Just a ordinary guy from Georgia. Here I publish my interests, rants, raves, and things that happen throughout my day to day life.
Wednesday, July 31, 2013
I got to put this out to my readers.
10 Signs Your Girlfriend Is A Bitch
I couldn't help myself on this one. I came across this and thought I would share..
No.10 - She’s self-centered
To a bitch, the only person in the world of any importance is herself. Others are merely warm bodies who get in the way of her selfish pursuits. She is the only person affected by a tragedy. The only feelings worth considering are hers. A bitch is so obsessed with herself that she would rather get a manicure than visit your father in the hospital.
No one should have to tolerate this kind of superiority complex — especially a good man, who tends to be the preferred victim of the bitch.
No.9 - She criticizes everything about you
Shaming is a common tactic women use to control their men. The bitch takes this to the extreme. By making you feel inadequate in every domain, she hopes to make you lose your self-confidence, then rely on her to do things “right.” Nothing is good enough for her, and you are the only one, aside from her bitch friends, who actually listens. So she nags about everything you say and do.
No.8 - She’s coldhearted
A bitch is typically amoral, adhering minimally to the ethical codes of society while transgressing those that are inconvenient to her. She dismisses civility for her own gains. She’s manipulative and scheming, always looking for underhanded ways of taking advantage of people or even hurting them. And as proof that she lacks a woman’s gentle soul, she never cries or shows soft emotion.
No.7 - She expects to be treated like a queen
A bitch is usually a spoiled brat who simply refuses to grow up. She was pampered and adored as a child, and typically given anything she asked for. As an adult, she still thinks she is entitled to everything. She consistently expects car rides, gifts and attention from you. She makes constant demands of people, and never listens to their requests. There is no fixing such a person; it’s programmed into her. Only by being denied several times will she begin to get a clue.
No.6 - She slights you in bed
You want to know just how heartless such a woman can be? Not only does she not appreciate all the effort you put into pleasing her sexually, she also has the gall to ridicule you. But she’ll pick the oddest times to do so, such as during an unrelated argument or just randomly in passing. This could be a cruel comment about your size, stamina or technique. More grating still is the fact that she would go crazy if you were to reciprocate the slur.
No.5 - She treats people like trash
As someone who believes luxury treatment is owed to her, a bitch has no respect for those who do things for her. She’s rude to people who work in the service industry, such as waiters and clerks, seeing them not as human beings, but as robots who exist solely to serve her. She talks at them — not to them.
She has no compassion for people in need, such as the poor or the sick. “It’s their own fault,” she’ll tell herself and others. More sickening still, she’s mean to children, as they are a nuisance and can’t do anything for her. And since her existence dwells on envy, she constantly badmouths other women over trivial things, such as their earrings or the way they speak.
No.4 - She never pays
As she thinks that it is the duty of others to provide for her, the bitch is a tightwad. On dates she always selects expensive restaurants and orders the priciest dish and drink, but never offers to pay. She won’t pitch in for gas on trips or for food at a get-together. She buys crappy gifts for others, when she can be bothered, usually expecting you to pay for them. And if you mention any of these things, she’ll accuse you of being cheap!
No.3 - She bosses you around
A bitch’s massive superiority complex makes her think people are born to be her servants, especially her boyfriend. As someone who spends a lot of his time with her, she uses you to do all the menial tasks that she doesn’t want to. Sometimes she’ll even boss you around for the power trip — just because she can.
No.2 - She embarrasses you in public
A bitch cares nothing about the feelings of others, not even those of the hapless sap she may be dating. In fact, she uses her man as a punching bag. Sometimes she even berates him in front of his friends, or even hers. She does this either as a power trip, to show others she can, or simply to beat a man’s self-worth down to her own level — after all, misery loves company.
No.1 - She flirts with other men
This is the most intolerable trait of a bitch, which many men sadly tolerate. She’ll tease and allure other men right in front of you, never once considering how you may feel about it. There are no bounds to her search for attention and admiration. And to top it off, she’ll extract whatever feelings of jealousy she can from you by comparing you to other men
Tuesday, July 30, 2013
Myths about men and dating unmasked.
The online survey quizzed around 100,000 people and found that while 48 per cent of men have fallen in love at first sight, a mere 28 per cent of women could say the same.
It’s not the first time popular ideas about men and romance have been wrong. Here are 10 myths about men and dating - well and truly debunked.
Myth one - men cheat, women are cheated on
It’s popularly believed that men are the cheaters in relationships and women the cheated on. Men don't cheat alone, so it’s commonly thought that a few women cheat a lot, but that far more men have been unfaithful at least once or twice.
Most figures don’t back that up. One recent study found that, while more men than women admitted to cheating, the gap was less than five per cent (20 per cent of men admitted cheating, compared with 16 per cent of women).
There’s also evidence to suggest that women are better at not getting caught, meaning unfaithful women may have longer affairs than unfaithful men.
Myth two - men tell great big whoppers
Studies suggest that, in relationships and while dating, men might lie a little more than women. We lie about how many partners we’ve had in the past, what our long-term intentions are, and how long ago we broke up with a previous partner, among many other things.
But figures suggest that between eight and 15 per cent of children have not been fathered by the man who thinks he is the biological parent.
So we might lie more, but it’s hard to imagine that our lies are worse.
Myth three - men are cold, women romantic
A wealth of research now exists to debunk this myth. The study mentioned at the start only confirms an earlier poll by match.com, which found that 54 per cent of men had felt love at first sight, compared to 44 per cent of women.
Myth four - women fall in love fastest
A study by Pennsylvania State University in the US found that most people thought of women as the hopeless romantics, and men as stand-offish and emotionally cold. The same study then went on to debunk the stereotype completely.
It found that three times as many men as women said 'I love you' first to their partners. That’s right, the three little words that mean so much are much more likely to come out of a man’s mouth first than his girlfriend’s.
Myth five - but...but...seriously, women DO fall in love fastest
Erm, no they don’t. The Penn State survey mentioned earlier also found that men were likely to start falling in love within weeks, while with women it took several months.
Another study, by researchers at the Massachusetts Institute of Technology, also found that men start thinking about saying 'I love you' a good six weeks before women do.
It seems the more loved-up gender - contrary to popular opinion - is men.
Myth six - women are the ones pressing for kids
Once ensconced in a relationship, the common perception is that, when women start talking about having kids, men have to be dragged kicking and screaming into bed.
But new research suggests that, in fact, men are just as broody as women, and sometimes more so. Research presented to the British Sociological Association recently found that men want to be fathers just as much as women want to be mothers.
And according to an earlier survey of more than 5,000 people by match.com, over half of single men aged 21-35 want children, compared with 46 per cent of women.
Myth seven - men need more space
OK, so men might fall in love and want kids and all that, but when they’re in relationships they need a lot of space. They need endless nights out with the boys and a 'man cave' to retreat to. Women, on the other hand, crave constant cuddles and intimacy. Right?
Wrong.
A US study from 2011 found that, in fact, the opposite was true. The data showed that 77 per cent of women say having their personal space is 'very important,' against 58 per cent for men; 78 per cent of women say the same about having their own interests and hobbies (64 per cent for men). And 35 per cent of women (compared to 23 per cent of men) say regular nights out with friends are important.
The study’s authors concluded that men and women are increasingly reading each other’s script. Compared to previous generations men want more intimacy and women more independence.
Myth eight - men are sex mad
Young and single men might be obsessed with sex, but that might be because they’re not getting much.
In relationships, the story may be different. According to a poll of nearly 2,000 men in long-term relationships by online pharmacy ukmedix.com, men are more likely than women to turn down sex. Over 60 per cent of the men surveyed said they turned down sex more frequently than their female partner. And for over 40 per cent of the men, sex once a fortnight was fine.
Myth nine - men think about sex all the time
You’ve probably heard the statistic that men think about sex every three seconds. Or was that seven seconds? Or was it every two minutes?
We forget the actual figure, because each time you hear it in the pub it’s different. It’s also a myth.
A study published in 2011 did find that men think about sex more than women, but only roughly 19 times a day. So that’s one sex thought every hour and a bit.
And the study found something else besides. Men think about food as much as sex, and sleep nearly as much. So men think about their physical needs a lot, and more than women do, but we don’t think about sex anywhere near as much as previously claimed.
Myth 10 - men break up and move on
The final myth says that when a love affair ends, cold and heartless men spend a couple of days in a bit of a bad mood and by the weekend are back on the pull. Women, on the other hand, spend months tearing their hair out and analysing what went wrong.
In fact, a US study found that, when a relationship is in trouble, men are more badly affected than women. Men also dealt with rocky love lives in a more damaging way, turning to booze for back-up while jilted women turned to friends.
Part of that might be that women see the end coming before men do. Research conducted at Carnegie Mellon University suggests that women adjust better to the end of a relationship because they've already thought about the possibility, whereas men are typically unprepared for it.
So are you a cold, unromantic man who is in a relationship largely for the sex and would much rather be out swilling beer with the boys than staying in with your partner? If so it seems that you might be in the minority.
So have your say below and tell us what you think.
Monday, July 29, 2013
Warning: The girl is using you!
That said, there are certain warning signs that could alert you to the notion that your partner isn't as keen on you personally as you may have hoped.
So how can you protect yourself from the type of girl who's just using you for what you can give to them? Whether it be an ego-boost, money, or a short distraction before someone else comes along, you don't want to find out she's really not that into you after it's too late.
Money
This may seem obvious, but it isn't always the case. A woman likes to feel special and a chivalrous man will be happy to buy dinner, drinks, tickets and other things. If a bloke expects a date to chip in with the bill right away he may come across as cheap, and that's the last thing you want. Generosity is an important trait, after all.
So, at the start of a relationship it's best to perhaps wait and see if her attitude to paying changes. But if you're past the third date and she's not offering to split the bill, alarm bells should go off.
The same rule applies when you meet a girl at a bar. Sure, buy her one, maybe two drinks, but come the third, it's her round.
It's all on her terms
A relationship involves compromise and flexibility. It's nice to know your partner will go out of her way to make you happy and vice versa. So, when you have no say in anything and find your girlfriend is only available when she wants to be, there's a problem.
Of course, she's entitled to her own life, but if she shows disinterest in everything you do and isn't prepared to go that extra mile, so to speak, the chances are she isn't keen on getting to know you.
An excellent tester is your friend's opinions, because they should be honest with you and want to see you happy. If you're girl makes no effort with your friends and family then it's fair to assume you're considered nothing more than a time-filler. She'll be out the door as soon as someone she considers better comes along.
Physical and emotional manipulation
Women have a great deal of power over men and they know it! First up, they generally know men lust after them and that we love sex, and secondly they also know how to play the victim and make us men feel guilty.
Emotional manipulation comes in many forms, and if your girl is using any of them she obviously doesn't respect you enough to communicate properly. You shouldn't put up with this.
One popular technique is weeding out previous bad experiences and weaving them into your current relationship to make you feel bad. Yes, she may have been treated poorly in the past, but that isn't your fault — and if she's not prepared to talk openly about it with you, there's nothing you can do. Yes, express concern and sympathy, but if you're dealing with a train wreck, then she's not seeing you in the right light.
Avoiding sex is a big one, too, especially when you've been dating for a little while. Of course, you can't expect to sleep with a girl right away and you certainly don't want to appear as though it's all you want, but you really shouldn't have to ask.
Women are sexual creatures as well, and most of them will have normal sex drives. If she really is into you and comfortable in the relationship, she'll most likely want to have sex with you as much as you want to get physical with her. If she's withholding, then you know there's something wrong.
Remember, what you get out of a relationship should be roughly what you put in. If you're genuinely treating your girlfriend with respect and showing her how much you care then she should return those feelings equally. You know why you are in the relationship and what you want out of it — so don't accept anything less.
How can you tell if your partner is using you? Have your say below
Sunday, July 28, 2013
FBI admits to flying drones over US without warrants
The Federal Bureau of Investigation (FBI) says it has used drones for domestic surveillance purposes in the United States at least ten times without obtaining warrants. In three additional cases, drones were authorized but “not actually used.”
Sen. Rand Paul (R-Ky.) on Thursday published a letter from FBI Assistant Director Stephen D. Kelly, who admitted that the agency used unmanned aerial vehicles (UAVs) domestically, without gathering any warrants.
“The FBI uses UAVs in very limited circumstances to conduct surveillance when there is a specific, operational need,” the letter reads. “Since late 2006, the FBI has conducted surveillance using UAVs in eight criminal cases and two national security cases.”
The bureau said that it would only be required to obtain a warrant to use a drone in cases for which a person “would have a reasonable expectation of privacy.” The FBI stated that it has not yet needed to ask for a warrant, but that all requests for drone use must be reviewed by an agency lawyer and approved by a senior management official.
The agency said that one of the cases involved the rescue of a five-year-old boy who was being held hostage in an underground bunker. The information strongly suggests that the agency was referring to the Alabama hostage crisis in which a retired truck driver kidnapped a boy from a school bus and held him hostage for six days.
Drone usage was also authorized in three additional cases, but the FBI did not release details about the nature of those circumstances.
Sen. Paul has long advocated against domestic drone usage, and in March held up CIA Director John Brennan’s nomination for nearly 13 hours, due to his history of defending drone strikes. In June, FBI Director Robert Mueller admitted that his agency uses drones to spy on US citizens without any “operational guidelines.” Since Mueller’s announcement, Paul has sent a series of open letters to the FBI, requesting detailed information about its use of drones in the United States.
In his second letter, mailed July 9, Paul threatened to filibuster the confirmation hearing for James Comey, Mueller’s successor, if he didn’t receive a response. This week, Paul finally received the information he sought.
But Paul was discontent with part of the agency’s response. In a follow-up letter addressed to Mueller, he expressed concern about the FBI’s ability to use drones without a warrant in cases where there is no “reasonable expectation of privacy.” He said the clause could result in “an over-broad interpretation of this protection,” and asked the FBI to clarify what would require a warrant.
Sen. Paul also took his concerns to Twitter, telling his followers that “spying without warrants is unconstitutional.”
Overall, confirmation of the FBI’s drone use might be cause for concern among privacy advocates and anti-drone activists. Dave Norris, a councilman of Charlottesville, Va., predicted last February that drone use would occur domestically, and feared that there would be room for abuse.
“To me, it’s Big Brother in the sky,” he told the New York Times. “I don’t mean to sound conspiratorial about it, but these drones are coming, and we need to put some safeguards in place so they are not abused.”
Friday, July 26, 2013
How to Know if Your Girlfriend Is Cheating on You
Sometimes, a good relationship can be ruined by mistrusting your girlfriend. But if you suspect she's cheating, the nagging suspicion can be almost impossible to ignore. Here's how to start figuring out if your fears are real.
1. Take a step back. Before you do anything rash, take a moment to exhale and consider the situation. Ask yourself:
What makes you think she's cheating? Do you have hard evidence, or just a hunch?
How trustworthy do you think your girlfriend is? Do you think she'd be capable of something like this?
Has your girlfriend lied to you? Can you think of any instances when you haven't been sure if she's telling the truth?
Is she absent or unreachable for long periods of time? Does she bail out on your plans often?
2. Observe. Watch how your girlfriend acts around you and other people. Do you notice any significant changes in her behavior, such as:
Does she send you text messages or calls less often? If you start being the one to call or text her first all the time, that's a bad sign.
Secret phone conversations. Does she leave the room every time she gets a call on her cell? Is she just trying to be polite? If she's trying to guard her conversations on the phone, there may be reason to worry.
Distinct changes in appearance. If your girlfriend suddenly starts worrying a little more about her appearance, (new clothes, always clean shaven, spending more time in the mirror) she may be trying to look good for someone else. If she gets dressed up for you, that's one thing but if they seem to spend a little more time looking good to go out without you, you might want to look into that.
Picking fights: Is your girlfriend picking fights and arguing more with you? This could just be an excuse to get out of the house. Picking a fight and then storming out of the house to get away from you is an easy way to go spend time with someone else.
Lying: Catching her in a lie, no matter how small, is always cause for concern. Try to connect lies with certain time frames and you may have a connection to infidelity.
Computer time: An increase in computer time may a sign you are being cheated on. There are many adult chat rooms out there that cater to infidelity.
Friends behavioral change: If your friends seem to feel uncomfortable around you, they may know something that you don't. This is a classic sign that your girlfriend is cheating on you and you are the last to know.
Accusing you: Another common sign you are being cheated on is that she constantly accuses you of the very same thing she is guilty of — cheating. She may drop hints that you are having an affair because her own guilt is starting to wear on her.
Emotionally detached. When she no longer cares about things related to the relationship. She has a cold, distant vibe that feels as if a large wall is up and you can't do anything to break it down.
3. Express affection and watch how she responds. These are signs that she might be thinking of cheating:
Tell her you love her. Does she say it back?
Hold her hand. Does she try to pull it away? Does she look nervous?
4. Look at her past. Like the old saying goes, "Once a cheater, always a cheater". Has she snuck around other boyfriends in the past? If so, then, she might already be comfortable with cheating.
5 Be up-front with her. Tell her you have something on your mind, and ask if she has time to talk in a private space. Don't accuse her (such as, "I know you're cheating!"), but do express your feelings (like "I feel like you're losing interest in our relationship").
Notice whether or not she gives you an answer. If she isn't cheating, she has no reason not to be straightforward and reassure you that everything is fine. If she is, she might talk in circles without really saying anything.
If she becomes defensive or tries to turn the tables on you, this might be her guilt talking.
6. Follow your gut. Sometimes, you just know things without having to second-guess yourself. No amount of crying and denial can rival the feelings you have in the pit of your stomach. After you've taken all the evidence into consideration, it's time to follow your intuition.
Quick Tip Rundown
If she is making excuses not to spend time with you but is going the extra mile to hang out with her so-called friends, it's likely that she doesn't want to be with you anymore.
If your girlfriend begins to start acting differently with the way she speaks to you and the way she acts when you are not around that could be a sign.
She will make all kinds of excuses to make you feel bad and the ease of getting away from cheating.
You can obviously tell if your girlfriend is cheating on you if she doesn't have the time to be with you anymore. It almost seems as if she has plans without you.
Don't just randomly ask her, "Hey, you wouldn't happen to be cheating on me, would you?" She's going to say no anyway and she'll think you don't trust her.
Nothing you can do will dictate her actions. Sometimes, there is simply nothing you can do but walk away. Never, ever, dismiss this as an option or you will not get anywhere.
She doesn't want you to know her associations, see her emails or her phone.
If she talks (texts) another guy more than she texts your or when you are out doing something, it's a good sign she might be cheating.
If she can't look you in your face while you two are talking, that might mean she is cheating on you.
If your girlfriend is coming home at extremely late hours after long periods of absence, this may be a sign that she is having an affair.
Well this is the first part of the two part blog series I have for Yall this weekend. Look for part 2 tomorrow. As always feel free to leave your comments .
FED's demand your user names and password for your online accounts.
Secret demands mark escalation in Internet surveillance by the federal government through gaining access to user passwords, which are typically stored in encrypted.
The U.S. government has demanded that major Internet companies divulge users' stored passwords, according to two industry sources familiar with these orders, which represent an escalation in surveillance techniques that has not previously been disclosed.
If the government is able to determine a person's password, which is typically stored in encrypted form, the credential could be used to log in to an account to peruse confidential correspondence or even impersonate the user. Obtaining it also would aid in deciphering encrypted devices in situations where passwords are reused.
"I've certainly seen them ask for passwords," said one Internet industry source who spoke on condition of anonymity. "We push back."
A second person who has worked at a large Silicon Valley company confirmed that it received legal requests from the federal government for stored passwords. Companies "really heavily scrutinize" these requests, the person said. "There's a lot of 'over my dead body.'"
Some of the government orders demand not only a user's password but also the encryption algorithm and the so-called salt, according to a person familiar with the requests. A salt is a random string of letters or numbers used to make it more difficult to reverse the encryption process and determine the original password. Other orders demand the secret question codes often associated with user accounts.
"This is one of those unanswered legal questions: Is there any circumstance under which they could get password information?"
--Jennifer Granick, Stanford University
A Microsoft spokesperson would not say whether the company has received such requests from the government. But when asked whether Microsoft would divulge passwords, salts, or algorithms, the spokesperson replied: "No, we don't, and we can't see a circumstance in which we would provide it."
Google also declined to disclose whether it had received requests for those types of data. But a spokesperson said the company has "never" turned over a user's encrypted password, and that it has a legal team that frequently pushes back against requests that are fishing expeditions or are otherwise problematic. "We take the privacy and security of our users very seriously," the spokesperson said.
A Yahoo spokeswoman would not say whether the company had received such requests. The spokeswoman said: "If we receive a request from law enforcement for a user's password, we deny such requests on the grounds that they would allow overly broad access to our users' private information. If we are required to provide information, we do so only in the strictest interpretation of what is required by law."
Apple, Facebook, AOL, Verizon, AT&T, Time Warner Cable, and Comcast did not respond to queries about whether they have received requests for users' passwords and how they would respond to them.
Richard Lovejoy, a director of the Opera Software subsidiary that operates FastMail, said he doesn't recall receiving any such requests but that the company still has a relatively small number of users compared with its larger rivals. Because of that, he said, "we don't get a high volume" of U.S. government demands.
The FBI declined to comment.
Some details remain unclear, including when the requests began and whether the government demands are always targeted at individuals or seek entire password database dumps. The Patriot Act has been used to demand entire database dumps of phone call logs, and critics have suggested its use is broader. "The authority of the government is essentially limitless" under that law, Sen. Ron Wyden, an Oregon Democrat who serves on the Senate Intelligence committee, said at a Washington event this week.
Large Internet companies have resisted the government's requests by arguing that "you don't have the right to operate the account as a person," according to a person familiar with the issue. "I don't know what happens when the government goes to smaller providers and demands user passwords," the person said.
An attorney who represents Internet companies said he has not fielded government password requests, but "we've certainly had reset requests -- if you have the device in your possession, than a password reset is the easier way."
Source code to a C implementation of bcrypt, a popular algorithm used for password hashing.
Photo by Declan McCullagh
Cracking the codes
Even if the National Security Agency or the FBI successfully obtains an encrypted password, salt, and details about the algorithm used, unearthing a user's original password is hardly guaranteed. The odds of success depend in large part on two factors: the type of algorithm and the complexity of the password.
Algorithms, known as hash functions, that are viewed as suitable for scrambling stored passwords are designed to be difficult to reverse. One popular hash function called MD5, for instance, transforms the phrase "National Security Agency" into this string of seemingly random characters: 84bd1c27b26f7be85b2742817bb8d43b. Computer scientists believe that, if a hash function is well-designed, the original phrase cannot be derived from the output.
But modern computers, especially ones equipped with high-performance video cards, can test passwords scrambled with MD5 and other well-known hash algorithms at the rate of billions a second. One system using 25 Radeon-powered GPUs that was demonstrated at a conference last December tested 348 billion hashes per second, meaning it would crack a 14-character Windows XP password in six minutes.
The best practice among Silicon Valley companies is to adopt far slower hash algorithms -- designed to take a large fraction of a second to scramble a password -- that have been intentionally crafted to make it more difficult and expensive for the NSA and other attackers to test every possible combination.
One popular algorithm, used by Twitter and LinkedIn, is called bcrypt. A 2009 paper (PDF) by computer scientist Colin Percival estimated that it would cost a mere $4 to crack, in an average of one year, an 8-character bcrypt password composed only of letters. To do it in an average of one day, the hardware cost would jump to approximately $1,500.
But if a password of the same length included numbers, asterisks, punctuation marks, and other special characters, the cost-per-year leaps to $130,000. Increasing the length to any 10 characters, Percival estimated in 2009, brings the estimated cracking cost to a staggering $1.2 billion.
As computers have become more powerful, the cost of cracking bcrypt passwords has decreased. "I'd say as a rough ballpark, the current cost would be around 1/20th of the numbers I have in my paper," said Percival, who founded a company called Tarsnap Backup, which offers "online backups for the truly paranoid." Percival added that a government agency would likely use ASICs -- application-specific integrated circuits -- for password cracking because it's "the most cost-efficient -- at large scale -- approach."
While developing Tarsnap, Percival devised an algorithm called scrypt, which he estimates can make the "cost of a hardware brute-force attack" against a hashed password as much as 4,000 times greater than bcrypt.
Bcrypt was introduced (PDF) at a 1999 Usenix conference by Niels Provos, currently a distinguished engineer in Google's infrastructure group, and David Mazières, an associate professor of computer science at Stanford University.
With the computers available today, "bcrypt won't pipeline very well in hardware," Mazières said, so it would "still be very expensive to do widespread cracking."
Even if "the NSA is asking for access to hashed bcrypt passwords," Mazières said, "that doesn't necessarily mean they are cracking them." Easier approaches, he said, include an order to extract them from the server or network when the user logs in -- which has been done before -- or installing a keylogger at the client.
Sen. Ron Wyden, who warned this week that "the authority of the government is essentially limitless" under the Patriot Act's business records provision.
Getty Images
Questions of law
Whether the National Security Agency or FBI has the legal authority to demand that an Internet company divulge a hashed password, salt, and algorithm remains murky.
"This is one of those unanswered legal questions: Is there any circumstance under which they could get password information?" said Jennifer Granick, director of civil liberties at Stanford University's Center for Internet and Society. "I don't know."
Granick said she's not aware of any precedent for an Internet company "to provide passwords, encrypted or otherwise, or password algorithms to the government -- for the government to crack passwords and use them unsupervised." If the password will be used to log in to the account, she said, that's "prospective surveillance," which would require a wiretap order or Foreign Intelligence Surveillance Act order.
If the government can subsequently determine the password, "there's a concern that the provider is enabling unauthorized access to the user's account if they do that," Granick said. That could, she said, raise legal issues under the Stored Communications Act and the Computer Fraud and Abuse Act.
The Justice Department has argued in court proceedings before that it has broad legal authority to obtain passwords. In 2011, for instance, federal prosecutors sent a grand jury subpoena demanding the password that would unlock files encrypted with the TrueCrypt utility.
The Florida man who received the subpoena claimed the Fifth Amendment, which protects his right to avoid self-incrimination, allowed him to refuse the prosecutors' demand. In February 2012, the U.S. Court of Appeals for the Eleventh Circuit agreed, saying that because prosecutors could bring a criminal prosecution against him based on the contents of the decrypted files, the man "could not be compelled to decrypt the drives."
In January 2012, a federal district judge in Colorado reached the opposite conclusion, ruling that a criminal defendant could be compelled under the All Writs Act to type in the password that would unlock a Toshiba Satellite laptop.
Both of those cases, however, deal with criminal proceedings when the password holder is the target of an investigation -- and don't address when a hashed password is stored on the servers of a company that's an innocent third party.
"If you can figure out someone's password, you have the ability to reuse the account," which raises significant privacy concerns, said Seth Schoen, a senior staff technologist at the Electronic Frontier Foundation.
As always feel free to coment.
Thursday, July 18, 2013
Obama Executive Order: All Americans Must Get Tested For HIV/AIDS
Yes another executive order. This just keeps rolling out. Not sure if I am for this or against it... You tell me..
EXECUTIVE ORDER- – - – - – -ACCELERATING IMPROVEMENTS IN HIV PREVENTION AND CARE IN THE UNITED STATES THROUGH THE HIV CARE CONTINUUM INITIATIVEBy the authority vested in me as President by the Constitution and the laws of the United States of America, and in order to further strengthen the capacity of the Federal Government to effectively respond to the ongoing domestic HIV epidemic, it is hereby ordered as follows:
Section 1. Policy. Addressing the domestic HIV epidemic is a priority of my Administration. In 2010, the White House released the first comprehensive National HIV/AIDS Strategy (Strategy), setting quantitative goals for reducing new HIV infections, improving health outcomes for people living with HIV, and reducing HIV-related health disparities. The Strategy will continue to serve as the blueprint for our national response to the domestic epidemic. It has increased coordination, collaboration, and accountability across executive departments and agencies (agencies) with regard to addressing the epidemic. It has also focused our Nation’s collective efforts on increasing the use of evidence-based approaches to prevention and care among populations and in regions where HIV is most concentrated.
Since the release of the Strategy, additional scientific discoveries have greatly enhanced our understanding of how to prevent and treat HIV. Accordingly, further Federal action is appropriate in response to these new developments. For example, a breakthrough research trial supported by the National Institutes of Health showed that initiating HIV treatment when the immune system was relatively healthy reduced HIV transmission by 96 percent. In addition, evidence suggests that early treatment may reduce HIV-related complications. These findings highlight the importance of prompt HIV diagnosis, and because of recent advances in HIV testing technology, HIV can be detected sooner and more rapidly than ever before.Based on these and other data, recommendations for HIV testing and treatment have changed. The U.S. Preventive Services Task Force now recommends that clinicians screen all individuals ages 15 to 65 years for HIV, and the Department of Health and Human Services Guidelines for Use of Antiretroviral Agents now recommends offering treatment to all adolescents and adults diagnosed with HIV.
Furthermore, ongoing implementation of the Affordable Care Act provides a historic opportunity for Americans to access affordable, quality health care. The Act is expanding access to recommended preventive services with no out-of-pocket costs, including HIV testing, and, beginning in 2014, insurancecompanies will not be able to deny coverage based on pre-existing conditions, including HIV. Starting October 1, 2013, Americans can select the coverage that best suits them through the new Health Insurance Marketplace, and coverage will begin January 1, 2014.
Despite progress in combating HIV, important work remains. Since the publication of the Strategy, data released by the Centers for Disease Control and Prevention show that there are significant gaps along the HIV care continuum — the sequential stages of care from being diagnosed to receiving optimal treatment. Nearly one-fifth of the estimated 1.1 million people living with HIV in the United States are undiagnosed; one-third are not linked to medical care; nearly two-thirds are not engaged in ongoing care; and only one-quarter have the virus effectively controlled, which is necessary to maintain long-term health and reduce risk of transmission to others.
In light of these data, we must further clarify and focus our national efforts to prevent and treat HIV infection. It is the policy of my Administration that agencies implementing the Strategy prioritize addressing the continuum of HIV care, including by accelerating efforts to increase HIV testing, services, and treatment along the continuum. This acceleration will enable us to meet the goals of the Strategy and move closer to an AIDS-free generation.
Sec. 2. Establishment of the HIV Care Continuum Initiative. There is established the HIV Care Continuum Initiative (Initiative), to be overseen by the Director of the Office of National AIDS Policy. The Initiative will mobilize and coordinate Federal efforts in response to recent advances regarding how to prevent and treat HIV infection. The Initiative will support further integration of HIV prevention and care efforts; promote expansion of successful HIV testing and service delivery models; encourage innovative approaches to addressing barriers to accessing testing and treatment; and ensure that Federal resources are appropriately focused on implementing evidence-based interventions that improve outcomes along the HIV care continuum.
Sec. 3. Establishment of the HIV Care Continuum Working Group. There is established the HIV Care Continuum Working Group (Working Group) to support the Initiative. The Working Group shall coordinate Federal efforts to improve outcomes nationally across the HIV care continuum.
(a) Membership. The Working Group shall be co-chaired by the Director of the Office of National AIDS Policy and the Secretary of Health and Human Services or designee (Co-Chairs). In addition to the Co-Chairs, the Working Group shall consist of representatives from:
(i) the Department of Justice;(ii) the Department of Labor;(iii) the Department of Health and Human Services;(iv) the Department of Housing and Urban Development;(v) the Department of Veterans Affairs;(vi) the Office of Management and Budget; and(vii) other agencies and offices, as designated by the Co-Chairs.
(b) Consultation. The Working Group shall consult with the Presidential Advisory Council on HIV/AIDS, as appropriate.
(c) Functions. As part of the Initiative, the Working Group shall:(i) request and review information from agencies describing efforts to improve testing, care, and treatment outcomes, and determine if there is appropriate emphasis on addressing the HIV care continuum in relation to other work concerning the domestic epidemic;(ii) review research on improving outcomes along the HIV care continuum;(iii) obtain input from Federal grantees, affected communities, and other stakeholders to inform strategies to improve outcomes along the HIV care continuum;(iv) identify potential impediments to improving outcomes along the HIV care continuum, including for populations at greatest risk for HIV infection, based on the efforts undertaken pursuant to paragraphs (i), (ii), and (iii) of this subsection;(v) identify opportunities to address issues identified pursuant to paragraph (iv) of this subsection, and thereby improve outcomes along the HIV care continuum;(vi) recommend ways to integrate efforts to improve outcomes along the HIV care continuum with other evidence-based strategies to combat HIV; and(vii) specify how to better align and coordinate Federal efforts, both within and across agencies, to improve outcomes along the HIV care continuum.
(d) Reporting.(i) Within 180 days of the date of this order, the Working Group shall provide recommendations to the President on actions that agencies can take to improve outcomes along the HIV care continuum.(ii) Thereafter, the Director of the Office of National AIDS Policy shall include, as part of the annual report to the President pursuant to section 1(b) of my memorandum of July 13, 2010 (Implementation of the National HIV/AIDS Strategy), a report prepared by the Working Group onGovernment-wide progress in implementing this order. This report shall include a quantification of progress made in improving outcomes along the HIV care continuum.
Sec. 4. General Provisions. (a) Nothing in this order shall be construed to impair or otherwise affect:(i) the authority granted by law to an executive department, agency, or the head thereof; or(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.
(b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
BARACK OBAMA
Source: http://www.whitehouse.gov/the-press-office/2013/07/15/executive-order-hiv-care-continuum-initiative
Wednesday, July 17, 2013
I am evil...
Yes I am that ass that is going 60 to 70 miles an hour making you speed all the way with me and when you catch up with me I stop doing 70 in a 60 why cause I can and I am evil today..
Sorry that's how i is.
Sent via goggle voice...
Sources: NSA sucks in data from 50 companies
Yep the FEDS ae at it agian and up to their same old tricks. When are "WE THE PEOPLE" gonna wake up..
Analysts at the National Security Agency can now secretly access real-time user data provided by as many as 50 American companies, ranging from credit rating agencies to internet service providers, two government officials familiar with the arrangements said.
Several of the companies have provided records continuously since 2006, while others have given the agency sporadic access, these officials said. These officials disclosed the number of participating companies in order to provide context for a series of disclosures about the NSA's domestic collection policies. The officials, contacted independently, repeatedly said that "domestic collection" does not mean that the target is based in the U.S. or is a U.S. citizen; rather, it refers only to the origin of the data.
The Wall Street Journal reported today that U.S. credit card companies had also provided customer information. The officials would not disclose the names of the companies because, they said, doing so would provide U.S. enemies with a list of companies to avoid. They declined to confirm the list of participants in an internet monitoring program revealed by the Washington Post and the Guardian, but both confirmed that the program existed.
"The idea is to create a mosaic. We get a tip. We vet it. Then we mine the data for intelligence," one of the officials said.
In a statement, Director of National Intelligence James Clapper said that programs collect communications "pursuant to section 702 of the Foreign Intelligence Surveillance Act, " and "cannot be used to intentionally target any U.S. citizen, any other U.S person, or anyone within the United States."
He called the leaks "reprehensible" and said the program "is among the most important" sources of "valuable" intelligence information the government takes in.
One of the officials who spoke to me said that because data types are not standardized, the NSA needs several different collection tools, of which PRISM, disclosed today by the Guardian and the Washington Post, is one. PRISM works well because it is able to handle several different types of data streams using different basic encryption methods, the person said. It is a "front end" system, or software, that allows an NSA analyst to search through the data and pull out items of significance, which are then stored in any number of databases. PRISM works with another NSA program to encrypt and remove from the analysts' screen data that a computer or the analyst deems to be from a U.S. person who is not the subject of the investigation, the person said. A FISA order is required to continue monitoring and analyzing these datasets, although the monitoring can start before an application package is submitted to the Foreign Intelligence Surveillance Court.
From the different types of data, including their credit card purchases, the locations they sign in to the internet from, and even local police arrest logs, the NSA can track people it considers terrorism or espionage suspects in near-real time. An internet geo-location cell is on constant standby to help analysts determine where a subject logs in from. Most of the collection takes place on subjects outside the U.S, but a large chunk of the world's relevant communication passes through American companies with servers on American soil. So the NSA taps in locally to get at targets globally.
It is not clear how the NSA interfaces with the companies. It cannot use standard law enforcement transmission channels to do, since most use data protocols that are not compatible with that hardware. Several of the companies mentioned in the Post report deny granting access to the NSA, although it is possible that they are lying, or that the NSA's arrangements with the company are kept so tightly compartmentalized that very few people know about it. Those who do probably have security clearances and are bound by law not to reveal the arrangement.
This arrangement allows the U.S. companies to "stay out of the intelligence business," one of the officials said. That is, the government bears the responsibility for determining what's relevant, and the company can plausibly deny that it subjected any particular customer to unlawful government surveillance. Previously, Congressional authors of the FAA said that such a "get out of jail free" card was insisted by corporations after a wave of lawsuits revealed the extent of their cooperation with the government.
It is possible, but not likely, that the NSA clandestinely burrows into servers on American soil, without the knowledge of the company in question, although that would be illegal.
The 2008 FISA Amendments Act allow the NSA to analyze, with court orders, domestic communications of all types for counter-terrorism, counter-espionage, counter-narcotics and counter-proliferation purposes. If the agency believes that both ends of the communication, or the circle of those communicating, are wholly within the U.S., the FBI takes over. If one end of the conversation is outside the U.S., the NSA keeps control of the monitoring. An administration official said that such monitoring is subject to "extensive procedures," but as the Washington Post reported, however, it is often very difficult to segregate U.S. citizens and residents from incidental contact.
One official likened the NSA's collection authority to a van full of sealed boxes that are delivered to the agency. A court order, similar to the one revealed by the Guardian, permits the transfer of custody of the "boxes." But the NSA needs something else, a specific purpose or investigation, in order to open a particular box. The chairman of the Senate intelligence committee, Sen. Dianne Feinstein, said the standard was "a reasonable, articulatable" suspicion, but did not go into details.
Legally, the government can ask companies for some of these records under a provision of the PATRIOT Act called the "business records provision." Initially, it did so without court cognizance. Now, the FISC signs off on every request.
Armed with what amounts to a rubber stamp court order, however, the NSA can collect and store trillions of bytes of electromagnetic detritus shaken off by American citizens. In the government's eyes, the data is simply moving from one place to another. It does not become, in the government's eyes, relevant or protected in any way unless and until it is subject to analysis. Analysis requires that second order.
And the government insists that the rules allowing the NSA or the FBI to analyze anything relating to U.S. persons or corporations are strict, bright-line, and are regularly scrutinized to ensure that innocents don't get caught up in the mix. The specifics, however, remain classified, as do the oversight mechanisms in place.
The wave of disclosures about the NSA programs have significantly unsettled the intelligence community.
The documents obtained by the two newspapers are marked ORCON, or originator controlled, which generally means that the agency keeps a record of every person who accesses them online and knows exactly who might have printed out or saved or accessed a copy. The NSA in particular has a good record of protecting its documents.
The scope of the least suggest to one former senior intelligence official who now works for a corporation that provides data to the NSA that several people with top-level security clearances had to be involved.
The motive, I suspect, is to punch through the brittle legal and moral foundation that modern domestic surveillance is based upon. Someone, at a very high level, or several people, may have simply found that the agency's zeal to collect information blinded it to the real-world consequences of such a large and unending program. The minimization procedures might also be well below the threshold that most Americans would expect.
Clapper said in his statement that the disclosures about the program "risk important protections for the security of Americans."
As always feel free to comment.
Is the NSA Making a Gun Registry?
A bipartisan group of Senators who aren’t satisfied with the National Security Agency’s (NSA) answers on a whole host of questions, recently sent a letter to the agency trying to get some more definite answers. The Senators, led by Ron Wyden (D-OR), asked whether or not the NSA was collecting (or had collected) data that went beyond simple phone records. Data like gun purchases.
The Senators were troubled that the actions of the NSA could have allowed them to collect bulk data that the government should not be privy to.
“It can be used to collect information on credit card purchases, pharmacy records, library records, firearm sales records, financial information, and a range of other sensitive subjects. And the bulk collection authority could potentially be used to supersede bans on maintaining gun owner databases, or laws protecting the privacy of medical records, financial records, and records of book and movie purchases.”
The Senators are worried that the NSA’s understanding of their legal limits and boundaries may be quite different than that of the American people. The problem is that much of the guidelines that our more clandestine agencies are using have been developed in secret and do not have any oversight until someone uncovers malfeasance.
Operating in this manner, many agencies may indeed be breaking the law simply because they understand the law to give them certain freedoms that they do not actually have.
In other words, because of the Patriot Act and other similar legislation that our government is using to fight the war on terror, certain government agencies may actually be breaking the law and diminishing the Constitution simply because they interpret the law wrong deciding that it gives them more power than it really does.
We have already seen that the NSA has completely disregarded our rights under the 4thAmendment; if they thought it could keep a terrorist attack from happening why wouldn’t they violate our 1st or 2nd Amendment too? This could be exactly what is happening now. The letter drafted by the Senators is broader than this, but the information the NSA has been consuming may allow them to build a partial (but very large) national gun registry, allowing the government to know which law abiding citizens have firearms, and what type of firearms they have.
A spokesman for Senator Mike Lee, who signed on to the letter as well, said it best:
“In this country, the government can’t just monitor your constitutionally protected activities—like gun ownership—just because it wants to “The justification that, ‘if you’re not doing anything wrong, you don’t have to worry about it,’ turns us into a police state very quickly. That’s why Congress is right to seek broad oversight of the NSA’s data collection programs.”
Thursday, July 11, 2013
Obama Signs Executive Order to Allow Shut Down of All US Communications!
President Obama released his latest Executive Order on Friday, July 6, a 2,205-word statement offered as the “Assignment of National Security and Emergency Preparedness Communications Functions.” And although the president chose not to commemorate the signing with much fanfare, the powers he provides to himself and the federal government under the latest order are among the most far-reaching yet of any of his executive decisions.
“The Federal Government must have the ability to communicate at all times and under all circumstances to carry out its most critical and time sensitive missions,” the president begins the order. “Survivable, resilient, enduring and effective communications, both domestic and international, are essential to enable the executive branch to communicate within itself and with: the legislative and judicial branches; State, local, territorial and tribal governments; private sector entities; and the public, allies and other nations.”
President Obama adds that it is necessary for the government to be able to reach anyone in the country during situations it considers critical, writing, “Such communications must be possible under all circumstances to ensure national security, effectively manage emergencies and improve national resilience.”Later the president explains that such could be done by establishing a “joint industry-Government center that is capable of assisting in the initiation, coordination, restoration and reconstitution of NS/EP [national security and emergency preparedness] communications services or facilities under all conditions of emerging threats, crisis or emergency.”
“The views of all levels of government, the private and nonprofit sectors, and the public must inform the development of NS/EP communications policies, programs and capabilities,” he adds.
On the government’s official website for the National Communications Systems, the government explains that that “infrastructure includes wireline, wireless, satellite, cable, and broadcasting, and provides the transport networks that support the Internet and other key information systems,” suggesting that the president has indeed effectively just allowed himself to control the country’s Internet access.
In order to allow the White House to reach anyone within the US, the president has put forth a plan to establish a high-level committee calling from agents with the Department of Homeland Security, Pentagon, Federal Communications Commission and other government divisions to ensure that his new executive order can be implemented.
In explaining the order, the Electronic Privacy Information Center (EPIC) writes that the president has authorized the DHS "the authority to seize private facilities when necessary, effectively shutting down or limiting civilian communications."
In Section 5 of his order, President Obama outlines the specific department and agency responsibilities that will see through his demands. In a few paragraphs, President Obama explains that Executive Committee that will oversee his order must be supplied with “the technical support necessary to develop and maintain plans adequate to provide for the security and protection of NS/EP communications,” and that that same body will be in tasked with dispatching that communiqué “to the Federal Government and State, local, territorial and trial governments,” by means of “commercial, Government and privately owned communications resources.”
Later, the president announces that the Department of Homeland Security will be tasked with drafting a plan during the next 60 days to explain how the DHS will command the government’s Emergency Telecommunications Service, as well as other telecom conduits. In order to be able to spread the White House’s message across the country, President Obama also asks for the purchasing of equipment and services that will enable such.
The fact that our nation needs so much "national security" is puzzling, given the fact that President Obama has declared himself leader of the front that has ended terrorism in the U.S. It seems like now, more than ever, our nation is in peril according to the State Department; but many U.S. citizens are asking themselves, "From what?", or better yet, "From who?"
According to Obama, the items of confiscation, or shut down can include: wireline, wireless, satellite, cable, broadcasting, internet, and other key information systems. Never in United States' history has a president given himself the authority to shut down the entire nation and immobilize the citizenry.
The public has been alerted recently that the Department of Homeland Security (DHS) has been buying an excessive amount of weaponry and ammunition; inclusive of hallow point bullets. DHS has also been given authority to "supervise" some protests throughout the nation. Tea Party groups have had several organized and peaceful protests circled by Department of Homeland Security officers, leading many to believe that DHS has been given the authority to intimidate as well.
If you combine bullets with nationwide immobilizing of all communications, the power given unto the government, is a power our founding fathers never foresaw, nor wished.
The Federal Bureau of Investigation (FBI) recently announced that they had already used drones on Americans for surveillance.
This is just one step closer to American's journey towards a police state. As always please feel free to leave your comments.
Monday, July 1, 2013
Religion..... Catholic's, Baptist's, Rabbi's
Seven days later, they all came together to discuss their experiences.
Father Flannery, who had his arm in a sling, was on crutches, and had various bandages on his body and limbs, went first.
'Well,' he said, 'I went into the woods to find me a bear. And when I found him, I began to read to him from the Catechism.
Well, that bear wanted nothing to do with me and began to slap me around. So I quickly grabbed my holy water, sprinkled him and, Holy Mary Mother of God, he became as gentle as a lamb. The Bishop is coming out next week to give him first communion and confirmation.
'Reverend Billy Bob spoke next. He was in a wheelchair, had one arm and both legs in casts, and had an IV drip. In his best fire-and-brimstone oratory, he exclaimed, 'WELL, brothers, you KNOW that we Baptists don't sprinkle! I went out and I FOUND me a bear. And then I began to read to my bear from God's HOLY WORD! But that bear wanted nothing to do with me. So I took HOLD of him and we began to wrestle. We wrestled down one hill, UP another and DOWN another until we came to a creek.
So I quickly DUNKED him and BAPTIZED his hairy soul. And just like you said, he became as gentle as a lamb. We spent the rest of the day praising Jesus. Hallelujah!
The Priest and the Reverend both looked down at the Rabbi, who was lying in a hospital bed. He was in a body cast and traction with IVs and monitors running in and out of him. He was in really bad shape. The Rabbi looked up and said: "Looking back on it, ...circumcision may not have been the best way to start.....
Sorry Couldn't help myself.