Recent Ruling Upholds Border Searches of Laptops

You can be forced to turn it on and let border agents browse around for stuff to charge you with. Isn't that nice?
Tags: Big Brother, Border Search, Your Rights

You can be forced to turn it on and let border agents browse around for stuff to charge you with. Isn't that nice?
Tags: Big Brother, Border Search, Your Rights

First the FBI was going to put the DNA of innocent people on permenant file, but now they're going to drag in the DNA of any relatives to the offenders as well.

He was a church-going father of two, and for more than 30 years Dennis Rader eluded police in the Wichita area, killing 10 people and signing taunting letters with a self-styled monogram: BTK, for Bind Torture Kill. In the end, it was a DNA sample that tied BTK to his crimes. Not his own DNA. But his daughter's.
Investigators obtained a court order without the daughter's knowledge for a Pap smear specimen she had given five years earlier at a university medical clinic in Kansas. A DNA profile of the specimen almost perfectly matched the DNA evidence taken from several BTK crime scenes, leading detectives to conclude she was the child of the killer. That allowed police to secure an arrest warrant in February 2005 and end BTK's murderous career.

The sad thing here is that the practice could be used to do great good, but we can't let the FBI ever have the power to do this because they can't be trusted to use it properly.
Tags: Big Brother, FBI
The U.S. government will soon begin collecting DNA samples from all citizens arrested in connection with any federal crime and from many immigrants detained by federal authorities, adding genetic identifiers from more than 1 million individuals a year to the swiftly growing federal law enforcement DNA database.
If you are found innocent, you can't be treated like a criminal. Duh.
What is happening at the FBI that they can violate our privacy and rights over and over and over?
Tags: DNA, DNA Mugging, FBI
Reunion.com is using a deceptive marketing strategy where they pretend to be someone you know who is inviting you to Reunion. If you go to Reunion.com to see who it is, sign up, and make the horrible gross mistake of giving them your e-mail address password, they will automatically send out false e-mails to all the people in your contact list.
Two things are going horribly wrong here. One is that Reunion.com is using false and deceptive practices and is doing nothing less than what a virus or hacker would do. I hope the hammer of law hits them hard and fast
The second thing is that people somehow believe it's ok to give up their e-mail address password which is a huge no no.
Tags: Password Mugging, Reunion.com, Viruses

The FBI has been up to no good:
Counterterrorism officials in FBI headquarters slowed an investigation into a possible conspirator in the 2005 London bombings by forcing a field agent to return documents acquired from a U.S. university. Why? Because the agent received the documents through a lawful subpoena, while headquarters wanted him to demand the records under the USA Patriot Act, using a power the FBI did not have, but desperately wanted.


This time, it's in New Jersey.
On its Web site, www.lifelock.com, the company reports that it places requests for fraud alerts with credit bureaus on behalf of its clients. "If someone is trying to use your personal information, you will be contacted by the creditor that is issuing the line of credit," LifeLock says.
"If you receive a call and you are not the one applying for credit, the transaction should be stopped immediately."
But creditors are not required to contact applicants even if they have fraud alerts in their files, says the Pasternak lawsuit. The Experian lawsuit makes a similar argument. The Pasternaks also blast LifeLock’s $1 million guarantee, claiming that the fine print renders it virtually worthless.


I'm skeptical of the Federal Trade Commission's ability to deal with spyware or Spam, but the crack-down on fake blogging and unlabeled DRM is interesting.
Fake blogs (flogs), like the ones set up by Sony to promote the PSP, also try to gain authenticity by masquerading as homegrown labors of love. And while most established media sites have policies designed to keep editorial and advertising separate, blogs may have no such rules in place.
Case in point: the Sony BMG rootkit fiasco, a case in which the Commission actually did charge the company with deception for not informing consumers that certain CDs contained DRM that limited their usefulness.


It was just yesterday that I was explaining why closed circuit tv systems (the the ones they have prominently installed all over London) don't work. Here's an article about a London Graffiti artist who carefully painted a giant message to the authorities that spans three full stories on a building right next to a security camera.
The secretive graffiti artist managed to erect three storeys of scaffolding behind a security fence despite being watched by a CCTV camera.
Then, during darkness and hidden behind a sheet of polythene, he painted this comment on 'Big Brother' society.

The last thing this cult wants is more exposure into their secret operating documents. Go Wikileaks!
Tags: Money Cult, Scams - Ripoffs - Dirty Tricks, Scientology, Wikileaks
D.C. officials are giving police access to more than 5,000 closed-circuit TV cameras citywide that monitor traffic, schools and public housing — a move that will give the District one of the largest surveillance networks in the country.
If you want to learn more about my professional background, click here to learn more.
Check out one of my guides/tutorials:
| Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files. |
| Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware. |
| Use a software firewall to detect bad code on your computer when it tries to connect to the Internet. |
| Always keep your system up to date with security patches or none of the rest of your security software will matter. |
| Use an encryption tool to protect your important data when storing or transmitting it. |
| Switch to Firefox for your web browsing and you'll be better protected from Internet threats. |
| Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware! |
... or check out any of my other guides and tutorials by clicking here!
| Copyright © by Jeremy Duffy All rights reserved. | About Me and This Site | Blog | Contact | Policies | My LinkedIn | My Youtube Channel |
A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.
[Click for full description]Learn how to detect and remove spyware and adware using a free scanning tool.
[Click for full description]Learn what a firewall is and why you want one on your computer.
[Click for full description]Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.
[Click for full description]Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.
[Click for full description]There are many browser choices out there. Read why I think Firefox is one of the best.
[Click for full description]Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!
[Click for full description]