All Discussions Tagged 'phone' - 12160 Social Network2024-03-28T13:34:43Zhttps://12160.info/forum/topic/listForTag?tag=phone&feed=yes&xn_auth=noIt’s not just your phone calls – it’s YOU they are listening totag:12160.info,2014-01-05:2649739:Topic:13884412014-01-05T04:25:56.002Zmysteryhttps://12160.info/profile/mystery
<p>You, like most Americans, are friendly and like to mind your own business. You have 2.3 kids, a mortgage, and a loving spouse.<br></br> <br></br> But, this is the 21st Century. A grand era of technology. Buck Rogers and H.G. Wells would be so proud of our technological advancements.<br></br> <br></br> But so would Stalin, Mao and Hitler. The NSA’s recently leaked shopping catalog is chilling and would “harsh the mellow” of any regular Joe.<br></br> <br></br> Let’s start with you.…<br></br> <br></br></p>
<p>You, like most Americans, are friendly and like to mind your own business. You have 2.3 kids, a mortgage, and a loving spouse.<br/> <br/> But, this is the 21st Century. A grand era of technology. Buck Rogers and H.G. Wells would be so proud of our technological advancements.<br/> <br/> But so would Stalin, Mao and Hitler. The NSA’s recently leaked shopping catalog is chilling and would “harsh the mellow” of any regular Joe.<br/> <br/> Let’s start with you.<br/> <br/> <a name="more" id="more"></a>You have a phone that you call home with. The NSA can listen in to your phone using <a target="_blank" href="http://www.prepperpodcast.com/?attachment_id=132535">PICASSO</a>. It knows your phone book, your recent calls, where you’ve been, your PIN numbers that you’ve used, and can block your calls. Like if you’re being chased by black SUVs and you want to call 911 – tough luck, they’ve shut down your phone.<br/> <br/> But the REAL interesting part of the PICASSO - it can collect LIVE AUDIO from the phone. Are you carrying on a great conversation about how much you think Obamacare is a scam? Your political dissent can now be recorded in real time and documented.</p>
<p>Continue reading at: <a href="http://www.activistpost.com/2014/01/its-not-just-your-phone-calls-its-you.html">http://www.activistpost.com/2014/01/its-not-just-your-phone-calls-its-you.html</a></p> Revealed: Obama admin’s nonsensical legal justification for bulk collection of Americans’ phone recordstag:12160.info,2013-08-12:2649739:Topic:12861272013-08-12T03:14:38.348Zmysteryhttps://12160.info/profile/mystery
<p>The Obama administration recently released a white paper which summarizes the supposed legal justification for the bulk collection of Americans’ phone records. Contained therein are some thoroughly nonsensical and leave the door open for massive invasions of privacy. Meanwhile, it was revealed that the National Security Agency (NSA) can conduct warrantless searches for the phone calls and emails of Americans and that the collection of data expands far beyond what was previously admitted…</p>
<p>The Obama administration recently released a white paper which summarizes the supposed legal justification for the bulk collection of Americans’ phone records. Contained therein are some thoroughly nonsensical and leave the door open for massive invasions of privacy. Meanwhile, it was revealed that the National Security Agency (NSA) can conduct warrantless searches for the phone calls and emails of Americans and that the collection of data expands far beyond what was previously admitted to.</p>
<p>Continue reading at: <a href="http://www.activistpost.com/2013/08/revealed-obama-admins-nonsensical-legal.html">http://www.activistpost.com/2013/08/revealed-obama-admins-nonsensical-legal.html</a></p> U.S. Drug Enforcement unit using NSA intercepts, wiretaps & phone records to launch criminal investigations of Americans.tag:12160.info,2013-08-05:2649739:Topic:12806352013-08-05T14:49:48.214Ztruthhttps://12160.info/profile/adap2k
<h1 class="title">U.S. Drug Enforcement unit using NSA intercepts, wiretaps & phone records to launch criminal investigations of Americans.</h1>
<p> </p>
<p>WASHINGTON (Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.</p>
<p> </p>
<p>Although these cases rarely…</p>
<h1 class="title">U.S. Drug Enforcement unit using NSA intercepts, wiretaps & phone records to launch criminal investigations of Americans.</h1>
<p> </p>
<p>WASHINGTON (Reuters) - A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.</p>
<p> </p>
<p>Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges.</p>
<p> </p>
<p>The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.</p>
<p><a target="_blank" href="http://www.chicagotribune.com/news/sns-rt-us-dea-sod-20130805,0,2087915,full.story" title="http://www.chicagotribune.com/news/sns-rt-us-dea-sod-20130805,0,2087915,full.story">http://www.chicagotribune.com</a></p>
<p></p>
<p><strong><span class="font-size-4">Check out the member blogs, videos, and discussions @ <a href="http://12160.info">http://12160.info</a></span><br/> <span class="font-size-4"><object id="obj_1339446151406" classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0" height="501" width="492"><param name="AllowScriptAccess" value="never"></param><param name="AllowNetworking" value="all"></param><param name="AllowFullScreen" value="false"></param><param name="flashvars" value="cid=1339446151406&a=999999&b=100&c=333333&d=FFFFFF&g=333333&j=333333&k=FF0033&l=000000&p=16&s=1"></param><param name="src" value="http://12160mhz.chatango.com/group"></param><param name="allowscriptaccess" value="never"></param><param name="allownetworking" value="all"></param><param name="allowfullscreen" value="false"></param><param name="wmode" value="opaque"></param><embed wmode="opaque" id="obj_1339446151406" type="application/x-shockwave-flash" src="http://12160mhz.chatango.com/group" allowscriptaccess="never" allownetworking="all" allowfullscreen="false" flashvars="cid=1339446151406&a=999999&b=100&c=333333&d=FFFFFF&g=333333&j=333333&k=FF0033&l=000000&p=16&s=1" height="501" width="492"></embed> </object>
</span><br/></strong></p> California cops defend phone confiscations as video of 'constant bashing' emergestag:12160.info,2013-05-15:2649739:Topic:11959032013-05-15T03:20:50.492Zmysteryhttps://12160.info/profile/mystery
<p><img alt="California Highway Patrol officers (Reuters/Robert Galbraith)" src="http://rt.com/files/news/1f/12/f0/00/phone-confiscations333-video-constant-bashing.si.jpg" style="float: none;" title=""></img></p>
<p>Mounting pressure from national media and the local community still has not convinced California police to offer any explanation for why they confiscated cell phone video taken by witnesses who say eight or nine officers beat a helpless man to death.</p>
<p>The Kern County Sherriff’s Office has responded to allegations of police brutality only by stonewalling reporters and the family of David Silva, 33, who died last week after witnesses say police took turns hitting the…</p>
<p><img style="float: none;" title="" src="http://rt.com/files/news/1f/12/f0/00/phone-confiscations333-video-constant-bashing.si.jpg" alt="California Highway Patrol officers (Reuters/Robert Galbraith)"/></p>
<p>Mounting pressure from national media and the local community still has not convinced California police to offer any explanation for why they confiscated cell phone video taken by witnesses who say eight or nine officers beat a helpless man to death.</p>
<p>The Kern County Sherriff’s Office has responded to allegations of police brutality only by stonewalling reporters and the family of David Silva, 33, who died last week after witnesses say police took turns hitting the supposedly inebriated man in the head with their batons. Observers who phoned 911 to report the police abuse were later visited by detectives demanding they turn over any footage captured in the early morning hours of Wednesday, May 8. </p>
<p>The seven Kern County deputies officials say were involved in the incident (the number of California Highway Patrol officers present is still unknown) have not been placed on administrative leave, according to the Bakersfield Californian, and department officials have refused to explain why. </p>
<p>“<i>We’re following the same protocol, as far as the administrative process is concerned, that we’d follow in similar-type incidents</i>,” said sheriff’s spokesman Ray Pruitt. Other law enforcement higher-ups echoed a similar sentiment by implying their silence was warranted by an “<i>ongoing investigation</i>” that could last for months. </p>
<p>The cause of death will be announced pending a toxicology report from the coroner as well as microscopic studies. But the delay in explanations fail to account for why witnesses told local and national media outlets that Silva appeared to die in front of them, after a police beating and while a canine unit looked on, apparently ready to intervene if Silva would have been allowed to stand. </p>
<p>Melissa Quair told the Bakersfield Californian that aggressive deputies showed up at her door and blocked the exit as they seized her boyfriend’s phone, which contained video of the beating. She also asserted that her mother was forced to forfeit her phone, even after the police were told it did not contain any supposed evidence.</p>
<p>continue reading at: <a href="http://rt.com/usa/phone-confiscations-video-constant-bashing-279/">http://rt.com/usa/phone-confiscations-video-constant-bashing-279/</a></p> Smart phone app 'Fooducate' could be the beginning of the end of GMOtag:12160.info,2013-04-20:2649739:Topic:11780982013-04-20T00:24:14.758Zmysteryhttps://12160.info/profile/mystery
<p>One of the biggest obstacles holding people back from eating healthy is easy access to resourceful information, about chemicals in foods, or natural remedies and supplements, and about new choices to make right at the store. If only technology made something for your phone, so you could scan every product's barcode and get a quick, reliable summary of what you're really getting. For instance, is it GMO? Does it contain gluten? Am I allergic to the ingredients? Guess what? The smart phone app…</p>
<p>One of the biggest obstacles holding people back from eating healthy is easy access to resourceful information, about chemicals in foods, or natural remedies and supplements, and about new choices to make right at the store. If only technology made something for your phone, so you could scan every product's barcode and get a quick, reliable summary of what you're really getting. For instance, is it GMO? Does it contain gluten? Am I allergic to the ingredients? Guess what? The smart phone app already exists, and has been around for a few years, but hardly anyone knows about it. That's all about to change. (<a href="http://www.fooducate.com/" target="_blank">http://www.fooducate.com/</a>).<br/><br/>Planet Earth is chock full of natural resources, foods that heal the body, herbs and mushrooms that build immunity, extracts and seed oils that cure diseases, and if no food scientists ever took any of it into a lab and cooked it with chemicals, there would be far less disease and disorder, far less obesity and cancer, and far less of a need need to put a HUGE filter on everything you consider purchasing. (<a href="http://store.naturalnews.com/Superfoods_c_4.html" target="_blank">http://store.naturalnews.com/Superfoods_c_4.html</a>)</p>
<p>Continue reading at: <a href="http://www.naturalnews.com/039993_fooducate_GMO_smart_phone.html">http://www.naturalnews.com/039993_fooducate_GMO_smart_phone.html</a></p> White House Supports Unlocking Phones -- But the Real Problem Runs Deepertag:12160.info,2013-03-13:2649739:Topic:11495372013-03-13T00:13:05.515Zmysteryhttps://12160.info/profile/mystery
<p>The White House has come out today <a href="https://petitions.whitehouse.gov/petition/make-unlocking-cell-phones-legal/1g9KhZG7">in support of legalizing the unlocking of cell phones for use on different carriers</a>, saying it makes "common sense" that "all consumers deserve that flexibility." The statement came as a response to a recent petition that received over 114,000 signatures.</p>
<p>Why were people concerned about cell phone unlocking? Unlocking a phone for use on a different…</p>
<p>The White House has come out today <a href="https://petitions.whitehouse.gov/petition/make-unlocking-cell-phones-legal/1g9KhZG7">in support of legalizing the unlocking of cell phones for use on different carriers</a>, saying it makes "common sense" that "all consumers deserve that flexibility." The statement came as a response to a recent petition that received over 114,000 signatures.</p>
<p>Why were people concerned about cell phone unlocking? Unlocking a phone for use on a different carrier may run afoul of section 1201 of <a href="https://www.eff.org/issues/dmca">the Digital Millennium Copyright Act (DMCA)</a>, which prohibits the so-called "circumvention" of technical locks on copyrighted works. In a nod to the unworkability of such a ban, the law outlines a process for the Librarian of Congress to establish some exemptions every three years. In 2006 and 2010, the Librarian approved an exemption targeted at cell phone unlocking, but opted not to in the 2012 process. <a href="https://www.eff.org/is-it-illegal-to-unlock-a-phone">That doesn't necessarily make unlocking illegal</a>, but it does strip it of the explicit legal protection it had before.</p>
<p>Today's White House statement acknowledges two important points about the controversial anti-circumvention provision: that it has gotten in the way of innovation and competition, and that its rigid rulemaking procedures are an "imperfect fit" for some issues—especially technical ones. That sentiment was echoed in <a href="http://www.loc.gov/today/pr/2013/13-041.html">the Library of Congress statement also issued today</a>: The rulemaking process "was not intended to be a substitute for deliberations of broader public policy."</p>
<p>Continue reading at: <a href="https://www.eff.org/deeplinks/2013/03/white-house-supports-unlocking-phones-real-problem-runs-deeper">https://www.eff.org/deeplinks/2013/03/white-house-supports-unlocking-phones-real-problem-runs-deeper</a></p> Legality questioned as secretive ‘Stingray’ cell phone surveillance tool used more frequentlytag:12160.info,2013-02-16:2649739:Topic:11236152013-02-16T00:21:50.012Zmysteryhttps://12160.info/profile/mystery
<p>Questions about the legality of the secretive cell phone surveillance tool known as “Stingray” are being raised as the use of the device, originally billed as a counterterrorism tool, expands into everything but cases related to terrorism.</p>
<p>Unfortunately this is just one of <a href="http://endthelie.com/2012/07/02/three-former-nsa-employees-expose-mass-illegal-surveillance-in-court/" target="_blank">many methods of surveillance</a> –…</p>
<p>Questions about the legality of the secretive cell phone surveillance tool known as “Stingray” are being raised as the use of the device, originally billed as a counterterrorism tool, expands into everything but cases related to terrorism.</p>
<p>Unfortunately this is just one of <a href="http://endthelie.com/2012/07/02/three-former-nsa-employees-expose-mass-illegal-surveillance-in-court/" target="_blank">many methods of surveillance</a> – <a href="http://endthelie.com/2012/09/27/feds-warrantless-surveillance-targeted-more-people-in-past-two-years-than-entire-previous-decade/#axzz2Ke61So4T" target="_blank">all of which are increasing dramatically</a> – used by <a href="http://endthelie.com/2012/10/15/fbi-issues-virus-warning-for-android-phone-users-mentions-surveillance-software-sold-to-governments/" target="_blank">the government</a>, <a href="http://endthelie.com/2012/07/09/u-s-mobile-phone-companies-responded-to-1-3-requests-for-subscriber-information-in-2011-alone/">law enforcement</a> and even <a href="http://endthelie.com/2012/02/26/report-reveals-facebook-spying-on-smartphone-users-text-messages-other-privacy-breaches/" target="_blank">the private sector</a>.</p>
<p>The Electronic Frontier Foundation (EFF) <a href="https://www.eff.org/deeplinks/2012/10/stingrays-biggest-unknown-technological-threat-cell-phone-privacy" target="_blank">called</a> Stingrays “the biggest technological threat to cell phone privacy you don’t know about” and “an unconstitutional, all-you-can-eat data buffet” in October of last year and unfortunately it has only become more important since then.</p>
<p>The Stingray essentially dupes cell phones into treating the device as if it were a real cell phone tower, thus allowing “the government to electronically search large areas for a particular cell phone’s signal—sucking down data on potentially thousands of innocent people along the way,” as the EFF <a href="https://www.eff.org/deeplinks/2013/02/secretive-stingray-surveillance-tool-becomes-more-pervasive-questions-over-its" target="_blank">puts it</a>.</p>
<p>The major problem is that law enforcement has used them while circumventing the need for individualized warrants as the Constitution requires.</p>
<p>Since this is dragnet surveillance, anyone and everyone can be targeted by the device without a warrant being issued for the search and seizure of their data.</p>
<p>In late January, LA Weekly <a href="http://www.laweekly.com/2013-01-24/news/stingray-LAPD-spying-21-terrorism-tool-against-citizens/full/" target="_blank">reported</a> that Stingray while “intended to fight terrorism, was used in far more routine LAPD criminal investigations 21 times in a four-month period during 2012, apparently without the courts’ knowledge that the technology probes the lives of non-suspects who happen to be in the same neighborhood as suspected terrorists.”</p>
<p>The Los Angeles Police Department (LAPD) was able to purchase their device thanks to a 2006 grant from the Department of Homeland Security (DHS). Keep in mind, DHS <a href="http://endthelie.com/2012/12/10/dhs-grants-fund-surveillance-equipment-on-public-buses/" target="_blank">funds many highly troublesome surveillance efforts</a> around the nation.</p>
<p>While the original grant request from the LAPD claimed they would be using the Stingray for “regional terrorism investigations,” they’ve been using it for everything from drug cases to burglary and murder cases.</p>
<p>“Of course, we’ve seen this pattern <a href="https://www.eff.org/deeplinks/2012/04/cispa-national-security-and-nsa-ability-read-your-emails" target="_blank">over</a> and <a href="https://www.eff.org/deeplinks/2011/10/ten-years-later-look-three-scariest-provisions-usa-patriot-act" target="_blank">over</a> and <a href="https://www.eff.org/deeplinks/2012/12/government-attorneys-agree-eff-new-counterterrorism-database-rules-threaten" target="_blank">over</a>,” the EFF points out. “The government uses ‘terrorism’ as a catalyst to gain some powerful new surveillance tool or ability, and then turns around and uses it on ordinary citizens, severely infringing on their civil liberties in the process.”</p>
<p>As previously mentioned, the biggest problem with Stingrays is the lack of a specific warrant issued for an individual, instead, it essentially gives police “general warrant” powers.</p>
<p>Blocking general warrant powers was exactly what the founding fathers had in mind when drafting the Fourth Amendment since, as the EFF rightly notes, “In pre-revolutionary America, British soldiers used ‘general warrants’ as authority to go house-to-house in a particular neighborhood, looking for whatever they please, without specifying an individual or place to be searched.”</p>
<p>Continue reading at: <a href="http://endthelie.com/2013/02/12/legality-questioned-as-secretive-stingray-cell-phone-surveillance-tool-used-more-frequently/">http://endthelie.com/2013/02/12/legality-questioned-as-secretive-stingray-cell-phone-surveillance-tool-used-more-frequently/</a></p> Using Cell Phone Parts for Survivaltag:12160.info,2013-01-20:2649739:Topic:10992382013-01-20T23:42:52.137Zmysteryhttps://12160.info/profile/mystery
<p>I thought this may be something to share with friends.</p>
<p><img src="http://i.imgur.com/qGlTL.jpg"/></p>
<p>Retrieved at: <a href="http://beforeitsnews.com/survival/2013/01/using-cell-phone-parts-for-survival-2457438.html">http://beforeitsnews.com/survival/2013/01/using-cell-phone-parts-for-survival-2457438.html</a></p>
<p>I thought this may be something to share with friends.</p>
<p><img src="http://i.imgur.com/qGlTL.jpg"/></p>
<p>Retrieved at: <a href="http://beforeitsnews.com/survival/2013/01/using-cell-phone-parts-for-survival-2457438.html">http://beforeitsnews.com/survival/2013/01/using-cell-phone-parts-for-survival-2457438.html</a></p> Everyone who attended #OWS with a cell phone had their identity logged, says security experttag:12160.info,2012-09-23:2649739:Topic:10005552012-09-23T19:28:37.779Ztruthhttps://12160.info/profile/adap2k
<h1 class="title">Everyone who attended OWS with a cell phone had their identity logged, says security expert</h1>
<div class="content-middle"><div class="node sticky"><div class="content"><iframe frameborder="0" height="439" src="https://www.youtube.com/embed/NObTjstI6f4?wmode=opaque" width="586"></iframe>
<p><sup><sub>Please note that by playing this clip YouTube and Google will place a long term cookie on your computer.</sub></sup></p>
<p>While we in the civil liberties community disagree…</p>
</div>
</div>
</div>
<h1 class="title">Everyone who attended OWS with a cell phone had their identity logged, says security expert</h1>
<div class="content-middle"><div class="node sticky"><div class="content"><iframe width="586" height="439" src="https://www.youtube.com/embed/NObTjstI6f4?wmode=opaque" frameborder="0"></iframe>
<p><sup><sub>Please note that by playing this clip YouTube and Google will place a long term cookie on your computer.</sub></sup></p>
<p>While we in the civil liberties community disagree strongly with private investigator <a href="http://www.stevenrambam.com/" target="_blank">Steven</a> <a href="http://www.stevenrambam.com/" target="_blank">Rambam</a>'s admonition to "Get Over It," after listening to him describe electronic surveillance powers it's hard to disagree with the first part of the title of his talk: "Privacy Is Dead." (Part two of the talk is below.)</p>
<p>"Where you work, what your salary is, your criminal history, all the lawsuits you've been involved in, real property...everything you've ever purchased, everywhere you've ever been...Your information is worth money. Your privacy today isn't being invaded by big brother -- it's being invaded by big marketer," he told an audience of hackers and privacy activists at HOPE 9 in New York during the summer of 2012.</p>
<p>Lots of the talk is about big corporations and their insatiable hunger for data about all of us, but Ramdam also addresses government spying:</p>
<blockquote><p>One of the biggest changes is the ability to track your physical location. I'm sorry I came in at the end of the previous talk. I heard them talk about surveying cell phones with a drone, in a wide area -- this is something that is done routinely now. [Note: Is that what <a href="http://privacysos.org/node/822">these microwave antennas</a> were used for at Occupy Wall Street in mid September?] <strong>I can tell you that everybody that attended an Occupy Wall Street protest, and didn't turn their cell phone off, or put it -- and sometimes even if they did -- the identity of that cell phone has been logged, and everybody who was at that demonstration, whether they were arrested, not arrested, whether their photos were ID'd, whether an informant pointed them out, it's known they were there anyway. This is routine. </strong> <a href="http://privacysos.org/node/825">http://privacysos.org/node/825</a></p>
</blockquote>
</div>
</div>
</div> Communicate if Your Government Shuts Off Your Internettag:12160.info,2011-02-01:2649739:Topic:3046312011-02-01T17:38:29.728ZThomas Gambillhttps://12160.info/profile/ThomasGambill
<p>Photo by albir/<a href="http://www.flickr.com/photos/lliurealbir/4852185263/" title="http://www.flickr.com/photos/lliurealbir/4852185263/">Flickr</a>/CC</p>
<p><i>Scenario:</i> Your government is displeased with the <a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet">communication</a> going on in your location and pulls the plug on your internet access, most likely by telling the major ISPs to turn off service.</p>
<p>This is what happened in Egypt…</p>
<p>Photo by albir/<a href="http://www.flickr.com/photos/lliurealbir/4852185263/" title="http://www.flickr.com/photos/lliurealbir/4852185263/">Flickr</a>/CC</p>
<p><i>Scenario:</i> Your government is displeased with the <a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet">communication</a> going on in your location and pulls the plug on your internet access, most likely by telling the major ISPs to turn off service.</p>
<p>This is what happened in Egypt Jan. 25 prompted by citizen protests, with sources estimating that the Egyptian government cut off approximately 88 percent of the country's internet access. What do you do without internet? Step 1: Stop crying in the corner. Then start taking <a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet">steps</a> to reconnect with your network. Here’s a list of things you can do to keep the communication flowing.</p>
<p><i>This article is part of <b>a wiki anyone can edit.</b> If you have advice to add, please log in and contribute.</i></p>
<table border="0">
<tbody><tr><td><p><b>Contents</b></p>
<p>[hide]</p>
<ul>
<li><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet#Preventative_measures">1 Preventative measures</a><ul>
<li><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet#Make_your_network_tangible">1.1 Make your network tangible</a></li>
<li><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet#Broadcast_on_the_radio">1.2 Broadcast on the radio</a></li>
<li><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet#Phone">1.3 Phone</a></li>
<li><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet#Fax">1.4 Fax</a></li>
</ul>
</li>
<li><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet#Getting_back_online">2 Getting back online</a><ul>
<li><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet#Find_the_privately-run_ISPs">2.1 Find the privately-run ISPs</a></li>
<li><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet#Return_to_dial-up">2.2 Return to dial-up</a></li>
<li><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet#Ad-Hoc_Networking">2.3 Ad-Hoc Networking</a></li>
</ul>
</li>
<li><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet#Get_satellite_access">3 Get satellite access</a></li>
<li><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet#Packet_Radio">4 Packet Radio</a></li>
<li><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet#Back_to_Basics">5 Back to Basics</a></li>
<li><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet#Additional_Resources">6 Additional Resources</a></li>
</ul>
</td>
</tr>
</tbody>
</table>
<p><b>Preventative measures</b></p>
<p><b>Make your network tangible</b></p>
<p>Print out your contact list, so your phone numbers aren’t stuck in the cloud. Some <a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet">mail services</a> like Gmail allow you to export your online contact list in formats that are more conducive to paper, such as CSV or Vcard, and offer <a href="http://mail.google.com/support/bin/answer.py?hl=en&answer=24911" title="http://mail.google.com/support/bin/answer.py?hl=en&answer=24911">step-by-step guides</a> on how to do this.</p>
<p> </p>
<p><b>Broadcast on the radio</b></p>
<p><b> </b></p>
<p><a href="http://en.wikipedia.org/wiki/Citizens%27_band_radio" title="http://en.wikipedia.org/wiki/Citizens%27_band_radio"><i>CB Radio:</i></a> Short for "Citizens Band" radio, these two-way radios allow communication over short distances on 40 channels. You can pick one up for about $20 to $50 at Radio Shack, and no license is required to operate it.</p>
<p> </p>
<p><a href="http://en.wikipedia.org/wiki/Amateur_radio" title="http://en.wikipedia.org/wiki/Amateur_radio"><i>Ham radio</i>:</a> To converse over these radios, also known as "amateur radios," you have to obtain an operator's license from the FCC. Luckily, other Wired How-To contributors have already explained exactly <a href="http://howto.wired.com/wiki/Become_a_Ham_Radio_Operator" title="http://howto.wired.com/wiki/Become_a_Ham_Radio_Operator">what you need to do</a> to get one and use it like a pro.</p>
<p> </p>
<p><a href="http://en.wikipedia.org/wiki/GMRS" title="http://en.wikipedia.org/wiki/GMRS"><i>GMRS</i>:</a> The General Mobile Radio Service (GMRS) is a licensed land-mobile FM UHF radio service in the United States available for short-distance two-way communication. It is intended for use by an adult individual who possesses a valid GMRS license, as well as his or her immediate family members... They are more expensive than the walkie talkies typically found in discount electronics stores, but are higher quality.</p>
<p> </p>
<p><a href="http://en.wikipedia.org/wiki/Family_Radio_Service" title="http://en.wikipedia.org/wiki/Family_Radio_Service"><i>Family Radio Service</i>:</a> The Family Radio Service (FRS) is an improved walkie talkie radio system authorized in the United States since 1996. This personal radio service uses channelized frequencies in the ultra high frequency (UHF) band. It does not suffer the interference effects found on citizens' band (CB) at 27 MHz, or the 49 MHz band also used by cordless phones, toys, and baby monitors.</p>
<p> </p>
<p><a href="http://en.wikipedia.org/wiki/Microbroadcasting" title="http://en.wikipedia.org/wiki/Microbroadcasting"><i>Microbroadcasting</i>:</a> Microbroadcasting is the process of broadcasting a message to a relatively small audience. This is not to be confused with low-power broadcasting. In radio terms, it is the use of low-power transmitters to broadcast a radio signal over the space of a neighborhood or small town. Similarly to pirate radio, microbroadcasters generally operate without a license from the local regulation body, but sacrifice range in favor of using legal power limits.</p>
<p> </p>
<p><b>Phone</b></p>
<p><b> </b></p>
<p><i>Set up a phone tree:</i> According to the <a href="http://www.aauw.org/act/issue_advocacy/phonetree.cfm" title="http://www.aauw.org/act/issue_advocacy/phonetree.cfm">American Association of University Women</a>, a phone tree is "a prearranged, pyramid-shaped system for activating a group of people by telephone" that can "spread a brief message quickly and efficiently to a large number of people." Dig out that contact list you printed out and follow the steps on the <a href="http://www.aauw.org/act/issue_advocacy/phonetree.cfm" title="http://www.aauw.org/act/issue_advocacy/phonetree.cfm">AAUW website</a> to spread the message down your pyramid of contacts.</p>
<p> </p>
<p><i>Enable Twitter via SMS:</i> Though the thought of unleashing the Twitter fire hose in your text message inbox may seem horrifying, it would be better than not being able to connect to the outside world at all. The Twitter website has full instructions on <a href="http://support.twitter.com/entries/14014-twitter-phone-faqs" title="http://support.twitter.com/entries/14014-twitter-phone-faqs">how to redirect tweets to your phone</a>.</p>
<p> </p>
<p>Alex Jones and infowars.com have a telephone number for people to listen to his radio show by phone, in case the internet goes down, or if you don't have internet. The phone in listen line is 512-646-5000.</p>
<p> </p>
<p><b>Fax</b></p>
<p><b> </b></p>
<p>If you need to quickly send and receive documents with lengthy or complex instructions, phone conversations may result in misunderstandings, and delivering the doc by foot would take forever. Brush the dust off that bulky old machine, establish a connection by phone first with the recipient to make sure his machine is hooked up, then fax away.</p>
<p> </p>
<p>You may not need a fax machine to send or receive faxes if your computer has a dial-up fax application.</p>
<p> </p>
<p><b>Getting back online</b></p>
<p><b> </b></p>
<p>While it might be relatively easy for a government to cut connections by leveraging the major ISPs, there are some places they wouldn't get to so readily, like privately-owned networks and independent ISPs.</p>
<p> </p>
<p><b>Find the privately-run ISPs</b></p>
<p><b> </b></p>
<p>In densely populated areas, especially in central business districts and city suburbs there are multiple home WiFi networks overlapping each other, some secure, some not. If there is no internet, open up your WiFi by removing password protection: If enough people do this it's feasible to create a totally private WiFi service outside government control covering the CBD, and you can use applications that run Bonjour (iChat on Mac for example) to communicate with others on the open network and send and receive documents. **needs more clarification</p>
<p> </p>
<p>If you are a private ISP, it's your time to shine. Consider allowing open access to your Wi-Fi routers to facilitate communication of people around you until the grid is back online.</p>
<p> </p>
<p><b>Return to dial-up</b></p>
<p><b> </b></p>
<p>According to an article in the BBC about <a href="http://www.bbc.co.uk/news/technology-12322948" title="http://www.bbc.co.uk/news/technology-12322948">old tech's role in the Egyptian protests</a>, "Dial-up modems are one of the most popular routes for Egyptians to get back online. Long lists of international numbers that connect to dial-up modems are circulating in Egypt thanks to net activists We Re-Build, Telecomix and others."</p>
<p> </p>
<p>Dial-up can be slow. Often, there is a lightweight mobile version of a site that you can load from your desktop browser quickly despite the limitations of dial-up. Examples: <a href="http://mobile.twitter.com/" title="http://mobile.twitter.com">mobile.twitter.com</a>, <a href="http://m.facebook.com/" title="http://m.facebook.com/">m.facebook.com</a>, <a href="http://m.gmail.com/" title="http://m.gmail.com">m.gmail.com</a>.</p>
<p> </p>
<p><b>Ad-Hoc Networking</b></p>
<p><b> </b></p>
<p>Most wireless routers, PCs, laptops, and even some ultramobile devices like cellphones have the ability to become part of an "ad hoc" network, where different "nodes" (all of the devices on the network) share the responsibility of transmitting data with one another. These networks can become quite large, and are often very easy to set up. If used properly by a tech-savvy person, such networks can be used to host temporary websites and chat rooms. There are many internet tutorials on the internet for ad hoc networking, so feel free to google some.</p>
<p> </p>
<p>Apple computers tend to have very accessible ad hoc functionality built in, including a pre-installed chat client (iChat) that will automatically set up an ad hoc "Rendezvous" chatroom among anybody on the network, without the need for an external service like AIM or Skype. Ad hoc network-hosting functionality is built in to the Wi-Fi menu.</p>
<p> </p>
<p>Windows computers have several third-party ad hoc chat applications available (such as Trillian) and setting up an ad hoc Wi-Fi network is almost as simple as on a Mac.</p>
<p> </p>
<p>Linux operating systems, of course, have plenty of third-party apps available, and most distros have ad hoc network-creation support built in.</p>
<p> </p>
<p> </p>
<p> </p>
<p><b>Get satellite access</b></p>
<p>You <i>can</i> have very, very slow internet if you have something similiar to an Iridium phone, which would allow you to do dial up at 2400 baud, which at least gives you e-mail. This will also work when your government has shut down GSM and telephone access, and will work pretty much anywhere on the planet. If you're in the right place, get yourself KA-SAT access (<a href="http://en.wikipedia.org/wiki/KA-SAT" title="http://en.wikipedia.org/wiki/KA-SAT">http://en.wikipedia.org/wiki/KA-SAT</a>) which is satellite broadband and will not be routed through any internet exchange that certain local governments may monitor or block (unless that government is part of EU or er ... Uncle Sam.</p>
<p> </p>
<p><b>Packet Radio</b></p>
<p><b> </b></p>
<p>Back to the '90s: There do exist shortwave packet-radio modems. These are also excruciatingly slow, but may get your e-mail out.</p>
<p> </p>
<p><b>Back to Basics</b></p>
<p><b> </b></p>
<p>Have an air horn or other loud instrument handy. It may just come down to being able to alert people in your local geographic area, who would otherwise be unaware of an emergency. You may also want to learn a bit about Morse code and have a cheat sheet available.</p>
<p> </p>
<p><b>Additional Resources</b></p>
<p><b> </b></p>
<p>The online activist group known as Anonymous has posted a crowd-sourced document titled <a href="http://pastebin.com/9jJUku77" title="http://pastebin.com/9jJUku77">"20 Ways to Circumvent the Egyptians Governments' Internet Block"</a> that includes specific connectivity details like ham radio frequencies and ip addresses for social networking sites.</p>
<p><br/> <br/></p>
<p><a href="http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet">http://howto.wired.com/wiki/Communicate_if_Your_Government_Shuts_Off_Your_Internet</a></p>