefinite detention.
Dishonesty from politicians is nothing new for Americans. The real question is whether we are lying to ourselves when we call this country the land of the free.

Jonathan Turley is the Shapiro professor of public interest law at George Washington University.

Thursday, November 1, 2012

Nutrasweet and Equal, masquerading as a safe double for sugar


Nutrasweet and Equal, (aka Monsanto’s Aspartame) a dangerous chemical sugar substitute masquerading as a safe double for sugar, is all to carelessly used in many diet sugar-free foods and drink. Implying that this form of sweet poison is better for your health and your weight, while in reality, nothing could be further from the truth, and is a blatant criminal offense being perpetrated upon unsuspecting consumers. 

This continuing chemical assault on our health throughout our food-supply may explain why this nation is alarmingly riddled in degenerative diseases, including cancer, now in epidemic dimensions. The facts are that many dangerous additives to our food supply are being employed without our knowledge, and hidden and covered-up by our government and medical industry, who wallow in the financial rewards of sick desperate Americans reduced to disappointing dangerous radiation and chemo-therapy(chemical) cures. 


Reports of Aspartame being classified as a carcinogen are difficult to uncover now, and a cover-up of the facts must be assumed. http://alturl.com/f4jhg


Govt. intervention (aka Donald Rumsfeld, former Secy. of Defense) a major investor in Monsanto’s dangerous chemical Aspartame, was able to side-step the FDA’s initial rejection of this dangerous chemical. Aspartame (aka Nutrasweet and Equal) has since been unleashed upon the American population as if it were a safe and tested pixie dust.


Read bout Rumsfeld’s criminal role in getting this poison approved within our food supply… http://alturl.com/8ox73


Look for our soon to be released report and latest guide to preventing disease dedicated to a long and healthy life instead of the never-ending research to discover an illusive cure for the all-to-many disease stricken Americans that are literally being politicized to death.  And, we’ve uncovered a cutting edge Litmus-Hydrion in-home-self-test-kit to quickly determine your immediate risk to degenerative diseases such as cancer. A true breakthrough in medical science. Many alternatives will be revealed in our upcoming publication............. 
            
                                        "CHEATING DEATH”®

It’s not a diet but a dedicated discovery to a disease-free way of life minus all the fluff and poison we’ve been receiving from unscrupulous marketers and government cronies. Our goal is the simple prevention of disease before the fact, rather than to suffer the indignity, pain, and health destruction, of immune depleting, death inducing so-called cures, after the fact

Sunday, May 20, 2012

Nine Major Ways Criminals Use Facebook

1. Hacking Account
When criminals hack a Facebook account, they typically use one of several available “brute force” tools, Grayson Milbourne, Webroot’s Manager of Threat Research for North America, told 24/7 Wall St. in an interview. These tools cycle through a common password dictionary, and try commonly used names and dates, opposite hundreds of thousands of different email IDs. Once hacked, an account can be commandeered and used as a platform to deliver spam, or — more commonly — sold. Clandestine hacker forums are crawling with ads offering Facebook account IDs and passwords in exchange for money. In the cyber world, information is a valuable thing.
2. Commandeering Accounts
A more direct form of identity theft, commandeering occurs when the criminal logs on to an existing user account using an illegally obtained ID and password. Once they are online, they have the victim’s entire friend list at their disposal and a trusted cyber-identity. The impostor can use this identity for a variety of confidence schemes, including the popular, London scam in which the fraudster claims to be stranded overseas and in need of money to make it home. The London scam has a far-higher success rate on Facebook — and specifically on commandeered accounts — because there is a baseline of trust between the users and those on their friends list.   


See...Everyone's Guide to Email, Internet, and Wireless Security
3. Profile Cloning
Profile cloning is the act of using unprotected images and information to create a Facebook account with the same name and details of an existing user. The cloner will then send friend requests to all of the victim’s contacts. These contacts will likely accept the cloner as a friend since the request appears to be from someone they’re familiar with. Once accepted, the crook has access to the target’s personal information, which they can use to clone other profiles or to commit fraud. As Grayson Milbourne puts it, “Exploiting a person’s account and posturing as that person is just another clever mechanism to use to extract information.” Perhaps what’s scariest about this kind of crime is its simplicity. Hacking acumen is unnecessary to clone a profile; the criminal simply needs a registered account.
4. Cross-Platform Profile Cloning
Cross-platform profile cloning is when the cyber criminal obtains information and images from Facebook and uses them to create false profiles on another social-networking site, or vice versa. The principle is similar to profile cloning, but this kind of fraud can give Facebook users a false sense of security because their profile is often cloned to a social platform that they might not use. The result is that this kind of fraud may also take longer to notice and remedy.
5. Phishing
Phishing on Facebook involves a hacker posing as a respected individual or organization and asking for personal data, usually via a wall post or direct message. Once clicked, the link infects the users’ computers with malware or directs them to a website that offers a compelling reason to divulge sensitive information. A classic example would be a site that congratulates the victims for having won $1,000 and prompts them to fill out a form that asks for a credit card and Social Security number. Such information can be used to perpetrate monetary and identity fraud. Grayson Milbourne of Webroot, also explained that spearphishing is becoming increasingly common, a practice that uses the same basic idea but targets users through their individual interests.
6. Fake Facebook
A common form of phishing is the fake Facebook scam. The scammers direct users via some sort of clickable enticement, to a spurious Facebook log-in page designed to look like the real thing. When the victims enter their usernames and passwords, they are collected in a database, which the scammer often will sell. Once scammers have purchased a user’s information, they can take advantage of their assumed identity through apps like Facebook Marketplace and buy and sell a laundry list of goods and services. Posing as a reputable user lets the scammer capitalize on the trust that person has earned by selling fake goods and services or promoting brands they have been paid to advertise.
7. Affinity Fraud
In cases of affinity fraud, con artists assume the identity of individuals in order to earn the trust of those close to them. The criminal then exploits this trust by stealing money or information. Facebook facilitates this type of fraud because people on the site often end up having a number of “friends” they actually do not know personally and yet implicitly trust by dint of their Facebook connection. Criminals can infiltrate a person’s group of friends and then offer someone deals or investments that are part of a scheme. People can also assume an identity by infiltrating a person’s account and asking friends for money or sensitive information like a Social Security or credit card number.


See....Network Security Bible


8. Mining Unprotected Info
Few sites provide an easier source of basic personal information than Facebook. While it is possible to keep all personal information on Facebook private, users frequently reveal their emails, phone numbers, addresses, birth dates and other pieces of private data. As security experts and hackers know, this kind of information is often used as passwords or as answers to secret security questions. While the majority of unprotected information is mined for targeted advertising, it can be a means to more pernicious ends such as profile cloning and, ultimately, identity theft.
9. Spam
Not all spam — the mass sending of advertisements to users’ personal accounts — is against the law. However, the existence of Facebook and other social sites has allowed for a new kind of spam called clickjacking. The process of clickjacking, which is illegal, involves the hacking of a personal account using an advertisement for a viral video or article. Once the user clicks on this, the program sends an advertisement to the person’s friends through their account without their knowledge. This has become such an issue for the social media giant that earlier this year that the company has teamed up with the U.S. Attorney General to try to combat the issue.
See....Computer Security Basics

Tuesday, May 1, 2012

Genetically modified crops' results raise concern.


 Genetically modified crops' results raise concern.
April 30, 2012, San Francisco Chronicle (San Francisco's leading newspaper) 
Biotechnology's promise to feed the world did not anticipate "Trojan corn," "super weeds" and the disappearance of monarch butterflies. In the Midwest and South - blanketed by more than 170 million acres of genetically engineered corn, soybeans and cotton - an experiment begun in 1996 with approval of the first commercial genetically modified organisms is producing questionable results. Those results include vast increases in herbicide use that have created impervious weeds now infesting millions of acres of cropland, while decimating other plants, such as milkweeds that sustain the monarch butterflies. More than a million people have signed a petition to the Food and Drug Administration to require labeling of genetically engineered food. The stakes on labeling such foods are huge. The crops are so widespread that an estimated 70 percent of U.S. processed foods contain engineered genes. The U.S. Department of Agriculture has approved more than 80 genetically engineered crops while denying none. Genetically engineered crops ... have spawned an infestation of "super weeds" now covering at least 13 million acres in 26 states. The crops led to a 400-million-pound net increase in herbicide applications. Dave Mortensen, a weed ecologist at Pennsylvania State University, said the number of "super weed" species grew from one in 1996 ... to 22 today. Last month, scientists definitively tied heavy use of glyphosate to an 81 percent decline in the monarch butterfly population. It turns out that the herbicide has obliterated the milkweeds on Midwest corn farms where the monarchs lay their eggs after migrating from Mexico. Iowa State University ecologist John Pleasants, one of the study's authors, said the catastrophic decline in monarchs is a consequence of the genetically engineered crops that no one foresaw.
Note: Multiple reliable sources have shown that you may be eating genetically modified food daily which scientific experiments have repeatedly demonstrated can cause sickness and even death in lab animals. For key reports from major media sources on hidden facts on the dangers of genetically modified food, click here.
S.F. Chronicle article.........  

Monday, April 23, 2012

Your privacy at stake….

April 30, 2012
What Congress’ latest intrusive Internet bill would mean to you.
The “Cyber Intelligence Sharing and Protection Act” (CISPA)
would usher in a new era of information sharing between companies and government agencies — with limited oversight and privacy safeguards.


Rep. Ron Paul, the Texas Republican and presidential candidate, warned on April 23 that CISPA represents the “latest assault on Internet freedom” and was “Big Brother writ large.” And 18 Democratic House members signed a letter the same day warning that CISPA “does not include necessary safeguards” and that critics have raised “real and serious privacy concerns.”
In February, Facebook VP Joel Kaplan wrote an enthusiastic letter to Rep. Mike Rogers (R-Mich.), the chairman of the House Intelligence Committee to “commend”and support  them on CISPA Bill, which he said “removes burdensome rules for online service providers that currently can inhibit protection of the cyber ecosystem.”
However, by mid-April,, Facebook had been forced on the defensive, with Kaplan now assuring users that his employer has “no intention” of sharing users’ personal data with the Feds and that section is “unrelated to the things we liked” about CISPA in the first place. (A Demand Progress campaign says: “Internet users were able to push GoDaddy to withdraw its support of SOPA. Now it’s time to make sure Facebook knows we’re furious.”)  Read more…  http://alturl.com/c37jn
                                                         


                            PICKING YOUR POCKET!

What began as a cleverly designed electronic chip to track shipments and inventory control of merchandise to WalMart, and other BigBox stores has now criminally evolved.  This same Radio Frequency IDentification (RFID) chip is being used to electronically pick your pocket without ever touching or coming in contact with you and other unsuspecting Americans as they shop, or just go about their daily business-as-usual schedule.

Criminals are using this RFID technology to scan items we carry on our own physical person, such as our driver’s license, credit cards, and passport as we merely pass by.
What you may not realize yet is that the Government has covertly embedding these RFID microchips in these bank & government issued items in an attempt to track you, your purchases, and your habits. 

According to RFID Journal (an industry trade magazine) Radio Frequency Identification is a technology that connects RFID tagged objects, and shipments to the internet, so they may be tracked.

As an example, touchless credit cards are being used more frequently by credit card companies since it makes purchases quicker. You simply float your credit card above a touchless-equipped reader and your payment is made. It’s faster that swiping your card. However, it also makes theft of your most confidential information fast and easy, and without your immediate knowledge.

Since this technology employ’s scanning information that is floating on radio waves, any electronic reader tuned-in, and within short range can capture your data. That’s simply all that these touchless pickpockets really do.  A practical demonstrations by security experts reveals how a pickpocket can connect a touchless credit-card reader to a small notebook computer or smartphone, and easily “steal” credit-card information right through a purse or pants-pocket by just walking past an unsuspecting victim. Let me repeat that………. ”A thief can steal your most sensitive information by simply passing close by.”

Armed with your stolen information, the crook can create a fake credit card, or easily use the information collected to make purchases online, and in some instances, raid your bank account. Last year identity thieves stole $18 billion from unprotected americans.
Picture a crook going to a sports game, a movie theater, or the mall on a busy day, he could steal thousands of credit-card’s without ever being detected. The threat exists with your driver’s license and passport.
       
                                                                                What is your best defense?

You could attempt to destroy the RFID chip embedded within your cards, but it’s not advisable with your government issued RFID documents, because it could come with a penalty.

Your best options are to wrap the cards in aluminum foil to block the radio signals, but it is always a hassle to keep unwrapping your cards purchase after purchase, day after day.
There are better, and much safer alternatives such as retiring your old leather wallet for one of the new stylish wallets designed to block the radio signals from RFID chips. This will prevent theft of your sensitive information while in your pocket or purse.
And, the US State Department recommends using such wallets to protect your passport information.

You can find a stylish selection, and color coordinates of economical protective "RFID" blocking wallets and card holders available at Amazon….  RFID PROTECTIVE CARD HOLDERS & WALLETS..

Wednesday, April 11, 2012

Thieves love to steal smartphones.

(CBS News) - Americans love to use smartphones, and thieves love to steal them. Why? Because there's a growing black market for these expensive devices. But now, cellphone carriers and the government are fighting back.
Sen. Chuck Schumer, D-NY, said, "iPhone and smart phones nowadays are like catnip for criminals. They've valuable, they're exposed. They're easy to steal."
Schumer will introduce legislation that would make it a federal crime to tamper with a cell phone's unique identification number, punishable by up to five years in prison.
Read the whole story...   http://alturl.com/ov45t
Take charge of your online security with some great tips from Amazon....  http://amzn.to/GIAXV1

Continued……………>

Thursday, March 29, 2012

NEW ONLINE SECURITY THREATS!



NEW SECURITY THREAT! Is there no end? It’s reported by watchdog Katherine Hunt, that those innocent looking QR (quick response) bar codes, the one that looks like a small square checkerboard pattern that appear in ads, and can be scanned for text messages with a smartphone camera, may have serious unsuspecting security consequences…

It seems that scammers are developing and placing QR bar codes that steal your ID information from your smartphone, and also may urge you to call a phone number that places huge charge$ on your account. Some cybercriminals are even sticking fake QR code labels over legitimate ones.



Enhanced Online Security Has Become Mandatory!
Last year identity thieves stole $18 billion from unprotected americans, and are now hacking into, and looting our personal bank accounts. Don’t you become a victim. There are measures you can install now. You must protect your online security at all cost. Doing nothing can easily become a horrible disaster that you could have prevented.
Please take a moment to view the collection of great tips & references on security measures you can, and should install for your ultimate internet protection and piece of mind. Go to Internet Security at Amazon….  http://amzn.to/GIAXV1


Below is a very small microcosm  of scamming complaints to be aware of recently received by the Better Business Bureau (BBB) of America.

AmEx's "Thanks for Updating Your Email" Messages are Fakes…….
American Express card holders beware! Scammers are using the credit card company's email address for a phishing scam. Consumers nationwide reported receiving fake emails informing them that their account's email address has been changed.
What does the email look like?
These scam emails are remarkably sophisticated. Not only do they use the American Express logo, they copy the business's email design and color scheme. The fake messages even contain footer links labeled "View Our Privacy Policy" and "Contact Customer Service."
The message informs recipients that the email address on their American Express account has been changed and provides a link to where they can log in and correct the address. The link, along with the ones in the email footer, actually leads to a third-party website that downloads a virus on users' computers.



Ignore that Text! You Didn't Win a Walmart Gift Card:
Cell phone users across the country are receiving suspicious text messages that claim to be from Walmart. The texts tell consumers they won a free gift card... and all they have to do is click a link and enter some information. 

Unfortunately, there is no gift card. It's a scam to steal your credit card number and other personal info.


Electronic Pickpocketing: Are your Credit Cards at Risk?
New technology now allows criminals to steal your credit card information by passing an RFID (Radio Frequency Identification) reader near your wallet or purse.
Stealing a physical wallet is a thing of the past-new technology now allows criminals to steal your credit card information by passing an RFID (Radio Frequency Identification) reader near your wallet or purse.
RFID is a small chip that contains information like the credit card number and expiration date. These chips are used in one third of the total credit cards in the US; consumers can wave their card in front of a RFID reader and the credit card information is transmitted to the merchant.  This makes purchasing simple, but it also makes pick pocketing just as easy.
RFID readers are easily purchased, so criminals have access to your credit card numbers and expiration dates.
Using the information they obtain from your credit card, they are able to make duplicate cards to make other purchases.
BBB recommends the following tips to protect yourself:
 *   Put some sort a metal around your card such as aluminum foil
 *   Buy a protective sleeve or wallet from Amazon Security link.
 *   Ask your bank to send you a card that does not contain an RFID chip
If you believe you are a victim of identity theft, contact the Federal Trade Commission for an Identity Theft Kit. You can also contact the Better Business Bureau at 509-455-4200 if you have any questions.

Online Dating Scams:
Are you thinking --- who would ever do online dating? More people than you think. In fact, millions of Americans use dating sites, social networking sites, and chat room to meet people.

It does work. In fact, one out of five relationships starts online. I know professional people who used online dating; it resulted in marriage.


But as with anything, you have to be careful so you are not scammed. On the Internet, it’s easy to pretend to be someone you are not. Are you really friends with all of your “friends” on Facebook? 
Do you have a lot of personal information on a dating site? With so much information about you online, a scammer can sound like they know you.

They create fake profiles to build online relationships, and eventually convince people to send money in the name of love. Some even make wedding plans before disappearing with the money.


OnGuardOnline.gov       has some great tips to help you avoid scams. Be wary if your “sweetheart” does the following:
  Suggests leaving the dating site immediately and use personal email
  Moves the relationship along too quickly
  Claims to be a U.S. citizen who travels out of the country frequently
  Plans to visit, but has to cancel plans due to personal problems, including money
First and foremost do not wire money to your newly discovered “attraction” to cover:

  travel
  medical emergencies
  hotel bills
  hospital bills for a child or other relative
  visas or other official documents
  losses from a temporary financial setback
  losses from a mugging or robbery