Source: Joseph Marks
The Food and Drug Administration is looking for a contractor to monitor social media chatter about the drugs and other products it regulates and how that chatter shifts as a result of FDA risk warnings, solicitation documents show.
The agency is looking for a contractor that can provide historical information about the sorts of conversations consumers are having on blogs, message boards and social media sites about the product classes FDA regulates — such as drugs, medical devices, food and tobacco — and then track when the sentiment or volume of those conversations shifts, according to the sources sought notice posted on Tuesday.
FDA wants to track what makes those conversations spike, rise slowly or trend downward, the notice said, and to gather information about “about social media buzz volume over time, top sources of buzz, most popular forums of online discussion, most-cited news stories, major themes of discussion, sentiment analysis, word clouds and/or message maps, and a sample of verbatim consumer comments.”
A sources sought notice doesn’t obligate FDA to purchase any goods or services.
Source: Elizabeth Harrington
The National Library of Medicine (NLM) is “mining” Facebook and Twitter to improve its social media footprint and to assess how Tweets can be used as “change-agents” for health behaviors.
The NLM, a division of the Department of Health and Human Services (HHS), will have software installed on government computers that will store data from social media as part of a $30,000 project announced last week.
“The National Library of Medicine is the world’s largest biomedical library and makes its stored information available online at no charge to consumers, health professionals, and biomedical scientists through a diverse suite of resources,” the agency said in a contract posted on Oct. 23. “Evaluating how its databases and other resources are utilized is an important component of continuing quality improvement and has long been an on-going program of NLM management through a potpourri of monitoring tools.”
“The world-wide explosion in the use of social media provides a unique opportunity for sampling sentiment and use patterns of NLM’s ‘customers’ and for comparing NLM to other sources of health-related information,” the agency said.
“By examining relevant tweets and other comments,” the contract said, “NLM will gain insights to extent of use, context for which information was sought, and effects of various health-related announcements and events on usage patterns.”
Specifically, NLM will look at the “value of tweets and other messages as teaching tools and change-agents for health-relevant behavior.”
“The overarching objective of these studies is to obtain a richer understanding of how consumers, clinicians, researchers actually look for the health-related information they seek, and what they do with what they find,” NLM said in a response to frequently asked questions about the project.
OhMyGov Inc., a media company that specializes in the promotion of government agencies, will be paid $30,660 to monitor social media for NLM for one year.
The company will install software on computers at NLM headquarters in Bethesda, Md. to “maintain a comprehensive ‘universe’ of social media data.” Government bureaucrats will be trained on the software so they can search the database for health-related content.
“Content from Twitter, Facebook, blogs, news sites, discussion boards, video and image sharing sites will be maintained by the Contractor and kept up-to-date in a timely manner and made available for query by Government,” the contract said.
When asked by a vendor if they are interested in storing the data for “historical analysis,” NLM said “Yes.”
The project will also track NLM’s impact on social media in comparison to its “competitors,” which they define as Google, Mayo Clinic, and WebMD.
“Demographic characteristics” of Facebook and Twitter posts will be noted “to the extent permitted by privacy regulations.” NLM said they are interested in the location, number of followers, and academic degrees held by users.
The contractor OhMyGov Inc. is partially funded by the National Science Foundation, and a member of President Obama’s “Startup America Initiative,” a public-private partnership designed to spur entrepreneurship.
“The OhMyGov Media Monitoring and Policy Analysis system is the first and only business intelligence software completely politically focused,” according to the company’s website. “It provides real-time data mining, analysis, and visual analytics to uncover patterns in message uptake and critical insights into how issues are being characterized by Congress as well as the media, public, and key stakeholders.”
Requests for comment from NLM were not returned.
You have until April 15th to file a return – and the IRS will be collecting a lot more than just taxes this year.
According to several reports, the agency will also be collecting personal information from sites like Facebook and Twitter.
It says the effort is to catch people trying to beat the system, but some say it goes too far.
Attorney Kristen Mathews warns to be careful with what you say on social media platforms.
She has concerns the government is pushing the limits of what has historically been considered private.
“There are laws that regulate the government’s ability to get a hold of things like credit card transaction history. But those laws have become more permissive in the last several years, particularly after 9-11, and so some might say those laws are no longer in line with the average expectation of privacy,” says Mathews.
The government has said it would only check a Facebook page or twitter account if there is already red flag in a tax form.
Source: Susanne Posel
Twitter has released a report confirming that the US government leads the world in requesting information on their citizens. TheTransparency Report shows the US government has made requests that are infringing on American privacy rights. Twitter states that “we’ve received more government requests in the first half of 2012, as outlined in this initial dataset, than in the entirety of 2011.”
As the US government sifts through the tweets US citizens are making and analyzing information from illegal means, there are decisions about particular citizens being made to justify the construction of an all-encompassing Big Brother network.
Cloud computing is also under surveillance as every conversation is recording and filed. While Microsoft denies this is true, the adherence to their rules and regulations explains that all your personal information is stored within Skype. In section 2 of their user contract explains: “Our primary purpose in collecting information is to provide you with a safe, smooth, efficient, and customized experience. Skype collects and uses, or has third party service providers acting on Skype’s behalf collecting and using, personal data relating to you, as permitted or necessary to . . .”
The Department of Homeland Security’s Delaware Information and Analysis Center (DIAC) “now offers a mobile app to report suspicious activities in real-time by attaching a photo, sending location information, or entering details about suspicious vehicles or persons. In addition, users can choose to make their report anonymously or can include contact information for follow-up by law enforcement.”
The Anti-Terrorism Mobile FORCE 1-2 App is designed for iPhone and Android users that create spies out of average citizens for the sake of the State. The information collected by users is funneled to a National Security Agency (NSA) Fusion Center to be disseminated with federal agencies and local law enforcement.
Using terrorism and 9/11 phone calls as a fear-mongering campaign to coerce the general public into participating in this new Stasi, the Delaware government hopes to keep its citizens “ever vigilant in the fight against terrorism and this new app is just one way for our citizens to help.”
Simultaneously, Symantec’s Norton Cybercrime Report states that cybercrimes involving smartphones are costing consumers $110 billion annually as these thieves peruse mobile devices and social networks looking for loopholes. Smartphones are sent fake bills which add to the telecommunications services and rack-up charges as well as implant viruses into devices through apps.
Infected phones infect other phones through sending of information, text messages and emails. Nameless, faceless hackers change segments of code and inject the malware into the smartphone. However, most mobile phone and telecommunications corporations still maintain that mobile applications are safe and there should be no precautions taken when downloading these apps.
The CIA-sponsored AntiSec hacker group was successful in stealing millions of ID numbers from Apple, Inc. from databases where the corporation had been storing user personal data. They then leaked this information out for the general public to see. However this action serves another purpose.
The FBI was also infiltrated by the same state-controlled hacker group wherein a laptop was “compromised and private data regarding Apple UDIDs was exposed. At this time, there is no evidence indicating that an FBI laptop was compromised or that the FBI either sought or obtained this data.” The bureau’s press office later posted on its Twitter account that it “never had” the information in question and that the reports its laptop was hacked were “totally false.”
While data mining, cell phone corporations are using mobile phone habits to decipher the predictive movements of users. Scientists from the University of Brimingham in the UK have revealed that they can predict the movements of mobile phone users through tracking the network usage in real time with algorithms that forecast probabilities. This means that cell phone corporations, if using this system could predict the future whereabouts of their customers at any time of the day or night.
As our cell phone become weapons of mass surveillance, police departments across the nation are installing more CCTV cameras to better spy on citizens. In Maryland, local police have been using speed cameras at intersections to watch citizens under the guise of mitigating damages caused by car accidents.
Researchers for the Defense Department have created working prototypes of bi-static radar that can utilize WiFi to spy on citizens through walls. In tests, a one foot think brick wall was used and the monitoring radar could send back visual data to be interpreted.
WiFi signals can be extended and are available virtually everywhere which makes the capability of transmitting information easier with radio signals and laptops.
With the siphoning of information from a wireless router, surveillance software can be used as well to see through walls. A person’s whereabouts can be correctly pinpointed by using WiFi signals that bounce off objects which can decipher speed, location and direction of an individual.
Justification for this technology is surmised as: “See Through The Wall (STTW) technologies are of great interest to law enforcement and military agencies; this particular device has the UK Military of Defense exploring whether it might be used in ‘urban warfare,’ for scanning buildings. Other more benign applications might range from monitoring children to monitoring the elderly.”
These surveillance grids are being implemented to compliment the State and Local Anti-Terrorism Traning (SLATT) program that defines for police departments what an extremist is and how to “recognize and report indicators of terrorism/criminal extremism.”
The SLATT’s definition of terrorism is vague and broad. It encompasses “the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” While terrorism is meant to intimidate and coerce a population into submission, the local law enforcement is employed to play an integral part in bringing intelligence to the federal agencies and “international intelligence communities” involved with hindering terrorism.
The SLATT explains that those who use cash, stay in tight-knit groups, repeatedly use the word “God”, carry video or observation equipment and have hand-drawn maps are terrorists. The document goes on to explain that any type of surveillance that is not state-sponsored is terroristic in nature and should be reported.
Susanne Posel’s website is Occupy Corporatism.
Obama’s Twitter account has 18.8 million followers — but more than half of them really don’t exist, according to reports.
A new Web tool has determined that 70% of Obama’s crowd includes “fake followers,” The New York Times reports in a story about how Twitter followers can be purchased.
“The practice has become so widespread that StatusPeople, a social media management company in London, released a Web tool last month called the Fake Follower Check that it says can ascertain how many fake followers you and your friends have,” the Times reports.
“Fake accounts tend to follow a lot of people but have few followers,” said Rob Waller, a founder of StatusPeople. “We then combine that with a few other metrics to confirm the account is fake.”
Notes the Times:
If accurate, the number of fake followers out there is surprising. According to the StatusPeople tool, 71 percent of Lady Gaga’s nearly 29 million followers are “fake” or “inactive.” So are 70 percent of President Obama’s nearly 19 million followers.
Republican opponent Mitt Romney has far fewer Twitter followers — not quite 900,000 — but it’s a good bet that some of them are fake as well.
Both campaigns have denied buying Twitter followers.
Source: DAVID STREITFELD and KEVIN J. O’BRIEN
After months of negotiation, Johannes Caspar, a German data protection official, forced Google to show him exactly what its Street View cars had been collecting from potentially millions of his fellow citizens. Snippets of e-mails, photographs, passwords, chat messages, postings on Web sites and social networks — all sorts of private Internet communications — were casually scooped up as the specially equipped cars photographed the world’s streets.
“It was one of the biggest violations of data protection laws that we had ever seen,” Mr. Caspar recently recalled about that long-sought viewing in late 2010. “We were very angry.”
Google might be one of the coolest and smartest companies of this or any era, but it also upsets a lot of people — competitors who argue it wields its tremendous weight unfairly, officials like Mr. Caspar who says it ignores local laws, privacy advocates who think it takes too much from its users. Just this week, European antitrust regulators gave the company an ultimatum to change its search business or face legal consequences. American regulators may not be far behind.
The high-stakes antitrust assault, which will play out this summer behind closed doors in Brussels, might be the beginning of a tough time for Google. A similar United States case in the 1990s heralded the comeuppance of Microsoft, the most fearsome tech company of its day.
But never count Google out. It is superb at getting out of trouble. Just ask Mr. Caspar or any of his counterparts around the world who tried to hold Google accountable for what one of them, the Australian communication minister Stephen Conroy, called “probably the single greatest breach in the history of privacy.” The secret Street View data collection led to inquiries in at least a dozen countries, including four in the United States alone. But Google has yet to give a complete explanation of why the data was collected and who at the company knew about it. No regulator in the United States has ever seen the information that Google’s cars gathered from American citizens.
The tale of how Google escaped a full accounting for Street View illustrates not only how technology companies have outstripped the regulators, but also their complicated relationship with their adoring customers.
Companies like Google, Amazon, Facebook and Apple supply new ways of communication, learning and entertainment, high-tech wizardry for the masses. They have custody of the raw material of hundreds of millions of lives — the intimate e-mails, the revealing photographs, searches for help or love or escape.
People willingly, at times eagerly, surrender this information. But there is a price: the loss of control, or even knowledge, of where that personal information is going and how it is being reshaped into an online identity that may resemble the real you or may not. Privacy laws and wiretapping statutes are of little guidance, because they have not kept pace with the lightning speed of technological progress.
Michael Copps, who last year ended a 10-year term as a commissioner of the Federal Communications Commission, said regulators were overwhelmed. “The industry has gotten more powerful, the technology has gotten more pervasive and it’s getting to the point where we can’t do too much about it,” he said.
Although Google thrives on information, it is closemouthed about itself, as the Street View episode shows. When German regulators forced the company to admit that the cars were sweeping up unencrypted Internet data from wireless networks, the company blamed a programming mistake where an engineer’s experimental software was accidentally included in Street View. It stressed that the data was never intended for any Google products.
The F.C.C. did not see it Google’s way, saying last month the engineer “intended to collect, store and review” the data “for possible use in other Google products.” It also said the engineer shared his software code and a “design document” with other members of the Street View team. The data collection may have been misguided, the agency said, but was not accidental.
Although the agency said it could find no violation of American law, it also said the inquiry was inconclusive, because the engineer cited his Fifth Amendment against self-incrimination. It tagged Google with a $25,000 fine for obstructing the investigation.
Google, which has repeatedly said it wants to put the episode behind it, declined to answer questions for this article.
“We don’t have much choice but to trust Google,” said Christian Sandvig, a researcher in communications technology and public policy at the University of Illinois. “We rely on them for everything.”
That reliance has built an impressive company — and a self-assurance that can be indistinguishable from arrogance. “Google doesn’t seem to think it ever will be held accountable,” Mr. Sandvig said. “And to date it hasn’t been.”
When Street View was introduced in 2007, it elicited immediate objections in Europe, where privacy laws are tough. The Nazis used government data to systematically pursue Jews and other unwanted groups. The East German secret police, the Stasi, similarly controlled data to monitor perceived enemies.
Source: DANIEL MILLER UK Daily Mail
The Department of Homeland Security has been forced to release a list of keywords and phrases it uses to monitor social networking sites and online media for signs of terrorist or other threats against the U.S.
The intriguing the list includes obvious choices such as ‘attack’, ‘Al Qaeda’, ‘terrorism’ and ‘dirty bomb’ alongside dozens of seemingly innocent words like ‘pork’, ‘cloud’, ‘team’ and ‘Mexico’.
Released under a freedom of information request, the information sheds new light on how government analysts are instructed to patrol the internet searching for domestic and external threats.
The words are included in the department’s 2011 ‘Analyst’s Desktop Binder‘ used by workers at their National Operations Center which instructs workers to identify ‘media reports that reflect adversely on DHS and response activities’.
Department chiefs were forced to release the manual following a House hearing over documents obtained through a Freedom of Information Act lawsuit which revealed how analysts monitor social networks and media organisations for comments that ‘reflect adversely’ on the government.
The top-secret US National Security Agency is not required to reveal any deal it may have with Google to help protect against cyber attacks, anappeals court ruled Friday.
The US Court of Appeals in Washington upheld a lower court decision that said the NSA need not confirm or deny any relationship with Google, because its governing statutes allow it keep such information secret.
The ruling came in response to a Freedom of Information Act request from a public interest group, which said the public has a right to know about any spying on citizens.
The appeals court agreed that the NSA can reject the request, and does not even have to confirm whether it has any arrangement with the Internet giant.
“Any information pertaining to the relationship between Google and NSA would reveal protected information about NSA’s implementation of its information assurance mission,” Judge Janice Rogers Brown wrote in the appeals opinion.
The non-profit Electronic Privacy Information Center (EPIC) filed a formal request to make public documents related to the dealings, and said much of the information had already been in news media.
The request stemmed from a January 2010 cyber attack on Google that primarily targeted the Gmail email accounts of Chinese human rights activists.
According to the Google blog, the Internet group’s chief legal officer David Drummond stated that the firm was notifying other companies that may have been targeted and was also working with the relevant US authorities.
The Wall Street Journal and Washington Post reported that Google had contacted the NSA immediately following the attack.
According to news reports, the NSA agreed to help Google analyze the attacks in a bid to better protect the California-based search company and its users from future intrusions.
The reported alliance would seek to allow the spy agency to evaluate Google’s hardware and software vulnerabilities, as well as estimate the sophistication of its adversary in order to help the firm understand whether it has the right defenses in place.
Privacy advocates already critical of Google policies regarding saving user data and targeting ads to match online behavior patterns fear that an alliance with the spy network could put private information at risk.
Source: Agence France-Presse
Many users of Facebook are unaware of the privacy risks from the massive social network site or fail to take adequate precautions, a report by Consumers Reports said Thursday.
The report found nearly 13 million US Facebook users do not use, or are not aware of the site’s privacy controls.
An estimated 4.8 million Americans have posted about where they planned to go on a certain day — a potential tip-off to burglars, the report noted.
And it found that 4.7 million have “liked” a Facebook page about health conditions or treatments, details that insurers might use against them.
The report, part of the nonprofit group’s State of the Net survey, estimated that seven million households using Facebook said they had trouble last year, ranging from someone using their log-in without permission to being harassed or threatened. That was up 30 percent from the previous year.
Only 37 percent of Facebook users said they have used the site’s privacy tools to customize how much information is shared with third parties, according to the Consumer Reports survey.
“Facebook really is changing the way the world socially communicates and has become a successful service in part by leveraging copious amounts of personal data that can be spread far wider than its users might realize,” said Jeff Fox, Consumer Reports technology editor.
“Our investigation revealed some fascinating, and some disquieting trends — but ones always worth knowing for consumers who wish to keep their personal data under better control.”
The report indicates Facebook gathers a considerable amount of information from users that they may not be aware of.
“Some users might be surprised to know that Facebook gets a report every time they visit a site with a ‘Like’ button, regardless of whether or not they click on that button, have a Facebook account, or are even logged in,” the organization said.
It did give credit to Facebook for taking privacy and security “seriously” by implementing checks against abuses and inappropriate applications.
But Consumer Reports said Facebook should do more by fixing “a security lapse” that permits users to set up weak passwords including some six-letter dictionary words and to help users avoid inadvertently sharing status updates with the public.
Consumer Reports points out that all of this data collection is not without risks.
The report was based on a survey from January 16-31 of a sample of 2,002 people.
In a statement, Facebook said it works to help protect the safety and privacy of its users.
“We believe more than 900 million consumers have voluntarily decided to share and connect on Facebook because we provide them options and tools that place them in control of their information and experience,” the company said.
“As part of our effort to empower and educate consumers, we always welcome constructive conversations about online privacy and safety.”
The number of people using Facebook worldwide had risen to 901 million by the end of the quarter, according to company documents.
Facebook is expected to make its much-anticipated stock market debut in the coming weeks in a public offering which could raise as much as $10 billion, the largest flotation ever by an Internet company on Wall Street.
Source: Kurt Nimmo
Google property YouTube has closed down a popular Ron Paul channel after “multiple third-party notifications of copyright infringement,” most notably establishment media tool CNBC.
Most of the videos scrubbed from YouTube were not CNBC property.
The effort to reduce Ron Paul’s presence on YouTube follows the deliberate under-coverage of the Paul campaign by the establishment media during the 2012 primaries.
In October of last year, a study conducted by Pew Research Center confirmed that the establishment was terrified of Ron Paul’s presidential campaign gaining momentum. An earlier report by the polling organization revealed a concerted effort to ignore Paul.
As we noted in 2009, YouTube and Google are CIA assets. Both serve as gatekeepers for the establishment.
“Google is a corporate member of the Council on Foreign Relations. In late 2006, Google bought YouTube for US$1.65 billion in stock, so it is fair to say YouTube is also pushing the CFR’s one-world government agenda,” we noted at the time.
It makes sense that the CFR would send videos featuring Ron Paul to the memory hole. Ron Paul, after all, is a contagion for liberty and constitutional principles which send the elite into allergic paroxysms.
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- 911 scam
- Agenda 21
- Bank Of America
- BIG BROTHER
- Domestic News
- Domestic Spying
- ECONOMIC CRISIS
- False Flag Event
- FEATURED STORIES
- foreign affairs
- GLOBAL CRISIS
- government corruption
- gun rights
- mainstream media
- Martial Law
- Middle East
- north american union
- POLICE STATE
- secret societies
- Solar Update
- U.S. NEWS
- WORLD AT WAR
- WORLD NEWS