Author Archives: The Privacy Advocate

God is the Internet

Internet is God

God returns in the form of Google

Some religions have taken to the internet, others block it and deem it evil and will punish their ‘flock’ if they are caught using it. Regardless, the internet now boasts a “user base of 34%” of the total global population.

Has Facebook become the devil or an angel in disguise, you tell me… Perhaps Facebook is the new Judas, who betrayed Google.  Are we all not the children of God?

Unless the stats we researched are completely off, and we mean way, way off – this leaves the internet population at a staggering 2,405,518,376 users!  Reference to stats: http://www.internetworldstats.com/stats.htm

No matter what religion you believe in – if you are a believer, you have to concede that your God is all knowing.  Now, the Internet has become all knowing!   Is Google the new God?  Perhaps the reincarnation of Allah has arrived as being Microsoft?  Seems possible to me, shouldn’t it be looked at?

Like religion, most entities of power exist only to govern people and create revenue.  Well, there is an original thought –  Google, Facebook, Microsoft and Apple all of the greatest of power!  Does the internet not govern people?  Through fact, fiction and desire to be, have and do – the Internet provides us with all the answers, interaction and solutions we want, right?  Google may be God?

Now don’t get your undies in a wad, your religion is not under attack here – its just evolved to the Internet.  What does your God think about all this?  Whom ever he /she or “it” is – it shouldn’t take much intelligence to realize that the internet is power, wisdom and controls the thoughts, actions and voices of the largest ‘collective’ population of human beings!

What is so shocking to me is that despite the basic evolution of intelligence through science and true reflection on history and knowing that most of the religious teaching are carefully crafted and selected story’s and were created to govern man, we still cling to this Internet as many do a religion!  We ignore that the governments across the globe are fighting to invade privacy while practicing our Internet religion and that the media is blasting its bias (paid for) messages through your monitors and screens!

Even through our most basic levels of evolution, we didn’t learn that religion causes more wars than any other cause, we don’t care that our governments are spying on us – we are lazy, numb and incompetent of our own ability to govern ourselves.  So, we must bow down to the ones we serve – the Internet, our Governments and the Media!

We have no choice now, we are still a global society searching for all the things that the Internet offers and therefore Governments, Religions and of course our Media all want to control the Internet!  Just think about it for a minute!

Take a look at a few of the news articles on privacy this week:

https://www.wired.com/2013/10/private-tracking-arms-race/

illegal surveillance

Electronic Surveillance Act to Protect your Privacy

Electronic surveillance involves the use of an electronic device to monitor an individual’s activities.  Unwarranted surveillance can be said to violate the person’s fourth amendment rights. It may include the use of a ‘bug’ which is a small microphone typically attached to the victim’s phone or telephone line. This is considered wire-tapping.  It may also take the form of video surveillance or monitoring online activities. Any legal entity that seeks surveillance must apply and receive a warrant before they can begin.  There is no legislation referred to specifically as electronic surveillance act, however, there are laws pertaining to surveillance in many forms including electronic. Continue reading

Internet safety tips

Cyberstalking statistics- What you need to know about stalking

Cyberstalking statistics indicate that cyber bullying and cyberstalking is becoming increasingly popular.  The use of the Internet and electronic devices makes it easier to carry out this crime without much physical effort form the perpetrator. As opposed to stalking, that involved following an individual among other monitoring activities, the cyber stalker now follows the individual by showing up on different social media sites that the victim is a part of, sending multiple emails and instant messages and seeking to gain personal information. The culprit may even post embarrassing pictures and videos obtained by legal or illegal means, post false information or accusations all in an effort to damage the person’s reputation. As a result of the nature of the Internet, this information is disseminated quickly. Continue reading

federal laws against stalking online

Online Stalking Statistics and How to Identify Cyberstalking

In recent years, stalking has evolved from the traditional expressions of obsession, which involved, following, monitoring, harassing the victim and attempts at intimidation. Now the act can be performed through the Internet and is, therefore, referred to as cyber stalking when adults are involved and cyber bullying for children.

Recent online stalking statistics indicate that approximately 52% of the nation’s students are being bullied online. This type of stalking takes the form of attempts at damaging the victim’s reputation by posting negative information about them on social media sites. These online communities are generally large, therefore, the information spreads quickly to a large number of individuals. Many children are unable to handle this type of abuse and often times embarrassment, hence there have been incidents children committing suicide as a result of this abuse. Social network stalking, and should be addressed as soon as it is identified, especially when children are involved. Continue reading

Glendale Unified School District stalks students twitter accounts

Glendale Unified School District

Bong picture is seen on Twitter by school district

Don’t you wish your kids would think before they speak, let alone before they tweet pictures of bongs on Twitter?  Well, now is the time to have that discussion with them about the impact of social media and school board officials stalking them.

The Glendale Unified School District paid $40,000 to a firm to monitor its students Twitter accounts.  Yes, that is right – when there is a shortage of teachers, low moral, un-monitored class rooms and teacher pay ranks up there with the guy at the car wash – this is where the school district in CA deems it a priority to invest.

Now, they can try to use security as an excuse but  we would like the school district to know that a number of our writers in California would like to offer to become security guards during school hours at $40.000 a year, to assist with security!

What needs to happen is very simple:  The parents and the students of the Glendale Unified School District need to blast the council members for squandering tax dollars and tweet their asses off sharing to the names, phone numbers and home addresses of all the Glendale Unified School District Teachers and Staff – especially, the Council!

Stalking behavior over the Internet

Federal stalking laws in the US

California was the first state to enact laws in relation to stalking in 1990. It was also the first state in 1999 to enact cyberstalking laws. Since then there are many other states that have followed suit, but not all. USA Federal stalking laws consider it a federal crime with punishment of years in prison and payment of a fine. Many of the state laws have been enacted as a result of an unfortunate ending to a cyber stalking event. Stalking is generally an obsessive behavior, which include repeated following, phoning, making threats. The intent of the stalker is to intimidate the victim. Continue reading

personal information

411 on Cyberstalking laws

In recent years, many crimes have been perpetrated over the Internet, crimes that have become even easier to get away with because of this technology. Identity theft and other methods of fraud are becoming increasingly popular and so is cyberstalking, making cyberstalking laws necessary.

This obsessive behavior is also called cyber bullying. The means of stalking may be done either electronically or through the use of the Internet. There is only a slight difference in the use of the terms. Cyber bullying, usually akin to bullying that takes place in schools, is usually used when referring to children, while cyber stalking refers to that perpetrated by and against adults. Continue reading

To think you have any privacy on the internet is – well, just funny! Your being watched and monitored with every click of the mouse, with every post of a pic, every tweet and thanks to our friends at Google – every search you perform! Internet Privacy is like an honest politician – it does not exist!

So, you think you know who is watching you? You know why, right? No, you really have no idea! There is NO Internet Privacy!

Why and who would be watching me:
25% e-commerce use (to sell you more crap, including media)
75% government use (provided by Google, Facebook and all the cell phone providers)

Google privacy concerns

You should know by now, there is no privacy on the Internet!

 

 

 

 

 privacy protection
Do you know who is fighting for your privacy and rights, even though you have NO idea they are doing it?  We do, its the Electronic Privacy Information Center!
If you, like so many others, haven’t taken the time to get to know more about them – now is the time!
It is very important to understand that your personal and private information must be protected and in order to fight the BIG Government, it takes a lot of resources and money!
Our most sincere thanks go out to the folks at the EPIC – Electronic Privacy Information Center, there would be little to no chance of having anyone challenging the privacy issues that are raining down on every American, without them.
Thank you EPIC and please, keep up the good fight!  Please take the time today and reach out today to the team at Epic.org:
Marc Rotenberg, President
Deborah Hurley, Chair
Pablo Molina, Treasurer
Grayson Barber, Secretary
Christine Borgman
David Farber
Charlie Firestone
Addison Fischer
Pamela Jones Harbour
Joi Ito
Jeff Jonas
Peter Neumann
Ray Ozzie
Deborah Peel
prevent the theft of your identity

How can I Keep my Personal Information Private?

The Internet is used for many purposes, both business and pleasure. For both, the user is expecting some level of privacy. However, many malicious parties and software can easily capture your private information, which will either cause you a lot of embarrassment or loss of money.

It is easy for individuals to get extremely comfortable while on the World Wide Web. Its use has become so much a part of our everyday lives that we are unable to see certain dangers unless of course we experience them first hand. Of recent, many are becoming victims of identity theft. Continue reading