Reasons For Reclaiming Your Privacy

 

Privacy has been seriously compromised and is something that no longer exists for the overwhelming majority of residents in the United States!

 

Here are some reasons you might choose to reclaim personal privacy with an alternate name and identity or multiple identities as I have done:

 

 

Government Tracking:

 

I could probably write a book on this subject alone.

 

The Following short video does a nice job of pointing out “some of the many ways” our government is tracking us:

 

http://www.youtube.com/watch?v=PZak8JlIj4o

 

I hope this is still available when you click on the link … but don’t be surprised if it has been censored!

 

 

Video Cameras:

 

In recent years, video cameras have appeared on business exteriors, residential exteriors, airports, major highways, street intersections, toll bridges, inside most businesses, and at most public locations. It’s increasingly impossible to travel without recording by video cameras. With the arrival of modern Face Recognition Technology, you can right now and soon will be personally identified almost everywhere you go … Every time a video camera has you in its view.

 

When you exit airport garages or cross a toll bridge, your license plate is recorded and goes into local, state, and federal databases.

 

I could go on, let’s just say you are being recorded almost everywhere you go. Increasingly, you are identified because of invasive government photo databases and business photo databases assembled by Facebook and its cousins. The photo images in these databases are linked to Facial Recognition Software. Is your photo on your driver’s license, passport, debit card, credit card, or on a social network like Facebook? Believe me when I say your image is in plenty of databases out there, government databases, and business databases the government has access to.

 

YOU ARE BEING CONSTANTLY TRACKED AND RECOGNIZED BY VIDEO CAMERAS AND LINKED FACIAL RECOGNITION SOFTWARE!

 

 

Land Line Phones:

 

While a warrant is supposedly needed, the government and various law enforcement agencies have had the capacity to listen to your home through any landline phone. This is done by remotely activating the microphone. Of course, unlawful taps are done all the time by unscrupulous businesses, snoopy individuals, private investigators, employers, and who knows! A phone tap warrant is not needed to listen in on a cordless phone because you are ON the Air and the government owns the airways! In fact, anyone with the right equipment can listen in on you and that includes your snoopy neighbors.

 

Your telephone could be listening to you … Do you want to take precautions to protect your telephone privacy? ... Read on!

 

 

Cell Phones and Superphones:

 

Our cell phones track us wherever we go and even when turned off because most have a separate small watch battery permanently installed. This small battery is to keep the tracking function active even if you turn the phone off or remove the main battery. Today, many Superphones have an alternative to the separate battery which is a permanently embedded battery that cannot be removed that has a hidden battery reserve. Our Superphones can track us personally as well as locating our friends, relatives, or almost anyone you choose! Men, women, and children of all ages are carrying tracking devices everywhere they go!

 

As mentioned before, most cell phones have a hidden battery you cannot easily remove … Can you do something about it? These cell phones with backup batteries can always track you even if turned off and the main battery removed.

 

A warrant is NOT NEEDED to tap a cell phone because it is ON the AIR and the government owns the airways!

 

If you don’t believe there might be a second hidden battery in your cell phone to preserve the tracking function, check out this YouTube video. You will see one of these hidden batteries being removed. I hope, this video will still be out there for you to view, but I expect that sooner than later, Big Brother will have it disappear:

 

http://www.youtube.com/watch?v=1caimAQwczQ

 

 

Computers and other Smart Electronic Devices:

 

Desktop computers, laptop computers, and other electronic devices such as tablets, smart HDTV’s, smart Blu-ray players, etc., we use at work and home, track every keystroke and website visited. These electronic devices report personal information about us, our purchases, credit card information, our interests, web searches we’ve done, websites visited, television programs viewed, etc. Have your ever searched for an item on your computer only to find your computer targeted with advertisements on every website you visit? The popup ads want you to buy the same product or similar products wherever you may go on the web in the weeks to come.

 

I have much more to say about our computers, tablets, etc., so read on to discover what you can do to protect your privacy, important files, and other sensitive information about yourself and loved ones.

 

 

Automobiles:

 

Our personal transport tracks us everywhere we go. Newer cars are equipped with an Event Data Recorder (EDR), an electronic device connected to various sensors around the car both inside and outside. The EDR can tell if a driver is wearing a seat belt or if the oil pressure is low. In the event of a crash, it sends a signal telling the car's air bags to deploy. It also tracks your car's acceleration or deceleration and its speed in the seconds before a crash occurs. This information is used by law enforcement, crash investigators, and insurance companies to decide fault in a wreck. All GM cars produced since 1998 have an EDR and some models were fitted with the recorders from the late 1970s. The devices work by continuously collecting data, but the most recent data are continuously overwriting previously stored information. In the event of a crash, the data cycle is "frozen”, allowing a snapshot of the most recent data to be available. Insurance investigators or law enforcement officers can then recover the information electronically. Drivers have little choice but to drive with the system. To disable it, you have to get rid of air bags, and it's unlawful to do so. You can reasonably assume all automobile manufacturers have installed EDR tracking devices similar to GM!

 

GM’s OnStar and similar systems from other car manufacturers can even remotely disable your car!

 

I’ve always enjoyed riding a motorcycle or bicycle, and my yacht carries both aboard. Now I have even more reason to enjoy anonymous two-wheeled transport.

 

Radio Frequency Identification Chips (RFID) invade every aspect of our lives:

Imagine going to a grocery store or department store, filling your cart with goods, and walking right out the door. No longer will you have to wait as a cashier rings up each item in your cart one at a time. Instead, RFID chips and labels will communicate with an electronic reader that will detect every item in your cart. The electronic reader will read the RFID chip on the plastic in your wallet without having to take it out of your wallet. The electronic reader will be connected to a large network that will send information on your products to the retailer and product manufacturers. Your bank debits your account to pay for the items in your cart. All of this will be thanks to a RFID chip that is already in your debit card or credit card. No lines and no waiting will be the heralded advantage!

 

Today, at many cash registers you no longer need to slide your plastic thru a scanning device to debit your funds. You just hold your plastic near a scanner so the RFID chip can allow access to your account and pay for your goods. We are only one step away from the fantasy I started this section with where you continue directly out of the store without pause to pay for your goods. All courtesy of embedded RFID chips already in our plastic.

 

An Identity Thief with a handheld illegal scanner could pass by you on the street, read your RFID credit cards, and debit cards. The ID Thief then empties your accounts and charges your credit cards to the max. This is NOT fantasy … It is happening to unwary people every day. You can defeat this by encasing your plastic in metal to block the scanner. A tinfoil-lined sleeve will do the job and they are available on eBay or elsewhere on the Internet as are metal wallets.

 

I keep all of my plastic in these individual metal foil-lined sleeves.

 

RFID chips, a technology once limited to tracking cattle, are tracking consumer products worldwide. Many manufacturers use the tags to track the location of each product they make. They track a product from time of manufacture until bought.

 

Beyond the realm of retail goods, RFID chips and tags are tracking cars, airline passengers, Alzheimer's patients, and pets. Soon, they may track your preference for strawberry or grape jelly. Numerous critics believe RFID technology is becoming too invasive. We're not even aware of all the parts of our lives they affect or how deeply our privacy is being invaded.

 

How about using cash? … That choice could soon be removed and the use of cash BANNED! Such possibilities are already being proposed.

 

These chips are in our credit cards, debit cards, driver’s licenses, passports, and the list goes on.

Researchers have developed a new way of embedding traceable RFID chips within “smart paper”. This will allow banks and governments using the technology to guard against counterfeiting and it will allow the tracking of paper money. RFID embedded in paper uses Laser Enabled Advanced Packaging (LEAP) to transfer RFID onto paper. Such “smart paper” could lead to new types of banknotes, legal documents, tickets, and smart labels!

 

Worldwide, central banks have launched separate projects to embed RFID in smart paper currency! LEAP can place ultrathin semiconductor chips at specific locations on both rigid and flexible materials. That could enable chip-embedded things such as smart clothing. It could enable the spread of RFID chips in applications as diverse as public transit smart cards and product labels!

 

Widely used RFID technology could transform everything about doing business right down to the way cash changes hands. Law enforcement agencies could track smart money as part of its efforts to fight drug trafficking or other organized crime activities. RFID technology could herald a future world where traceable currency further reduces the privacy of how people use money. For instance, the government might track the flow of money in the so-called “gray economy” to track and tax transactions that rely on mostly untraceable cash exchanges. You could find yourself getting a tax bill for the earnings from a yard sale, items sold online via eBay, or transactions started through online forums like Craigslist!

 

Here Are A Couple Of RFID Disable Videos You Might Want To Check Out:

 

I can’t advise you to do what is shown in these videos to disable RFID chips, but it is interesting to see how it is done.

 

http://www.youtube.com/watch?v=e52WfJgXuXE

 

http://www.youtube.com/watch?v=-Gj--jfeJ1I

 

 

Patriot Act:

 

The USA PATRIOT Act of 2001 is an Act of Congress signed into law by President George W. Bush on October 26, 2001. The title of the act is a ten-letter acronym (USA PATRIOT Act) that stands for Uniting (and) Strengthening America (by) Providing Appropriate Tools Required (to) Intercept (and) Obstruct Terrorism Act.

 

The act was in response to the twin tower and other terrorist attacks of September 11, 2001 (9/11). The Patriot Act significantly weakened the controls on law enforcement agencies gathering of intelligence within the United States. It expanded the Secretary of the Treasury’s authority to regulate financial transactions, especially those involving foreign individuals and entities. It broadened the discretion of law enforcement and immigration authorities in detaining and deporting immigrants suspected of terrorism-related acts. The act also expanded the definition of terrorism to include domestic terrorism, thus enlarging the number of activities to which the USA PATRIOT Act’s expanded law enforcement powers can be applied!

 

Opponents of the act have criticized:

 

 

 

 

 

Many of the act's provisions were to sunset beginning December 31, 2005, 4 years after its passage. In the months preceding the sunset date, supporters of the act pushed to make its expiring provisions permanent, while critics sought to revise various sections to improve civil liberty protections. In July 2005, the U.S. Senate passed a reauthorization bill with substantial changes to several sections of the act, while the House reauthorization bill kept most of the act's original language. The two bills were then reconciled in a conference committee that was criticized -````by Senators from both the Republican and Democratic parties for ignoring civil liberty concerns. The bill, which removed most of the changes from the Senate version, passed Congress on March 2, 2006, and was signed into law by President George W. Bush on March 9 and 10, 2006!

 

On May 26, 2011, President Barack Obama signed the PATRIOT Sunsets Extension Act of 2011, a four-year extension of three key provisions in the USA PATRIOT Act:

 

  1. Roving wiretaps

 

  1. Searches of business records (the "library records provision")

 

  1. Surveillance of “lone wolf” individuals suspected of terrorist-related activities not linked to terrorist groups!

 

BE AWARE:  Many businesses now use the Patriot Act as an excuse to take a photocopy of your driver’s license. There is no provision in the Act for businesses to demand this but many businesses are doing this (doctor’s offices especially so). They endanger you in doing so because their records may not be secure. An employee or cleaning person could use your driver’s license number to steal your identity. One of two things is needed to run an illegal credit check, a driver’s license number, or a social security number linked to your name so beware of allowing copies or giving out these identifying numbers.

 

I refuse to do business with any business that insists on taking a copy of my driver’s license (which I keep in my car), or my social security card (which I never carry). I would only allow law enforcement to see my driver’s license.

 

You can often avoid a request for a driver’s license by showing a passport. The passport number is not usable to steal your identity or access your credit file and it is legitimate photo ID. I have debit cards with my photo in Business Names (Pen Names) and that is what I use for photo identification. This way, everything is in a Business Name that looks like a person’s name but it is NOT traceable to me personally, or my living address.

 

A Student or Teacher ID with photo is another choice to use for photo ID. I give you a link later in the book in that chapter where you can make your own Student ID or Teacher ID card with your photo on it … Done online for FREE.

 

 

ObamaCare:

 

You can say good-bye to what little remains of your medical privacy under ObamaCare!

 

Email this page to a friend

Top of Form

If you buy health insurance on an ObamaCare exchange, be aware that your Personal Health Information (PHI) will be made available to various government agencies, including the Internal Revenue Service (IRS).

Proposed Department of Health and Human Services (HHS) regulation will require state, federal, and local agencies as well as health insurers to exchange supposedly protected personal health information of anybody seeking insurance on an exchange. PHI includes an individual's medical history, test and laboratory results, insurance information, and the ever vague “other data”.

Americans not getting coverage via their employers will be required to buy it on the individual market or pay a tax penalty. That’s how the IRS will get your private medical information. The exchanges, some run by the states, others by the federal government, are supposed to provide marketplaces for individuals to shop for the ObamaCare-compliant insurance that best suits their needs. Depending on household income, individuals buying insurance on an exchange may be eligible for relief subsidies. Under the new rule, people will find their medical history subject to bureaucrats and possibly unknown others prying eyes as we are all reviewed to decide eligibility for those possible subsidies.

If an individual applies for insurance on an exchange, the exchange will send specific identifying information to HHS. HHS will verify applicant information with information from the federal and state databases and other program databases that provide eligibility and enrolment information on minimum essential coverage.

To get insurance on an exchange, an individual must surrender his PHI to the exchange. The exchange forwards the information to HHS, which will then share it with state and federal agencies. There is no requirement that applicants authorize release of their PHI. Since income is the main criteria for subsidy eligibility, this information will be shared with the IRS, which is tasked with enforcing any violation of the insurance mandates with tax penalties.

The IRS’ enforcement role is cause for serious concern even for those not buying insurance on an exchange.
Americans for Tax Reform has warned every taxpayer will have to file a new form with his annual income tax return to prove he is complying with the health insurance mandate. This new tax information document, the group argues, must, at a minimum, contain the following:

 

 

 

 

 

It becomes simple for IRS agent to get anyone’s medical history.

With Americans PHI traveling around on all of these linked computer networks, it would also be relatively simple for hackers to get hold of sensitive information and use it for their own evil purposes.

Hackers have stolen millions of medical records from the Veterans Administration, and patients were at risk for identity theft. David Blumenthal, M.D., the President’s former health information czar, admitted “no infrastructure exists in most areas of the country for secure health information exchange among providers and between providers and consumers”. It becomes more complex and increasingly unsecure.

SERIOUS CONCERN:  Health care under ObamaCare comes at a steep price, which is the confidentiality of one’s medical records. Employers already deny employment based on medical information they ask you for but now they will be able to get your medical information without even asking!

 

Does anyone want this privacy loss? … No choice offered … We are being dictated to!

 

 

United States Postal Service Mail:

 

Every day, almost all mail and parcels get photographed, sprayed with a bar code, and tracked. It is reasonably presumed a similar process is used by FEDEX, UPS, and other mail or package shippers and couriers.

 

I go into much more detail about the pitfalls and answers to mail privacy issues further on in the book.

 

 

Social Media:

 

Social networking sites like Facebook, LinkedIn, etc., require users to agree to “Terms of Use” policy before allowing use of their services. These Terms of Use declarations often contain clauses allowing social networking operators to store data on users, or even share it with third parties. Facebook has attracted attention over its policies on data storage. This includes making it difficult to delete an account, keeping data after an account is closed, and being caught sharing personal data with third parties.

 

The high school bully who made your life miserable, or the supposed friend who told lies about you behind your back, and other unsavory people like this now want to be your friend online. The number of true friends we have in life can usually be counted on one or two hands. When someone claims to have hundreds or thousands of friends online, do you want to be just another one in the herd?

 

Facebook Addiction Disorder (FAD) is a named psychobabble disorder, in which an unhealthy portion of an individual’s life is spent on Facebook. Over 350 million people suffer from this pandemic disorder. Soon, a Big Pharmaceutical company is sure to come out with a drug for this disorder and label it as a new syndrome needing expensive treatment. Perhaps they will label it Facebook Addiction Disorder Syndrome (FADS). There will probably be a whole series of new prescription drugs for other disorders like Texting Syndrome (TS). They did it for “Restless Leg Syndrome”. Many more people are afflicted with FADS and TS.

 

Do you think I’m joking?

 

There are many ways third parties access information about you on social media sites. If you play games or take any of the quizzes, your information goes to third parties.

 

Potential dangers with Social Media Include:

 

 

 

 

 

 

 

 

 

 

www.examiner.com/ social-media-in-national/ us-gov-software-creates-fake-people-on-social-networks-to-promote-propoganda

 

UH OH … Just before publication, I checked to see if all the links in this book were still active. The infamous “BIG BROTHER” has deleted this one.

 

PRIVACY NOTE:  Twitter has admitted they have scanned and imported their user's phone contacts onto the website database to learn more about their users.

 

INSTITUTIONAL CONCERNS:  Many institutions have expressed concern over the lack of privacy for users of social networking sites. These include schools, libraries, and even government agencies. Libraries in particular, being concerned with the privacy of individuals, have debated on allowing library patrons to access social networking sites on public library computers.

 

STRONG RECOMMENDATION:  I advise you to avoid Social Media or if you do use it … Use a fake name … NO … Just Don’t Use Social Media!

 

 

No attempt is being made to scare you with this information. I’m trying to open your eyes to real dangers most are not aware of. In the chapters to come, I will show you how you can deal with all of these issues and take control of your life. You can reclaim your privacy and protect yourself. This book can be your salvation so read on dear reader.