Keep 12160 Alive, please donate!

If everyone reading this gave just a dollar, our fund raiser would be over in 2 hrs.

"Save the Internet" News, Censorship and Solutions


"Save the Internet" News, Censorship and Solutions

Facebook Censors Navy SEALS to Protect Obama on Benghazi


Over the weekend, Facebook took down a message by the Special Operations Speaks PAC (SOS) which highlighted the fact that Obama denied backup to the forces being overrun in Benghazi.

The message was contained in a meme which demonstrated how Obama had relied on the SEALS when he was ready to let them get Osama bin Laden, and how he had turned around and denied them when they called for backup on Sept 11.

I spoke with Larry Ward, president of Political Media, Inc -- the media company that handles SOS postings and media production. Ward was the one who personally put the Navy SEAL meme up, and the one who received the warning from Facebook and an eventual 24 hour suspension from Facebook because Ward put the meme back up after Facebook told him to take it down.

Location: 12160mods
Members: 169
Latest Activity: Jan 6, 2014


"LEAKED! Here's The White House's Draft Cybersecurity Executive Order"

Earlier this week, we wrote about how the White House was working on an executive order to act as a "stand in" for cybersecurity legislation that has so far failed to pass Congress (CISPA passed in the House, but a different effort, the Cybersecurity Act, failed in the Senate, and it would have been difficult to get the two houses aligned anyway). Last weekend Jason Miller from Federal News Radio wrote about a draft he saw... but failed to share the actual draft. We got our hands on a draft (and confirmed what it was with multiple sources) and wanted to share it, as these kinds of things deserve public scrutiny and discussion. It's embedded below. As expected, it does have elements of the Lieberman/Collins bill (to the extent that the White House actually can do things without legislation). It's also incredibly vague. The specific requirements for government agencies are left wide open to interpretation. For example, the State Dept. should engage other governments about protecting infrastructure. Well, duh. As expected, most stuff focuses on Homeland Security and its responsibilities to investigate a variety of different cybersecurity issues -- but, again, it's left pretty vague.

There is, as expected, plans concerning information sharing -- but again, they're left pretty empty on specifics. It talks about an "information exchange framework." Unfortunately, it does not appear to highlight privacy or civil liberties concerns in discussing the information sharing stuff. That seems like a pretty big problem. Homeland Security is tasked with coming up with a way to share information, pulling on some existing efforts, but nowhere do they call out how to make sure these information exchange programs don't lead to massive privacy violations, despite the President's earlier promises that any cybersecurity efforts would take into account privacy and civil liberties.

Mike Masnick






Discussion Forum


Started by HwΩΩd♪. Last reply by Lawrence Edward Calcutt Nov 9, 2012. 1 Reply

UN Seeking Global Internet Surveillance for Terror, Propaganda

Started by Nathan. Last reply by Lawrence Edward Calcutt Oct 24, 2012. 1 Reply

Comment Wall


You need to be a member of "Save the Internet" News, Censorship and Solutions to add comments!

Comment by guest_blog on October 21, 2013 at 4:48pm

Level 3 Outage Disrupts East Coast Internet Traffic 19 Oct 2013 Internet users from Brooklyn to Philadelphia suffered slow to nonexistent service Saturday after equipment at a New York-area network hub broke down, disrupting service for several hours. A spokesman for the Internet service provider Level 3 Communications Inc. said technicians were working quickly to fix the outage, which cascaded down to customers using Cablevision Systems Corp.'s Optimum service and Time Warner Cable Inc., among others. It wasn't immediately clear Saturday why traffic from cable subscribers in New York and New Jersey wasn't rerouted around Level 3.

Comment by HwΩΩd♪ on March 24, 2013 at 1:43pm

Wireless Mesh Networks – The Internet Censorship Solution

Fabulous must see video! James Corbett again brilliantly nails the ongoing internet "war of attrition" by our would-be controllers. More than that, he introduces our ultimate solution to their clampdown - a decentralized pirate internet via "mesh networks"!

Get ready, folks, it's about to come to that, same story as in all fascist clampdowns. They can't stamp us out as hard as these bastards try. Listen and learn and start getting hooked up. Keep on!

Comment by HwΩΩd♪ on February 2, 2013 at 6:06pm
Comment by Friday Woodlans-Sprite on January 3, 2013 at 6:49pm

anyone who invokes god needs to learn.

Comment by truth on December 6, 2012 at 11:46am

U.N. Report Reveals International Protocol for Tracking People Online

The document outlines the stages law enforcement agencies should go through when conducting electronic surveillance of suspects: first, by obtaining data and “cookies” stored by websites like Facebook, Google, eBay and Paypal; second, by obtaining location data from servers used by VoIP Internet phone services (like Skype); then, by conducting a “smart analysis” of these data before moving on to the most serious and controversial step: intercepting communications, exploiting security vulnerabilities in communications technologies for “intelligence-gathering purposes,” and even infecting a target computer with Trojan-horse spyware to mine data.

Comment by Tula on December 1, 2012 at 11:47am

Alex Jones Connected To Stratfor/Israel CIA Front

Comment by guest_blog on December 1, 2012 at 11:40am

CIA-Sponsored Trolls Monitor Internet & Interact With Users to Discredit Factual Information

Comment by Nathan on November 27, 2012 at 3:41pm

Orin Kerr was on the Kojo Nnamdi show (on DC’s NPR station, 88.5 WAMU) this morning ... with Julian Sanchez and Julia Angwin. It’s a one-hour program that was inspired by the Petraeus investigation but turned to many of the broader issues of online investigations and privacy.

You can listen here:

Comment by Nathan on November 21, 2012 at 8:21am

Last week, we posted a list of open questions about how voters’ personal information was used in the 2012 presidential election (and how it’ll be used now that the election’s over). We posted the questions on our blog and on the social news site Reddit, and lo and behold, someone from the Obama campaign’s data mining team answered!

Although he wasn’t in charge of the data mining operations, his answers still give some insight into how personal information drove the campaign. We found it especially unsettling to see how much detailed Facebook data is up for sale for marketing, regardless of whether you’ve set your Facebook account to be more private (see his answer to question 4).

We’re posting our questions and his answers below (note that we haven’t edited his answers at all, except to format their numbering):

1. Abine: How detailed did the profiles that the campaign built up about people get? Like, was it “category of single guys in OH who like microbrews,” or “John Smith in OH who hasn’t had a girlfriend in 3 years and always drinks Dogfishhead?” Bonus: can we see a (redacted) real profile?

Campaign Employee: “I wasn’t high enough to get end results, but I saw some of the print outs upstairs… They know everything Google and FB know about you, pretty much. They know what music you like, which Harry Potter book is your favorite, your voting habits, etc. It’s all in databases, you’re just a number in a DB with a name attached.” 

2. Abine: It sounds like databases have become a valuable asset in a growing number of campaigns. Is there anything stopping, say, the losing party who’s in campaign debt and has to answer to creditors from selling the data to marketers and other third parties to help fulfill that debt?

Campaign Employee:Again, I’m not the person to talk to about that, didn’t even think to ask that. I AM in advertising with a focus on DB marketing though and it depends on the conditions on which they got your data and what they agreed to in the process.”

3. Abine: Let’s talk about online tracking. Advertisers always argue that the data they collect doesn’t pose any privacy problems because it’s aggregated and “de-personalized,” while researchers say there’s no such thing as truly anonymous tracking. Given your experience, who’s closer to the truth?

Campaign Employee: “I’ve worked on advertising campaigns before. I can tell you that as long as the databases aren’t leaked, you’re fairly safe. They will have your name, CCN, SSN etc. but most of that is only used to match personally identifiable information to you (matching your Amazon spending habits to your FB “likes” for example). In other words, the latter, but it’s happened since the first targeted print ads. Magazines and newspapers have collected similar data without you knowing for decades.”

Comment by truth on November 15, 2012 at 8:17am

Senate Narrowly Votes Down Cybersecurity Act Again

Eric Blair
Activist Post

Desperate for Internet control, Senate leaders once again put the Cybersecurity Act of 2012 up for a vote yesterday, and yet again, it failed to pass. But this time it was one vote closer (51 to 47) to passing than its August defeat (52 to 46).

The Protecting Cyberspace as a National Asset Act, first introduced in 2010 by Joe Lieberman, was quickly dubbed the Internet Kill Switch Bill because of the power it gives to the executive branch to seize or shut down parts of the Internet in a cyber emergency.

At the time Lieberman justified this draconian power grab by saying, "Right now, China, the government, can disconnect parts of its Internet in a case of war. We need to have that here, too." ...



  • Add Photos
  • View All

Need help or have questions/concerns??? Send a message to The Admin Team

24 or more hours of member activity

Please remember this website is supported by your donations...

Report an Issue

© 2015   Created by truth.

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 2007-2015 - all rights reserved. unless otherwise noted