• About Elkhart County Grassroots Hub

Elkhart County Grassroots Hub

Elkhart County Grassroots Hub

Category Archives: Internet Privacy

When LIARS lead…

10 Monday Sep 2012

Posted by HattieBelle in Campaign, Censorship, Civil Rights, Communist, Constitution, Corruption, Cronyism, Eavedropping, Executive Order, Facism, Fascism, Firearms, Freedom, Fusion Centers, Independence, Internet Privacy, Liberty, Martial Law, McCain Cybersecurity Act, Patriot, Politics, Principles, Property Rights, Protect your privacy, Socialism, WHY Truth Matters

≈ 1 Comment

Tags

Bill of Rights, Cold War, Constitution, Don, Don't Tread on Me, East Germany, Fascism, Freedom, German Democratic Republic - East Germany, Germany, History, Lying Unacceptable, Patriot, Politics of Germany, Tea Party, TRUTH, United State

If the truth is what sets us free, what does it mean to live in a society where truth is absent?

The danger to America is not a single politician with ill intent. Or even a group of them. The most dangerous thing any nation faces is a citizenry capable of trusting a liar to lead them.

“Almost all current events in the affairs of governments and nations have their parallels and precedents in the past,” American President Harry Truman wrote, “without an understanding of history, we are doomed to repeat our collective past.” Has any leader’s lies from the past dramatically shaped people’s destiny?

The Nazi’s, who comprised less than 10% of the German population, compelled millions of people to head for gas chambers in a docile manner. 10 MILLION PEOPLE! How did they do THAT? The Nazis were overwhelmingly outnumbered. They could easily have been overpowered. Why didn’t people resist?

The answer is breathtakingly simple. It is a method still being used by some elected leaders to achieve various goals today.

THEY LIED.

Adolf Eichmann, known as “The Master”, set about implementing the “Final Solution” as if he were the president of a multinational corporation. His intricate stories, were designed to ensure the cooperation of the condemned (but unknowing) Jews. Accompanied by an entourage of no more than thirty local men — mostly unarmed -Eichmann would address the crowd in a strong, clear voice.

This is what he said:

“Jews: At last, it can be reported to you that the Russians are advancing on our eastern front. I apologize for the hasty way we brought you into our protection. Unfortunately, there was little time to explain. You have nothing to worry about. We want only the best for you. You will leave here shortly and be sent to very fine places indeed. You will work there, your wives will stay at home, and your children will go to school. You will have wonderful lives. We will all be terrible crowded on the trains, but the journey is short. Men? Please keep your families together and board the railcars in an orderly manner. Quickly now, my friends, we must hurry!”

Auschwitz concentration camp, arrival of Hunga...

Auschwitz concentration camp, arrival of Hungarian Jews, Summer 1944 (Photo credit: Wikipedia)

The Jewish husbands and fathers were relieved by the explanation and comforted by the fact that there weren’t more armed soldiers. Fear of “heinous Russian Communists” had been pounded over the media to the masses for months. Relieved that the authorities were looking out for their best interests, grown, strong men, who could have resisted, instead trustingly helped their families into the rail cars. The containers, designed to transport eight cows, were each packed with a minimum of one hundred human beings and quickly padlocked.

At that moment, they were lost.

“If a nation expects to be ignorant and free,” said Thomas Jefferson, “. . . . The people cannot be safe without information. Where the press is free, and every man able to read, all is safe.”

History shows that any people who are sheep-like in following their leadership (so long as their personal self-interests are satisfied) may one day awaken to find that their nation has changed in dramatic ways.

-Do YOU think lying to get elected is acceptable? Especially when you believe the candidate’s intention is to get elected to do GOOD WORKS?

-Who are the “good guys” and who are the “bad guys”?

-Would truth be a starting point for telling the difference?

-What is our nation’s course? Do you believe that one can determine a probable destination by examining the direction in which we are traveling? Where are we headed?

The only way to know a person who aspires to lead us is to listen to what he says and watch what he does. Frankly, what I think of any current or past leader of the United States is irrelevant. The questions most important to YOU in regard to this subject should be: What criteria do YOU use?

It doesn’t take MANY people to lead a nation in a direction that has serious repercussions on the liberty of OTHERS. Indeed, it has happened, here, in the United States. We have given up liberties for various reasons. WE MAY NEVER GET THEM BACK. And, things could turn even WORSE very rapidly.

Is SOMEONE lying to our country right now?

YOU get to answer that for yourself. My point is that each of us must STOP blindly believing everything someone with an agenda says.

TODAY WITH THE ADVENT OF THE INTERNET’S SEARCH ENGINES, it is simple to verify a politicians voting record, see videos of the politician on youtube to check out the politician’s consistency and whether or not he or she keeps his or her promises.

We MUST do our best to change our country’s direction and to put the best people possible in office. People who will DO what they believe is RIGHT and TRUE.

Knowing is not enough; we must apply. Being willing is not enough; we MUST DO. ~Leonardo DeVinci

Your life, the lives of your children and the lives of your grandchildren may depend upon you demanding THE TRUTH and NOTHING LESS.


Related articles
  • Why Do We Let Politicians Get Away With Lying? (outsidethebeltway.com)
  • A Tidal Wave of Political Liars Lying (jonrappoport.wordpress.com)
  • Partisan Politics: Dems and Reps Both Say It’s OK For Their Politicians to Lie to Get Elected (reason.com)
  • The Propaganda Society (mike10613.wordpress.com)
  • HR 5736 – A Bill to Establish An Orwellian Truth Ministry (independentsentinel.com)
  • Astonishing Parallels: Nazi Rhetoric and James Dobson (biblethumpingliberal.com)
  • Russian Journalist Exposes Propaganda Lies about Houla Massacre (sjlendman.blogspot.com)
  • Why Don’t the Corrupt Players On Wall Street and In D.C. Show Remorse for Their Destructive Actions … And Why Don’t We Stop Them? (washingtonsblog.com)

A second Civil War?

04 Tuesday Sep 2012

Posted by HattieBelle in Civil Rights, Eavedropping, Economic Collapse, Executive Order, Fascism, Government Stockpiling Ammunition, Internet Privacy, Invasion of Privacy, Martial Law, McCain Cybersecurity Act, Police, Warrantless Eavesdropping

≈ 3 Comments

Tags

Civil War, Federal Emergency Management Agency, Government Agencies, Government Overreach, Martial Law, Operation Garden Plot, Pentagon, Rex 84, United States, White House

Is the U.S. preparing for a civil war?

The internet is awash with reports of government agencies stockpiling weapons and medical supplies in the face of looming domestic unrest — but is there any truth behind the rumors? Why do some people believe the U.S. is preparing for civil war?

SOURCES referenced in the video:

Rex 84: Government Silently Positions for Martial Law as Financial Collapse Arrives in America

`JCS Conplan 0300-97,’ begun in the Bush/Cheney era, authorizes the Pentagon to employ special, ultra secret `anti-terrorist’ military units on American soil to arrest or kill citizens at home and is complete with a mammoth budget, commando units, hit squads, spies, mercenary forces, intelligence gathering and analysis, and a direct line to the White House.

OPERATION GARDEN PLOT, Just do a search to bring up several PDF’s (they were updated and changed through the years).

FBI Index: ADEX List

The Rise of the National Security State: FEMA and the NSC

Top Secret Pentagon Operation “Granite Shadow” revealed. Today in DC: Commandos in the Streets?

Related articles
  • Government Silently Positions for Martial Law as Financial Collapse Arrives in America (johnmalcolm.me)

Op-Doc: ‘The Program’ (Stellar Wind)

26 Sunday Aug 2012

Posted by HattieBelle in American, Civil Rights, Controlled, Department of Homeland Security, Eavedropping, Electronic Communication, Fascism, Fusion Centers, Indiana, Internet Privacy, Invasion of Privacy, Martial Law, Spying

≈ 3 Comments

Tags

Federal Bureau of Investigation, George W. Bush, John Ashcroft, Laura Poitras, NSA, Stellar Wind, United States, United States Department of Justice

A short (8:27) documentary by Laura Poitras DEFINITELY worth your time:

Stellar Wind Routinely eavesdropped on politicians and journalists…

The Stellar Wind program was considered so illegal by the Justice Department and FBI agents who knew about it, there was a belief that then-Attorney General John Ashcroft would be indicted for allowing the interception program to operate. Known also as the “Terrorist Surveillance Program,” the warrantless wiretapping was authorized by President George W. Bush in the wake of 9/11 and had to be recertified every 45 days. In March 2004, Deputy Attorney General James Comey, upon the determination of the Justice Department’s Office of Legal Counsel, decided that certification would not occur because the program was deemed illegal.

How many “Stellar Wind/Fusion Spy Centers” exist? Read, TOP SECRET AMERICA/A Washington Post Investigation. The report (which is shocking) determines that the “secret world” the government created has become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work.

About the “Indiana Intelligence Fusion Center” HERE.

The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say) Article by WIRED HERE

Privacy Is Not Secrecy; Debunking The ‘If You’ve Got Nothing To Hide…’ Argument Article by TechDirt HERE

Children’s websites gather addresses and activity data…even ask kids to upload photographs…

23 Thursday Aug 2012

Posted by HattieBelle in Children's Online Privacy Protection Act, Eavedropping, Internet, Internet Privacy, Parental Online Supervision, Privacy, Private Web Surfing, Spying, Spying on Children, Websites Use Kids to Collect Information

≈ Leave a comment

Tags

Child Abuse, Children, Children's Safety, Corporate Intrusion, Eavedropping, Family Privacy, Internet Privacy, Intrusion, Online Dangers, Parent's Responsibility, Parental Supervision, Safe Online Use, Spying, Spying on Children, Websites Upload Children's Pictures, Websites Use Kids to Gather Information

The law, the Children’s Online Privacy Protection Act, requires Web site operators to obtain verifiable consent from parents before collecting personal information about children under age 13.

But as with any law, there are apparent loopholes that allow sites to collect some information, and that it what spurred a coalition of nearly 20 US children’s advocacy, health and public interest groups to file a complaint with the Federal Trade Commission on Wednesday.

The NYT reports that among the websites named in the complaint are McDonald’s HappyMeal.com; Nickelodeon’ Nick.com; General Mills’ and TrixWorld.com; SubwayKids.com; and Turner’s CartoonNetwork.com.

They stand accused of offering children games to play online, then asking them to “tell a friend” by providing the email of their friends – effectively bypassing the aforementioned law. Also, some of them have allegedly been tracking children’s activities online and asking them to to upload their photographs.

Many of the companies who run those sites commented on their practices by saying that they are within the bounds of the law, and some of them said that they would be investigating the allegations.

It remains to be seen what the FTC will conclude after the investigation.

By asking children to register with the site, join a kids’ club, enter a contest, or fill out a questionnaire, these sites can compile names, addresses, favorite activities and commercial products. This information then is used to create customer lists, which may be sold to brokers who, in turn, sell them to other businesses.

MORE about how your child’s data is TRACKED online:

On the Web, Children Face Intensive Tracking/WSJ

Children More Intensively Spied Upon than Adults/Bloomberg

Children’s data is intensely tracked online/ArticleBase

2 General Mills Websites accused of collecting kid’s data/Star Tribune

Your Indiana Representative’s Constitutional Report Card…

09 Thursday Aug 2012

Posted by HattieBelle in 2012 Election, Affordable Care Act, Audit the Fed, Bailouts, Bill of Rights, CISPA, Constitution, Debt, Democrat, Eavedropping, economy, Elkhart County, Federal Reserve, House of Representatives, Indiana, Internet Privacy, Marlin Stutzman, Mike Pence, Obamacare, Republican

≈ Leave a comment

Tags

Andre Carson, Anti-Freedom. Stimulus, Audit the Fed, CISPA, Congress, Dan Burton, Extended Patriot Act, Grades, House of Representatives, Indiana Representatives, Joe Donnelly, Larry Buschon, Marlin Stutzman, Mike Pence, NDAA, OBAMACARE, Pete Visclosky, Pro-Freedom, Raised Debt Ceiling, Report Cards, Stimulus, TARP, Todd Rokita, Todd Young

How your Indiana Representative voted on these issues.

An explanation of the issues and the grades.








Your internet privacy is up to YOU: 5 essential privacy tools

29 Sunday Jul 2012

Posted by HattieBelle in CALEA, CISPA, Eavedropping, Electronic Communication, Hoosier, Internet Privacy, Lieberman-Collins Cyber Security Act, McCain Cybersecurity Act, NSA, Privacy, Private Web Surfing, Protect your privacy, Tea Party

≈ 4 Comments

Tags

Android, CISPA, Eavesdropping, IOS, NDAA, Patriot Act, PGP, Pretty Good Privacy, Privacy Matters, S 3414, SENATE NO TO CISPA, SENATE NO TO S3414, Snooping, SpiderOak, TELL YOUR SENATOR TO VOTE NO, TrueCrypt

Since  the passage of the Cyber Intelligence Sharing and Protection Act by the U.S. House of Representatives in April, #CISPA has been everywhere. Also, let’s not forget the gradual expansion of CALEA and the Lieberman-Collins Cyber Security Act and the NSA-centric McCain Cybersecurity Act.

The concern by some is that the bill’s language is too broad, giving companies
and the government power to intercept, share or block user information as long as it is to fight “cybersecurity threats.”

An explanation of how CISPA wil kill ALL PRIVACY on the internet HERE.

Who supports CISPA and who doesn’t HERE.

What has gone largely unnoticed in this torrent of analysis, however, is that privacy tools for individuals already exist and they have so for many years! Quietly anticipating encroachment against basic Internet liberties, concerned cyber privacy advocates has been coding and releasing the tools that allow for private electronic communication and private web surfing. Proposed legislation like CISPA may or may not pass and become law, but if it does we have to understand the new landscape. Your privacy is up to you!

1. Email Privacy – Naked email is like a postcard for anyone to read. Pretty Good Privacy (PGP), an open source software program created by Phil Zimmermann in 1991, is the global standard for point-to-point encrypted and authenticated email. Hushmail is an OpenPGP-compatible web-based email platform that does not have access to your user password for decryption. Both products, when used correctly, offer subpoena-proof email communication.

2. File Privacy – Your files might be stored in the encrypted cloud but that doesn’t mean that they’re 100% safe for your eyes only. Free and open-source TrueCrypt allows you to encrypt folders or entire drives locally prior to syncing with Dropbox. BoxCryptor also facilitates local file encryption prior to cloud uploading and it comes with added compatibility for Android and iOS.

There is an alternative to the dual-application process described above. Although most cloud-based storage services transfer over an encrypted session and store data in an encrypted form, the files are still accessible to the service provider which makes the data vulnerable to court-ordered subpoena. In order to rectify this, two different zero-knowledge data storage companies provide secure online data backup and syncing – SpiderOak and Wuala. For obvious reasons, there is no password recovery and employees have zero access to your data.

3. Voice Privacy – Wiretapping will become more prevalent in the days and months ahead. From the creator of PGP, Zfone is a new secure VoIP phone software product utilizing a protocol called ZRTP which lets you make encrypted phone calls over the Internet. The project’s trademark is “whisper in someone’s ear from a thousand miles away.” You can listen to Zimmermann present Zfone at DEFCON 15.

Also utilizing ZRTP, open-source Jitsi provides secure video calls, conferencing, chat, and desktop sharing. Because of security issues and lawful interception, Tor Project’s Jacob Appelbaum recommends using Jitsi instead of Skype.

Designed specifically for mobile devices and utilizing ZRTP, open-source RedPhone from Whisper Systems is an application that enables encrypted voice communication between RedPhone users on Android.

4. Chat Privacy – Encrypting your chat or instant messaging sessions is just as important as encrypting your email. Cryptocat establishes a secure, encrypted chat session that is not subject to commercial or government surveillance. Similar to Cryptocat, the older and more durable Off-the-record Messaging (OTR) cryptographic protocol generates new key pairs for every chat implementing a form of perfect forward secrecy and deniable encryption. It is available via Pidgin plugin.

5. Traffic Privacy – The final step in the process is geo-privacy, which refers to the protection of ‘information privacy’ with regard to geographic information. Virtual Private Networks, or VPNs, have been used consistently for anonymous web browsing and IP address masking. Just make sure that your VPN provider does not log IP addresses and that they accept a form of payment that does not link you to the transaction.

Additionally, the Tor Project provides free software and an open network for privacy-oriented Internet usage. Intended to protect users’ personal freedom, privacy, and ability to conduct confidential business, Tor (The onion router) is a system that improves online anonymity by routing Internet traffic through a worldwide volunteer network of layering and encrypting servers which impedes network surveillance or traffic analysis.

Related articles
  • IF YOU WANT PRIVACY, YOU CAN BUY IT: “Phil Zimmermann and some of the original PGP team have joined… (pjmedia.com)
  • An App Keeps Spies Away from Your iPhone (technologyreview.com)
  • An app that keeps spies away from your iPhone (whptv.com)
  • Web privacy guru designing anti-spying iPhone app (bgr.com)
  • Cryptography for the Rest of Us (lfb.org)

*****Tell the Senate NO on S. 3414, the Cybersecurity Act of 2012: CISPA. They can vote as early as next week!

Recent Posts

  • Holy Cow! The war on milk…
  • Corruption is Legal in America
  • Indiana candidates Stutzman & Young debate for US Senate Seat

Archives

  • April 2016
  • March 2016
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • June 2013
  • September 2012
  • August 2012
  • July 2012
  • June 2012

About Elkhart County Grassroots Hub

  • About Elkhart County Grassroots Hub

2012 Election 2013 Activism American Bill of Rights Civic Engagement Civil Rights Community Community Service Event Community Services Compassion Constitution economy Education Elkhart Elkhart County Events Family times Food GOP Health Care Hoosier Indiana Jackie Walorski Neighbors Obamacare Politics Richard Mourdock Tea Party Volunteer
January 2021
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    
  • RSS - Posts
  • RSS - Comments

Blog at WordPress.com.

Cancel
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy