Please visit our sponsors

Rolclub does not endorse ads. Please see our disclaimer.
Page 1 of 3 123 LastLast
Results 1 to 10 of 29
  1. #1
    Senior Investor Offshore-Wealth.com's Avatar
    Join Date
    Jul 2005
    Location
    FREEDOMLAND
    Posts
    3,277
    Feedback Score
    0
    Thanks
    574
    Thanked 2,129 Times in 355 Posts

    Default Better Than Any HYIP Privacy-Rights-Army.com

    JOIN the FIGHT to REGAIN OUR PERSONAL PRIVATE DATA RIGHTS..........

    Most do not know it, but your private personal data is a commodity which thousands of companies are earning billions off of, but did you give your permission? Most don't have a clue, but the PrivacyArmy does, and so will you when you register.

    How do we stop it, simple, under commercial law if you contract with an entity, such as we have established, and you do not want your personal private date illegally violated, then we as a poweful group can initiate a class action against any company who uses our data again.

    We have a patent pending legal strategy to recoup billions from this illegal activity of selling our personal private data to other companies. We will not only sue the companies who are selling our data, but we will also sue those who purchase it, and this includes 30,000 companies we have identified to date who are selling, while hundreds of thousands are purchasing our data.

    If you remember the tobacco class action suits, you will get an idea of how many hundreds of millions there are at stake. WE, as registered members will pool all proceeds from all class action suits won and devide it equally amoung members. The potential is enormous, and with our press releases soon to begin, get positioned TODAY.

    We have arranged to have the same law firms who won tobacco suits working for us. We need to increase our associations registered membership to handle the millions of potential leads we will generate in press releases, and we will each be paid to assist these interested citizens to register and join the war against our rights be violated. With over 100,000,000 already registered on the DO NOT CALL list, don't think for a minute people are not concerned about their personal private data being violated. These same companies who no longer can call us on list means little, they still have our data and use it in mailings.

    JOIN US TODAY and SECURE YOUR PERSONAL DATA TOMORROW.............

    BETTER THAN ANY HYIP YOU WILL EVER LOSE MONEY IN.......................

    SHARE IN THE HUNDREDS OF MILLIONS CLASS ACTION SUITS.................

    Short term income is amazing, mid term even more amazing, but the potential long term class action suit proceeds will be awarded to each of us as a lifetime of PASSIVE income, just like HYIPsters have promised over and over, but never delivered on. Time to WAKE UP PEOPLE.....EARN REAL MONEY USING THE LEGAL SYSTEM TO OUR MUTUAL BENEFIT. NO MORE WASTING MONEY ON SCAMS, PONZI's, PYRAMIDS and HYIP's.
    __________________

  2. Sponsored Links
  3. #2
    Senior Investor Offshore-Wealth.com's Avatar
    Join Date
    Jul 2005
    Location
    FREEDOMLAND
    Posts
    3,277
    Feedback Score
    0
    Thanks
    574
    Thanked 2,129 Times in 355 Posts

    Default Privacy-rights-army.com

    Updated:2006-08-21 08:46:12
    Who’s Watching?
    By ERIC PETERS





    Big Brother will be watching you for sure by 2008 -- the year a proposed requirement that Event Data Recorders (EDRs) become mandatory standard equipment in all new cars and trucks will become law unless public outrage puts the kibosh on it somehow.

    EDRs are "black boxes" -- just like airplanes have. They can record a wide variety of things -- including how fast you drive and whether you "buckle-up for safety." The National Highway Traffic Safety Administration (NHTSA) wants EDRs to be installed in every new vehicle beginning with model year 2008 -- on the theory that the information will help crash investigators more accurately determine the hows and whys of accidents.

    But EDRs could -- and likely will be -- used for other purposes as well.

    Tied into GPS navigation computers, EDRs could give interested parties -- your local cash-hungry sheriff, for example -- the ability to take automated ticketing to the next level. Since the data recorders can continuously monitor most of the operating parameters of a vehicle as it travels -- and the GPS unit can precisely locate the vehicle in "real time," wherever it happens to be at any given moment -- any and all incidents of "speeding" could be immediately detected and a piece of paying paper issued to the offender faster than he could tap the brake. That's even if he knew he was in the crosshairs, which of course he wouldn't. Probably they'll just erect an electronic debiting system of some sort that ties directly into your checking account -- since the paperwork could not keep up with the massive uptick in fines that would be generated.


    What Do You Think?








    If you think this is just a dark-minded paranoiac vision, think again. Rental car companies have already deployed a very similar system of onboard electronic monitoring to identify customers who dare to drive faster than the posted limit -- and automatically tap them with a "surcharge" for their scofflaw ways. While this inventive form of "revenue enhancement" was challenged and subsequently batted down by the courts, the technology continues to be honed -- and quietly put into service.

    Already, 15-20 percent of all the cars and trucks in service have EDRs; most of these are General Motors vehicles. GM has been installing "black boxes" in its new cars and trucks since about 1996 as part of the Supplemental Restraint (air bag) system. Within a few years, as many as 90 percent of all new motor vehicles will be equipped with EDRs, according to government estimates -- whether the requirement NHTSA is pushing actually becomes law or not.

    The automakers are just as eager to keep tabs on us as the government -- in part to keep the shyster lawyers who have been so successfully digging into their deep pockets at bay. EDRs would provide irrefutable evidence of high-speed driving, for example -- or make it impossible for a person injured in a crash to deny he wasn't wearing a seat belt.

    Insurance companies will launch "safety" campaigns urging that "we use available technology" to identify "unsafe" drivers -- and who will be able to argue against that? Everyone knows that speeding is against the law -- and if you aren't breaking the law, what have you got to worry about?

    It's all for our own good.

    But if you get edgy thinking about the government -- and our friends in corporate America -- being able to monitor where we go and how we go whenever they feel like checking in on us, take the time to write a "Thanks, but no thanks" letter to NHTSA at DMS Web




  4. #3
    Senior Investor Offshore-Wealth.com's Avatar
    Join Date
    Jul 2005
    Location
    FREEDOMLAND
    Posts
    3,277
    Feedback Score
    0
    Thanks
    574
    Thanked 2,129 Times in 355 Posts

    Default Privacy Rights Army

    AUG. 21 5:30 P.M. ET Two AOL employees were fired and its chief technology officer has left the company in the aftermath of a privacy breach that involved the intentional release of more than 650,000 subscribers' Internet search terms.
    Although AOL had substituted numeric IDs for the subscribers' user names, the search queries themselves contained Social Security numbers, medical conditions and other data that could be traced to an individual. In fact, The New York Times was able to trace user 4417749 to Thelma Arnold, 62, of Lilburn, Ga. Maureen Govern, the technology chief, will be replaced on an interim basis by John McKinley, who had held that position before becoming AOL's president for digital services. The change takes effect immediately, according to a memo AOL Chief Executive Jonathan Miller sent to employees on Monday.


    "This incident took place because some employees did not exercise good judgment or review their proposal with our privacy team," Miller said in a second memo. "We are taking appropriate action with the employees who were responsible."

    The data release is among a series of breaches involving sensitive information in recent months. Unlike those resulting from computer hacking or missing laptops, however, the AOL data had been intentionally released as part of a program to assist academic researchers.
    AOL, a unit of Time Warner Inc., apologized two weeks ago for what it termed a mistake made by a company researcher who had failed to properly seek clearances before releasing three months' worth of search data. Though the information was meant for researchers, it was released to a public site and quickly circulated once a blogger discovered it.
    The company fired the researcher who released the data and that employee's direct supervisor, who reported to Govern, said one person familiar with the company's decisions. The person, who spoke on condition of anonymity because release of personnel information was not authorized, would not say whether Govern's departure was voluntary. The person also would not identify the two employees who were fired.
    Although the search terms released were not directly tied to real names, many individuals type their own names to find out what's being said about them. They may later search for online mentions of their credit card or Social Security numbers and perhaps for prescription drug prices, revealing their medical ailments. All the searches for each user name were linked to the same numeric ID in the released data.
    AOL removed the information from its site once senior executives learned of it, but by then copies already were widely available. Some people even created search sites just for the AOL data.
    At least two groups have asked the Federal Trade Commission to investigate. In its complaint, filed last week, the Electronic Frontier Foundation accused AOL of breaking a promise to protect its subscribers' privacy.
    Kevin Bankston, staff attorney with the EFF, said he hoped the breach would prompt Internet companies to be more forthcoming about what data they keep and for how long. Congress, he said, may need to intervene.
    "Rearranging personnel is not going to get to the root of this problem, a problem which extends far beyond AOL and to the rest of the Internet industry," Bankston said. "As an industry, the search engines have been unacceptably tightlipped about what their practices are regarding search logs."
    To prevent a recurrence, Miller said AOL will:
    -- Create a task force led by senior executives to review privacy and data-retention policies.
    -- Place additional limits on employee access to data, regardless of whether they are linked to individual accounts.
    -- Evaluate technologies designed to flag sensitive information. Under such a system, for instance, a 16-digit string might be assumed to be credit card number and kept out of research databases.
    -- Improve employee education and awareness on privacy.
    The fallout occurs as AOL tries to lure more people to its search services and other free, ad-supported features to offset a revenue decline that's likely to accelerate as the company stops charging for AOL.com e-mail accounts and software.
    AOL continues to rank fourth in search, behind Google Inc., Yahoo Inc. and Microsoft Corp.'s MSN, according to data released this week by Nielsen/NetRatings and comScore Media Metrix. Shares in Time Warner closed unchanged at $16.50 in Monday trading on the New York Stock Exchange.

  5. #4
    Senior Investor Offshore-Wealth.com's Avatar
    Join Date
    Jul 2005
    Location
    FREEDOMLAND
    Posts
    3,277
    Feedback Score
    0
    Thanks
    574
    Thanked 2,129 Times in 355 Posts

    Default Privacy Rights Army

    Privacy rights group files FTC complaint against AOL


    (AP) - SAN FRANCISCO-The backlash against AOL's recent release of its subscribers' search requests continued Wednesday as a privacy rights group filed a Federal Trade Commission complaint alleging the breach was intentional.
    AOL spokesman Andrew Weinstein scoffed at the allegation made by the World Privacy Forum, reiterating earlier descriptions of the breakdown as a "mistaken release" by a bumbling researcher.

    The San Diego-based World Privacy Forum's filing follows a similar complaints by the Electronic Frontier Foundation and PrivacyArmy, civil liberties groups in San Francisco and Nashville, TN.
    These groups are urging the FTC to investigate and possibly penalize AOL for its unauthorized release of about 19 million search requests made by about 658,000 subscribers during a three-month period ending in May.
    The files containing the search requests were publicly accessible for 10 days before AOL removed the information, giving people time to fetch copies that continue to circulate on Web sites like http://www.aolstalker.com.
    The FTC complaints allege AOL - owned by Time Warner Inc. -engaged in unfair or deceptive business practices by exposing its subscribers' information, which included requests for online pornography, murder tips and medical advice.
    Although no names were attached to the search requests, some of the data was revealing enough to figure out the identities of the people behind the queries.
    The FTC so far has not indicated whether it intends to investigate AOL.

  6. #5
    Senior Investor Offshore-Wealth.com's Avatar
    Join Date
    Jul 2005
    Location
    FREEDOMLAND
    Posts
    3,277
    Feedback Score
    0
    Thanks
    574
    Thanked 2,129 Times in 355 Posts

    Default Privacy Rights Army

    Endorsing the Privacy Army Cause 24/7/365
    Privacy News Alerts

    Every Day . . . Top of the Hour . . . Front-Page News

  7. #6
    Senior Investor Offshore-Wealth.com's Avatar
    Join Date
    Jul 2005
    Location
    FREEDOMLAND
    Posts
    3,277
    Feedback Score
    0
    Thanks
    574
    Thanked 2,129 Times in 355 Posts

    Default Privacy Rights Army

    RFID, its implications and how to defeat
    by Jon Winthrop



    Imagine a future in which your every belonging is marked with a unique number identifiable with the swipe of a scanner, where the location of your car is always pinpoint-able and where signal-emitting microchips storing personal information are implanted beneath your skin or embedded in your inner organs.

    This is the possible future of radio frequency identification (RFID), a technology whose application has so far been limited largely to supply-chain management (enabling companies, for example, to keep track of the quantity of a given product they have in stock) but is now being experimented with for passport tracking, among other things. RFID is set to be applied in a whole range of consumer settings. Already being tested in products as innocuous as shampoo, lip balm, razor blades, clothing and cream cheese, RFID-enabled items are promoted by retailers and marketers as the next revolution in customer convenience. Consumer advocates say this is paving the way for a nightmarish future where personal privacy is a quaint throwback.

    How RFID works
    There are two types of RFID tags: active and passive. When most people talk about RFID, they talk about passive tags, in which a radio frequency is sent from a transmitter to a chip or card which has no power cell per se, but uses the transmitted signal to power itself long enough to respond with a coded identifier. This numeric identifier really carries no information other than a unique number, but keyed against a database that associates that number with other data, the RFID tag's identifier can evoke all information in the database keyed to that number.

    An active tag has its own internal power source and can store as well as send even more detailed information.
    The RFID value chain involves three parts: the tags, the readers and the application software that powers these systems. From there, the data generated by the application software can interface with other systems used in an enterprise, or, if they obtain the information or collect it themselves, concievably by governments or more nefarious organizations.

    Where it’s used today
    Global companies such as Gillette, Phillips, Procter & Gamble, Wal-Mart and others see huge savings to be made from the use of RFID, and there are numerous pilot projects underway which are indicating savings in supply chains as well as the ability to add value to both product owner, product reseller and customer.

    But they’re just pilots, mostly. RFID is a long way from being everywhere, so far. Pharmaceutical tracking has long been held out as one of the flagship applications of RFID in the short term, yet just some 10 medications are expected be tagged using RFID technology on a large scale in the U.S. during 2006, analysts predict. Slow roll-outs are contrasting sharply with the optimism of a year ago, when evidence suggested tripling or even quadrupling of RFID for consumer goods tracking. Why? Uncertainty over pending legislation. There are a complex mixture of federal and new state laws (in particular Florida and California) intended to combat drug theft and counterfeiting that have implications for RFID. The details are still being worked out.

    Where it’s likely to be used tomorrow
    Depending which analysts you believe, the market for RFID technology will represent between 1.5 and 30 Billion USD by the year 2010. Analyst firm IDTechEx, which tracks the RFID industry, believes more than 585 billion tags will be delivered by 2016. Among the largest growth sectors, IDTechEx forsees the tagging of food, books, drugs, tires, tickets, secure documents (passports and visas), livestock, baggage and more.

    Buses and subways in some parts of the world are being equipped with RFID readers, ready for multi-application e-tickets. These are expected to make things easier for the commuter, and help stem the fraud from the current paper-ticket system. However the biggest problem facing rollouts of RFID for commercial micropayment tracking is apparently not technical, but involves agreeing on the fees charged by the clearing house and how credit from lost and discarded tickets will be divided.

    Passport tracking
    One of the highest profile uses of RFID will be passport tracking. Since the terrorist attacks of 2001, the U.S. Department of Homeland Security has wanted the world to agree on a standard for machine-readable passports. Countries whose citizens currently do not have visa requirements to enter the United States will have to issue passports that conform to the standard or risk losing their non-visa status.

    American and other passports are being developed that include RFID-based chips which allow the storage of considerable amounts of data such as fingerprints and digitized photographs. In the U.S., these passports are due to start being issued in October of 2006. Early in the development of these passports there were gaping security holes, such as the capability of being read by any reader, not just the ones at passport control (the upshot of this was that travelers carrying around RFID passports would have been openly broadcasting their identity, making it easy for wrongdoers to easily – and surreptitiously – pick Americans or nationals of other participating countries out of a crowd.)

    Those security blunders were initially corrected by adding metal shielding to the passport cover to minimize its readability when closed, dialing back the range of the electronics and adding a special electronic protocol called Basic Access Control (or BAC). This scheme required the passport to be opened and scanned before its data could have been properly interpreted by an RFID receiver. Unfortunately, in early February 2006, Dutch security experts managed to “listen in” on the communications between a prototype BAC-protected passport and a receiver and cracked the protocol. Which means the international authority developing this new global passport standard may need to go back to the drawing board as of this writing, because ‘bad guys’ could clearly stand in line at passport control and capture passport information. Details of the Dutch hack here.

    Implications for privacy seekers
    RFID has clear implications for those who are worried about their privacy and safety. Some of them are obvious, and some of them are not.
    • Can be read without your knowledge – Since the tags can be read without being swiped or obviously scanned (as is the case with magnetic strips or barcodes), anyone with an RFID tag reader can read the tags embedded in your clothes and other consumer products without your knowledge. For example, you could be scanned before you enter the store, just to see what you are carrying. You might then be approached by a clerk who knows what you have in your backpack or purse, and can suggest accessories or other items.
    • Can be read a greater distances with a high-gain antenna – For various technical reasons, RFID reader/tag systems are designed so that distance between the tag and the reader is kept to a minimum. However, a high-gain antenna can actually read tags from much further away, leading to privacy problems. Governments or others could punch through privacy screens and keep tabs on people.
    • Difficult to remove – RFID tags are hard for consumers to remove; some are very small (less than a half-millimeter square, and as thin as a sheet of paper) - others may be hidden or embedded inside a product where consumers cannot see them. New technologies allow RFID tags to be printed right on a product and may not be removable at all
    • Disruptions if maliciously jammed – RF signals can be jammed, which could complicate everyday life if RFID tags became essential. Imagine a central bus or train station, maybe an airport, where suddenly everyone could neither be ID'd or access their cash accounts. A single hour of jamming during morning rush over a large area could cost a large city untold millions of dollars in delayed commerce and transport. It would be worse than a mass-transit strike, and easier to repeat.
    • Could be linked to a credit card number – The Universal Product Code (UPC) implemented with barcodes allows each product sold in a store to have a unique number that identifies that product. Work is proceeding on a global system of product identification that would allow each individual item to have its own number. When the item is scanned for purchase and is paid for, the RFID tag number for a particular item can be associated with the credit card number it was purchased with.
    • Potential for counterfeit – If an RFID tag is being used to authenticate someone, anyone with access to an RFID reader can easily capture and fake someone else’s unique numeric identifier, and therefore, in essence, their electronic 'signature'. If an RFID-tagged smartcard is used for shopping, for instance, anyone who intercepted and reverse-engineered your number, and programmed another card with it, could make charges on your account.
    • Marking for crime – Even after you leave a store, any RFID devices in things you buy are still active. A thief could walk past you in the mall and know exactly what you have in your bags, marking you as a potential victim. Someone could even circle your house with an RFID scanner and pull up data on what you have in your house before robbing it. As a result, there are now discussions of “zombie” RFID tags that expire upon leaving the store and reanimate if the product is ever returned to the store and returned to the supply chain.
    • Marking for violence – Military hardware and even clothing are beginning to make use of RFID tags to help track these items through supply chains. RFID is being used today by the U.S. military to track materials in Iraq and Afghanistan. Some analysts are concerned about particular items being associated with high-level officers that could trigger roadside bombs via an RFID scan of cars going by. (Thankfully, RFID tags retained close to the body can rarely be scanned. For instance, UHF tags, the kind being most widely deployed, are virtually unreadable near the body because of its high water content.)
    Some have suggested that mobile phones are already as great a threat to privacy as RFID. In the case of mobile phones, information about your whereabouts and calling patterns is regularly available to your service provider, a centralized and highly regulated source of information gathering. An adversary with special-purpose equipment would also have the capability of tracking your mobile phone, but this would require significant expertise and investment. See our article Cell phone hazards.

    What makes RFID a more significant privacy threat than mobile phones is the fact that readers will be readily available and ubiquitously deployed. In other words, RFID readers will soon be an accepted element of everyday life, while eavesdropping equipment for mobile phones is unlikely to be.

    How to thwart RFID technology
    There are a few approaches you can take to thwart RFID tags … but before you take proactive steps, note that sometimes the very absence of a tag or its signal in places it’s expected could arouse suspicion. For instance, if you’re carrying what is expected to be an RFID-tagged passport and your tag isn’t working, say, you may invite unwanted scrutiny. Be careful which tags you choose to disrupt.

    The simplest, most permanent approach to disable RFID tags is to destroy them. If you can detect them and wish to permanently render them useless, remove them and smash the small chip component with a hammer. If you’re not sure whether a product you own contains a tag, consider putting it in a microwave to destroy the tag if the object is otherwise safe to be microwaved. Be careful with some plastics. Note there have been reports of RFID materials catching fire in microwaves.

    If removing the tag is not practical, there are four general ways to disrupt RFID tag detection.
    • Blocking – Construct a conductive foil box (even tin foil is good) around the tag. If you are concerned about RFID emissions from work badges, school IDs, new generation drivers licenses, credit cards, and even cash in the future containing RFID tags, buy or make an RFID-proof wallet. RFID wallet project details are easy to find on the Internet.
    • Jamming – Since RFID systems make use of the electromagnetic spectrum like wireless networks or cellphones, they are relatively easy to jam using a strong radio signal at the same frequency the tag operates. Although this would only be an inconvenience for consumers in stores (longer waits at the checkout), it could be disastrous in other environments where RFID is increasingly being used, like hospitals, or in military combat situations. Such jamming devices, however, would in most cases violate government regulations on radio emissions. A group of researchers in Amsterdam have theorized that a personal RFID jammer is possible (read their paper here) but the device seems only theoretical at this time.
    • Repeated interrogation – Active RFID tags that use a battery to increase the range of the system can be repeatedly interrogated to wear the battery down, disrupting the system.
    • Popping – Generating a very strong pulse of radiation at the right frequency can cause RFID tags to resonate and break.
    What strategy you should pursue depends on what RFID privacy threats you are trying to thwart and your technical expertise.
    Related Content
    ICAO specification for BAC passport protection algorithm
    Details of Dutch crack of e-passport algorithm
    Cell phone hazards
    RFID Guardian: A battery-powered mobile device for RFID privacy management

  8. #7
    Senior Investor Offshore-Wealth.com's Avatar
    Join Date
    Jul 2005
    Location
    FREEDOMLAND
    Posts
    3,277
    Feedback Score
    0
    Thanks
    574
    Thanked 2,129 Times in 355 Posts

    Default Wake Up People......you Are Being Ripped Off???

    WAKE UP PEOPLE................LATEST UPDATE YOUR PRIVACY VIOLATIONS

    Consumer Reports makes this abundantly clear in the Oct 6th issue. Going beyond this to the aggressive snooping sophistication is exposed by Kathryn Albrecht in her book Spychips , a #1 best-seller in America. Millions have read her book and been scared witless. The problem is that those who expose the problems have no answers other than ranting and moaning.

    Only YOU and I TOGETHER are the answer, taking effective action.

    Let me point out a strategy clarification regarding filing our opt-out letters with our vendors. Rather than piecemeal them in ones and twos, the Privacy Army strategy is to target specific vendors at one time with an avalanche of opt-out letters from masses of our people, each backed up by matching letters from our law firms averring that they have knowledge of a contract in force for each of us which gives us legal standing to have asserted our rights and be emotionally damaged and financially damaged by the continuing selling of our data by the vendor. We shall be contacted at the time and we each make our individual decision for each targeted firm as to our own participation in that particular outreach. Fully ethical and chillingly effective. Imagine yourself being an officer of one of these privacy piracy corporations and you receive thousands of letters during the same week from thousands of individuals with the same branding and coupled in each case by a letter from known, powerful class-action attorneys. Now imagine your reading that you are reading being put on legal notice that to resist opting each of us out of the continuing selling of info for each of the plaintiffs demonstrates a pattern of repetitive, purposeful defrauding of members of the class, which initiates RICO laws. Now you know that you can no longer hide behind the corporate veil. You learn that you cannot escape even by quitting your job, because you were in position when the theft-reselling violations took place. You have now two choices : either let these families off the hook by removing them and their data from future sales, or else face the personal and corporate consequences of your resistance. As you compare this collective, thoughtful action to regain control of our own private property, do you think you would have the same impact by writing your own letter to the same pirates ? [we should be able to hear their laughter from where we sit ].





    Privacy Piracy Snooping & Cross-Referencing
    In order to add value to their respective data files
    on you, the data moguls dig deeply into all available
    records, public and private. Is this what you want ?

    Utility company info Settlements in the past
    Past Employment info Garnishments
    Present employment info Liens
    Mortgage info Levies
    Real Estate info Debt records
    Medical info Newspaper clippings
    Bank account(s) info Savings accounts
    Credit card(s) info Checking accounts
    Debit card(s) info Insurance policies in force
    Department store info Retirement accounts
    Fuel card info Ownership of debt instruments
    Wholesale card info Ownership of equities
    Grocery store info Travel patterns, history
    Pharmacy info Hobbies
    Car dealership info Disabilities of record
    Tax preparation info Military record
    Internet surfing habits info Veteran records
    Affiliate group info Preferences for every category
    Alumni assoc. info Mother's maiden name
    Health insurance info Every password/non-secure sites
    Car insurance info Answers to password questions
    Life insurance info Every email address
    Friends & others who have been references
    Membership info for all group involvement
    Passport info Names of all relatives and addresses
    Drivers license info Every past street address
    Hospital data Schools of your kids, grand kids
    Viewing data from satellite TV & cable TV
    Birth records Linkage to past spouses
    Marriage records Online purchase history
    Divorce records Every check you have ever written
    Civil suit records Every traffic incident of your life
    Criminal records Current pending suits
    Credit complaints pending Above sold daily to all who pay for it.

    WAKE UP PEOPLE.............PUT YOUR MONEY IN A REAL DEAL,
    NOT THE TYPICAL RIP OFF HYIP. THIS LEGAL CLASS ACTION
    POOL WILL PAY OFF BETTER THAN ANY HYIP I HAVE SEEN.

    Good luck to all, Mike

  9. #8
    Senior Investor Offshore-Wealth.com's Avatar
    Join Date
    Jul 2005
    Location
    FREEDOMLAND
    Posts
    3,277
    Feedback Score
    0
    Thanks
    574
    Thanked 2,129 Times in 355 Posts

    Default Wake Up People..........you Are Being Ripped Off???

    Google privacy battle likely to end in compromise

    Dominic Timms
    Wednesday March 15, 2006
    MediaGuardian.co.uk



    A legal battle between the US justice department and internet giant Google looks set to end in compromise, after a US judge signalled he intended to make the company surrender some, but not all, of the data on its huge search database. The US district court judge James Ware told a hearing last night he would make a decision "very quickly", adding that he would allow the justice department access to some of Google's index of websites and search terms.
    The two sides came to court after Google refused the demands of the attorney general, Alberto Gonzales, to hand over records of the searches made on its website in January, to aid the administration in its battle against online child pornography.
    In January, the justice department had demanded access to records of more than 1 million searches but it has dropped its demands to just 50,000 URLs - internet addresses - and 5,000 search terms of which, it said, it would only look at 1,000.
    Judge Ware said he remained concerned about Google users' privacy but said the reduced requests, coupled with a government promise to compensate the company for lost programming days, meant he would grant the government at least some of its demands.
    "It is my intent to grant some relief to the government," said Judge Ware of the US district court for the Northern District of California.
    Facing similar demands from the justice department, other internet operators such as AOL, Microsoft and Yahoo! have agreed to hand over similar records.

    * * * *
    Thought you would like to see more into the trend. Insatiable appetites for info exceeding the Nazis. Who cares eough to act ?

    I think you know who.


    Good luck to all, Mike

  10. #9
    Senior Investor Offshore-Wealth.com's Avatar
    Join Date
    Jul 2005
    Location
    FREEDOMLAND
    Posts
    3,277
    Feedback Score
    0
    Thanks
    574
    Thanked 2,129 Times in 355 Posts

    Default Timing Is Everything.......PRIVACY-RIGHTS-ARMY.com

    Your PRIVACY For Sale
    is the title of a feature investigative article in the October issue
    of Consumer Reports (pg. 41) just released today!
    ____________________________________

    Here's the CR Quick Take...
    Large data brokers have your numbers---Social Security, phone,
    and credit cards. They might also know about the drugs you take,
    what you buy, your political party, and your sexual orientation.
    When we investigated this secretive industry, we discovered:

    >> Data brokers are willing to sell even your most sensitive
    information to paying customers, some of them crooks.
    >> When CR staffers asked to see their own files, they received
    scant information. One report contained 31 errors.
    >> The federal government is a steady customer of the data collectors,
    but there's no way to know what it collects or exactly how much it pays.
    >> Pretexters, who lie to get information about you and sell it to anybody,
    operate largely free of regulation.

    A case in point is Elizabeth Rosen. Until Valentine's Day weekend 2005,
    she had never heard of ChoicePoint. But ChoicePoint, it turns out, knew
    plenty about her. That's when Rosen, a nurse in California, received a letter
    and found out that the Alpharetta, Georgia company had collected information
    about her. Among the sensitive items it had: Social Security number, records
    of her insurance claims, her current and past addresses, and her employment
    history. Now, ChoicePoint was informing her that it had inadvertently disclosed
    her information --- and that of 165,000 other Americans --- to a group of criminals.
    What galls Rosen more, she says, is that all along, ChoicePoint itself "was
    profiting by collecting and selling confidential information about me without my
    knowledge or consent."

    If you don't think you're confidential information is being sold, just type
    your name and click your state on this search engine:

    http://www.zabasearch.com

    Now, who would pay $49.95 for your Social Security number, address, phone
    number and other information? How about 13 million illegal aliens!

    According to this past Sunday edition of the Atlanta Constitution, this affected
    8.9 million Americans, a loss of $56.7 billion ($6343/per person) last year!

    Would you like to know how to recover your privacy and
    make money selling the information you don't mind selling?

    Just call in Thurs/Aug30 at 9:20pm EST, 8:20pm CST, 7:20pm MST, 6:20pm PST

    Call in Number: (620) 294-4000 Pin: 988055#

    WAKE UP PEOPLE..............

  11. #10
    Senior Investor Offshore-Wealth.com's Avatar
    Join Date
    Jul 2005
    Location
    FREEDOMLAND
    Posts
    3,277
    Feedback Score
    0
    Thanks
    574
    Thanked 2,129 Times in 355 Posts

    Default WAKE UP PEOPLE.....Timing Is Everything..Privacy-Rights-Army.com

    ANNOUNCEMENT.....................

    All around us we are seeing the facts come to the surface about our privacy being violated every singe day of our lives. What is wrong with people who do not care? This is the reason we are all in this situation, WE LET IT HAPPEN. If you don't value your Constitutional Rights to Privacy, then you will lose it.

    Timing is everything in life, and here we have an opportunity to spread the word of what the PrivacyArmy is all about, it is ABOUT YOU, ME and EVERYONE in the free world. Why anyone would not get involved with us is beyond my comprehension. ROL members are international, this we know, but for those in U.S. and CAN to start is just the beginning.

    Over the years I have seen many opportunities come and go, and I have researched thousands, but I have never seen one even close to what we have here. A common interest of everyone in these days where we see how our personal private data is being sold to hundreds of thousands every day. How does this make you feel when commercial enterprises are profiting off of YOUR NAME?

    I don't know how to better put it, this is ILLEGAL. DO YOU CARE ABOUT YOUR PERSONAL PRIVACY RIGHTS? Well, evidently not for only a few dozen have registered to date. We have not yet officially launched, but come on, it is FREE and you can EARN while you LEARN, so what is it, you DON'T CARE about companies profiting off YOUR PERSONAL PRIVATE DATA?

    Bottom line is this, we are being robbed, and unless you do something about it, it will not stop, and in fact, it is getting worse every day. No matter who you are, you are being robbed, so when are you going to wake up and put your foot down and STOP IT? Do it TODAY. If not for the reasons listed above, then do it OUT OF GREED. (g)

    For those who are more interested in making money than preserving our Constitutional Rights to Privacy, then fine, that is OK with me. We are all money motivated or we would not be here on this forum. We have all lost money, and we see many complaining about it, so lets do something to change this around. PrivacyArmy is just such an opportunity which can and will change your life and provide you financial freedom.

    Skeptical, yes, so way I, but once you learn what I have, this is better than anything I have ever seen before, and believe me, I have seen it all. (g) We are all people who enjoy helping others, so now is the time to step forward and prove it. Share this valuable information with everyone you know. Yes, I know all about the NFL club, no friends left, after all, we have all been burned by programs we have shared with others, but here is the opportunity to change all that. This is a mission you can be proud to educate others about, as there is nothing as near or dear to us than our RIGHT TO PRIVACY granted under the CONSTITUTION.

    Look in the news, privacy issues are front page headline news. Who here has not heard that the VA Administration records were stolen, banks losing our credit card records with all our personal private data attached. What about the credit bureaus who sell your information to anyone who registers as a subscriber? So many companies who are leaking our information, including AOL which was in the news last week, Google giving up your privacy, and on and on it goes.

    TIMING..............This is what we have here, perfect timing. The press is selling our Privacy Rights Message for us. And when we launch, and OUR PRESS RELEASES start with a legal solution to issue, watch what happens next. WE WILL BE OVERWHELMED WITH INQUIRES, and we NEED YOU to handle the questions as a CONSUMER ADVOCATE with the PRIVACYARMY.
    The TIME IS NOW to JOIN US..............and it is FREE TO REGISTER.

    Here is latest link on CONSUMER REPORTS INVESTIGATION.


    Kansas City infoZine News - Consumer Reports Investigation Warns Your Privacy Is for Sale - USA

  12. Sponsored Links
Page 1 of 3 123 LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Share |