NOTICE: INTELLECTUAL PROPERTY
All intellectual property rights to the various posts, materials, and cartoons belong solely to their respective creators. No claim is made here to the intellectual creations of others.
Pointing out the arguably creepy features of Google that include anonymised ping-backs from cell phone accelerometers to see how fast people are going, the Guardian’s article goes on to explain that this same technology can easily determine how busy your local bar is, by the number of data streams coming from a particular location, if it corresponds to a local hotspot, giving the end user some idea of how many people are crowding around inside their favorite local watering hole or park, or conceivably anywhere you wanted that had been registered in such a way.
It is profound, the depth of data being moved around today to determine movements of the people. See for yourself, some recent articles on the subject.
From The Guardian: The technology giant is now using live data to let you know exactly how crowded your local cafe, restaurant or tourist attraction is. Does it work?
One of the creepiest – and most useful – Google inventions has been its ability to predict traffic jams by using anonymised ping-backs from mobile phones to tell how fast everyone is moving.
Now, the technology giant is rolling out the same thing for places using live data. Although, since July 2015, the Popular Times section of Google Maps has provided a bar graph showing how busy a bar, museum or restaurant is at any given time, this is just based on averages.
How accurate will the new feature be? Rather than just believe our Alphabet overlords, we road-tested the system by dawdling around five of London’s biggest attractions.
See the conclusions at the Guardian website. It’s astounding to think of the power at the fingertips of the people who control the data input flows, for they surely know much more information about those streams of data than they are allowed to publicly state. What power it must be to create AI that can watch over all of it, as they are planning now, with Deep Mind technology and the Google AI divisions. Could it possibly be that Google is already an AI that is loose and not in control by anyone and that it predicts what we want before we even ask for it simply by a matter of running an algorithm against our social media profiles?
First of all, download or print these instructions. Keep them with your survival gear, if you have prepared one.
Your government is displeased with the communication going on in your location and pulls the plug on your internet access, most likely by telling the major ISPs to turn off service.
This is what happened in Egypt Jan. 25, 2012 prompted by citizen protests, with sources estimating that the Egyptian government cut off approximately 88 percent of the country’s internet access. What do you do without internet? Step 1: Stop crying in the corner. Then start taking steps to reconnect with your network. Here’s a list of things you can do to keep the communication flowing.
MAKE YOUR NETWORK TANGIBLE
Print out your contact list, so your phone numbers aren’t stuck in the cloud. Some mail services like Gmail allow you to export your online contact list in formats that are more conducive to paper, such as CSV or Vcard, and offer step-by-step guides on how to do this.
BROADCAST ON THE RADIO
CB Radio:Short for “Citizens Band” radio, these two-way radios allow communication over short distances on 40 channels. You can pick one up for about $20 to $50 at Radio Shack, and no license is required to operate it.
Ham radio:To converse over these radios, also known as “amateur radios,” you have to obtain an operator’s license from the FCC. Luckily, other Wired How-To contributors have already explained exactly what you need to do to get one and use it like a pro. However, if the President declares a State of Emergency, use of the radio could be extremely restricted or prohibited.
GMRS:The General Mobile Radio Service (GMRS) is a licensed land-mobile FM UHF radio service in the United States available for short-distance two-way communication. It is intended for use by an adult individual who possesses a valid GMRS license, as well as his or her immediate family members… They are more expensive than the walkie-talkies typically found in discount electronics stores, but are higher quality.
Family Radio Service:The Family Radio Service (FRS) is an improved walkie-talkie radio system authorized in the United States since 1996. This personal radio service uses channelized frequencies in the ultra high frequency (UHF) band. It does not suffer the interference effects found on citizens’ band (CB) at 27 MHz, or the 49 MHz band also used by cordless phones, toys, and baby monitors.
Micro-broadcasting:Micro-broadcasting is the process of broadcasting a message to a relatively small audience. This is not to be confused with low-power broadcasting. In radio terms, it is the use of low-power transmitters to broadcast a radio signal over the space of a neighborhood or small town. Similarly to pirate radio, micro-broadcasters generally operate without a license from the local regulation body, but sacrifice range in favor of using legal power limits.
Packet Radio Back to the ’90s: There do exist shortwave packet-radio modems. These are also excruciatingly slow, but may get your e-mail out. Like ham radio above it requires a ham radio license because they operate on ham radio frequencies.
Set up a phone tree:According to the American Association of University Women, a phone tree is “a prearranged, pyramid-shaped system for activating a group of people by telephone” that can “spread a brief message quickly and efficiently to a large number of people.” Dig out that contact list you printed out to spread the message down your pyramid of contacts.
Enable Twitter via SMS:Though the thought of unleashing the Twitter fire hose in your text message inbox may seem horrifying, it would be better than not being able to connect to the outside world at all. The Twitter website has full instructions on how to redirect tweets to your phone.
Call to Tweet: A small team of engineers from Twitter, Google and SayNow, a company Google acquired recently, made this idea a reality. It’s already live and anyone can tweet by simply leaving a voicemail on one of these international phone numbers (+16504194196 or +390662207294 or +97316199855) and the service will instantly tweet the message using the hashtag #egypt. No Internet connection is required. People can listen to the messages by dialing the same phone numbers or going to the Twitter account, speak2tweet.
If you need to quickly send and receive documents with lengthy or complex instructions, phone conversations may result in misunderstandings, and delivering the doc by foot would take forever. Brush the dust off that bulky old machine, establish a connection by phone first with the recipient to make sure his machine is hooked up, then fax away.
You may not need a fax machine to send or receive faxes if your computer has a dial-up fax application.
NON-VIRTUAL BULLETIN BOARD
Sometimes we get so wrapped up in the virtual world that we forget about resources available in the real world. Physical bulletin boards have been used for centuries to disseminate information and don’t require electricity to function. If you are fortunate enough to be getting information from some other source why not share it with your friends and neighbors with your own bulletin board? Cork, magnetic and marker bulletin boards are as close as your nearest dime store and can be mounted just about anywhere. And if push comes to shove you can easily make your own with scrap wood lying around the house.
Getting back online – While it might be relatively easy for a government to cut connections by leveraging the major ISPs, there are some places they wouldn’t get to so readily, like privately-owned networks and independent ISPs.
FIND THE PRIVATELY RUN ISPs
In densely populated areas, especially in central business districts and city suburbs there are multiple home WiFi networks overlapping each other, some secure, some not. If there is no internet, open up your WiFi by removing password protection: If enough people do this it’s feasible to create a totally private WiFi service outside government control covering the CBD, and you can use applications that run Bonjour (iChat on Mac for example) to communicate with others on the open network and send and receive documents. **needs more clarification
If you are a private ISP, it’s your time to shine. Consider allowing open access to your Wi-Fi routers to facilitate communication of people around you until the grid is back online.
RETURN TO DIAL-UP
According to an article in the BBC about old tech’s role in the Egyptian protests, “Dial-up modems are one of the most popular routes for Egyptians to get back online. Long lists of international numbers that connect to dial-up modems are circulating in Egypt thanks to net activists We Re-Build, Telecomix and others.”
Dial-up can be slow. Often, there is a lightweight mobile version of a site that you can load from your desktop browser quickly despite the limitations of dial-up. Examples: mobile.twitter.com, m.facebook.com, m.gmail.com.
Most wireless routers, PCs, laptops, and even some ultramobile devices like cellphones have the ability to become part of an “ad hoc” network, where different “nodes” (all of the devices on the network) share the responsibility of transmitting data with one another. These networks can become quite large, and are often very easy to set up. If used properly by a tech-savvy person, such networks can be used to host temporary websites and chat rooms. There are many internet tutorials on the internet for ad hoc networking, so feel free to Google some.
Apple computers tend to have very accessible ad hoc functionality built in, including a pre-installed chat client (iChat) that will automatically set up an ad hoc “Rendezvous” chatroom among anybody on the network, without the need for an external service like AIM or Skype. Ad hoc network-hosting functionality is built in to the Wi-Fi menu.
Windows computers have several third-party ad hoc chat applications available (such as Trillian) and setting up an ad hoc Wi-Fi network is almost as simple as on a Mac.
Linux operating systems, of course, have plenty of third-party apps available, and most distros have ad hoc network-creation support built in.
BUILD LARGE BRIDGED WIRELESS NETWORK
Using popular wireless access point devices like a Linksys WRT54G, you can create a huge wireless bridged network — effectively creating a Local Area Network (LAN), or a private Internet that can be utilized by all users within range using a Wi-Fi enabled device.
You can also link multiple devices together wirelessly, extending the range of your network. Most access points will cover a 100 meter area and if your wireless device is built to support the 802.11n wireless standard, you will get almost a 500 meter coverage area for each access point.
To build a wireless bridge, check out the dd-wrt wiki, and learn how to configure Linksys WRT54G as a wireless client using this Anandtech thread.
A used DS family device can be purchased inexpensively. In addition to wi-fi, the DS supports its own wireless protocols. Using Pictochat, it is possible to chat with nearby DS users without having any DS games. Unfortunately, the range is quite short.
Some games, such as the fourth generation Pokemon games, support mail items. Thus you can send your message under the guise of just playing a game. Mail items can be sent through the Internet if you can get on the net and you and your partner(s) have each other’s friend codes.
The original DS and the DS Lite do support the Opera web browser, but finding the game card and memory pack may be very difficult. Starting with the DSi, Opera is downloadable.
Your computer has the ability to set up your own INTRANET. This was done BEFORE the internet was popularized in two ways: Your computer dialed up other computers and sent them the contents of a message board, or local people people dialed into your computer. A nationwide system can be set up this way with a central location sending to many cities then each city sending out the info locally.
If you’re going to post government secrets on your work-around site, you may want to set up an untraceable account. Really, you only need a mail drop, an assumed name, a prepaid credit card you can get at many stores to set up service.
GET SATELLITE ACCESS
You can have very, very slow internet if you have something similar to an Iridium phone, which would allow you to do dial up at 2400 baud, which at least gives you e-mail. This will also work when your government has shut down GSM and telephone access, and will work pretty much anywhere on the planet. If you’re in the right place, get yourself KA-SAT access which is satellite broadband and will not be routed through any internet exchange that certain local governments may monitor or block (unless that government is part of EU or er … Uncle Sam.
BACK TO BASICS
Make some noise: Have an air horn or other loud instrument handy. It may just come down to being able to alert people in your local geographic area, who would otherwise be unaware of an emergency. You may also want to learn a bit about Morse code and have a cheat sheet available.
This week’s hearing into the January raid against Kim Dotcom’s New Zealand mansion has turned up interesting new evidence today. Under questioning from a defense lawyer, a senior police officer has admitted that top New Zealand officers and members of the FBI watched the raid live via video link. Only adding to the intrigue is the revelation that a secret government unit were present at the pre-raid meeting.
This week Kim Dotcom, police and other officials have been giving evidence in the Auckland High Court as part of a hearing to determine what happened during the January raid on his New Zealand mansion.
By now the backdrop to the story is well-known, particularly after a video recorded during the raid was published online this week.
It largely confirmed what has been reported thus far – armed anti-terrorist officers, helicopters and significant force were all used in the pursuit of individuals alleged to have been involved in copyright infringement in the United States.
It is known that U.S. authorities had “boots on the ground” in New Zealand in pursuit of Dotcom and his associates and today that assertion was further underlined.
Under questioning from defense lawyer Guyon Foley, Detective Inspector Grant Wormald of the NZ Organized and Financial Crime Agency had to reveal how senior police officers and the FBI had received their information as the raid panned out.
“What information was coming back to your headquarters group in relation to what was happening as to progress of the raid?” Mr Foley asked.
“We received phone calls from the scene in respect to the fact that at least three of the defendants apart from Mr Dotcom have been located,” Mr Wormald said, initially stumbling over his words.
“Radio contact with officers on the ground?” Foley questioned.
Wormald said that due to the raid being carried out by the Special Tactics Group they did not have direct radio contact since STG, New Zealand’s anti-terror force, use only encrypted communications.
“Any video feed from anywhere?” Foley pushed. After another pause, Wormald said that there had indeed been live video.
“We had a video feeding back to the police station,” Wormald said.
“Really?” Foley added with a surprised tone. “From where?”
“I’m not going to discuss that,” Wormald responded.
What happened next was hidden from the media but the intrigue didn’t stop there. Detective Inspector Wormald also admitted that a secret government organization had been involved in the raid on the Dotcom mansion.
Paul Davison, QC, acting on behalf of the defense, asked Wormald if the group of people at the pre-raid meeting belonged to the Security Intelligence Service. He denied that, but refused to say exactly who they were.
“They work for the government,” he said.
On Twitter, Kim Dotcom said people should expect some big news in the coming weeks.
“The truth is coming out!” he said. “And we are just getting started.”
This deceptive piece of ‘journalism’ reeks of some sort of psy-op to put pressure on people to join the biggest spy operation ever created so they can spew out data points for the NSA and the spying apparatus in this country.
So, not having a Facebook account is not considered suspicious behavior. There you have it.
Facebook has become such a pervasive force in modern society that increasing numbers of employers, and even some psychologists, believe people who aren’t on social networking sites are ‘suspicious.’
The German magazine Der Taggspiegel went so far as to point out that accused theater shooter James Holmes and Norwegian mass murder Anders Behring Breivik have common ground in their lack of Facebook profiles.
On a more tangible level, Forbes.com reports that human resources departments across the country are becoming more wary of young job candidates who don’t use the site.
Normal: Facebook has become so pervasive in this culture that not having a profile is considered ‘abnormal’
The common concern among bosses is that a lack of Facebook could mean the applicant’s account could be so full of red flags that it had to be deleted.
Slate.com tech reporter Farhad Manjoo wrote in an advice column that young people shouldn’t date anyone who isn’t on Facebook.
‘If you’re of a certain age and you meet someone who you are about to go to bed with, and that person doesn’t have a Facebook page, you may be getting a false name. It could be some kind of red flag,’ he says.
Manjoo points out that these judgements don’t apply to older people who were already productive adults before social media became widespread.
The tech news site Slashdotsummed up Der Taggspiegel’s story about social networking as ‘not having a Facebook account could be the first sign that you are a mass murderer.’
Loner: James Holmes, the accused Colorado theater shooter, does not appear to have friends and did not have a Facebook page
It points out that Holmes, who is accused of killing 12 people and an unborn child and wounding 58 others at a movie theater in Aurora, Colorado, and Breivik, who murdered 77 people with a car bomb and mass shooting, did not use Facebook and had small online footprints.
Breivik used MySpace and Holmes was reportedly on the hookup site Adult Friend Finder.
Psychologist Christopher Moeller told the magazine that using Facebook has become a sign of having a healthy social network.
Psychologists have noted that Holmes, along with several noted mass murderers, have lacked any real friends.
And this is what the argument boils down to: It’s the suspicion that not being on Facebook, which has become so normal among young adults, is a sign that you’re abnormal and dysfunctional, or even dangerous, ways.
It’s on — at least partially: Reddit has announced that it will go dark for 12 hours to protest the Stop Online Piracy Act, or SOPA, and Wikipedia founder Jimmy Wales has said that he hopes to coordinate with the site so that Wikipedia does the same. Will other sites join in? Should we prepare for the Great Internet Strike of 2012?
Writing that it’s “not taking this action lightly,” Reddit announced on Tuesday that it will black out its site on Jan. 18 for 12 hours, starting at 8 a.m. E.T. During that period, the site’s content will be replaced with “a simple message about how the PIPA/SOPA legislation would shut down sites like reddit, link to resources to learn more, and suggest ways to take action.” The company will also run a live video stream of that day’s House Committee on Oversight and Government Reform hearing on Internet security, intellectual property and economic growth.
On the site’s blog, the Reddit team admitted that “we’re as addicted to reddit as the rest of you,” but also explained that “we wouldn’t do this if we didn’t believe this legislation and the forces behind it were a serious threat to reddit and the Internet as we know it. Blacking out reddit is a hard choice, but we feel focusing on a day of action is the best way we can amplify the voice of the community.” The company says support for a blackout isn’t unanimous among the Reddit community, and it is asking for input as it decides what to do next.
Read more: http://techland.time.com/2012/01/12/sopa-reddit-confirms-january-18-blackout-wikipedia-and-others-may-follow/#ixzz1jHT7Nu7l
TorrentFreak, a news site devoted to all things BitTorrent, has published the results of an investigation they conducted into downloads via BitTorrent software at IP addresses owned by some of the entertainment industry’s biggest companies.
Using Russian site YouHaveDownloaded.com, which identifies a user’s torrent downloading activity based on their IP address, TorrentFreak took known IPs belonging to Sony, Fox, and NBC Universal and tested them. They found rampant downloading of a variety of programming – movies, music, and TV shows – at all three companies. Highlights of the findings include the Paramount Studios film Super 8 being downloaded by someone at Fox, the complete first season of HBO’s Game of Thrones being downloaded at an NBC Universal office in Fort Lauderdale, the 2011 Conan the Barbarian remake being downloaded at Sony, and someone at Google’s New York office downloading a copy of Windows 7. They also checked on the IP of the San Francisco headquarters of BitTorrent, Inc., where they found no downloading activity at all.
As remarkable as these results are, they are made all the more amazing by debate currently raging over SOPA, the anti-piracy legislation currently working its way through the US Congress. The companies whose activity TorrentFreak examined are among the most outspoken proponents of the legislation, and have a history of aggressively pursuing those who violate copyright by downloading their content.
US authorities have initiated the largest round of domain name seizures yet as part of their continued crackdown on counterfeit and piracy-related websites. With just a few days to go until “Cyber Monday” more than 100 domain names have been taken over by the feds to protect the commercial interests of US companies. The seizures are disputable, as the SOPA bill which aims to specifically legitimize such actions is still pending in Congress.
The Department of Justice (DOJ) and Immigration and Customs Enforcement (ICE) have resumed “Operation In Our Sites”, the domain name seizing initiative designed to crack down on online piracy and counterfeiting.
The new round comes exactly a year after 82 domains, including Torrent-Finder, were taken over in 2010. At the time ICE labeled the actions “Cyber Monday crackdown,” referring to the Monday following Thanksgiving where consumers are persuaded to shop online.
TorrentFreak has identified more than 130 domains taken over by the government during the last 24 hours, which makes this the largest seizure round to date. The authorities have yet to comment via official channels, but we assume that they will use the same justification for the domain seizures as they did last year.