Push to Pass KOSA Spurs Fears Over Privacy and Free Speech

Attorneys general from 32 jurisdictions — including 31 states and the District of Columbia — have signed an open letter urging Congress to pass the Kids Online Safety Act (KOSA) before the looming conclusion of the current session early next year. This legislation, although primarily aimed at protecting minors from digital harms, introduces significant implications for online privacy and freedom of speech through proposed mechanisms for age verification and potential censorship.

We obtained a copy of the letter for you here.

KOSA itself doesn’t mandate direct implementation of online age verification but tasks the Secretary of Commerce, along with the FTC and FCC, with exploring “options for developing systems to verify age at the device or operating system level.” This move toward digital identification could fundamentally alter the landscape of internet privacy, linking social media accounts and other online activities directly to real-world identities.

Keep reading

Pokémon Go Player Data Being Used to Train AI & Construct ‘Large Geospatial Model’

Millions of users’ location and imaging data is being compiled to construct a global virtual model of the real world, ostensibly to build new augmented reality experiences, the company behind the popular mobile game Pokémon Go has revealed.

In a blog update Tuesday, Niantic explained they’ve been enlisting Pokémon Go players to participate in efforts to construct a Large Geospatial Model (LGM), which the company says “could guide users through the world, answer questions, provide personalized recommendations, help with navigation, and enhance real-world interactions.”

The company says the LGM constructs a comprehensive AI world model by leveraging its Visual Positioning System (VPS), which was “built from user scans, taken from different perspectives and at various times of day, at many times during the years, and with positioning information attached, creating a highly detailed understanding of the world. This data is unique because it is taken from a pedestrian perspective and includes places inaccessible to cars.”

“The LGM will enable computers not only to perceive and understand physical spaces, but also to interact with them in new ways, forming a critical component of AR glasses and fields beyond, including robotics, content creation and autonomous systems,” Niantic said. “As we move from phones to wearable technology linked to the real world, spatial intelligence will become the world’s future operating system.”

“Over the past five years, Niantic has focused on building our Visual Positioning System, which uses a single image from a phone to determine its position and orientation using a 3D map built from people scanning interesting locations in our games and Scaniverse,” the company wrote.

Keep reading

The Biden Regime Has Just Issued a Very Suspicious Directive Permitting Military Intervention in US Domestic Affairs

The Department of Homeland Security has flagged individuals questioning COVID-19 origins, vaccine efficacy, and election integrity as potential domestic terrorism threats.

Is a coup being set in place?

A new Department of Defense directive 5240.01 issued September 27, 2024, just prior to the November presidential election allows the US military to use lethal force against American citizens in assisting police authorities in domestic disturbances.

A report on this development lists these civil liberties concerns:

Right to protest: There are fears that expanded authority could suppress legitimate protests.

Privacy rights: Increased military involvement in domestic intelligence gathering could infringe on privacy.

Due process: The military’s role in law enforcement could bypass standard due process protections.

Freedom of speech: The broad definition of “national security threats” could target individuals for their political beliefs.

Civilian control: The expanded military role could erode civilian oversight of the military.

Here are some Constitutional concerns:

Challenging the Posse Comitatus Act: This Act traditionally limits the powers of the federal government in using military personnel for domestic law enforcement. The new DoD directive, by permitting the use of lethal force through military assistance in civilian law enforcement, may push the boundaries of these limitations.

Potential First Amendment Concerns: Natural health advocates and others exercising their First Amendment rights, such as questioning the government’s response to COVID-19 or the integrity of elections, have been labeled as potential domestic extremists and/or terrorists by some agencies. This directive could expand those classifications into scenarios involving lethal force interventions, potentially chilling free speech under the guise of national security.

Fourth Amendment Considerations: This directive also allows intelligence sharing between military and law enforcement under emergency conditions, raising questions about the right to privacy and the potential for expanded surveillance.

Due Process Implications (Fifth Amendment): The possibility of military use of lethal force in domestic scenarios introduces concerns about how due process protections might be maintained before potentially life-altering decisions are made.

Why these ominous changes one month before the election? Is something in the works? Why is there no reporting and no debate on this change in policy?

Here is the Directive: https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodd/524001p.PDF?ver=UpTwJ66AyyBgvy7wFyTGbA%3d%3d

Here is the report: https://stateofthenation.co/?p=256688

Ever since the CIA used the Washington Post and the media to cover up the assassination of President John F. Kennedy, the term, “conspiracy theory,” introduced by the CIA, has been used by the presstitutes and government to demonize truth and those who speak truth, and to protect official narratives, such as “Saddam Hussein’s weapons of mass destruction.”

Unless Trump cuts a deal with Democrats not to hold them accountable and also a deal with the Ruling Elite not to interfere with their control, I can see no way that either will permit Trump to be President.

Keep reading

Opt Out: How to Protect Your Baby’s Photos on the Internet + More

The Guardian reported:

You’ve got the cutest baby ever, and you want the world to know it. But you’re also worried about what might happen to your baby’s picture once you release it into the nebulous world of the internet.

Should you post it?

“Everyone has had parents share embarrassing baby photos with friends. It’s a cringe-inducing rite of passage, but it’s different when that cringe is felt around the world and can never be deleted,” said Albert Fox Cahn, director of the Surveillance Technology Oversight Project.

I’ve described my own concerns about my newborn’s privacy in the past. Tech companies are not transparent about what they do with our data and our pictures.

They might use the photos to train their latest AI models. That’s enough for me to try to err on the safe side of the do-I-post-pictures-of-my-child spectrum. I only share pictures of him via text or with his face turned away. Other parents might be more concerned with, for example, online predators.

I reached out to a few experts to help you figure out what the best move might be for you, depending on what you’re most concerned about. They all said that the most powerful protection is, of course, abstinence. Just don’t post or digitally store your kids’ pictures, and you’re golden. Is that realistic on a day-to-day basis?

The experts agreed: no. We all have to reach a happy medium.

Keep reading

The Government Compels Silence Again

When Congress enacted the Stored Communications Act of 1986 (SCA), it claimed the statute would guarantee the privacy of digital data that service providers were retaining in storage. The act prohibited the providers from sharing the stored data, and it prohibited unauthorized access to the data, commonly called computer hacking – except, of course, if the recipients or the hackers were working for the federal government.

Just as it did with the Patriot Act of 2001 – which permits one federal agent to authorize another to conduct a search of stored data, without a judicially issued search warrant – the SCA permits judges to issue “orders” for searches without meeting the probable cause standard required by the Fourth Amendment.

Just like the Patriot Act – which in its original form prohibited the recipient of agent-issued search warrants, called National Security Letters (NSLs), from telling any persons of their existence – the SCA requires judges who issue orders for a search, upon the request of the government, to bar the custodian of the data who has received the order from informing the person whose data is sought.

What if the person whose data is sought has a claim of privacy on the data? What if the owner and creator of the data relied on the Fourth Amendment to keep the government’s hands off of it? What if that person was the President of the United States at the time he created the data? What if he has a claim of executive privilege on it? What if all persons have a privacy claim on all stored data and have a right to resist the government’s efforts to seek it?

Keep reading

Germany Rushes to Expand Biometric Surveillance

Germany is a leader in privacy and data protection, with many Germans being particularly sensitive to the processing of their personal data – owing to the country’s totalitarian history and the role of surveillance in both Nazi Germany and East Germany.

So, it is disappointing that the German government is trying to push through Parliament, at record speed, a “security package” that would increase biometric surveillance at an unprecedented scale. The proposed measures contravene the government’s own coalition agreement, and undermine European law and the German constitution.

In response to a knife-stabbing in the West-German town of Solingen in late-August, the government has introduced a so-called “security package” consisting of a bouquet of measures to tighten asylum rules and introduce new powers for law enforcement authorities.

Among them, three stand out due to their possibly disastrous effect on fundamental rights online. 

Keep reading

PimEyes Says Meta Glasses Integration Could Have ‘Irreversible Consequences’

Two Harvard students made headlines after converting Meta’s smart glasses into a device that automatically captures people’s faces with facial recognition and runs them through face search engines. One of the companies providing the face search function, PimEyes, is not too happy about it.

AnhPhu Nguyen and Caine Ardayfio released a video of themselves using the smart glasses to identify people on the street and look up their personal information through services such as PimEyes. The students used the integrated camera on Meta’s Ray-Ban glasses to capture live video through Instagram and ran it through their software I-XRAY.

“We stream the video from the glasses straight to Instagram and have a computer program monitor the stream,” Nguyen says in the video. “We use AI to detect when we’re looking at someone’s face, then we scour the internet to find more pictures of that person. Finally, we use data sources like online articles and voter registration databases to figure out their name, phone number, home address and relatives names and it’s all fed back to an app we wrote on our phone.”

Keep reading

Is your “private” VPN service controlled by Israel?

The group Palestine Declassified has put together a video report explaining that many of the world’s top VPN (virtual private network) services are controlled by a Zionist-controlled company called Kape Technologies.

The report suggests that Israel exploits technology used by millions of people, i.e., VPNs, to target individuals and conduct mass surveillance. What you think is private may actually be getting tracked by the Israeli government, according to the accusations leveled in the report.

Concerning Kape, the following “top brands” are listed on the company website as falling under the same umbrella of control:

• ExpressVPN

• Private Internet Access

• CyberGhost VPN

• Intego Antivirus

• Webselenese

Israeli businessman Teddy Sagi owns Kape. And according to Palestine Declassified, Sagi has an extensive background in working covertly with Israel Defense Forces (IDF), also known as the Israeli military, on secret projects – check out the report below:

Keep reading

Hidden Agendas: Beware of the Government’s Push for a Digital Currency

The government wants your money. It will beg, steal or borrow if necessary, but it wants your money any way it can get it.

The government’s schemes to swindle, cheat, scam, and generally defraud taxpayers of their hard-earned dollars have run the gamut from wasteful pork barrel legislation, cronyism and graft to asset forfeiture, costly stimulus packages, and a national security complex that continues to undermine our freedoms while failing to making us any safer.

Americans have also been made to pay through the nose for the government’s endless wars, subsidization of foreign nations, military empire, welfare state, roads to nowhere, bloated workforce, secret agencies, fusion centers, private prisons, biometric databases, invasive technologies, arsenal of weapons, and every other budgetary line item that is contributing to the fast-growing wealth of the corporate elite at the expense of those who are barely making ends meet—that is, we the taxpayers.

This is what comes of those $1.2 trillion spending bills: someone’s got to foot the bill.

Because the government’s voracious appetite for money, power and control has grown out of control, its agents have devised other means of funding its excesses and adding to its largesse through taxes disguised as fines, taxes disguised as fees, and taxes disguised as tolls, tickets and penalties.

No matter how much money the government pulls in, it’s never enough (case in point: the endless stopgap funding deals and constant ratcheting up of the debt ceiling), so the government has to keep introducing new plans to empower its agents to seize Americans’ bank accounts.

Make way for the digital dollar.

Whether it’s the central bank digital currency favored by President Biden, or the cryptocurrency being hawked by former President Trump, the end result will still be a form of digital money that makes it easier to track, control and punish the citizenry.

For instance, weeks before the Biden Administration made headlines with its support for a government-issued digital currency, the FBI and the Justice Department quietly moved ahead with plans for a cryptocurrency enforcement team (translation: digital money cops), a virtual asset exploitation unit tasked with investigating crypto crimes and seizing virtual assets, and a crypto czar to oversee it all.

No surprises here, of course.

Keep reading

Massive DATA LEAK at background check company exposes private information of over 100 million Americans

The private information of almost one-third of the population of the United States has been leaked following a security lapse within a major corporation responsible for conducting background checks.

The affected company, MC2 Data, provides background check services. The company collects, organizes and analyzes data from a vast range of public sources, such as criminal records, employment histories, family data and contact details. (Related: Massive DATA BREACH exposes personal data of 700 million users of Microsoft-owned LinkedIn.)

MC2 Data and similar companies use the gathered information to make complete profiles that are used by employers, landlords and other entities who depend on them for decision-making and risk management.

MC2 Data owns multiple background check websites, including PrivateRecords.net, PrivateReports, PeopleSearcher, ThePeopleSearchers and PeopleSearchUSA.

Cyber News reported that the total number of people affected by the data breach is 106,316,633. MC2 is being accused of leaving a database with 2.2 terabytes worth of information without a password and readily accessible on the open web, raising serious concerns regarding the ability of MC2 Data to protect the privacy and safety of people it conducts background searches on.

Keep reading