New Book on Off-The-Grid Privacy Reveals...
How to Virtually Disappear From Today's All Seeing Surveillance Grid
New Book Reveals the Little Known Secrets of How To Maintain An Extremely Low Profile In An Age Of Hackers, Snoops, Data Miners, Corrupt Bureaucrats and Surveillance Grid Profilers.
Hereís the story:
In January of 2012, a genial Irishman by the name of Leigh Bryan tweeted to a friend, "Free this week for a quick gossip/prep before I go and destroy America?" Bryan's innocent tweet got him in BIG trouble, and all because an overzealous, overpaid, unelected bureaucrat sitting in an anonymous cubicle somewhere didn't understand that "destroy" was slang for "party."
When Bryan arrived at LAX airport, he was detained, searched, interrogated, handcuffed, imprisoned, roughed up, and denied entry into the United States. He had been flagged as a terrorist threat.
The only way the government could have flagged Bryan was by monitoring Twitter.
In April of that same year, at 7:30am one morning, deputies wearing bulletproof vests and carrying assault rifles raided the quiet, suburban home of Adlynn and Robert Harte in Leawood, Kansas. They were looking for marijuana plants in their basement. What they found instead were a few ordinary tomato and squash plants. The Hartes believe they were targeted because they bought ordinary gardening supplies and grow lights.
But here's the big question. How did law enforcement know that the Hartes bought gardening supplies?
In 2009, a high school in Philadelphia put spying software on the laptops they had loaned to hundreds of students. Snapshots and screenshots were taken in the students' homes without their knowledge. The spying was only discovered because one student was called into the assistant principal's office for "improper behavior in his home."
Incidents like these are happening right here in the United States of America ... every single day.
The land of the free? Not anymore. Now it's the land of the surveilled. Privacy is dead. Our freedoms have been strangled to death by the insatiable, power hungry ruling elite who fear anything they can't control-freedom lovers like you and me.
It's almost impossible to exaggerate how closely they're watching us. You won't believe how much information they're collecting on you. It's far, far more information than the dossiers of suspected dissenters under the Stalin and Hitler regimes. For instance:
- "They" know where you've been and when you've been there. The movements of millions of Americans are tracked every day without their knowledge or consent. All over the nation, license plate readers scoop up thousands of license plate numbers per minute, pinning each vehicle to a precise location at a precise moment in time. The data is kept on file for up to five years ... even though the vehicle owners have done nothing wrong.
- "They" can practically see what you're doing inside your house. Smart meters, which are fast becoming a requirement in many communities with no opt-out permitted, collect data so exact that it can reveal when you are home, what appliances you're using at any given time, and what your habits are. (In fact, if your utility usage takes an unexpected jump, they may assume you're growing marijuana in your home.)
- "They" can determine every website you have ever visited. When you're on the web, you leave your "fingerprints" on every website visit. It's kept on record ... forever. Think you're erasing your tracks by deleting your history? Think again.
- "They" gather and retain up to 75,000 pieces of data on every consumer, including you. And it's kept on file whether you like it or not. You have no right to opt out.
The 4th Amendment to the Constitution is supposed to protect you from these kinds of egregious intrusions. It addresses not just your private property, but also your privacy. It's what keeps the government from snooping into your personal life ... and, in the event of a hostile administration, potentially finding things that could be used against you on the slightest pretext.
Here's what the 4th Amendment says:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
All that's fine and dandy ... except the 4th Amendment is no longer in full effect. Sure, search warrants still exist, and on the surface of things, that's how law enforcement still operates. But in today's data-driven society, the reality is very, very different.
Under the spirit of the 4th Amendment, a government entity is not permitted to gather or retain any of this information without due process. They must go to a judge, clearly define what they are going to search, show probable cause, and get a warrant to proceed. If they mess up on any one of these steps, a criminal case against you can be thrown out.
But there's a loophole in this. A big, fat loophole.
"The 3rd party doctrine" and how it has
gutted the 4th Amendment
It's called "the 3rd party doctrine" and what it boils down to is this; when you share information with any party – such as a bank, a search engine, a posting on the Internet – even if you don't know you're sharing information – you no longer have 4th Amendment protections.
The government can go straight to the search engine companies or social media entities or private data mining corporations ... and get whatever they want. After all, they didn't perform the act of searching and seizing your property (information about you). A third party did.
And make no doubt about it, it can be ... and all too often is ... used against you.
If someone wants to create a complete dossier on you, they can get everything they need ... for a price. And the data mining companies, who are virtually unregulated, are only too happy to oblige.
Nowhere to Hide
With license plate data and GPS records, they can find out when and where you visit a health care provider ... where you go to church ... who your friends and associates are ... whether or not you're present at political meetings or demonstrations ... all the addresses you visit. Add in a little basic analysis on what phone numbers you call, how often you call them, how long those conversations last and they have another layer of understanding. It's not hard to see how anyone who wanted to manufacture some dirt on you could do it.
GPS data is stored indefinitely... and the information can be used against you.
Have you ever heard of TomTom? It's a company that makes GPS units for cars. In the Netherlands, TomTom collected all the GPS data that was transmitted from cars using the units, and sold it to local law enforcement entities. Law enforcement went through the data and identified how long it had taken drivers to go from point A to point B. If they got there too quickly, they were retroactively cited for speeding.
You can't even have a reasonable expectation of privacy in your own home anymore. Not according to a report published by the Congressional Research Service in 2012. Speaking of smart meters, the report said, "Police will have access to data that might be used to track residents' daily lives and routines while in their homes, including their eating, sleeping, and showering habits, what appliances they use and when, and whether they prefer the television to the treadmill, among a host of other details."
But who's watching the watchers?
Why Congress Won't Pass Laws Against Corporate Surveillance
No matter how much lip service they give it, Congress can't get legislation written, much less passed, that protects you – for three reasons.
Reason #1: The government wants to be able to keep control of the citizens ... so any privacy laws they do pass are for show only. And all they have to do to ignore the laws or play the "war on terror" card and they have a free pass to snoop wherever and however they want.
Reason #2: Data profiling on consumers is a cash cow ... and worth billions to corporations. You can bet corporations lobby, and lobby hard, to make sure they have continued access to the data that brings in the big profits.
One major retailer, for instance, is so good at mining the data that they can tell when a woman is pregnant before she's shared that information with almost anyone else...based on the purchases she made at the pharmacy! If you're the retailer who has this private information, you can begin to woo her to capture all the pregnancy and child related purchases she'll make before any of your competitors do.
You'll be horrified at just how much data has been collected, analyzed, shared and sold about you. Here's a real-life example: If you use an online portal to obtain medical test results, you have to set up a profile first. During the registration process, you're asked for your name and the last four digits of your social security number. Then you'll be prompted to answer security questions to verify your identity. And you'll be astonished at how they know things about you: which of these cars have you not owned? Which of these high schools did you attend? Did you live on this street as a teenager? The data has been aggregated not just from your credit report, but also from MVA registration records, school enrollment records, and more. They know everything about you, and have pinned it to your name and part of your social security number.
Reason #3: Surveillance technology is a cash cow ... and worth billions to the tech industry segment that provides it.
The surveillance tech industry has exploded in recent years. This industry segment provides federal, state, and local governments with surveillance tools – tools that cost big bucks and spell big profits for the companies that provide them. It's a win-win: businesses make money, and the government acquires surveillance tools. You can bet lobbyists are whispering sweet nothings into the ears of your Senators and Representatives to make sure they understand this win-win proposition.
There are hundreds of these companies, and you won't believe how they're stealing your privacy:
- One company sells technology to the government that can download video, audio, call logs, text messages, photos, and more from cell phones without the owner's knowledge.
- Another company searches instant messaging, social media, and emails, analyzing and reporting on huge volumes of information in real time.
They're even watching you at the gym
A chain of community gyms uses a fitness program that encourages members to track their workouts. Tracking boxes are affixed to every piece of gym equipment. You build a user profile with your personal data, including your age, weight, and so forth, and even though you sign in with a pin number, it's also linked to your name. When you use equipment, it tracks your workout, along with health parameters like your heart rate. It keeps a log of how often you work out, what you do, and how you perform on any given workout.
Can you imagine how eager a life or health insurance company would be to obtain this information?
And can you imagine what could happen to your insurance rates—or even your insurability—if they didn't like your data?
- Millions of smart phones contain a software program that logs and tracks everything you do with the device. That data is retained by the carrier indefinitely—and if you don't like it, tough. It's not even erased when you switch to another carrier.
Look, it should be obvious, but this type of technology is NOT benign. For instance, one U.S. company shows police how to infiltrate social media and search engines. And guess what? They sold this technology to Egypt – so Egyptian authorities could monitor people who protested against the country's leaders. (If it can happen there, why not here? And who's to say it's not already happening?)
But it gets worse...
There's an even darker side to this industry, too. The same tools that can be sold to law enforcement (sure, sure, they won't misuse it), can also be sold to criminals – who would just love to get their hands on your data to get rich while using your identity.
Not only that, but social media and email accounts, smart phones, and more can be easily hacked – giving criminals access to bank accounts, passwords, and more.
An identity theft happens every 3 seconds in the United States ... and even if your bank or credit card company has fraud protection, the damage to your credit rating can be devastating. The time and effort required to straighten out false records and repair credit can take years.
When you and I were growing up, a thief might break into your home and steal a few valuables-whatever he can run off with-but now, a thief can raid your bank account, your retirement account...even borrow money in your name, commit crimes in your name and ruin your life!
Terms and conditions: why privacy policies don't protect you and may even expose you to greater harm
Consumers are understandably anxious about how their information will be used. One feel-good piece of legislation requires that companies have privacy policies to keep you informed about how they'll use your information.
Don't kid yourself. Privacy policies ... user agreements ... terms and conditions ... none of these were written to protect you. They're written to give corporations every possible advantage—or, at the very least, to protect them against lawsuits.
In his 2013 documentary Terms and Conditions May Apply, director Cullen Hoback points out that reading a book, watching television, or using a landline telephone are not subject to user agreements. But today, using an e-reader, watching streaming video online through a pay service, or using a smart phone requires you to agree to specific terms of service.
Who reads all those terms of service? Probably not you. Because if you were to actually read all the agreements and privacy policies for the services you subscribe to, it would take you about 180 hours (or the equivalent of working a full time job for a month...plus overtime).
Did you know...
Facebook has at least 25 fulltime employees whose only job is to respond to government surveillance requests.
If you were to read the terms and conditions of the most well-known search engine, for example, you would be appalled. It's the one that also provides free email service and owns the largest video sharing website in the world. They state in the fine print that they can use your email, search habits, and video-watching habits to create a detailed profile of you. Not only that, but they say they can share your information with 3rd parties ... perhaps, say, the government?
Unless you read the fine print, you'll have no idea if this data will ever be shared with anyone. And watch out for the clause that seems to be included in every user agreement –that they can change the terms of service at any time!
The bottom line for using anything in today's wired world? User beware!
Is there any way to recover your privacy and protect your freedom in this Big Brother culture?
Yes. There is. That's why we wrote this important how-to manual. Underground Privacy Secrets: How to Protect Your Privacy, Identity, and Freedom in an Increasingly Unfree Word is for anyone concerned about privacy in the information age.
- How life in the cloud makes your information vulnerable to anyone who wants it, and how you can take advantage of ‘cloud' technology while protecting yourself... see page 26
- Why drones are one of the greatest threats to your personal liberty, privacy, and even your life ... turn to page 31
- How the government can listen to almost anyone, at any time, in any place, with this ubiquitous device ... page 33
- Which government agency is reading your emails without a warrant (and it's not the NSA!) ... Turn to page 34 to find out.
- How prospective employers are using purchased data to screen potential employees without their knowledge ... page 47 has the details.
- The "Identity Theft Rule of 3" and how it can destroy your credit score ... see page 88
- The one document that is considered the most authoritative form of identification and why you MUST keep it secure ... turn to page 89
- Who are the most common victims of identity theft (forewarned is forearmed!) ... see page 90
- The two pieces of information you must NEVER include in a social media profile – swiping your identity is as easy as taking candy from a baby if you share this information (hint: it's not your social security number). Turn to page 98 for details.
- How to remain anonymous while web surfing ... find the how-to's on page 148
Plus: how to evade the prying eyes of data mining companies ... everyday rules for Internet behavior that will minimize you as a criminal target ... how to use email that the government can't get into ... tips and tricks for preventing identity theft ... why you need to be very, very worried about facial recognition technology ... a step-by-step plan to stay practically invisible under conditions of martial law ... and much, much more.
Just imagine...a few days from now you'll be learning the tips and tricks the professionals use to break free of the system and live a life beyond the reach of the hackers, bureaucrats and criminal elements.
You are the only one who can take back your privacy. You can't wait for Congress to act, or for corporations to suddenly have a change of heart and realize they're being too nosy.
It's just not going to happen.
That's why you must take your privacy and security into your own hands. With the information in Underground Privacy Secrets, you'll have the know-how to make it happen.
Underground Privacy Secrets is only $19.95 plus shipping and handling ... and given our current political climate ... given the state of government and corporate surveillance ... given the diminishing Constitutional protections we have ... this could well be the best $19.95 you ever spend. It's a tiny insurance policy on your future...and that of your family.
As the government and the corporations exert more and more control over your day to day life, it's anybody's guess how much longer information like this will even be available. That's why you must grab your copy of this essential manual while you still can.
This issue is so important to me-and I believe to the future of our society-that I want to make you a "better than risk free" offer; If you read “Underground Privacy Secrets" and don't think it's worth at least twice what you paid, just send it back for a no questions asked, 100% money back guarantee.
P.S. For a limited time, we're offering a very special bonus with your order. It's a special report, in PDF format, entitled Surveillance Nation: The Coming of the Great American Surveillance State. It's the perfect companion to Underground Privacy Secrets. With both of these publications, you'll be well informed – and well-armed – against Big Brother. This PDF is yours FREE, even if you decide you don't like “Underground Privacy Secrets", So order now and start reclaiming your privacy and security!
Buy Yours Today!
›› CLICK BUY NOW TO ORDER YOUR COPY TODAY ‹‹
Buy Underground Privacy Secrets
Only $19.95 + $6.95 Shipping & Handling
Order Online By Safe Secure Server