Internet Privacy

Which Countries Have the Least Internet Freedom

This week we received an email from our friends at comparitech.com. They’ve put together research and awesome infographics of privacy in other countries, including internet privacy. There’s some really surprising information here and you should check it out.

https://www.comparitech.com/blog/information-security/cyber-security-statistics/

They’ve pulled together data from 10 different sources to provide a comprehensive picture of not only which countries have the best and worst track record in terms of Internet freedom and cybersecurity but also those countries that are least prepared and most vulnerable.cyber internet attack

Advertisements

What Information Can be Found With a Phone Number

When you consider connecting the dots to create a picture, imagine your phone number as the dot that connects everything else they know about you.  Even if they have it all, it is up to you whether or not they have the dot with your phone number to complete the picture.phone hacker

All it takes to find everything is to just find that phone number connected to one of the many things we already know like your facebook account (which requires a phone number) or any shopping card from a corporate retailer you may have given your number to.  Do you still believe those corporations don’t sell or trade your private information?  Well even if you do, it doesn’t matter because they are all systematically hacked a bare minimum of every 3-5 years.

Any email you get for free is being picked off as we speak.  It doesn’t matter if you gave the provider any phone information or not.  All you have to do is reveal your phone number in the text of an email and boom!! Mission accomplished!!  Free emails mine everything that comes across your screen, including drafts.  Why do you think they always want you to “secure” your email account with a phone number?

If you have connected to an old friend or new business acquaintance by email or social media and given them your phone number in a message it is connecting you to that phone number and that media account.

It’s called the world wide WEB for a reason.  Everything you do is sucked into a giant computer and maintained for profit and micromanagement of the public.  A good researcher can take an unknown phone number and use cell towers to “pair” it with other devices already known to be in your name.  For example: a burner phone (see our article on burner phones https://privacyliving.com/2016/05/17/what-is-a-burner-phone-how-can-it-help-me/ ) can have its owner pegged pretty efficiently when it is continually detected near the same owner’s normal cell phone or other smart device.  This can include cars with smart devices embedded in them.  By detecting an unknown phone continually traveling to the same places and staying at the same address all night along with already known devices it is easy to deduce that you are the owner.

As you can see, being truly anonymous requires some serious work but it is possible.  You can always pick up a copy of “Disappear in 24 Hours” by Lonn E Wolfenstein if you want to do a total makeover.  The book is available at Brave New Books in Austin TX or can be ordered by clicking the products link at the top of this page.

Privacy is officially no longer safe around modern technologies such as smart phones, smart TVs and the like. This is something that we always kind of knew, but it’s now been confirmed in the latest Wikileak.

Via the WikiLeaks press release (courtesy of Naturalnews.com):

Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones

Read more: http://www.naturalnews.com/2017-03-07-vault-7-bombshell-just-vindicated-every-conspiracy-theorist-the-cia-can-spy-on-anyone-through-tvs-iphones-smart-phones-and-windows-pcs.htmlcia hacking code phone

Body Cams Give Cops The Power To Google Everything They See

Scary new technology gives those using body cameras power to google things and so much more. When body camera meets artificial intelligence technology, scary things happen.

Last week, Taser, the stun gun company that has recently become an industry leader in body-mounted cameras, announced the creation of its own in-house artificial intelligence division. The new unit will utilize the company’s acquisition of two AI-focused firms: Dextro, a New York-based computer vision startup, and Misfit, another computer vision company previously owned by the watch manufacturer Fossil. Taser says the newly formed division will develop AI-powered tech specifically aimed at law enforcement, using automation and machine learning algorithms to let cops search for people and objects in video footage captured by on-body camera systems. – Vocativ.com

http://www.vocativ.com/402771/ai-body-cams-cops-google/

body cam cops

Your TV is Watching You!

Is your TV watching you? tv-watching-you

Vizio, one of the world’s biggest makers of Smart TVs, is paying $2.2 million to settle charges that it collected viewing habits from 11 million devices without the knowledge or consent of the people watching them.

According to a complaint filed Monday by the US Federal Trade Commission, Internet-connected TVs from Vizio contained ACR—short for automated content recognition—software. Without asking for permission, the ACR code captured second-by-second information about the video the TVs displayed. The software collected other personal information and transmitted it, along with the viewing data, to servers controlled by the manufacturer. Vizio then sold the data to unnamed third-parties for purposes of audience measurement, analysis, and tracking.

Read more at arstechnica.com

arstechnica.com

Make Your Property Ownership Information Confidential

Currently, many states in the US make it super easy for anyone to search for your home address and find out information about where you live, what your home is valued, your tax information, the size of your home, your mailing address and more. With identity theft and other violent crimes being as pervasive as they are, there are ways to protect your family, make yourself more private and less of a target.

When it comes to property, such as land or homes, one of the best ways to construct a barrier between yourself and those who are searching for you (solicitors, criminals, nosy neighbors and others), is to put your property into a trust or LLC. The downside to this plan is that trusts and LLCs require time and money. For example, you may need to hire an attorney to create an LLC for your property (contact us if you want help with this – we have an easier, faster way to do this), and in many cases you must own the property outright in order to create such a legal umbrella (the bank cannot own the property). property-cad-request-confidential

A quicker, cheaper and easier way to gain a new layer of privacy between your property and your identity is to request confidentiality status for the property. How do you make your property information confidential, avoiding the prying eyes of snoops and bad guys? Your properties information is typically managed and maintained by a county appraisal district (CAD). For example, if you purchase a property, you are required to have a registered surveyor conduct a survey of the property boundaries which will be recorded legally by the CAD in your county or district. The CAD keeps hardcopies of your property survey with details of who owns the property (through county records), and also posts information about the property on their website, which is typically available to the public.

If you don’t want others to be able to view your property ownership information on the CAD website or request copies of the information, you must make a request through the CAD for property confidentiality status. Normally, this requires that the owner complete a request form and submit it to the CAD for review. It is important to note that in some places there may be limitations to what information remains confidential and who is eligible to apply for property confidentiality status. In some states, the information will be completely blocked from the website and not available for anyone but law enforcement. In addition, in the state that I live in, for example, only individuals such as law enforcement, military, judges and victims of family violence may apply for confidentiality status. However, it never hurts to apply, even if you think you might not be eligible. I contacted the CAD in my area and was told that no proof of status (law enforcement or other) was required to be submitted with the application (other states may require verification). Did I mention that the applications are, in many cases, free?!

Need help? Contact us at our “CONTACT” link at the top of the page and get started today!

USB Killers: What You Need To Know

The USB killer is quickly growing in fame.  The small device that fits into regular USB ports and rapidly kills the motherboard of the device is said to work on 95% of computers.  This device is loaded with capacitors that pull in electricity from the host device and then release a rapid electric pulse that will fry anything on the receiving end. PC On Fire Shoot

This happens in about 1-3 seconds and the job is done!

But, not so fast with thinking this solves everything.  I have included a video below that shows the USB Killer in action on a variety of devices.  Some computer companies have already made internal preparations for this kind of attack, so it is not 100% effective.

In the video below all devices did in fact have the port itself fried and data shut down.  So it’s useful to some degree for sure.  If you have to use this device you are already in trouble.  With the cloud in full swing these days, what you have done will probably not just be stored on the device in your hands.  Just keep in mind this is a handy device and it could buy you some time.

Here’s the video:  https://www.youtube.com/watch?v=5pP8TLwO_Ks

Here is the USB Kill site where you can buy one for about $50 if you order it out of the UK:  https://www.usbkill.com/order?ipa=8

If you want to pay around $80 you can order off of ebay.com .  There are many sellers.

How to Do a Real Acid Wash on Emails: Not the CNN Fact Check method

I’m so fed up with these CNN fact checkers!  This time it’s the “acid wash” bit where everything I try to look up for the first 10 pages of the web are Donald Trump “fact checks”.  Who cares what was said?  The real thing you are looking for is a fool proof way of dissolving your information where somebody can’t recover it and then use it against you or your family.  You are now at the right place.
Destroying a Hard Drive the Correct Way
First of all, in my book “Disappear in 24 Hours”, I discuss that there is only one good way of destroying a hard drive.  Boil it for a good while and then put it in the microwave until you start to hear lots of popping noises.  Then take a hammer and smash away.  Smash it into the smallest pieces you can get it into.  Next, find some trash cans or dumpsters around town to throw a few pieces at a time away.  I do like the idea of throwing pieces of the boiled, cooked and smashed hard drive into black water but I hate the idea of littering, so don’t do that.destroy-computer-hard-drive-hammer
Though I believe my original routine to be quite sufficient, I neglected, in my book to explain that another great strategy before destroying a hard drive is to delete everything and overwrite it.  Secondly, the acid idea is not in my book because it is a book based on time efficiency and I doubt the reader would have time or be in a position to shop around town for the chemicals needed.  Here is the acid destruction solution:
It takes a mixture of Nitric Acid (HNO3) and Hydrochloric acid (HCL) in a glass container.  Heed my warning about the glass container please!  Anything left after a couple hours in that solution and you can take those to the next level of smashing and dumping.
The Real Acid Wash of Emails
As far as the acid wash of emails is concerned that would not be a physical process.  This is a fabled process according to the usual bloggers but I am quite certain after speaking to some sources that there is a process of actually destroying actual emails and anywhere those emails may have been received or sent from can also be dealt with.  This process would require a very skilled individual in an administrative position to go into the system through a “back door” and remove the data.  This may be called “acid washing” in a metaphoric sort of way.  An example of this is Amazon Kindle.  They call it “Kindle” because it is symbolism for a book burning.  In this case no real acid is involved.  Due to the position it would require along with the risk and skill involved we can extrapolate that it is a very expensive process, as Trump stated in the debate.
So is Hillary in the Clear?
There are only 2 problems with the acid wash method: Screen shots, and hackers.  Screen shots are self explanatory.  A screen shot taken and kept out of reach is a hard copy.  Secondly, if a hacker gets into the email and takes information for himself before the acid wash then the information is still out there.  So when it comes to the hacking situation we see, the Clintons still have a problem.
Most of us could never imagine being able to afford an acid wash, so my best advice is to stick with a device that is not traceable and use a pseudonym when communicating.  When it comes time to ditch it, follow my original advice from the book “Disappear in 24 Hours”.  At Privacy Living we also offer hard drive destruction for our members.  For more information on that contact us on the blog.

Why You Are Not Safe on Facebook

Never consider yourself safe or your conversations or whereabouts private when using social media such as facebook. Just like your friends, your enemies too use facebook.

http://www.globalpost.com/article/6772142/2016/05/26/salvadoran-gangs-use-facebook-track-down-victims

tattoo gangster central america

You Can’t Hide From The Police If They Have Stingray Tracking Device

Recently, the Milwaukee, Wisconsin Police Department had to admit in court that they had used a Stingray to track a suspect prior to his arrest and jailing. – What many would say is a blatant violation of the 4th Amendment.

american flag camera spying

The Fourth Amendment of the U.S. Constitution provides, “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”

The ultimate goal of this provision is to protect people’s right to privacy and freedom from arbitrary governmental intrusions.  Private intrusions not acting in the color of governmental authority are exempted from the Fourth Amendment. – Cornell University Law Online.

“Thanks to EFF and the ACLU, the government has finally admitted it secretly used a Stingray to locate a defendant in a Wisconsin criminal case, United States v. Damian Patrick. Amazingly, the government didn’t disclose this fact to the defendant—or the court—until we raised it in anamicus brief we filed in the case.”
As we wrote in a previous article on Stingrays and ISIS, aka cell-site simulators, act as a fake cell-phone tower. They can provide an exact location of where a particular cell phone is located without the user knowing.

“Stingrays are especially pernicious surveillance tools because they collect information on every single phone in a given area—not just the suspect’s phone—this means they allow the police to conduct indiscriminate, dragnet searches—in some cases on up to 10,000 phones at one time. They are also able to locate people inside traditionally-protected private spaces like homes, doctors’ offices, or places of worship and can be configured to capture the content of communications.”

Read more at Electronic Frontier Foundation (EFF): https://www.eff.org/deeplinks/2016/04/eff-and-aclu-expose-governments-secret-stingray-use-wisconsin-case

stingray van spying privacy