Posts tagged "NSA"

NSA Angry Birds Help the Government Spy on Your Intimate Details

nsa birdsNSA Angry Birds are Stalking You

So you’ve had a rough day at the office.  You plop down on your couch with a cold beverage nearby, ready to let the day go.  You have twenty minutes until your chicken pot pie dings, and the thought of chicken reminds you of, well… Angry Birds. Harmless fun. NOT!

While you may be enjoying a mindless game, somewhere far off in cyber land others are just beginning to work very hard.  WHO THEY ARE: advertising companies and intelligence agencies alike. WHAT THEY ARE DOING TO YOU: gathering all of the most personal data off of your mobile device: everything from your name, age, sex, location, and perhaps even your political alignment or sexual orientation—and lots more!

Posted in Cyber Data Security, Online Privacy by Identity Theft Speaker .
Tags: , , , , ,

Privacy Expert: NSA Intercepting Your Address Books, Buddy Lists

Snowden_Leak_Tip_of_the_Iceberg_of_NSA_Surveillance_Program__141492What makes a privacy expert nervous? Glimpsing the size of the iceberg under the surface. When National Security Agency contractor Edward Snowden became a whistle blower earlier this year, I think we all knew we were really just seeing the tip of the iceberg about exactly how much information the NSA was gathering on the average American citizen.  And it was a pretty large tip to start with.

Here’s a reminder of what started the whole thing.  Snowden provided reporters at The Guardian and The Washington Post with top-secret documents detailing two NSA surveillance programs being carried out by the U.S. Government, all without the average voter’s knowledge. One gathers hundreds of millions of U.S. phone records and the second allows the government to access nine U.S. Internet companies to gather all domestic Internet usage (so they are tapping pieces of your phone calls and emails, in other words). The intent of each program respectively is to use meta-data (information about the numbers being called, length of call, etc., but not the conversation itself, as far as we know) to detect links to known terrorist targets abroad and to detect suspicious behavior (by monitoring emails, texts, social media posts, instant messaging, chat rooms, etc.) that begins overseas. As a privacy expert, I understand the need to detect connections among terrorists; the troubling part is the scope of the information being gathered.

Posted in Online Privacy by Identity Theft Speaker .
Tags: , , , , , , ,

Keeping Grounded When the Surveillance Accusations Start to Fly

NSA
image-15553
I’m in the business of encouraging people to keep their guard up.  I’m always telling people to watch for signs of something that doesn’t feel quite right, take precautionary measures, and stay informed.  But even I have to question the tactics some are recommending when it comes to reacting to the NSA PRISM surveillance program leaked by Edward Snowden.  In a previous post on this topic, I said it isn’t a black or white argument, but some people are asking you to make it one.

Best-selling author, technology expert and Columbia Law School professor, Tim Wu, has said that web users have a responsibility to quit Internet companies like Google, Facebook, Apple, Yahoo and Skype if it is indeed verified that they have been collaborating with the NSA.  In fact, Wu bluntly proclaimed, “Quit Facebook and use another search engine. It’s simple.  It’s nice to keep in touch with your friends. But I think if you find out if it’s true that these companies are involved in these surveillance programs you should just quit.”  Wu acknowledged that there is still much to learn about this program and admitted it was no surprise that PRISM exists, saying, “When you have enormous concentrations of data in a few hands, spying becomes very easy.”

Posted in Cyber Data Security, Online Privacy, Sileo In the News, Uncategorized by Identity Theft Speaker .
Tags: , , , , , ,

Snowden chills in Hong Kong as we boil like frogs in a stew of NSA surveillance

snowden-hk-papers,jpg
image-15522
Do you value national security?
Do you want to live free of fear from random terrorist acts like the Boston Marathon bombing? Do you value your privacy? Should you be allowed to act in legal ways without others (namely, the government) digitally eavesdropping on your secrets?

A former data spy is asking us to decide where we stand on the spectrum separating security and privacy. Edward Snowden, 29, a former contractor to the National Security Agency (the guys and gals in charge of wire-tapping phones and internet traffic) and an employee of the CIA, leaked classified documents to reporters about two far-reaching U.S. surveillance programs. Fearing government reprisal, Snowden is hiding in Hong Kong, a country he believes has “a spirited commitment to free speech and the right of political dissent”.

Posted in Cyber Data Security, Online Privacy by Identity Theft Speaker .
Tags: , , , , ,

Certified Speaking Professional – Sileo Earns CSP from National Speakers Association

image-4891
I love my job as a keynote speaker. To be honored as one of only 570 Certified Speaking Professionals on the planet this past month was icing on the cake, and confirmation that we’d finally made it through that which almost destroyed our family.

Just a few years ago I thought I might go to jail for crimes that someone else committed using my identity. I lost nearly everything, including my business, my reputation and lots of money. Who would have thought then that all of the pain we experienced as a family would be turned into a highly satisfying career as an author and professional keynote speaker? Every day I get to go to work with the enviable conviction of empowering people to protect their privacy from identity theft, social media exposure and human manipulation. I get to steer people and corporations away from making the significant mistakes I did. It is vastly fulfilling.

Posted in Cyber Data Security, Digital Reputation & Trust, Fraud Detection & Prevention, Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , ,