Privacy

Which Countries Have the Least Internet Freedom

This week we received an email from our friends at comparitech.com. They’ve put together research and awesome infographics of privacy in other countries, including internet privacy. There’s some really surprising information here and you should check it out.

https://www.comparitech.com/blog/information-security/cyber-security-statistics/

They’ve pulled together data from 10 different sources to provide a comprehensive picture of not only which countries have the best and worst track record in terms of Internet freedom and cybersecurity but also those countries that are least prepared and most vulnerable.cyber internet attack

Advertisements

Body Cams Give Cops The Power To Google Everything They See

Scary new technology gives those using body cameras power to google things and so much more. When body camera meets artificial intelligence technology, scary things happen.

Last week, Taser, the stun gun company that has recently become an industry leader in body-mounted cameras, announced the creation of its own in-house artificial intelligence division. The new unit will utilize the company’s acquisition of two AI-focused firms: Dextro, a New York-based computer vision startup, and Misfit, another computer vision company previously owned by the watch manufacturer Fossil. Taser says the newly formed division will develop AI-powered tech specifically aimed at law enforcement, using automation and machine learning algorithms to let cops search for people and objects in video footage captured by on-body camera systems. – Vocativ.com

http://www.vocativ.com/402771/ai-body-cams-cops-google/

body cam cops

Make Your Property Ownership Information Confidential

Currently, many states in the US make it super easy for anyone to search for your home address and find out information about where you live, what your home is valued, your tax information, the size of your home, your mailing address and more. With identity theft and other violent crimes being as pervasive as they are, there are ways to protect your family, make yourself more private and less of a target.

When it comes to property, such as land or homes, one of the best ways to construct a barrier between yourself and those who are searching for you (solicitors, criminals, nosy neighbors and others), is to put your property into a trust or LLC. The downside to this plan is that trusts and LLCs require time and money. For example, you may need to hire an attorney to create an LLC for your property (contact us if you want help with this – we have an easier, faster way to do this), and in many cases you must own the property outright in order to create such a legal umbrella (the bank cannot own the property). property-cad-request-confidential

A quicker, cheaper and easier way to gain a new layer of privacy between your property and your identity is to request confidentiality status for the property. How do you make your property information confidential, avoiding the prying eyes of snoops and bad guys? Your properties information is typically managed and maintained by a county appraisal district (CAD). For example, if you purchase a property, you are required to have a registered surveyor conduct a survey of the property boundaries which will be recorded legally by the CAD in your county or district. The CAD keeps hardcopies of your property survey with details of who owns the property (through county records), and also posts information about the property on their website, which is typically available to the public.

If you don’t want others to be able to view your property ownership information on the CAD website or request copies of the information, you must make a request through the CAD for property confidentiality status. Normally, this requires that the owner complete a request form and submit it to the CAD for review. It is important to note that in some places there may be limitations to what information remains confidential and who is eligible to apply for property confidentiality status. In some states, the information will be completely blocked from the website and not available for anyone but law enforcement. In addition, in the state that I live in, for example, only individuals such as law enforcement, military, judges and victims of family violence may apply for confidentiality status. However, it never hurts to apply, even if you think you might not be eligible. I contacted the CAD in my area and was told that no proof of status (law enforcement or other) was required to be submitted with the application (other states may require verification). Did I mention that the applications are, in many cases, free?!

Need help? Contact us at our “CONTACT” link at the top of the page and get started today!

USB Killers: What You Need To Know

The USB killer is quickly growing in fame.  The small device that fits into regular USB ports and rapidly kills the motherboard of the device is said to work on 95% of computers.  This device is loaded with capacitors that pull in electricity from the host device and then release a rapid electric pulse that will fry anything on the receiving end. PC On Fire Shoot

This happens in about 1-3 seconds and the job is done!

But, not so fast with thinking this solves everything.  I have included a video below that shows the USB Killer in action on a variety of devices.  Some computer companies have already made internal preparations for this kind of attack, so it is not 100% effective.

In the video below all devices did in fact have the port itself fried and data shut down.  So it’s useful to some degree for sure.  If you have to use this device you are already in trouble.  With the cloud in full swing these days, what you have done will probably not just be stored on the device in your hands.  Just keep in mind this is a handy device and it could buy you some time.

Here’s the video:  https://www.youtube.com/watch?v=5pP8TLwO_Ks

Here is the USB Kill site where you can buy one for about $50 if you order it out of the UK:  https://www.usbkill.com/order?ipa=8

If you want to pay around $80 you can order off of ebay.com .  There are many sellers.

How Safe are your Wi-Fi Connections and Apps?

When you have your cell phone or other smart device with you the NSA is watching.  We all know that but sometimes we need to be reminded.  Keep in mind that there are no known exceptions to this rule.  If there was one I would be skeptical, but if you have to have a phone, why not get the most secure phone possible?

After reading and hearing all of the negatives posted about the Black Phone from Silent Circle I am still a supporter.  I think many of the negative reports are coming from competitors and sold out individuals who care more about the quality of their “selfies” than they do about being watched by data mining corporations and foreign governments.wi-fi-privacy

I will concede that the Black Phone is not exactly what I would build.  For example: I don’t think a camera belongs on a phone at all, unless it is self-contained in its own compartment with zero internet capability. However, I commend Silent Circle for their innovation in the areas of Wi-Fi and App security.blackphone-privacy-cell

Wi-Fi Connections

The Black Phone has the capability of automatically shutting off Wi-Fi when you leave the range of your current connection.  This is a no nonsense security measure but it doesn’t serve corporate greed.  On most phones, when you leave your current Wi-Fi network, your phone will continue to search for another.  This is dangerous.  Even if you don’t like the Black Phone please keep your phone on Airplane mode if you are not using it in a secure area of your choosing.

Apps

When you sign up for most apps, there is a multi-page agreement that nobody wants to read.  Within that agreement you give up your privacy, but most people do it because they want the app.  With the Black Phone there is a way to get many apps without giving the corporate bullies access to your camera and contacts list.

I realize this seems like a commercial but I am not being paid by Silent Circle.  It just seems like a decent product they are producing here in a world that knows nothing but theft and fleecing of consumers.  Below I have an interview from 2014 about the qualities of the Black Phone.  There is now a Black Phone 2 with even more features and sells for just under $600.

Check it out if you wish to boost privacy, but keep in mind you are never 100% safe on a phone.

https://www.youtube.com/watch?v=dbtSNAD4JJY

 

Erase Yourself From The Internet!

You may not know this, but there is a way to remove every trace of yourself from the internet. And it can be done very inexpensively, perhaps free of cost (at least for now)! Many like minded people are tired of the endless government and internet spying conducted by ruthless corporations like Google and Facebook. Despite some of the freedom and anonymity that the internet may have initially offered in it’s early life, it now has been slowly tightening it’s tyrannical noose on all of it’s users – demanding more information of us, harvesting and storing our data and using it against the citizenry.you-are-the-hope-guy-faukes

And now there’s a more organized way to remove yourself from the online prison matrix that is the world wide web. Read more here: http://thenextweb.com/apps/2016/11/24/delete-internet/

You are the hope! Make a change for the better today.

 

How to Do a Real Acid Wash on Emails: Not the CNN Fact Check method

I’m so fed up with these CNN fact checkers!  This time it’s the “acid wash” bit where everything I try to look up for the first 10 pages of the web are Donald Trump “fact checks”.  Who cares what was said?  The real thing you are looking for is a fool proof way of dissolving your information where somebody can’t recover it and then use it against you or your family.  You are now at the right place.
Destroying a Hard Drive the Correct Way
First of all, in my book “Disappear in 24 Hours”, I discuss that there is only one good way of destroying a hard drive.  Boil it for a good while and then put it in the microwave until you start to hear lots of popping noises.  Then take a hammer and smash away.  Smash it into the smallest pieces you can get it into.  Next, find some trash cans or dumpsters around town to throw a few pieces at a time away.  I do like the idea of throwing pieces of the boiled, cooked and smashed hard drive into black water but I hate the idea of littering, so don’t do that.destroy-computer-hard-drive-hammer
Though I believe my original routine to be quite sufficient, I neglected, in my book to explain that another great strategy before destroying a hard drive is to delete everything and overwrite it.  Secondly, the acid idea is not in my book because it is a book based on time efficiency and I doubt the reader would have time or be in a position to shop around town for the chemicals needed.  Here is the acid destruction solution:
It takes a mixture of Nitric Acid (HNO3) and Hydrochloric acid (HCL) in a glass container.  Heed my warning about the glass container please!  Anything left after a couple hours in that solution and you can take those to the next level of smashing and dumping.
The Real Acid Wash of Emails
As far as the acid wash of emails is concerned that would not be a physical process.  This is a fabled process according to the usual bloggers but I am quite certain after speaking to some sources that there is a process of actually destroying actual emails and anywhere those emails may have been received or sent from can also be dealt with.  This process would require a very skilled individual in an administrative position to go into the system through a “back door” and remove the data.  This may be called “acid washing” in a metaphoric sort of way.  An example of this is Amazon Kindle.  They call it “Kindle” because it is symbolism for a book burning.  In this case no real acid is involved.  Due to the position it would require along with the risk and skill involved we can extrapolate that it is a very expensive process, as Trump stated in the debate.
So is Hillary in the Clear?
There are only 2 problems with the acid wash method: Screen shots, and hackers.  Screen shots are self explanatory.  A screen shot taken and kept out of reach is a hard copy.  Secondly, if a hacker gets into the email and takes information for himself before the acid wash then the information is still out there.  So when it comes to the hacking situation we see, the Clintons still have a problem.
Most of us could never imagine being able to afford an acid wash, so my best advice is to stick with a device that is not traceable and use a pseudonym when communicating.  When it comes time to ditch it, follow my original advice from the book “Disappear in 24 Hours”.  At Privacy Living we also offer hard drive destruction for our members.  For more information on that contact us on the blog.

The Police May Be Tracking You and Your Phone

Recently a friend told me a story of a first hand account of police knocking on his door at 3 am looking for another person.  He was completely caught off guard and terrified for the first few minutes of them banging on his door because he thought he was being robbed (they did NOT identify themselves as police). This is a fair assumption if you wake up in the middle of the night and someone is ringing your door bell and banging on your door. Burglars frequently do this to determine if someone is at home or not – after all, they typically don’t want to hassle with homeowners in the middle of stealing all of your possessions.

Now before I get to the rest of the story, which is quite interesting, I should say that apparently the police are trying to use Stingray technology more and more these days (Read our blog about it here: https://privacyliving.com/2016/05/08/you-cant-hide-from-the-police-if-they-have-stingray-tracking-device/). You’ll recall that A Stingray is a device that mimics a cell phone tower and allows law enforcement to gather information about you by accessing your cell phone. There was an article this week, oddly enough, that questioned whether the older Stingrays would even function on a 4G or greater cell network, during an operation where local police called in the Feds – but that’s a discussion for another time.

police swat team at your door

So back to the story. My friend wakes up at 3 am, he hears pounding on his front door, door bell ringing and he sees a flash light outside his window and shadows. He’s groggy, confused and scared. The fight or flight response is taking hold in his body and he’s preparing to defend himself in the event that the burglars kick in his front door. He calls 9-11, explains the situation to the operator and she asks him to hold. Seconds later, she tells him to open the front door – it’s the police. Huh?!

It turns out that the police had been using an unidentified device to track a person’s phone and the search had erroneously led to my friends front door. He explained to them that he didn’t know the person they were looking for and that he lived alone, but they still asked to search his home, which he reluctantly allowed.

The lesson to be learned here is that you should never let anyone you don’t know in your house for any reason. Period. Even if it’s the police. And second, the police will use any means necessary to find you or someone else if given the means to do so. I hate to generalize here because I’m a supporter of the police in general. But it’s important to be aware of the state of law enforcement these days. Be safe out there.

 

 

Why are The Russians Holding Back the Clinton Emails?

If there are still 30,000 of Hillary’s emails still missing and the Russians have them, you may be wondering what is the strategic drop date for the historic nemesis of America.  The writing is on the wall that the Russians most likely have those emails but it is in their best interest to release them only at the perfect time, in which the most damage can be done.

It’s hard to imagine this Hillary email scandal has gone on for so long but I wrote an article pertaining to this exact situation just over a year ago called “What Would You Do If You Were Hillary Clinton?” https://privacyliving.com/2015/07/31/what-would-you-do-if-you-were-hillary-clinton/   In that article I predicted the emails would be held to control her if she wins the presidency.  Now that we have narrowed down the search of the foreign government holding the emails, we can begin to adjust our predictions based on what the Russians prefer. top secret hillary emails

The best bet for them is to monitor the American presidential race and only use the emails during the race if needed.  It is my opinion that the Russians, while acting Pro-Trump, secretly want Clinton to win since these emails they are holding will give them some leverage in negotiations for anything they want.  However, if Trump begins to pick up in the polls and it becomes very obvious that he will win by a landslide, the Russians will release the Clinton emails so they can pull favor with the “President Trump”.

One final angle you may be stumbling over is Julian Assange.  Isn’t he supposedly the one holding the Clinton emails?  Well, yes, but he will be answering to the Russians on this one.  In fact, the Russians will be able to walk away with clean hands on this one no matter how it turns out.  They will use someone else to look like the guy (or government) that hacked these emails.  Either way, I think we are all curious what is actually in those messages.

Safety and Privacy Tips For Off Duty Police

This message is for everybody.  For police officers that are in the current struggle of our nation you probably already know these things but you can use this as a check list.  For all others who may have someone trying to hunt you every day these techniques can benefit you as well.  Police officers have to constantly look over their shoulder for the obvious reason that they may run into a former client, fresh out of prison and ready for revenge, but the political climate today has put that worry in second place.  Now officers have to worry about entitled drug addicts on the George Soros payroll coming out of nowhere.  This is also the case if you happen to support any cause that these people find offensive, even if you are John Q Citizen.  Here is a simple list of tips that police officers use for off duty safety and privacy when they are off duty.invisible police man

  1. Have a plan for your family if you run into trouble: It is important to know that you may remember a bad acquaintance from your past when you run into them at the mall.  Your wife will have no idea who this person is. It is important for you to make a clear and concise plan with your family that if you tell them to “go home”, they do so without question or hesitation.  Talking about this and reminding your spouse before going out every time is important.
  2. Get a burner car: In the past I have written extensively about the burner phone (and you should have one) but if you feel you are being hunted you need a burner car. This is just a basic piece of junk that you pay $1000-$1500 for and you just use to drive to work.  Just throw some liability insurance on this one and know that you can do anything you want with this one.  You want some examples?  Ram your way out of illegal roadblocks, Run over anyone shooting at you, practice your stunt driving in vacant parking lots, and best of all when the angry rioters show up and set cars on fire you won’t mind.  If you get the right kind of burner car, they may even pass over you thinking you are one of them, or are so poor they feel sorry for you!
  3. Put your nice car in somebody else’s name: I always say I’m not afraid of the government, but those rogue employees are a different story.  Whether you are a police officer or not, you know just about anybody can check the tags on your car.  Move the ownership of your car to a friend or get an LLC for the vehicle.
  4. Use a different address: This is a big issue for police because they are always expected to live where they say they live. Officer or not, you need to avoid living where you say you live.  This is not just about you; this is about your family’s safety.  Move your home into the name of a friend or relative, or an LLC. If you have to but don’t live in a place where someone can easily find out.
  5. Shave down your friend list: People talk and unfortunately a friend of a friend stopping by your house or your social media page could get some ideas if he gets upset for no reason. Only deal with close friends.  All others are just going to have to stay away.  This means no big parties at your house.  In fact, if you follow rule #4 above you shouldn’t have any visitors.
  6. Always Pack Heat: There is a lot of shaming in the media and there are a lot of jabs being thrown by politicians right now regarding guns.  Don’t fall for it.  Take it from a guy who has been in shoot outs with and without guns.  Being without a gun is a helpless feeling.  Take it everywhere.
  7. Look the Part of John Q Citizen: On your days off grow your facial hair and try to look as normal as possible. Don’t wear police stuff.  The only police item you should have on your person is a gun (or 2).
  8. Get your Food to Go: Get everything to go.  Sometimes you have to go out and do things with your family but that should be kept to a minimum.  Unfortunately, with the political climate you will probably want to only go to restaurants in a different town from the one you work in.
  9. Stop signs are optional at this point: I would never tell anybody to willingly violate the law but you have to make a good judgement for yourself and your family here.  Is it worth making a complete stop at a stop sign or red light just to be shot at if you are in the wrong neighborhood?  Keep moving while you are in your car.  It will slow some bullets down but you have no way of defending yourself while you are trapped in your car seat.  On that note, you should always keep a safe distance from the car in front of you.  I consider a safe distance, the distance it takes me to get the car up to a speed to ram my way out of the situation.
  10. Secure your home like Fort Knox. I don’t think this needs explanation, but you need to do everything you can to make it unappealing and unhealthy for a burglar or homicidal maniac to get inside your house.  You should never have to shoot anybody if it is well secured, but have the guns ready to go to.