Copyright 2011-3011 Alternative News Forum, All Rights Reserved.
RFID technology is superb for inanimate objects like store inventory and shipping containers. That is not the issue. Inserting RFID chips into living human beings is insane, and should be outlawed. It is a documented fact that the chips cause bleeding oozing sores, tumors, and cancerous growths. Further, the use of RFID chip technology in living human beings is the ultimate breach of personal privacy and constitutes a heinous disregard for public health, safety, the sanctity of personal privacy and civil rights, including the freedom to move about in life without being surreptitiously surrveiled.
The mere fact that I should even need to write blog posts about this issue indicates a level of approaching spiritual depravity in our culture that is horrific. The fact that there is now a more or less complete absence of public outrage over laws tacitly written into Obamacare [ using “stealth legislation” techniques ] which mandate RFID technology to be used in people, indicates that the moral compass within our elected leaders may be spinning out of control.
If the American people do not immediately begin expressing their outrage and refusal to be “RFID chipped” like barnyard animals then that is exactly what you can expect to happen by the Spring of 2013. Speak out against RFID chipping people, for your own sake, for your children’s sake, for America’s sake for God’s sake. Do it now before it is too late.
Chase Kyla HunterAmerican clothing manufacturers have secret item level RFID tagging and labeling plans? Click here to see.
Calvin Klein fabric label was among the items featured at the Checkpoint RFID booth. Viewed from the front, it looks looks like an ordinary clothing label that would be sewn into the collar of a shirt or sweater. When the Calvin Klein clothing label is opened, the RFID device it contains can be clearly seen. Note the computer chip in the center of the tag and the metallic antenna extending from it. This chip contains a unique ID number that can be read remotely.Other disguises for hidden RFID chips can be seen in the photo below:
|Mobile Edge WSS Passport Wallet Protects RFID Passports
A couple weeks ago, we asked readers to weigh in on the news that the U.S. was going to be issuing passports with RFID chips embedded in them. Even though the passports are supposed to be shielded, and the chips will have a very short range, many of us are concerned about keeping our info private. (We also discussed the issue on Gearlog Radio, the September 13 podcast).
Matthew from Mobile Edgesaw the post and let me know that in Q4 of this year, the company will be shipping passport covers with extra shielding built in; might be the extra protection that makes us feel better about the whole thing:
“The new leather Mobile Edge Passport Wallet protects your passport from unwanted RFID access using their exclusive Wireless Security Shield™ (WSS) technology. The patent pending design incorporates a Zinc lined material that has conductive fibers woven into the fabric, which blocks out electromagnetic waves and radio frequencies ensuring ultimate ID security. “
Implanting Microchips into Insects US Military Develops ‘Cybug Spies’
Originally researchers sought to control insects by gluing machinery onto their backs, but such links were not always reliable. To overcome this hurdle, the Hybrid Insect Micro-Electro Mechanical Systems (HI-MEMS) program is sponsoring research into surgically implanting microchips straight into insects as they grow, intertwining their nerves and muscles with circuitry that can then steer the critters. As expensive as these devices might be to manufacture and embed in the bugs, they could still prove cheaper than building miniature robots from scratch.’
Example of Matrix loyalty card chip
RFID proponents would like to see all loyalty cards, ATM cards and other ID’s RFID enabled with chips like this. Imagine! Banks, retailers, supermarkets and governments could find out everything about you when you walk past a reader device since line-of-sight is not necessary to access the information. The radio waves could go right through your pants and through your wallet to get the information on the card’s chip. Imagine how valuable it would be for businesses to determine who is worth serving and who should be ignored!
For more information:
Members of the press can contact us as follows:
Dr. Katherine Albrecht
Co-author of Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID
Founder and Director, CASPIAN Consumer Advocacy
(Consumers Against Supermarket Privacy Invasion and Numbering)
For information on RFID visit Spychips.com
Next step in H1N1 scare: Microchip implants
Company developing under-the-skin devices to detect ‘bio-threats’
Posted: August 22, 2009
11:50 pm Eastern
By Drew Zahn
© 2009 WorldNetDaily
VeriChip’s microchip implant, about the size of a grain of rice
A Florida-based company that boasts selling the world’s first and only federally approved radio microchip for implanting in humans is now turning its development branch toward “emergency preparedness,” hoping to produce an implant that can automatically detect in its host’s bloodstream the presence of swine flu or other viruses deemed a “bio-threat.”
VeriChip Corporation currently sells a small, under-the-skin Radio Frequency Identification capsule, or RFID, that patients can opt to have implanted, containing a number computer-linked to their medical records, enabling doctors with a special reader to access the information even if the patient is unconscious or unidentified. The company boasts its microchip, roughly the size of a grain of rice, is the only such implant approved by the U.S. Food and Drug Administration.
But VeriChip has also turned its attention to other uses for the technology, including microchips that be used to tag and log human remains after a disaster and implants the company hopes will be able to warn if their host is infected with the H1N1 swine flu virus, the H5N1 bird flu virus or other pandemic agents deemed to be a “bio-threat.”
VeriChip is working with a Minnesota company, Receptors LLC, to develop the virus-detection technology.
“As we continue to build on our partnership with Receptors, which started with the development of a glucose-sensing RFID implantable microchip, we are moving beyond patient identification to sensors that can detect and identify illnesses and viruses such as influenza,” said Scott R. Silverman, chairman of VeriChip, in a statement. “This is an exciting next step for the future of our healthcare division.”
According to a joint white paper released earlier this year by both companies called “An Integrated Sensor System for the Detection of Bio-Threats from Pandemics to Emerging Diseases to Bio-Terrorism,” the research’s goal is to transform existing glucose-detection technology into pinpointing viruses instead, then couple it with an “in vivo” – meaning implanted inside a living organism – microchip that can alert others of the virus’ presence.
The ultimate goal is to develop an implant that can also diagnose which virus is infecting the host.
VeriChip has also announced earlier this month additional forays into emergency preparedness through its VeriTrace system.
According to a statement, the company sold a VeriTrace system, including 1,000 RFID microchips, to Kentucky’s Green River District Health Department “for disaster preparedness and emergency management needs.”
The company explains that VeriTrace, a separate system from its virus detection or patient records technology, was created in the aftermath of Hurricane Katrina, where it was used by the Federal Disaster Mortuary Operational Response Team. The system includes the microchips, a Bluetooth handheld reader, a customized camera that receives both RFID scanned data and GPS data wirelessly and a web-based database for storing information and images captured during emergency response operations.
The microchips are implanted in human remains following a disaster or, according to one report from the Katrina catastrophe, duct-taped to bones, in order to maintain detailed records, particularly in events that result in hundreds or thousands of fatalities.
“This database ensures the precise collection, storage and inventory of all data and images related to remains and the associated evidentiary items,” the statement boasts. “This also allows the recreation of an accurate and complete reconstruction of a disaster setting, crime scene or similar setting where recreation is necessary.”
Since Hurricane Katrina, the RFID Journal reports, the Georgia Bureau of Investigation, the Hawaii Department of Health, the Florida Emergency Mortuary Operations Response System and the medical examiner’s office in the Department of Heath in Erie County, N.Y, have also purchased the system. Earlier this year, VeriChip announced sales to Maryland’s Calvert Memorial Hospital and to Mercer and Atlantic counties in New Jersey.
WND contacted VeriChip seeking information on its progress in developing the virus detection technology and other emergency preparedness microchip implants, but received no response.
WND previously has reported on such chips when hospitals used them to identify newborns, VeriChip desired to embed immigrants with the electronic devices, a government health event showcased them and when Wal-Mart used microchips to track customers.
Previous stories: Vigil protests mandatory chip implants
Publix ranks #1
Supermarket chain retains top spot on customer satisfaction survey
For the 12th year in a row Publix Supermarkets has retained the top rating for supermarkets in the American Customer Satisfaction Index (ACSI)
<< click here for more information >>
Another one bites the dust
Brown and Cole of Seattle drops card program
A Seattle reader dropped us a note to let us know that local grocer Brown and Cole has decided to drop their dreaded card program.
<< click here for more information >>
SOLD, to the highest bidder!
Albertsons’ assets sold to CVS, Supervalue and investor group
After announcing late last year they were putting themselves on the auction block, Albertson’s has been sold.
<< click here for more information >>
A world divided
Why your shopping history may cost you
A collection of quips and quotes from the industry that demonstrate why customer specific marketing will soon be coming to a store near you.
<< click here for more information >>
<< click here for more information >>
Name that… name?
Ebay isn’t just for knick knacks
It may be illegal to sell your kidney, but creative ebay sellers are selling things almost as dear.
<< click here for more information >>
Industry Attempt to Smear RFID Activist Katherine Albrecht
Grocery Manufacturers of America and Gillette CEO asked to explain
CASPIAN finds embarrassing confidential RFID documents
Talk of “pacifying” consumers, hoping for “apathy,” and bringing lawmakers into the “inner circle.” CASPIAN asks “How can we trust these people with our personal data?”
Metro “Future Store” hides RFID in shopper cards
Protest and backlash force a recall
Wal-Mart, P&G Caught in Secret RFID Test
Consumers used as guinea pigs for controversial technology
Posted on 08/17/2009 by Chase Hunter
I’d like to welcome several more new members this week at http://2012poleshift.wetpaint.com
The fur is flying at town halls all over the USA as everyday people have awakened with a thunderclap to the realization that Obamacare has hidden Orwellian aspects that may be very harmful to personal health, well being and civil liberties. The people that laughed at this movement last year, calling us all out as racists in a cheap desperate shot, are now creeping back to the web with their tails between their legs to quietly join the movement and start their own patriot blogs. The Spirit of Truth is moving and shaking. Today I discovered an RFID chip in the shape of a Nazi Swastika. It’s on a new post listed under “RFID Secrets”.
If there is no global fascist conspiracy to enslave humankind, why design a swastika into the RFID reader? Well duh.
So there you have it. This is serious stuff folks and it’s going on everywhere. Menawhile, 7/8ths of several million wetpaint wikis are dedicated as TV and movie “fan” sites. Absolutely bizarre.
Yep that’ s right. An entire generation of tens of millions of otherwise intelligent American people are living in fantasyland. Is it no wonder they have tacitly RFID chipped the Calvin Klein clothes labels, groceries,. Nike shoes, et al?
No one is watching. Everyone is too busy watching TV. It’s a world not just gone mad, it’s a world gone so deep into the rabbithole of television virtual reality that they can’t get out – these are people who are litrally psychologically addicted to TV, thus leaving the actuality of life to the RFID chippers and corporate globalists to foist their designs on us with impunity.
The future will belong to those who live in actuality.
Filed under: 21st Century Christians, Connecting The NWO Dots, Illuminated Christianity, New progressive Christians, RFID chips, RFID secrets, addicted to tv, american spiritual wasteland,connecting the dots, cult of barack obama, dark advertising deceptions, dumbed down america,earth changes, false messiah, hidden RFID plans exposed, imminent world change, network with other souls of light, spiritual life in america, virtual reality generation, virtual reality tv existence,work while you have the light | Tagged: addicted to tv, global fascism, RFID chips, RFID secrets,secret rfid technology, tv fan sites bizarre, virtual reality generation
- Steps to Disable RFID (rfid-weblog.com)
- RFID Hacking (ask.metafilter.com)
- New credit cards pose big risk ()
- What is Passive RFID? (rfid-weblog.com)
- HOWTO graft the RFID from a payment-card onto your phone (boingboing.net)
- RFID Card – What Are Some Smaller Alternatives? (Wristwatch; Wedding Ring) (ask.metafilter.com)
- RFID Credit Card Skimming; Your Credit Card Never Leaves Your Pocket (geardiary.com)
- RFID: Scaring Holiday Shoppers For Years & Years (crunchgear.com)
- Verayo Unveils New Unclonable RFID Chip Enhancing Its Portfolio of Low-Cost Anti-Counterfeiting and Authentication Solutions (eon.businesswire.com)
- Another hidden secret in Obamacare “RFID Chip Implants” (via Angelbabe43′s Blog) (alligatorfarm.wordpress.com)
- Credit card fraud from a distance, and out of thin air? Sure, thanks to RFID. (weinterrupt.com)
- RFID MICROCHIPS IN HUMANS: Modern Day Stalkers (cowgirlkitty.com)
- Another hidden secret in Obamacare “RFID Chip Implants” (angelbabe43.wordpress.com)
- What’s next for RFID? (thinkup.waldenu.edu)
- Walmart, Macy’s, and JC Penney to use item level RFID tagging for shoes (slashgear.com)
Copyright 2011-3011 Alternative News Forum, All Rights Reserved.
Privacy is disappearing on the web, and the only real way to avoid having details about your life posted without your permission or consent is to NOT use the internet. Since many millions now depend on the web, this is not an option that works. I recently found out that all my yahoo.com emails were being read by someone, somewhere, on their back end, and the salient details about me were being harvested from them. This is also called “data mining.”
I was in a dialogue with a distant relative via email. This relative had not seen or heard from me in 20 years. I temporarily forgot where I was during our email exchange [which was on Yahoo.com email ] and told her my age.
Within 48 hours my age appeared in my Youtube.com channel, without my consent, without my permission and without me even knowing it until I logged and found it posted. I quickly deduced where this information had been datamined from. Someone from Yahoo.com had provided it to Google, which owns Youtube and it appeared in my Youtube account so quickly I was stunned. And furious too.
I need to warn all readers and subscribers not to EVER discuss anything of a private or confidential nature on yahoo.com email. Your emails are being archived, examined and harvested for details about you with each send.
I learned the hard way. What made this worse is that there is NO function now operative in the new youtube.com settings where you can remove your age from their database. Now every time I log into youtube my channel is hammered with ads for a certain age group that I have no interest whatsoever in viewing or clicking. Below are yahoo.com’s protocols for “deactivating” and then eventually deleting your account. All information that passed through the account, as far as I can tell from their statements, may be stored on their servers indefinitely. Not good.
Here it is. Read, and learn.
In order to provide products and services, Yahoo! collects and stores information from user account registration and site usage. Yahoo!’s policy is to de-identify user log file data within 90 days of collection, with limited exceptions to fight fraud, secure systems, and meet legal obligations. Yahoo! takes additional steps so that data collected and used to customize interest based advertising and some content on Yahoo! are not associated with personally identifiable information. Yahoo! is committed to continuous improvements and implementation of our data protection and de-identification measures. We describe the data we store, our processes and your choices in more detail here.
- When you register with Yahoo! or submit information to Yahoo!, a temporary copy of that information is routinely made to prevent accidental loss of your information through a computer malfunction or human error.
- Yahoo! keeps your account information active in our user registration databases in order to provide immediate access to your personalization preferences each time you visit Yahoo!.
- If you ask Yahoo! to delete your Yahoo! account, in most cases your account will be deactivated and then deleted from our user registration database in approximately 90 days. This delay is necessary to discourage users from engaging in fraudulent activity.
- Please note that any information that we have copied may remain in back-up storage for some period of time after your deletion request. This may be the case even though no account information remains in our active user databases.
Servers Log Files
- The Yahoo! computers (called “servers”) that send your web pages and advertising banners process and store an enormous amount of information every day. These computer records are called “log files”.
- Log files are used for analysis, research, auditing, and other purposes, as described above. After this information has been used, it is stored and is inaccessible. Until the information is stored, your Yahoo! ID may remain in our active server log files.
- Anonymization is a process of removing or replacing personal identifiers in data records so that the resulting data is no longer personally identifiable. This is also referred to as de-identification. We use these terms interchangeably.
- Yahoo! uses a multi-step process to replace, truncate, or delete identifiers in order to de-identify data.
Log file anonymization
- Yahoo!’s anonymization policy applies to user log file data and includes searches, ad views, ad clicks, page views and page clicks.
- Yahoo! stores this data in an identifiable form for up to 90 days for most log file data.
- There are certain exceptions to this policy. Yahoo! will store a limited amount of log file data in identifiable form for up to 6 months for select log file systems involved in product and financial fraud detection and abuse management. There are also exceptions for legal obligations.
Your Interests and Yahoo!
- Yahoo collects and maintains information about your interests based on your web surfing activity when you are visiting the branded Yahoo! network of web sites as well as when you are visiting other websites in the Yahoo! advertising network.
- Yahoo! maintains information in both identifiable and de-identified forms. When you are signed-in to the Yahoo! network, Yahoo! associates your observed interests and activity with your Yahoo! account.
- When you log in to your Yahoo! account, a cookie is placed on that computer which contains information about your interests. This is stored on the hard drive of whatever computer or device you are using when you log in. Your browsing habits on your work computer or a library computer may affect the kinds of advertisements you see when using your home computer.
- Information that Yahoo! collects related to your activities and interests on and off the Yahoo! network is maintained by Yahoo! on its servers and is associated with Yahoo! cookies regardless of what computer or device you use to sign in to Yahoo!.
- If you are a Yahoo! registered user who is not signed-in, Yahoo! will continue to store information about your interests based on a unique browser cookie. This cookie is an encrypted (or “one-way secret hashed”) form of a Yahoo! cookie that is de-identified from your Yahoo! account information. This de-identified cookie cannot be used by any third-parties to identify you.
- When you are not signed in to Yahoo!, Yahoo! will use this encrypted cookie and its stored associated interest information, to match advertisements and content to your interests.
Your Preference and Opt-out Choices
- To see and/or customize the information that Yahoo! has stored about interests that we use for advertising customization, you can visit our Ad Interest Manager. Ad Interest Manager allows you to opt out of one or more specific interest categories or opt out of all interest-based ads that Yahoo! serves.
- Yahoo! refreshes cookie information for registered Yahoo! users each and every time you log in to Yahoo! on whichever computer or device you are using at that time. Accordingly, if you do not want Yahoo! to store your interests to deliver more relevant advertising, deleting your cookies will not be an effective way to express this choice. Instead, you should use the persistent opt-out that Yahoo! provides for you. If you are signed-in when you exercise the opt-out, your opt-out cookie will be refreshed each time you log in to Yahoo! – even if you have had previously deleted your cookies and/or moved to a new computer.
- You can visit the Network Advertising Initiative site to see other networks that you may want to opt-out of or to use other tools to manage your opt-out choices.
- Yahoo’s Offers Cookie Opt-out Button Ahead of New EU Law (pcworld.com)
- Big Brother Google and Yahoo! Too (growmap.com)
- Is Google Risking Regulatory Ire by Targeting Rivals – Associated Content from Yahoo! – associatedcontent.com (stephencrose.wordpress.com)
- Yahoo! Privacy Opt Out – I Think Too Few Knew (lockergnome.com)
- Proxy-Privacy User Higher for Illicit Domains (circleid.com)
- France fines Google over Street View privacy breaches (theglobeandmail.com)
- Google fined £87,000 by French privacy watchdog for gathering and storing data through Street View cameras (dailymail.co.uk)
- Delete Old Online Accounts for Better Privacy (linearfix.wordpress.com)
- Facebook Testing Permanent Account Deletion [Privacy] (lifehacker.com)
Copyright 2011-3011 By Chase Kyla Hunter, All Rights Reserved.
One of the many odd things I noticed as I traveled through California during 2009 was the peculiar new invasion of personal privacy that occurred at the grocery check-out counter. After ringing up your groceries the clerk would ask you for your zip code when you began to pay. I would invariably reply:
and then stare blankly at the poor befuddled clerk, who was usually someone long accustomed to doing whatever someone in authority told he or she to do, without ever stopping once to ponder why. They would try to explain the inane retail reason that my zip code was now needed to finish the transaction, upon which I would flatly reply:
“I have been buying groceries for at least 35 years. No one EVER needed my zip code to check me out before, and you don’t need it now. Wanna debate this? I think the courts will agree with me….”
And the clerk would agree it was silly, type zeros on the designated spot, ring me up and I was on my way.
Apparently at one particular local grocery store no one had mustered the courage to NOT comply with this newest invasion of privacy until I was observed refusing one day, and then the next 5 people in line refused also. I knew I was right, and I knew a court of law would agree. The courts have now caught up with me and they agree.
Big Lesson: It took one person saying “no” to yet another invasion of privacy for the next 6 people standing in line to realize that they too could say “no,” and so they did. I’m glad the California court system has done right by the people of California and that the courts agree with us. They have ruled that clerks may NOT require consumers in California to provide their zip code when they shop. Here’s the link.
Know your legal and civil rights. And remember the power of “no” in numbers.
Chase Kyla Hunter
- California Court: Stores Can’t Ask for ZIP Codes (online.wsj.com)
- Calif. Court: Merchants Can’t Ask Patrons for ZIPs (abcnews.go.com)
- ZIP Code Questions At The Register: Court Rules On Side Of Consumer Privacy (huffingtonpost.com)
- Calif. court: Merchants can’t ask for ZIPs (boston.com)
- Stores that want your zip code: Annoying and illegal, court rules (seattlepi.com)
- Calif. court: Merchants can’t ask patrons for ZIPs (seattletimes.nwsource.com)
- Court Says California Stores Can’t Ask Customers For ZIP Codes (yro.slashdot.org)
- California high court: Retailers can’t request cardholders’ ZIP code (cnn.com)
- California mechants may not ask customers using credit cards for their ZIP codes, state Supreme Court rules (latimesblogs.latimes.com)
- Stores can’t ask for ZIP codes at time of purchase (sfgate.com)
Reposted from the Web By Chase Kyla Hunter on 01.20.2011
If you value your rapidly disappearing privacy while surfing the Internet you need to know about these tools. Whether you want to protect yourself from snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. The best part about them is they are FREE!
“If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”
-Google CEO Eric Schmidt
Without a Trace
If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number or email address, then these tools are for you.
- Big String. Big String offers self-destructing IMs and emails for those who don’t want any evidence of their online communications. Use with many popular IM clients.
- Mozilla Firefox, Portable Edition. This free web browser leaves no personal information on your computer. Not only can you use this anywhere, but no one will know you were there.
- x Paranoia mod. This Firefox extension is great for those who want to leave nothing behind on the computer. With a couple of clicks you can clear all your Internet history, passwords, cookies, and cache.
- Bugmenot.com. If you’ve ever had to register with a site just to read an article or watch a video, then you will want this tool. Find login information for many websites that require registration and never have to give your information again.
- 10 Minute Mail. Use this tool to get an email address that is good for 10 minutes, then expires. This is a great way to register with sites that require an email validation or just to cover your tracks.
- inumbr. Get a disposable phone number that you can use to forward calls to any other phone in the U.S. No one will be able to trace you with this number.
- GrandCentral. Here’s another phone option when you don’t want to be traced by your number. Consolidate all your phones into one with this tool that gives you one voice mailbox and one number for all your phones.
- drop.io. Want to share a top-secret online file with someone and then have no sign of the evidence later? This is the tool for you. The file is deleted after 30 days.
- Fake Name Generator. If you need a name, address, email, or even a UPS tracking code, use this handy tool to generate any one of the necessary fakes.
- cl1p.net. Create a note or upload a photo that you can keep for yourself or share, then delete it when you are finished with absolutely no sign of what you had.
If you want to browse the Internet in privacy, these tools will help you do just that. Use these to do the actual browsing or to check the security of your browsing privacy.
- Hide My Ass!. Hide your identity with this free tool. This proxy service will hide your IP address so no one will know you.
- Tor. Like getting secreted away, this free service allows you to hide your Internet identity with a “network of virtual tunnels.” Join journalists, government agencies, and more who use Tor for the ultimate in Internet privacy.
- Guardster. Another proxy service that hides your IP, this one is available in both free and for a fee versions. The free version does not work with encrypted SSL sites.
- Megaproxy. Paste the URL for whatever website you want to visit into this tool and you will have a completely private look at your target site. No registration or downloads needed to use this tool.
- Scandoo. Get real time protection when surfing the Internet with warnings about websites before you click on them. Based on ScanSafe technology, this home version is free.
- ShieldsUP!. Check out this tool to learn what information your browser is sending out. You can also test the effectiveness of your personal firewall when running ShieldsUP! testing.
- Privoxy. Privoxy is an open source non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk.
- What Is My IP Address?. Use this tool to ensure your IP blocking software is working correctly and not revealing your true IP address.
- Clusty. Use this search engine when browsing. Clusty doesn’t save your information or track you at all when you use it.
- Scroogle. Try searching Google with this tool. Scroogle uses SSL to send your search terms to Google with encryption, then does the same when sending the results back to you.
Using the Internet is a huge open door for people to stick their nose in your business. Use these tools to slam that door tightly shut.
- Malwarebytes’ Anti-Malware. This anti-malware software is one of the best tools available for removing crap from your computer. Best when used in conjunction with Ad-Aware to keep your PC 99.999% malware free.
- avast!. This free anti-virus software is one of the best available (for free or for a fee) at protecting your computer. This tool will alert you any time malware is detected and even checks incoming email. avast! also includes a boot-time scan option.
- Ad-Aware. The free version of this software does an excellent job of protecting your computer against spyware and adware. The paid version gives you real-time protection which is not available with the free one.
- Sandboxie. This free tool is great for both protecting your computer and getting rid of evidence. It works as a temporary storage area for information that would normally go to and from your hard drive. When you are finished in the “sandbox,” you can just clear it out.
- ThreatFire. Use this in conjunction with your anti-virus to fend off malware. ThreatFire detects malicious behavior such as capturing keystrokes and also serves to defend against zero-day threats.
- SnoopFree Privacy Shield. The ultimate free software for the ultra-cautious, this tool will detect any method of privacy invasion through your keyboard, screen, and open windows.
- Comodo Firewall. Keep out hackers with this free firewall. This program is one of the best when it comes to protecting your computer.
- WinPatrol. Protect your privacy and your computer with this free tool that works by alerting you to “hijackings, malware attacks and critical changes made to your computer without your permission.”
- AVG Free Anti-Virus. Get anti-virus and anti-spyware protection from this free software. This software also includes a scheduled scan option.
- TrueCrypt. This disk encryption software will keep nosey-parkers at bay. You can create a virtual encrypted disk, encrypt USB flash drives and hard drives, and more.
- Trustable Downloader. Download files from the Internet without worries of Trojans, worms, or viruses with this free application. As described, this tool will help guard you against government spying on its citizens.
- SiteAdvisor. This software alerts you before you visit a website that has spyware or harvests your information for spam. Use their color-coded system to alert you to the potential dangers of websites.
- Peer Guardian 2. This IP blocker is capable of blocking incoming and outgoing connections. You can also select to block spyware, adware, and educational and government ranges.
- GlowWorm FW Lite . Mac users can use this software to be informed when a program attempts to make an outgoing connection. Not only will this tool protect your information, it also guards against malware.
If someone makes off with your laptop, know how to stop them with these tools.
- Adeona. If you want to guard against someone taking your laptop, check out this tool. This software continually tells you where your laptop is located without the interference of any third party to help you track and recover your computer.
- iAlertU. Another laptop protection and tracking device, this one specifically for Macs, this software is based off mouse and keyboard movement which sets off an alarm, takes a photo of the thief, and emails the photo to a specified email address.
Spying on Those Out to Get You
If you know someone is trying to get to you, then turn the tables on them with these tools that will help you get the dirt on them.
- GotVoice. Take advantage of the 14 day free trial to have your target’s voice mail sent directly to you. If you need more time, get another 14 day trial with different information.
- Decoding Social Security Numbers in One Step. You can’t get everything out of that magical number with this tool, but you can narrow down the state and year of issue with any social security number instantly.
- Keylogger. This free software allows you to log everything entered on the keyboard so you can track computer usage. Be sure to use the stealth mode so your target doesn’t know you are tracking him.
- Decode Your License. This article describes how you can get a driver’s license from any state and decode the barcode on it to receive personal information. You will need the Internet tool described in the article and a scanner.
- Webcam Spy. Use this software to spy on your target using a webcam. The software activates the webcam with a motion sensor for an auto on and off feature. Spying on your target isn’t the only use for this–you can also use it in your home to see who comes by when you are gone.
Maps for Monitoring Occurrences
Whether you are looking for evidence for your conspiracy theory or trying to put all the pieces together on a plot you know is about to be hatched, then these maps will help you get all the information you need.
- Global Incident Map. Find out where terrorism is occurring around the world with this mapping tool. You be able to find plenty of patterns to put together your own theories.
- HealthMap. This tool will keep you posted on health alerts. Find outbreaks by geographical location, disease, or chronological occurrence.
- Who is Sick?. This Google map-based tool shows symptoms for any geographical spot. You’ll be able to track any type of outbreaks with this tool.
- Incident1. Track police, fire, and emergency services on this map. You can also do a search by zip code or select a region within the states.
- Incidentlog. If you live in the northeast and couldn’t find anything on Incident1, try Incidentlog for more options. This map is populated from a different pool of data.
- Havaria Information Service Alert Map. Find everything from earthquakes to hazmat incidences to biological hazards on this world map. You can narrow the results by country if you don’t want to see the world view.
- GeoMAC Wildfire Information. This map shows where wildfires are currently burning throughout the United States or check out past wildfires since 2002.
- Piracy Attacks Maps. Pirates on the high seas are not a thing of the past. Use this map to track current piracy around the world.
- UNEP: Atlas of Our Changing Environment. Sponsored by the United Nations Environment Programme, this map includes incidents that document environmental changes around the world. Click on each incident to see photos and read the story.
- Google Maps Mania. This unofficial site follows the incredible array of various interactive maps being used in conjunction with Google Maps. Find a map that tracks your favorite passion or create one of your own.
Tags: internet privacy