John Oliver’s Breakdown of Data Brokering – What it is, why you should care, and a small side-order of Congressional blackmail

Of course John didn't actually blackmail anyone, but he made a valid point that sometimes the only way for things to get done is for Congress to feel the problem actually affects them. To prove his point of how vile and dangerous unregulated data-brokering is, he used completely legal and commonly used techniques to get data about several members of Congress with a vague threat that if they were worried about what he found, they really ought to consider passing laws to prevent the kind of data gathering he used.

This video should be required watching for every US Citizen because data brokering is dangerous. If you need any proof, well… that's what the video is for (but you can also look at the ID Theft crisis which was almost entirely caused by data brokering). Tags: , ,

Senators Send Angry E-mail to Facebook Over Privacy Changes

(Image used under: Creative Commons 2.0 [SRC])

Some US senators are not happy about the new privacy changes and have sent a letter to Mark Zuckerberg about it.

Facebook now obligates users to make publicly available certain parts of their profile that were previously private. If the user does not want to connect to a page with other users from their current town or university, the user will have that information deleted altogether from their profile.

If you read the entire letter, you can clearly see that they actually know what they're talking about. Surprising really.

Tags: ,

Senator Wants Free Credit Report Companies to Actually OFFER Free Reports

Wait... free is supposed to be FREEE?
(Image used under: Creative Commons 2.0 [SRC])
U.S. Senator Charles E. Schumer is my hero of the day.
"If these companies want to say -- or sing for that matter -- that they are giving people free credit reports, then they can't charge people $15 a month, simple as that," Schumer said. "For years, these companies have said with a smile that they will provide a free credit report -- even though the government already requires a credit report be provided for free every year - and then suddenly, months later consumers get a bill in the mail for their credit monitoring services. My plan would finally bust up this scam and give consumers some honest choices."
Tags: , , , , , ,

What the Bailout Means to You

Confused by the bailout? Who isn't?
(Image used under: Creative Commons 2.0 [SRC])

A little translation for the rest of us.

Tags: ,

Sarah Palin’s Private E-mail Account Hacked

(Image is in the Public Domain)

Sarah Palin's Yahoo account has been broken into and e-mails found there posted to Wikileaks. I would say this was a pretty rotten thing to do, but the perpetrators claim they did it to prove that Palin has been using her private e-mail to circumvent recordkeeping laws about government business. If that's true, then perhaps this needed to happen.

Tags: , , , ,

Stupid Virginia Slapped By Judge

What should we do about privacy problems? Attack the person who found the problem!
(Image source is unknown)

When Betty Ostergren, otherwise known as the "Virginia Watchdog" and on of my personal heroes, started posting social security numbers and other private data about state senators, she turned a few heads.

She got the information from the state's own public records websites where the senators were quick to pull some strings to get their information off the sites, but Betty refused to pull it off hers until they fixed the system that left all the other less-connected people vulnerable.

Their response was to draft a law for her specifically (what an honor!) that would make it illegal to disseminate any public records that contained Social Security numbers. Facing tens of thousands of dollars in fines, she was fortunately rescued by the Virginia ACLU who filed a lawsuit on her behalf.

And the good news is that the right decision was reached and the state of Virginia was told to eat crow. The saddest and sickest part of the whole situation is that they violently attacked the person who publicized what they were doing wrong while they made no effort to fix the wrong she exposed.

Tags: , , ,

Petition to Remove Nancy Pelosi For Taking Impeachment “Off the Table”

Why do we need to hold people accountable for abuse?
(Image used under: Creative Commons 2.0 [SRC])

I found this online petition to remove Pelosi for failing to do her job and being a political hack. Even if Congress couldn't pull an actual impeachment (which I believe they could for trying to block investigations of the White House staff alone), then they could still do something.

Tags: , , ,

Tough Voting Ahead

(Image is in the Public Domain)

There's still no way in Hades that I'll ever vote for McCain, but Obama has been sorely disappointing recently. First he voted for Telco immunity despite his promises to filibuster any such attempt. Now Republicans have cleverly used web technology to alert them (and us) to changes on his website. Specifically to the pages that list his policies.

Tags: , , ,

Why Congress Won’t Prosecute Bush

George W. Bush
(Image used under: Fair Use doctrine)

Here's a take that I'm ashamed to admit I hadn't considered: Members of Congress may be protecting Bush because of votes they made previously that might seem to have supported his illegal activities. While it might not end in prosecution, it could end their Congressional careers.

So, of course key Congressional Democrats who were made aware of these illegal torture and surveillance programs are going to protect the Bush administration and other lawbreakers. If you were Jay Rockfeller or Nancy Pelosi, would you want there to be investigations and prosecutions for torture programs that, to one degree or another, you knew about? If you were Jane Harman, wouldn't you be extremely eager to put a stop to judicial proceedings that were likely to result in a finding that surveillance programs that you knew about, approved of, and helped to conceal were illegal and unconstitutional?
Tags: , , ,

Telecom Immunity Passed. Liberty Dies a Little More

Justice lacking
(Image is in the Public Domain)
In Senate debate, Patrick Leahy (D-VT) argued strongly against telecom immunity, because it would make it almost impossible to ever find out what really happened and "the American people ought to know who in the White House said, 'Go break the law.'" Sen. Russ Feingold (D-WI) noted that, "We're considering granting immunity when roughly 70 members of the Senate still have not been briefed on the president's wiretapping program. The vast majority of this body still does not even know what we're being asked to grant immunity for."
These were the protests that smarter senators made before the vote. They were ignored. The "FISA update" including immunity was passed yesterday.
"I sit on the intelligence and Judiciary committees, and I am one of the few members of this body who has been fully briefed on the warrantless wiretapping program," said Sen. Russell Feingold (D-Wis.), another prominent opponent. "I can promise that if more information is declassified about the program in the future, as is likely to happen . . . members of this body will regret that we passed this legislation."
Tags: , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]