Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Facebook, Microsoft release information on government data requests
FOX NEWS ^ | June 13,2013

Posted on 06/15/2013 5:13:21 AM PDT by SE Mom

Ted Ullyot, Facebook's general counsel, said in a statement Friday that Facebook is only allowed to talk about total numbers and must give no specifics. But he said the permission it has received is still unprecedented, and the company was lobbying to reveal more.

"These requests run the gamut – from things like a local sheriff trying to find a missing child, to a federal marshal tracking a fugitive, to a police department investigating an assault, to a national security official investigating a terrorist threat," Ullyot said.

(Excerpt) Read more at foxnews.com ...


TOPICS: Government; News/Current Events
KEYWORDS: benghazi; facebook; facebookisthedevil; fastandfurious; fbi; fourthamendment; impeachnow; irs; microsoft; nsa; spy; tyranny
I believe we were told we are being spied on TO PREVENT TERRORIST ATTACKS.

It appears we have been deceived AGAIN.

1 posted on 06/15/2013 5:13:22 AM PDT by SE Mom
[ Post Reply | Private Reply | View Replies]

To: SE Mom

Just think. Last week these same companies told us they’d never heard of such a thing.


2 posted on 06/15/2013 5:14:32 AM PDT by Black Agnes
[ Post Reply | Private Reply | To 1 | View Replies]

To: SE Mom

Use Linux.

It’s free.

And (mostly) unhackable. You can make Linux very, very secure. There is no “mothership” and no “back door”, unless you physically have the system.

The only exception to this is Linux variant “Android”. I despise Google for a number of reasons, but I despise them most for building a phishing expedition and government spying apparatus on top of a Linux kernel.


3 posted on 06/15/2013 5:16:38 AM PDT by Westbrook (Children do not divide your love, they multiply it.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SE Mom


4 posted on 06/15/2013 5:17:31 AM PDT by darkwing104 (Let's get dangerous)
[ Post Reply | Private Reply | To 1 | View Replies]

To: maggief; penelopesire; MestaMachine; onyx; kristinn; hoosiermama; holdonnow

It would seem these spying programs are being used by law enforcement all across the country.


5 posted on 06/15/2013 5:18:05 AM PDT by SE Mom (Proud mom of an Iraq war combat vet)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SE Mom

And Facebook’s Icon Zuckerberg is sponsoring millions and millions of dollars in DoppleConservative ads to instantiate amnesty for ILLEGAL ALIENS.

Let’s see.....ummmm lobby hard to get 50-100 million illegals and familial entourage here while simultaneously providing the plethora of personal data for real citizens here.

It’s akin to the Capos carting, burning, burying the bodies in WWIIs German death camps (to be soon rededicated as Obama’s AmeriKa Kamps).

It is hard to see from my viewpoint why on the earth anyone would be remotely associated or use Facebook.


6 posted on 06/15/2013 5:20:28 AM PDT by Gaffer
[ Post Reply | Private Reply | To 1 | View Replies]

To: SE Mom

I think we’re being spied on to prevent conservatives from ever having political power.


7 posted on 06/15/2013 5:23:38 AM PDT by cripplecreek (REMEMBER THE RIVER RAISIN!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SE Mom
It's a fair guess that my communications are under surveillance.

Screw them all. When defending the Constitution becomes a subversive act, I'm a subversive.


8 posted on 06/15/2013 5:38:21 AM PDT by Travis McGee (www.EnemiesForeignAndDomestic.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Travis McGee

Of course your communications are under surveillance. You’re much more interesting than I am, and I know they’re gathering data on me.


9 posted on 06/15/2013 5:45:27 AM PDT by BykrBayb (Somewhere, my flower is there. ~ Þ)
[ Post Reply | Private Reply | To 8 | View Replies]

To: cripplecreek

Yep.


10 posted on 06/15/2013 5:50:17 AM PDT by rintense
[ Post Reply | Private Reply | To 7 | View Replies]

To: SE Mom

Exactly! This has gotten out of control..just like drone technology.

Giving access to run of the mill law enforcement entities also helps to insulate the Feds and the WH. If they mix in their own requests with requests from various state agencies, it looks like the Feds are not requesting as much as they actually are.


11 posted on 06/15/2013 5:59:30 AM PDT by penelopesire (TIME FOR OBAMA TO ANSWER FOR BENGHAZI UNDER OATH!!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Westbrook

Your sorely mistaken if you think using Linux will do you any good against government snooping and surveillance. It doesn’t matter what O/S you are using, your IP address and Internet provider can easily be traced.

That information can be stored indefinitely and can be available just for the asking.

If you use the internet, a land line, a cell phone, credit card, CB radio, etc ,etc. you can be tracked. PERIOD.


12 posted on 06/15/2013 6:15:10 AM PDT by unixfox (Abolish Slavery, Repeal The 16th Amendment!)
[ Post Reply | Private Reply | To 3 | View Replies]

To: SE Mom

Couldn’t Facebook say how many State and local orders they’ve received? How can the Feds ban them from telling that?


13 posted on 06/15/2013 6:16:07 AM PDT by PghBaldy (12/14 - 930am -rampage begins... 12/15 - 1030am - Obama's advance team scouts photo-op locations.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PghBaldy

Aren’t the Federal requests here used for prosecutions, so they must be done by the book? How many citizens are being spied on by the Feds without use of warrants?


14 posted on 06/15/2013 6:18:02 AM PDT by PghBaldy (12/14 - 930am -rampage begins... 12/15 - 1030am - Obama's advance team scouts photo-op locations.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: penelopesire; SE Mom

He77 they can’t even get on the same page so they’re repeating the same lie! The talking point of the week isn’t even coordinated. Does Snowed have them scrambling?


15 posted on 06/15/2013 6:31:34 AM PDT by hoosiermama (Obama: "Born in Kenya" Lying now or then!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: SE Mom

Old one but remember this one?

Did Skype Give a Private Company Data on Teen WikiLeaks Supporter Without a Warrant?

By Ryan Gallagher

|

Posted Friday, Nov. 9, 2012, at 4:30 PM

http://www.slate.com/blogs/future_tense/2012/11/09/skype_gave_data_on_a_teen_wikileaks_supporter_to_a_private_company_without.html


16 posted on 06/15/2013 6:33:23 AM PDT by Irenic (The pencil sharpener and Elmer's glue is put away-- we've lost the red wheel barrow)
[ Post Reply | Private Reply | To 1 | View Replies]

To: unixfox

> If you use the internet, a land line, a cell phone, credit
> card, CB radio, etc ,etc. you can be tracked. PERIOD.

Indeed, but you can minimize your exposure, and you can shield your content from the spooks.

Here are some simple steps anybody can take.

* Use cash whenever possible, especially for things like church or political giving and ammo and firearms. I understand that some political giving must be done with credit card, but limit these as much as possible. Cash is always better.

* Turn your cell phone off unless you absolutely need it. They cannot track your whereabouts if your cell phone is off. This is especially important if you have a “smart” phone, though with some of those, you may need to remove the battery if you can. I advise against using “smart” phones at all.

* If all you do with your computer is email, browse, write letters, and maintain a few spreadsheets, use Linux. For newbies, I can recommend Ubuntu and its variants, or perhaps CentOS.

* If you have applications that must run under Windows, like Video or Audio editing and recording (Cuebase, Camtasia, etc), use a separate computer that is not connected to the internet. You can transfer files with “sneakernet” (usb “thumb” drive). If you have the know-how, you could create a local subnet that has no visibility beyond your environment.

* If you cannot have two separate computers, most modern computers are fully capable of creating “Virtual Machines”. Use VirtualBox for Linux and create a Windows “guest” with limited or no internet access. Files can be transferred through “shared” disk folders. You can use your current Windows license, usually on a sticker somewhere on your computrer, to activate Windows on the guest.

* Only connect your computer to the internet when you need to get email or browse. All other times, either disable the network device or shut off your computer. In Linux you can easily do this from the command line.

* Do not use Google, Apple, or Microsoft applications. Most of them are phishing expeditions and have “back doors” for the spooks.

* If you have an Apple, you’re hosed, unless you can get it to work without an internet connection. Then you can make it your secondary computer, used only for applications that won’t run on Linux.


17 posted on 06/15/2013 6:50:52 AM PDT by Westbrook (Children do not divide your love, they multiply it.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: unixfox

Oh, and very important ,.,

* STAY AWAY FROM “SOCIAL MEDIA”! Man, those things are REALLY bad. Stay away from YouTube, too. They’re owned by Google. Who knows how many hooks they have in there for the spooks.


18 posted on 06/15/2013 6:53:12 AM PDT by Westbrook (Children do not divide your love, they multiply it.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Westbrook

You have provided some good advice. However, you can barely move these days without a camera watching your every move.

We have succumbed to the most surveilled society in the history of mankind. And there is no escaping it.

But we still can’t find out if Zer0 has a valid birth certificate? PATHETIC.


19 posted on 06/15/2013 7:02:48 AM PDT by unixfox (Abolish Slavery, Repeal The 16th Amendment!)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Travis McGee
A clickable image...


20 posted on 06/15/2013 7:10:34 AM PDT by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: unixfox

> We have succumbed to the most surveilled society in the
> history of mankind. And there is no escaping it.

If you live in the city, where such surveillance is ubiquitous, consider moving out. Yeah, they can still see you by satellite, but it’s a lot harder, and they can’t see everything you do.

> But we still can’t find out if Zer0 has a valid birth certificate?

Not to mention his college transcripts, his theses and dissertation.


21 posted on 06/15/2013 7:14:50 AM PDT by Westbrook (Children do not divide your love, they multiply it.)
[ Post Reply | Private Reply | To 19 | View Replies]

To: PghBaldy; SE Mom; hoosiermama

I wonder how many ‘state and local’ requests came from democrat run states and municipalities? How many came from Chicago? Would be very easy for WH ‘friendlies’ to pass info on to WH and democrat operatives....without touching the WH or Feds.

Scary times and no one even seems to care to get to the bottom of how this administration has been abusing power in historic proportions.


22 posted on 06/15/2013 7:16:51 AM PDT by penelopesire (TIME FOR OBAMA TO ANSWER FOR BENGHAZI UNDER OATH!!)
[ Post Reply | Private Reply | To 13 | View Replies]

To: SE Mom

What’s Microsoft’s role in this?

Does their OS provide paths and access?


23 posted on 06/15/2013 7:18:09 AM PDT by G Larry (Let his days be few; and let another take his office. Psalms 109:8)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SE Mom
"I believe we were told we are being spied on TO PREVENT TERRORIST ATTACKS."

So Why Didn't NSA Catch The Tsarnaev Brothers?


24 posted on 06/15/2013 7:21:16 AM PDT by Grampa Dave ('How empty and dead' were they to let Chris Stevens, one of them , die for 'Obama-Clinton fiction?')
[ Post Reply | Private Reply | To 1 | View Replies]

To: G Larry
What’s Microsoft’s role in this?
Does their OS provide paths and access?

_NSAKEY was a variable name discovered in Windows NT 4 Service Pack 5 (which had been released unstripped of its symbolic debugging data) in August 1999 by Andrew D. Fernandes of Cryptonym Corporation. That variable contained a 1024-bit public key.

25 posted on 06/15/2013 7:43:12 AM PDT by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Mycroft Holmes

Uh....about your link...

“page has been deleted, check the deletion log, and see Why was the page deleted?”

Now THAT is funny!


26 posted on 06/15/2013 7:51:19 AM PDT by G Larry (Let his days be few; and let another take his office. Psalms 109:8)
[ Post Reply | Private Reply | To 25 | View Replies]

To: G Larry
Whoops! my fault, thanks. Corrected link below

Trust Me, Mash Here.

27 posted on 06/15/2013 8:11:57 AM PDT by Mycroft Holmes (<= Mash name for HTML Xampp PHP C JavaScript primer. Programming for everyone.)
[ Post Reply | Private Reply | To 26 | View Replies]

To: SE Mom

“I don’t have to listen to your phone calls to know what you’re doing. If I know every single phone call you’ve made, I’m able to determine every single person you talk to; I can get a pattern about your life that is very, very intrusive. The real question here is what do they do with this information that they collect that does not have anything to do with al-Qa’ida? ... But this idea that ... we’re going to trust the president and vice president of the United States that we’re doing the right thing — don’t count me in on that.” —then-Senator Joe Biden in 2006


28 posted on 06/15/2013 9:34:37 AM PDT by TurboZamboni (Marx smelled bad & lived with his parents most his life.)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson