Tom,<br><br>I use Norton 360. <br><br>So far as where the CIA will send me? Someplace by the sea. *L*<br><div class="gmail_quote">On Thu, May 24, 2012 at 7:30 PM, Tom Hansen <span dir="ltr"><<a href="mailto:thansen@moscow.com" target="_blank">thansen@moscow.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div bgcolor="#FFFFFF"><div>It is my impression that this information being retrieved by outside agencies is NOT necessarily the product of some sort of covert email espionage as it is the product of digitized "cookies" (as they are called) that are purposely deposited into your computer to lightly monitor your email activity. This activity can be drastically reduced by installing effective anti-virus/Internet protection software.</div>
<div><br></div><div>I protect my computers with Norton 360. Works great!</div><div><br></div><div>Note to Janesta: Let me know where the CIA assigns you after you get your CDL, ok? </div><div class="im"><div><br><div>Seeya round town, Moscow.</div>
<div><br></div><div>Tom Hansen</div><div>Moscow, Idaho</div><div><br></div><div>"If not us, who?</div><div>If not now, when?"</div><div><br></div><div>- Unknown</div><div><br></div><div><br></div></div></div><div class="im">
<div><br>On May 24, 2012, at 19:12, Janesta <<a href="mailto:janesta@gmail.com" target="_blank">janesta@gmail.com</a>> wrote:<br><br></div><div></div></div><blockquote type="cite"><div><div class="im">I use gmail. When v2020 was discussing the oversize trucks going to Alberta, I was receiving ads for truck driving school.<br>
<br>Now that our discussion is privacy issues, I just received an ad to apply to <span><span dir="ltr"><a dir="ltr" href="http://pagead2.googlesyndication.com/aclk?sa=l&ai=BD2tsdem-T-X2MNCCgAKXguXpAeHwjM0C-cyM3yPlzbTwA5CiYhABGAEgho-AAigGOABQ-O3-nvj_____AWDJvsmGxKPIF6ABs5Td_gOyAQ9tYWlsLmdvb2dsZS5jb226AQ5nbWFpbC1jdi1iZWxvd8gBAdoB_wFodHRwOi8vbWFpbC5nb29nbGUuY29tL01UUXdNamN3TnpFNE56ZzVOVFExTkRRMU9FbE9Wa2xUU1VKTVJURTBNREkzTWpZME1qRXlNREV4T0RVek1EWkRUMHhNUVZCVFJVUXhOREF5TnpjeU56azVOamMzT1RZd05qazFTVTVXU1ZOSlFreEZNVFF3TWpjNU16TXdOakUwTlRjd09UUXpNRWxPVmtsVFNVSk1SVEUwTURJM09UYzRNemd6TkRneU9EUXdOREpKVGxaSlUwbENURVV4TkRBeU9EQXlOREE0TlRBM09EQXdNakExU1U1V1NWTkpRa3hGTVRRd01qZ3fIArGApx-oAwHoAxPoAw3oA7oC9QMAAABE&num=1&sig=AOD64_0NTLmXWKifMmya9PrNqfBU785F3A&adurl=http://www.amu.apus.edu/lp2/intelligence/index.htm/%3Futm_source%3Dgoogle-amu%26utm_medium%3Dcpc%26utm_term%3Dcontent-targeting%26utm_campaign%3DCT%2520-%2520Intelligence" target="_blank"></a><a href="http://www.AMU.APUS.edu/Intelligence" target="_blank">www.AMU.APUS.edu/Intelligence</a> to get a CIA intelligence </span></span>degree.<br>
<br>All of this is creepy to me. <br><br>Does anyone know of an email service that does not scan my email?<br><br>Thanks,<br>Janesta<br><br></div><div class="gmail_quote"><div class="im">On Thu, May 24, 2012 at 6:20 PM, Tom Hansen <span dir="ltr"><<a href="mailto:thansen@moscow.com" target="_blank"></a><a href="mailto:thansen@moscow.com" target="_blank">thansen@moscow.com</a>></span> wrote:<br>
</div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div bgcolor="#FFFFFF"><div><div class="im"><div>Just because you're paranoid doesn't mean they AREN'T after you.</div>
</div><div><div class="h5"><div>
<span><image.jpeg></span><br></div><div><br></div><div>Paranoia . . . Self-destroya.<br><br><div>Seeya round town, Moscow.</div><div><br></div>
<div>Tom Hansen</div><div>Moscow, Idaho</div><div><br></div><div>"If not us, who?</div><div>If not now, when?"</div><div><br></div><div>- Unknown</div><div><br></div><div><br></div></div><div><div><div>
<br>On May 24, 2012, at 18:00, Paul Rumelhart <<a href="mailto:godshatter@yahoo.com" target="_blank"></a><a href="mailto:godshatter@yahoo.com" target="_blank"></a><a href="mailto:godshatter@yahoo.com" target="_blank">godshatter@yahoo.com</a>> wrote:<br>
<br></div><div></div>
<blockquote type="cite"><div>
<br>
Security, not just against police surveillance but against all forms
of intrusion, is best served by a layered defense. The first layer
is the one you suggest - if you don't want it compromised, don't put
it out there. There are other steps that can be taken, such as:<br>
<br>
- don't open attachments from strangers<br>
- don't run an email client that automatically runs attachments<br>
- don't tell your email client to run an attachment manually<br>
- keep up on your updates for your OS, email client, browser,
flash, and java<br>
- use a browser that doesn't run any attachments by default<br>
- turn off javascript or use something like NoScript to enable only
the sites you trust<br>
- use an adblocker to keep advertisers from tracking you through
image requests and to keep malware ads from doing harm<br>
- disable third-party cookies, or use an extension to manage them
for you<br>
- use something like FlashBlock to keep flash advertisements from
trying to track you<br>
- use a private VPN<br>
- use an OS like linux that isn't hacked as often<br>
- probably lots of others I'm forgetting at the moment<br>
<br>
I think of these things like common street smarts, but for the net.
You shouldn't click on an attachment any more than you should look
that mean looking dude in the eye when you walk past him. As a
bonus, if you do these things you won't see most advertisements that
are trying to distract you, and your browsing experience will be
twice as fast because of all the javascript and images you are not
downloading. Just remember to donate to your favorite websites to
make up for the loss of ad revenue, should you feel so inclined.<br>
<br>
Paul<br>
<br>
On 05/24/2012 02:02 PM, Ted Moffett wrote:
<blockquote type="cite"><br>
"You already have zero privacy anyway. Get over it." <sup>1</sup>
Sun Microsystems CEO Scott McNealy <br>
<br>
----------------------------------------<br>
I assume anything I place on my computer, or send over the
Internet, or any phone call I make anywhere, even from a public
phone, is subject to potential surveillance.<br>
<br>
I am way far from super well educated on these complex issues, but
from what I have gathered, encryption does not necessarily assure
privacy, with key stroke loggers such as Magic Lantern. <br>
<br>
What if when you are not home, the FBI or government black-op
operatives, or others from who knows where, break-in, with
surveillance technology placed on your computer, that records or
sends every keystroke? Maybe there are safeguards against Magic
Lantern or tampering directly with a computer to surveil it:<br>
<br>
Info on Magic Lantern:<br>
<br>
<a href="https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&crawlid=1&doctype=cite&docid=20+J.+Marshall+J.+Computer+%26+Info.+L.+287&srctype=smi&srcid=3B15&key=3addc849b1738f1c82c98f8bd294a0ab" target="_blank"></a><a href="https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&crawlid=1&doctype=cite&docid=20+J.+Marshall+J.+Computer+%26+Info.+L.+287&srctype=smi&srcid=3B15&key=3addc849b1738f1c82c98f8bd294a0ab" target="_blank"></a><a href="https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&crawlid=1&doctype=cite&docid=20+J.+Marshall+J.+Computer+%26+Info.+L.+287&srctype=smi&srcid=3B15&key=3addc849b1738f1c82c98f8bd294a0ab" target="_blank"></a><a href="https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&crawlid=1&doctype=cite&docid=20+J.+Marshall+J.+Computer+%26+Info.+L.+287&srctype=smi&srcid=3B15&key=3addc849b1738f1c82c98f8bd294a0ab" target="_blank">https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&crawlid=1&doctype=cite&docid=20+J.+Marshall+J.+Computer+%26+Info.+L.+287&srctype=smi&srcid=3B15&key=3addc849b1738f1c82c98f8bd294a0ab</a><br>
<br>
COMMENT: THE "MAGIC LANTERN" REVEALED: A REPORT OF THE FBI'S NEW
"KEY LOGGING" TROJAN AND ANALYSIS OF ITS POSSIBLE TREATMENT IN A
DYNAMIC LEGAL LANDSCAPE<br>
<br>
McNealy "You already have zero privacy anyway. Get over it." <sup>1</sup>
Although this quip from Sun Microsystems CEO Scott McNealy seems
extreme, it strongly illustrates the current tension between the
power of technology and an individual's expectation of privacy. <sup>2</sup>
This tension creates an incessant struggle, because for power of
surveillance technology to increase, privacy must decrease, and
vice versa. These struggles are best illustrated through the
Federal Government's attempts to maintain national security
through surveillance of communications and activities while
attempting to sustain the legitimate expectations of privacy in
the American people. <sup>3</sup> One of the most recent
developments resulting from this quandary is the FBI's new
enigmatic surveillance tool - a "keystroke logger" Trojan
horse/computer worm they have dubbed "Magic Lantern." <sup>4</sup><br>
<br>
." <sup>6</sup> Historically, the FBI has been thwarted by
certain counter-intelligence technologies, specifically
encryption. <sup>7</sup> Magic Lantern would assist the FBI by
recording the passwords used to encode/decode the encrypted
messages, thereby permitting the Bureau to access the content of
the otherwise indecipherable documents. <sup>8</sup> However,
critics of the software raise serious concerns about the
software's conflict ...<br>
<br>
---------------------------------------------------<br>
<br>
The Carnivore program may be old fashioned, given the speed of
computer technology advances, but it was major news, even
discussed in the US Congress by tech savvy US Senator from
Washington, Maria Cantwell, along with Magic Lantern, in questions
to former US Attorney General Ashcroft:<br>
<br>
<a href="http://www.salon.com/2001/12/08/ashcroft_15/" target="_blank"></a><a href="http://www.salon.com/2001/12/08/ashcroft_15/" target="_blank"></a><a href="http://www.salon.com/2001/12/08/ashcroft_15/" target="_blank"></a><a href="http://www.salon.com/2001/12/08/ashcroft_15/" target="_blank">http://www.salon.com/2001/12/08/ashcroft_15/</a><br>
<br>
Info on Carnivore:<br>
<br>
<span>Carnivore: US Government Surveillance<br>
of Internet Transmissions</span><br>
<br>
<a href="http://www.vjolt.net/vol6/issue2/v6i2-a10-Jennings.html" target="_blank"></a><a href="http://www.vjolt.net/vol6/issue2/v6i2-a10-Jennings.html" target="_blank"></a><a href="http://www.vjolt.net/vol6/issue2/v6i2-a10-Jennings.html" target="_blank"></a><a href="http://www.vjolt.net/vol6/issue2/v6i2-a10-Jennings.html" target="_blank">http://www.vjolt.net/vol6/issue2/v6i2-a10-Jennings.html</a><br>
<br>
----------------------------------------------------<br>
<br>
From "Wired" magazine, a recent article on the NSA's spying
expansion. Orwell rolls in his grave!<br>
<h1>The NSA Is Building the Country’s Biggest Spy Center (Watch
What You Say)</h1>
<div>
<ul>
<li>By <a href="http://www.wired.com/threatlevel/author/james-bamford/" target="_blank">James
Bamford</a></li>
<li><a title="Email
the Author" href="mailto:washwriter@gmail.com%3C/a%3E" target="_blank">Email
Author</a></li>
<li> March 15, 2012 </li>
</ul>
</div>
<a href="http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1" target="_blank"></a><a href="http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1" target="_blank"></a><a href="http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1" target="_blank"></a><a href="http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1" target="_blank">http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1</a><br>
<br>
Under construction by contractors with top-secret clearances, the
blandly named Utah Data Center is being built for the National
Security Agency. A project of immense secrecy, it is the final
piece in a complex puzzle assembled over the past decade. Its
purpose: to intercept, decipher, analyze, and store vast swaths of
the world’s communications as they zap down from satellites and
zip through the underground and undersea cables of international,
foreign, and domestic networks. The heavily fortified $2 billion
center should be up and running in September 2013. Flowing through
its servers and routers and stored in near-bottomless databases
will be all forms of communication, including the complete
contents of private emails, cell phone calls, and Google searches,
as well as all sorts of personal data trails—parking receipts,
travel itineraries, bookstore purchases, and other digital “pocket
litter.” It is, in some measure, the realization of the “total
information awareness” program created during the first term of
the Bush administration—an effort that was killed by Congress in
2003 after it caused an outcry over its potential for invading
Americans’ privacy.<br>
-----------------------------------------------------<br>
Vision2020 Post: Ted Moffett<br>
<br>
<div class="gmail_quote">On Wed, May 23, 2012 at 5:24 PM, Art Deco
<span dir="ltr"><<a href="mailto:art.deco.studios@gmail.com" target="_blank"></a><a href="mailto:art.deco.studios@gmail.com" target="_blank"></a><a href="mailto:art.deco.studios@gmail.com" target="_blank"></a><a href="mailto:art.deco.studios@gmail.com" target="_blank">art.deco.studios@gmail.com</a>></span>
wrote:<br>
<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Good
advice. Do you have any recommendations for a VPN provider?<br>
<br>
w.
<div>
<div><br>
<br>
</div>
</div>
</blockquote>
</div>
<br>
<br>
<fieldset></fieldset>
<br>
<pre>=======================================================
List services made available by First Step Internet,
serving the communities of the Palouse since 1994.
<a href="http://www.fsr.net" target="_blank"></a><a href="http://www.fsr.net" target="_blank"></a><a href="http://www.fsr.net" target="_blank"></a><a href="http://www.fsr.net" target="_blank">http://www.fsr.net</a>
<a href="mailto:Vision2020@moscow.com" target="_blank"></a><a href="mailto:Vision2020@moscow.com" target="_blank"></a><a href="mailto:Vision2020@moscow.com" target="_blank"></a><a href="mailto:Vision2020@moscow.com" target="_blank">mailto:Vision2020@moscow.com</a>
=======================================================</pre>
</blockquote>
<br>
</div></blockquote><blockquote type="cite"><div><span>=======================================================</span><br><span> List services made available by First Step Internet,</span><br><span> serving the communities of the Palouse since 1994.</span><br>
<span> <a href="http://www.fsr.net" target="_blank"></a><a href="http://www.fsr.net" target="_blank"></a><a href="http://www.fsr.net" target="_blank"></a><a href="http://www.fsr.net" target="_blank">http://www.fsr.net</a></span><br>
<span> <a href="mailto:Vision2020@moscow.com" target="_blank"></a><a href="mailto:Vision2020@moscow.com" target="_blank"></a><a href="mailto:Vision2020@moscow.com" target="_blank"></a><a href="mailto:Vision2020@moscow.com" target="_blank">mailto:Vision2020@moscow.com</a></span><br>
<span>=======================================================</span></div></blockquote></div></div></div></div></div></div><div><div class="h5"><br>=======================================================<br>
List services made available by First Step Internet,<br>
serving the communities of the Palouse since 1994.<br>
<a href="http://www.fsr.net" target="_blank"></a><a href="http://www.fsr.net" target="_blank">http://www.fsr.net</a><br>
mailto:<a href="mailto:Vision2020@moscow.com" target="_blank"></a><a href="mailto:Vision2020@moscow.com" target="_blank">Vision2020@moscow.com</a><br>
=======================================================<br></div></div></blockquote></div><br>
</div></blockquote><div><div class="h5"><blockquote type="cite"><div><span>=======================================================</span><br><span> List services made available by First Step Internet,</span><br><span> serving the communities of the Palouse since 1994.</span><br>
<span> <a href="http://www.fsr.net" target="_blank"></a><a href="http://www.fsr.net" target="_blank">http://www.fsr.net</a></span><br><span> <a href="mailto:Vision2020@moscow.com" target="_blank"></a><a href="mailto:Vision2020@moscow.com" target="_blank">mailto:Vision2020@moscow.com</a></span><br>
<span>=======================================================</span></div></blockquote></div></div></div></blockquote></div><br>