Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

From Dead to Diamonds – Sure Beats an Urn

Sure beats a grave
(Image is used under the Pixabay license)

I've heard of this before: taking the remains of your loved ones and having them made into synthetic diamonds. I didn't know you could pick colors though.

.... [Click here to read the rest of this post]

Tags: ,

Free Product Recall Information By E-mail, No Registration Required

Is it supposed to do that?
(Image used under: Creative Commons 2.0 [SRC])

Public Citizen reports that the Consumer Product Safety Commission has begun a service that will notify consumers by e-mail of any product safety recalls. While some manufacturers will do this voluntarily, some won't and even if they do, they usually ask for you to register all your products (including loads of personal information .... [Click here to read the rest of this post]

Tags: , ,

Quicken and MS Money Extort From Their Users

So you have a perfectly usable version? Let's patch that up for you...
(Image is in the Public Domain)

The Consumerist is running an article explaining how both Quicken and MS Money improperly and possibly illegally force users to upgrade to newer software by purposely cutting off necessary features to older versions.

.... [Click here to read the rest of this post]

Tags: , , ,

Private Lenders Turn Away People on The Terrorist Watch List

Watch lists have serious downsides that need to be addressed if we're going to use them

Now the terrorist watch list is making it to our everyday lives.

Private businesses such as rental and mortgage companies and car dealers are checking the names of customers against a list of suspected terrorists and drug traffickers made publicly available by the Treasury Department, sometimes denying services .... [Click here to read the rest of this post]

Tags: , , ,

24 Point Checklist for Identity Theft Victims – Good, But Missing the Most Important Step

(Image is in the Public Domain)

Here's a fairly good checklist for what to do if you're a victim of identity theft.

The only problem is that he didn't mention the most effective tool for preventing ID theft that there is: Credit Security Freezes. If you live in a state that has a freeze law, don't wait until you're a victim, do it now!

.... [Click here to read the rest of this post]

Tags: ,

John McCain Stole Credit and Bandwidth, Paid Dearly

(Image used under: Fair Use doctrine)

This story is hilarious! In short:

  1. John McCain, Senator and Presidential hopeful, set up a Myspace page to "connect with younger audiences"
  2. He used a default theme created by the author of this prank
  3. He not only didn't credit the author of the theme, but one of the images in the theme was being pulled from the author's .... [Click here to read the rest of this post]

Tags: , , , ,

15% Human Sheep For Organ Harvesting

Uh, oh.
(Image used under: Creative Commons 2.0 [SRC])

In a disturbing, yet reassuring article, we find out that some sheep have been created that grow some human organs. The idea is to use them for organ harvesting which is sad and terrible, but better than the alternatives.

The first thing I thought of after reading this line was the movie "The Island" (which I just watched .... [Click here to read the rest of this post]

Tags:

Detection Methods Used by Copyright Holders

Download responsibly - which also means keeping your downloading habits private.
(Image is in the Public Domain)

Not too long ago, a good friend of mine did a lot of work in understanding how copyright holders (such as those represented by the RIAA and MPAA for example) act and react to Peer 2 Peer filesharing networks.

I managed to dig up his 20 page essay on .... [Click here to read the rest of this post]

Tags: , , ,

Washington State Dumb as Dirt – Uses RFID in Licenses

ID that broadcasts data about you. What could go wrong?

In an act of supreme stupidity and ignorance, Washington state has passed a law allowing residents to purchase an "alternative" drivers license that could be used in lieu of a passport at the Canadian border.

Citing the 9/11 Commission's support for more secure documentation for U.S. entry, Chertoff pointed out that U.S. Customs and Border .... [Click here to read the rest of this post]

Tags: , , ,

University of Nebraska – Continues to Insult the RIAA

University of Nebraska
(Image used under: Creative Commons 2.0 [SRC])

In the continuing saga, the U of N is now planning to charge the RIAA $11 for each threatening e-mail sent.

"We're spending taxpayer dollars tracking down RIAA problems," Weir said. "Are we an agent of the RIAA? Why aren't they paying us for this?"

And their response:

Tags: , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

data defense Tutorial
|INDEX|next: Protecting Social Security Numbers
It's impossible to fully prevent credit card fraud, but there are several things you can do to help.
Social security numbers have become the gateway to all kinds of identity abuses so the less people you give it to, the better.
Your data is as valuable as money so protect it like money!
What do you do once your data is already out there? This.

... or check out any of my other guides and tutorials by clicking here!

Protecting Credit Cards

Credit card fraud isn't ID Theft, but is closely relatedare often used fraudulently so do what you can to prevent it.

[Click for full description]

Protecting Social Security Numbers

Social security numbers have become the gateway to all kinds of identity abuses so the less people you give it to, the better.

[Click for full description]

Being a Data Scrooge

Learn to protect your personal information the way Scrooge did his money.

[Click for full description]

Reputation Management

Just because there are things out there about you that are out of your control and are unflattering or worse, doesn't mean you're powerless.

[Click for full description]