THE CENTER FOR COPYRIGHT INTEGRITY
  • HOME
    • IP DATA
    • ABOUT CARRIE DEVORAH
  • (C)OPYRIGHT UNIVER$ITY
    • LAWYERS WHO USE LAW AS A CUDGEL
  • COPY.RIGHTs
    • COPYRIGHTS ARE OFTEN WRONGED >
      • "HAPPY BIRTHDAY TO YOU" DECISION SPELLS TROUBLE FOR ONLINERS CLAIMING PUBLIC DOMAIN AS THEIR OWN & PAIN FOR AUTHORS FIGHTING FOR THEIR BOOKS
      • HARPER LEE & THE MYSTERY OF HER NEWLY FOUND "GOLDEN GOOSE" TKAM
      • ENTREPRENEURSHIP ONLINE
      • TECHNOLOGY & LIFE >
        • POKEMON GO & CAMEL JOE ARE TWO OF A MARKETING KIND, almost
        • BILL COSBY, PEREZ HILTON, VENTURE CAPITALISTS & SAFE HARBOR
    • 2D IP (ARTS Intellectual Property) THEFT ONLINE >
      • SLAPP!!!!!!!!! SENATE CUFFS THE WRONG PEOPLE
      • SLATER'S SELFIE MONKEY SAGA
      • COPYRIGHT VIOLATIONS 101
    • ID (Identity) THEFT Online >
      • STOP IDENTITY THEFT ONLINE BY INVOKING CA Civil Code 3344-6
    • RIGHT OF PUBLICITY...... >
      • ALL IS FAIR IN SOCIAL MEDIA TO HOLD INTENTIONAL TENANT FRAUDSTERS TO TASK
      • REDSKINS & ETIQUETTE
    • FAIR USE? NOT WHEN TECH TAKES YOUR $$$
    • CHAFFEE AMENDMENT IS NOT ABOUT STEALING ARTS-iSTs BLIND
    • TECHNOLOGY & Regulations
    • PRIVACY ONLINE SEDUCED THE GREAT REVEAL
    • SECURITY ONLINE & OFF IS NOT SECURE >
      • OUR TAKEAWAY POST THE SAN BERNARDINO DISABILITY CENTER MURDERSge
      • THOUGHTS ON KEEPING THE LIFE LIGHTS ON IN THE FACE OF TERRORISM
      • WHAT TO DEMAND OF RESPONDERS POST PARIS
      • WHY BAD TERRORISM THINGS WILL CONTINUE TO HAPPEN TO INNOCENT PEOPLE
  • COPYRIGHT LAW TALKs
    • THE WHITE HOUSE 2016
    • THE WHITE HOUSE 2015 (July) -
    • The BERNE CONVENTION : Where America Joined Late >
      • TITLE XVII : The Founding Fathers Promise Of Property Rights
      • THE FOUNDING FATHERS America's Original Inventors & Entrepreneurs
      • MAGNA CARTA The GRANDMOTHER Of IP
    • INTERNATIONAL.EU COPYRIGHT CONVERSATIONS >
      • 1939 GERMANY WALTER HALLSTEIN WARNED
      • THE ROYALS
      • THE UK GOVERNMENT ASKED FOR COMMENTS SO I COMMENTED
      • THE VATICAN & ITS NEW FINANCIAL OIG RENEE BRUHOLDT
      • UNITED NATIONS
      • CHINA: ERIX CHEN
    • ICANN . IANA . WIPO >
      • THE DISASTER IMMINENT POST IANA TAKEN AWAY FROM US TAXPAYERS WHO PAID FOR IT
      • THE EZUBAO STORY THAT IS THE U.S. GOVERNMENT’s PROBLEM & ICANNs
      • ICANN JON POSTELs RFC REQUEST FOR COMMENTS - ETHICS >
        • DO THE ICANN-NOMINET NON-PROFIT DONATION MATH
        • ICANN . RFC Request For Comment
        • ICANN: PALESTINE COUNTRY CODE MEMO OF RULES
        • ICANN ASSIGNMENTS RFC 1060
        • PEOPLE WHO WORKED ON THE INTERNET RFC 1060
      • WIPO . CYBERSQUATTERS CAST THEIR VOTES
      • SANCTIONED BY THE U.S. BUT STILL DOING BUSINESS WITH ICANN
      • THE UNITED NATIONS, THE TALIBAN & THE IANA DECREE
      • GOOGLE is AMERICAs INTERNET ANTI-TRUST MONOPOLY SET UP TO BREAK DOWN THE WORLD
    • FCC . FTC .
    • RoC . USPTO Patents & Trademarks >
      • RACISM IS IN THE EYE OF THE USPTO EXAMINER:
    • SEC . FINRA . IP & ID +$ >
      • PRESIDENT OBAMA COMMUTATED LOW LEVEL CRIMINALS v WALL STREET NEVER JAILED
      • GIVE VIRGINIA FELONS RIGHT TO VOTE BECAUSE SEC "DISCIPLINED" (with no jail) KEEP THEIRs
      • WHY TRUMP SUPPORT OF FLORIDA AG PAM BONDI CONCERNS ME
      • HUSTLED BY FINRA OVER CLAIM OF DRS BEING FEDERAL ARBITRATION ACT COMPLIANT
      • THE POLICY OF PUBLIC FINANCIALS
      • THE FAILURE OF SUCCESS
      • MADOFF DID NOT... FINRA/NASD DID
      • BILL H.R. 1098 >
        • TERESA GUIDICE WENT TO JAIL, 45 PAGES OF WALL STREET “OTHERS” DID NOT
        • PRESIDENT WILSON SIGNED A SECRET CALLED THE FEDERAL RESERVE ACT…
        • DID GOVERNOR HOGAN PICK WHITE OVER LAW RIGHT IN THE ISSUE OF VOTES, CRIMES & FELONS?
        • SEC BARRING OF STEVEN A COHEN FOR 2 YRS IS PRIME EXAMPLE OF CONGRESSIONAL FIDUCIARY FAILURE LETTING WALL STREET WALK WHEN MAIN STREET GOES TO JAIL
        • YES KEVIN BACON, ELI WIESEL & OTHER HARMED INVESTORS, THERE ARE DEEP POCKETS... STILL >
          • & THIS BRAD PITT, ANSWERS YOU WHY THINGS AREN’T GOING TO CHANGE ON WALL STREET
        • SEC COMMENT: S7-18-15 >
          • THE SUPREMES GOT IT WRONG REJECTING BEBO v SEC
          • CLIFFNOTES ON FINRA, CONGRESS & DRS
        • OVERSIGHT COMMITTEE COMMENT: CONGRESS NEEDS TO SET “FIDUCIARY” DEFINITIONS ASIDE & PUT CONS THAT VIOLATE FIDUCIARY WHERE COPS CAN FIND THEM
        • A BIG DAY FOR CRIMINAL JUSTICE REFOMR THA T CAME & WENT UNNOTICED
        • FINRA RUSH TO THWART INVESTIGATION BURYING FINRA DRS IN FINRA REGULATION >
          • IF THE SEC ACT CITED ANTI-COMPETITION THEN....
          • FINRA CONNED BROKERS BELIEVING FINRA GRANTED S.R.O. STATUS NOT THE S.E.C. OR DID THEY
          • GO FUND ME, FINRA >
            • FINRA FORCED ARBITRATION OF INVESTORS IS UNLAWFUL & NOT IN ACCORDANCE WITH THE LAW CONGRESS WROTE >
              • WHY FINRA WANTS TO HIDE FINRA DRS IN FINRA REGULATION
      • WHEN CRIMINAL JUSTICE WILL HAPPEN.... REALLY
      • CONGRESS CREATED MADOFF >
        • SEC: DISCLOSURE COMMENTS
    • IRS
    • KEEPING Your (C) EYE ON CONGRESS >
      • GOVDELIVERY.com EMAILINGS on 12 . 4
      • SENATE: Keep Tabs On Senate 2D IP . ID . (C) . Commerce & Disability
      • JUDICIARY : Keep Tabs On Judiciary 2D IP . ID . (C) & Commerce
      • ENERGY + COMMERCE : Keep Tabs On E&C 2D IP . ID . (C) & Commerce >
        • CASHING IN ON HEALTHCARE.gov CLICKS
        • Energy & Commerce (Patent Troll) PATTERN AND PRACTICE
      • STATE SOVEREIGNTY AND IMMUNITY IN COPYRIGHT
  • ARCHIVE(s)
    • ARCHIVES: SEPTEMBER 2019 (transferred)
    • ARCHIVES: AUGUST 2019 (transferred)
    • ARCHIVE JULY 2019 (transfered)
    • ARCHIVES: JUNE 2019 (transfer)
    • ARCHIVES: MAY (Transferred) 2019
    • ARCHIVES: APRIL 2019 (transfered)
    • ARCHIVES: MARCH 2019 (transferred)
    • ARCHIVES: FEBRUARY 2019 (transferred)
    • ARCHIVE: JANUARY 2019 (transferred)
    • ARCHIVES: DECEMBER (transferred 2018)
    • ARCHIVES: NOVEMBER 2018 (transferred)
    • ARCHIVES: OCTOBER 2018 (transferred)
    • ARCHIVES: SEPTEMBER 2018 (transferred)
    • ARCHIVES: AUGUST (transferred) 2018
    • ARCHIVES: JULY (transferred) 2018
    • ARCHIVES: JUNE 2018 (transferred)
    • ARCHIVES: MAY II 2018 (transferred)
    • ARCHIVES: MAY I (Transfered) 2018
    • ARCHIVES: APRIL (Transferred) 2018
    • ARCHIVES: MARCH (Transferred) 2018
    • ARCHIVE: FEBRUARY (Transferred)2018
    • ARCHIVE: JANUARY 2018 (transferred)
    • ARCHIVE: DECEMBER (transferred)
    • ARCHIVES: NOVEMBER 2017 (transfered)
    • ARCHIVES: OCTOBER 2017
    • ARCHIVE: SEPTEMBER 2017
    • ARCHIVE: AUGUST 2017
    • ARCHIVE: JULY 2017
    • ARCHIVE: MAY 1/2017
    • ARCHIVE: APRIL 2017
    • ARCHIVE JANUARY 2017
    • ARCHIVE OCTOBER 2016
    • ARCHIVE AUGUST 2016
    • ARCHIVE JULY 2016
    • ARCHIVE MARCH 2016 -
    • ARCHIVE JANUARY 2016
    • ARCHIVE JUNE 2014 (a)
    • ARCHIVE JUNE 2014 (b)
    • ARCHIVE JUNE 2014 (b)
    • ARCHIVE JUNE 2014 (c)
    • ARCHIVE JUNE 2014 (d)
    • ARCHIVE JUNE 2014 (e)
    • ARCHIIVE OCTOBER 2015
    • ARCHIVE JANUARY 2015
    • ARCHIVE AUGUST 2015
    • ARCHIVE * MAY 2014
    • ARCHIVE * MARCH 2014
    • ARCHIVE * JANUARY 2014
    • ARCHIVE 2013 - 6/2014
    • ARCHIVE 2013 >
      • ARCHIVE 2013 (a)
      • ARCHIVE 2013 (b)
      • ARCHIVE 2013 (c)
      • ARCHIVE 2013 (d)
Distinguished Toastmaster
BUSINESS & BRANDING COACH . LIFE & LEADERSHIP STRATEGIST MOTIVATIONAL SPEAKER SERVING ENTREPRENEURS &
MAIN STREET

PRIVACY ONLINE SEDUCED THE GREAT REVEAL   [ You Are On This CLICKs Page ]

INDEX :
  • READOUT OF THE PRESIDENT'S MEETING WITH CEOS :
  • ON THIS DAY OF INTROSPECTION A Thought (c) Carrie Devorah
  • GOOGLE THIS Lawsuits Against Googles Adwords For Advertising Practices (c) Carrie Devorah
  • SOUNDBYTES ALERT (c) Carrie Devorah
  • SOCIAL-EASE (c) Carrie Devorah
  • WHAT HATH PEER 2 PEER WROUGHT (c) Carrie Devorah
  • DID YOU KNOW HEART DEVICES CAN BE HACKED? WELL YOU DO NOW (c)
  • Carrie Devorah :CONGRESSMAN MORANs CONSTITUENTS ARE BEING PING-POCKETED BY DC (c) Carrie Devorah
  • LEARNING ONLINE CAN BE OFF THE RECORD OR SHOCKINGLY OFF THE WALL (c) Carrie Devorah
  • TECH@STATE - YOUR ISP IS FOR SALE or RENT or WHATEVER THE UNKNOWN USER WILL DO (c) Carrie Devorah
  • DO YOU KNOW WHERE YOU ARE? YOU SHOULD BECAUSE EVERYONE ELSE DOES (c) Carrie Devorah

_______________________________________________________
READOUT OF THE PRESIDENT'S MEETING WITH CEOS :
_______________________________________________________

THE WHITE HOUSE Office of the Press Secretary

December 17, 2013

Readout of the President’s Meeting with CEOs

Today, the President and the Vice President met with executives from leading tech companies in the Roosevelt Room. The group discussed a number of issues of shared importance to the federal government and the tech sector, including the progress being made to improve performance and capacity issues with HeathCare.Gov.  The President also announced that Kurt DelBene, who most recently served as president of the Microsoft Office Division, will succeed Jeff Zients as Senior Advisor to Secretary Sebelius who will lead our ongoing efforts to improve HealthCare.gov and the Health Insurance Marketplace starting this Wednesday. The group discussed the challenges surround federal IT procurement. The President made clear his continued focus on improving the way we deliver technology to maximize innovation, efficiency and customer service, and encouraged the CEOs to continue to share their ideas on how to do so.  Finally, the group discussed the national security and economic impacts of unauthorized intelligence disclosures.  This was an opportunity for the President to hear from CEOs directly as we near completion of our review of signals intelligence programs, building on the feedback we’ve received from the private sector in recent weeks and months.  The President made clear his belief in an open, free, and innovative internet and listened to the group’s concerns and recommendations, and made clear that we will consider their input as well as the input of other outside stakeholders as we finalize our review of signals intelligence programs.

 

________________________________________________________
ON THIS DAY OF INTROSPECTION A Thought (c) Carrie Devorah :
________________________________________________________

It is a day to reflect in more ways than one, about life, death and privacy. It is a day for Government to stand back and ask “What Hath We Wrought.” It is a day for legislators to look inside, the halls of Congress that is, to even ask who, if any know their lair well enough to state within seconds of this question being asked where those exact words are posted. My guess? Few if, to none. Pizza party in the Longworth Caf if I am wrong. SECONDS. That is my determinant in that one would expect history to be core to decisions that impact worlds, apart and near, decisions that are legislated on that should have no need for clawback as we are seeing effect after Congressional Causation.

English? Courtland reporter Charlotte Alter wrote a summary on Circuit Judge Jay Bybee agreeing that Google, as I had written the words, is Rocking The Rico. Street View by Google is a Data Grab, officially, in violation of the Wiretap Act, setting boundaries for Privacy Protection, as Alter wrote “whether or not the network is secure.”

Bybee refused, repeat, REFUSED, to dismiss the collective suit(s) against Google’s collecting of Emails, User Names, Passwords and other data from personal Wi-Fi networks while collecting photos for its popular Street View feature.” Now, let me be honest here, the plethora of private data on the Internet is a double edged sword, I dance on while doing papertrails. For good, for bad, the info is out there in ways people haven’t a clue is coming back to bite them in the behind.

All those CASH ONLY businesses? Online, reported in sites like YELP where customer experience is King, making this world no longer a place Tax Dodges can hide behind. Cities going bust? GO ONLINE and search zipcodes and cash and turn your investigators out to bring ‘dem doggies home. Doing a skip trace? If one is smart enough… takes seconds online. Back to Google Street view? That adress a fancy posh advisor gives as a work adress sort of looks an awful lot like a private home in a well heeled adress. Thank you, Street View.

That said, there is everything right with being an old fashioned gumshoe and celebrating Bybee’s decision in that it aught to and better shake the Judiciary as it moves forward Legislating matters Google is pushing for …. MORE FREE DATA ALREADY IN VIOLATION OF FAIR USE & SAFE HARBOR.

Google’s, AOLs, Yahoo!s models are built on the backs of starving 2D ARTS IP and on the ID of the everyday person. AND on the images of the dead and unprotected. NO ONE has the rights to the images of the dead from 9-11, the murdered from the streets of Syria except their families who, considering Models must sign releases & waivers, should have Releases & Waivers signed, too, once the News event has come and been reported after all there must be balance in order for news to be covered AND for the Right to Data, the Right of Publicity to be respected.

Call it the adult version of the childhood game “MOTHER, MAY I?” Etiquette. Privacy, the same privacy Google exec Eric Schmidt requires lovers to sign on the dotted line for…. The right to decide if someone wants to continue to speak out for Loss From Terrorism as has Debra Burlingame or the decision to be silent and fight back each time a loved one’s image is used without permission, almost a second job along with all the other patrolling one must do to protect our murdered. My brother was murdered by terrorists. I continue to stand against charities using his name without permission or acknowledgement of his seven orphans.

Without etiquette or respect, what is America…… Atlantis waiting to sink

Judge Bybee? Politics aside, standing up for Privacy in a Technological age, YOU are 2D ARTS IPs Newest ROCKSTAR!!!!

So Congress- within FIVE minutes of receiving this- the first House staff CORRECTLY identifying the answer…. Pizza on me for the office…..


________________________________________________________
GOOGLE THIS Lawsuits Against Googles Adwords For Advertising Practices (c) Carrie Devorah :
________________________________________________________

Google Adwords has lawsuits against it by advertisers alleging CLICK FRAUD on behalf of GOOGLE possibly making the Internet Giant the next stop 4 Legislators looking in2 FACEBOOK privacy issues.

Advertisers complain of issues including but not limited 2 finding their credit cards are being OVERCHARGED even though setting a budget for CLICKS only 2 have that budget reset NOT by the advertiser then discovering increasing charges on their Credit Cards a matter the card companies recommends resolving warning the advertisers that  Card Holders GOOGLE will get their demanded payment- justified or not- from the Card Holder & the Googles Adwords client. Back in 2006 GOOGLE settled paying $90 million 2 advertisers who complained about being overcharged for online ads.

The settlement was paid in advertising credits to online retailers and other advertisers.GOOGLE settled a second suit for $20mil http://www.lawyersandsettlements.com/settlements/13311/google-class-action-lawsuit-adwords.html

________________________________________________________
SOUNDBYTES ALERT (c) Carrie Devorah :
________________________________________________________

“macfee has over 75 million malicious malware captured”  “the cloud is not secure” “going mobile in an unsecure world 2011 some of the known hacked are Google Sony Visa  Adida Mitsubishi. What is scary is all the hackings that are NOT known” “If people are involved we are sure to almost 1 there are vulnerabilities and it is not secure” “ anything done at cyber is at 100% visibility” “key thing in information sharing that gets misunderstood is that we are not talking about taking personal emails and giving them to the government” “the theft of intellectual property is astounding & we have to put a stop to that” – GENERAL KEITH ALEXANDER   DOD  NSA  @ AEI July 9 the day the Malicious malaware the government has known about for years was alerted to explode. The FBI requested citizens to CLICK a link that would alert RED or GREEN if the PC was infected or not. Shades of Eleanor Roosevelt hyping the Census before D DAY (stay tuned for my ebook)

________________________________________________________
SOCIAL-EASE (c) Carrie Devorah :
________________________________________________________

Seems the SOCIAL NETWORKING WORLD has redescribed "technical difficulties" as "server outages," that knocked Netflix Instagram & Pinterest offline & the over 6 mil affected out of the loop for SOCIAL MEDIA DAY

________________________________________________________
WHAT HATH PEER 2 PEER WROUGHT (c) Carrie Devorah :
________________________________________________________

Technology brings advances by the minute. Law does not keep abreast of the changes BUT using technology for the bad does. In June, Time Magazine published an article on CAR SHARING NETWORKS such as RELAY RIDES allowing people to rent their rides out by the hour backed by about $13mil from “the likes of GOOGLE and GM”. People hand car keys over to strangers for QUICK CASH?  Car owners hand over their keys for $5-$20 an hour- 15% is for hourly fee: 20% is for insurance: 65% goes to the car owner. Membership service coordinates payment and logistics online. RELAY RIDES runs a driving-record check. No word on Background Checks. LEST WE FORGET…. Before there were TERRORISTS WHO FLEW PLANES there was a truck bomb…North Tower… World Trade Center 1993

________________________________________________________
DID YOU KNOW HEART DEVICES CAN BE HACKED? WELL YOU DO NOW (c) Carrie Devorah :
________________________________________________________

Here you go, Congressional Privacy Caucus. Put this on your ASAP shortlist to call before you on Capitol Hill…… Who owns their own medical data? Is it considered Intellectual Property? Identity? Is anyone profiting from someone elses medical whatever owing them commerce in any way, shape or form? He had, obits say, a flair for showmanship. Obit? Yes, he died. Circumstances not yet known. At home. That is how the world now knows more globally what he did which may eclipse knowing who he was.

We probably only now of this because the thirty six year old who made it his life ambition to teach people how to hack died, causes unknown. He said, only to get manufacturers to get off their duffs and adress fixes that should and could be implemented. Barnaby’s most recent talk was to focus on  “Implantable Medical Devices: Hacking Humans,”  during which Jack planned to reveal software using “a common transmitter to scan for and “interrogate” individual medical implants” according to the Black Hat synopsis of Jack’s talk posted to the conference website, the premise of “Homeland” during which terrorists kill the Vice President by hacking into his heart device. Jack was letting it be known he had a way that manufacturers could improve the security of these type devices. Interesting how Jack died so soon after Google's Eric Schmidt announced he plans on implanting chips in people's brains and that soon American armies will be robots not people... got to make one wonder who is fast tracking ideas to Hollywood as scripts for intended summer blockbusters.

Barnaby Jack spoke at Black Hat conferences. Black Hat released the statement “Barnaby had the ability to take complex technology and intricate research and make it tangible and accessible for everyone to learn and grow from.” Barnaby Jack worked for computer security firm IOActive, Inc.

Barnaby Jack, most likely nicknamed so for his New Zealander roots, would go around and give his version of TED talks. His talk was called JACKSPOTTING ATMs addressing how ATM machines could be hacked remotely. Barnaby said he held back on the actual HOW TO HACK AN ATM. His religion was the WORD to manufacturers- ATMs will be hacked remotely so stop it by putting the fixes in.

It seems Barnaby figured out the Achilles heel of ATM machines was how their Makers talked on the Internet to the Machine.

Seems it was an accidental discovery for Barnaby when he was taking apart an ATM he bought on line. Doesn’t everybody do that, buy an ATM on line. Well, Barnaby did. He learned the key from his home ATM. Most people use parents pockets for unceasing cash requests but with Barnaby’s mom at home in NZ it is plausible to understand his desire for a home machine. Barnaby had already, it seems, figured out how to hack the ATMs remotely but a whole new bag of tricks came when his ATM arrived. It has a key. Wouldn’t you know it, Barnaby took the time to try his ATM key on other ATMs from the same manufacturer and, it worked. His key unlocked the ATM compartment in to which he could slip a UBS which just happened to have on it the command telling the ATM to dump its vaults, as the expression goes.

Between you and me, someone doing that same command from the street side of the ATM would be a thief  and pursued as such but in the world of hacking, someone doing that from the backside who decideds to anoint themselves with “I am doing this for the betterment of society’ is glorified rather than pursued with a charge of attempted thievery.

While the world is worried about NSA and Snowden who is giving clearer impressions he was America’s gift to Russia, the world and legislators should be worried about people like Jack who think about ways to break in to Everyday People’s lives. Jennifer Steffens, CEO of where Barnaby Jack worked, said his colleagues will continue his work. All the free people care to know is HOW long did she know this could be done and has she been contacted by government in any way good or bad? And is remote medical device hacking a cost or deduction under Obamacare…..


________________________________________________________
CONGRESSMAN MORANs CONSTITUENTS ARE BEING PING-POCKETED BY DC (c) Carrie Devorah :
________________________________________________________

Jim’s Crystal City is getting Ping Pocketed by DC. In all fairness to Jim, he probably doesn’t know Arlington taxes are crossing the Potomac each time a Sprint or other cell carrier is being paid. But they are.

In all fairness most customers don’t either unless they look past the DUE amount and read the surcharges. In all fairness, most customers don’t read the surcharges on their Telecom bills. Not only is it painful to shell out more money for reasons unexplained or necessary in light of Obamaphones being distributed to persons who at times get multiples they ‘fair-share’ maybe even sell but for sure support Carlos Slim whose wallet is getting fatter one Obamaphone at a time.

What is sure is this? One constituent of Jim’s caught the Tax Theft to DC and got back $13.20 of a $69.20 ‘surcharge’ which included DC, the District of Columbia in the wrap up.

IF YOU CAN FIND Sprint Surcharges where they are hidden under “Details” and if the link is clicked, the consumer Sprint’s Monthly statement reads: “Sprint Surcharges are rates we choose to collect from you to help defray costs imposed on us. Surcharges are not taxes on you or amounts we are required to collect from you by law. Surcharges, other charges incurred to recover costs associated with governmental programs and certain taxes associated with government programs and certain taxes imposed upon Sprint. The amounts and certain taxes associated with governmental programs, and certain taxes imposed upon Sprint. The amounts and the components used to calculate Surcharge amounts are subject to change. Federal-Univ Serv Assess LD Federal-Univ Serv Assess Non-LD District of Columbia State-911
Surcharge District of Columbia State-Telecom Serv Tax Administrative Charge Regulatory Charge
TOTAL DUE [ make a payment ]

No wonder this crucial bill segment is hidden. “…rates WE CHOOSE to collect…” “…to help defray costs imposed on us…” “… other charges incurred to recover costs…” “…associated with governmental programs…” “…. Certain taxes associated with government programs…”

Need more be said…. Actually, yes….

Sprint Corporation (S) -NYSE
Prev Close: 7.01
Open: 7.07
Bid: 6.99 x 6600
Ask: 7.00 x 23000
1y Target Est: 7.28
Beta: N/A
Next Earnings Date: 21-Oct-13S Earnings announcement
Day’s Range: 6.96 – 7.10
52wk Range: 5.61 – 7.26
Volume: 7,669,265
Avg Vol (3m): 42,562,600
Market Cap: 21.15B
P/E (ttm): N/A
EPS (ttm): -1.44
Div & Yield: N/A

Its not about Customers, its about bottom lines. Sprint’s has been saggin’ a while. And the District’s? Well,…. cant say anymore about how sad the Seat of Government has become with one Legislator crisis after another.

The explanation from Sprint was, well, should have been a Jay Leno intro… “Did you hear the one about the Arlington taxes that crossed the Potomac into Vince Gray’s constituency? Just like his shadow campaign… now you see the taxes in DC and now you don’t see them in Virginia…”

Sprint Customer Service Person #1 gave was the signal searches for a tower to PING from. Since Arlington is close to DC, given the choice of towers, the signal PING’d DC’s. Grin. I have a bridge in Brooklyn I can sell you. Sprint states it doesn’t profit from PING taxes on cell phone bills. Sprint says the Tax money flows through to DC. Arlington County Virginia has 220,565 residents. Crystal City has around 11,000 residents and approxiametly 30,000 transient workers. Adressing the telecom carrier Sprint only at this time, this is potentially alot of revenue lost to Virginia, no telling how far back the river jumping of Tax Dollars to DC has been going on.

Is this JUST a Virginia/DC issue. Most likely not. Is it a tower issue? Most likely not. Is it just an America problem? Not in a global economy with Markets & Mergers happening as quick as a blink of an eye. It is an everywhere problem of lack of oversight all the way down from Congress to the Constituent.

How would a legislator or local BID or mayor find out if their tax dollars are being PING POCKETED by telecom carriers or other jurisdictions?

Simple.

A- Random sampling & B- Approach & C- Determination A(i) Pick 3-9 residents in each of your jurisdictions A(ii)Determine where the Cell Towers are in your jurisdiction A(iii) Determine where the Cell Towers are in your bordering jurisdictions

B(i) Annoint your 3-9 Constituents “rockstars” B(ii) Your “Rockstars” will provide you their cell phone bill SURCHARGE SECTION for a period of (moving forward) 6 months B(iii) Your “Rockstars” will provide you their cell phone bill SURCHARGE SECTION for a period of (moving backward) 6 months, if needed 12 months, if needed 18 months (you get the point. Bills go back without charge for 18 months)

C(i) If determining your Constituents tax monies have been passed forward to another jurisdiction, you will connect to that jurisdiction to determine if they are losing tax dollars too
C(ii) Reach across the state line to others to determine Patterns (call me but not on your land line to lay this out for you…wink… Sprint makes big bank on land to cell calls racking up overage charges in no time at all)

D(i) Call for Congressional Oversight by the FCC and the Energy & Commerce Committee D(ii) Make sure EACH AND EVERY TAX DOLLAR overcharged to another District, county or state goes Directly back to the Consumer. NO. Lawyers are not needed neither are class action suits

E- for edification sake, ask your constituents E(i) do they receive their monthly statement by mail or by email
E(ii) do they read their monthly statement cover to cover (determined if is a snail mail bill or an email) E(iii) do they read their email bill or just follow the Payment Prompts and pay without reading the small print E(iv) have they ever read their online bill from beginning to end
E(v) do they want a simpler one page bill online or did they like it better when the bills came by mail…. (rooting for the USPS)

F- thank your “rockstars” publicly- McDonalds, anyone?

Legislators, just don’t get caught with your pants down getting PING POCKETED…. again


________________________________________________________
LEARNING ONLINE CAN BE OFF THE RECORD OR SHOCKINGLY OFF THE WALL (c) Carrie Devorah :
________________________________________________________

Bookbags, once a test of someone’s fortitude, are lighter holding iPads and Tablets instead of a multitude of books. Coincidentally, YAHOO has withdrawn telecommuting, as a work option from employees.

A year plus after, the House Commerce, Manufacturing and Trade Subcommittee debated Federal Trade Commission recommendations by the that Web firms get permissions from parents to collect information on children under the age of 13, News Corp has introduced their 10” $299 AMPLIFY tablet at SouthbySouthWest conference in Austin Texas, a tablet which comes with software for teachers to WATCH EACH STUDENTS ACTIVITIES runs on a school’s wireless Internet system, taking Instant Polls  & giving students ANONYMOUS quizzes to get a sense of the students understanding. The question of a child’s privacy, though being debated on the Hill, seems to be unadressed or ignored, here.

Kathryn Montgomery, a professor of communications at American University said “Developments are happening so quickly in the digital marketing industry that many of the new techniques may be escaping scrutiny.” Montgomery is known for her contribution to the 1998 COPPA law, an effort  to adress this issue.

Reps. Ed Markey (D-Mass.) and Joe Barton (R-Tex.) proposed legislature to prevent the tracking of children online. Companies spoke out against the law that requires an eraser button for children’s information. The companies said a Data Erasure button would be hard to pull off technologically.

The FTC had recommended companies must first get parents’ permission to collect data on a child’s geo-location. Geo-location data gathering isa practice used by Web giants Google, Facebook and other firms. The FTC parental consent must be given before websites track children online through cookies and other technologies for purposes outside the operations of the Web site, along with permission for gathering photos and videos that identify a child. Rupert is hoping his tablets will be in classes come Fall, setting the trend for other platforms Schools should consider. Newscorp executive Joel Klein, formerly chief of NY City schools says technology is changing education by helping teachers manage classrooms.

Google, infamous for archiving PRIVATE DATA eternally, has partnered with over 2000K schools, over 20 million students using them. AP, advanced placement, and NWP, National Writing Project, classrooms are already using some form of Tablet. 4 out of 10 students are using them. Proponents are doing the math. 6 out of 10 students aren’t using them translating in to Room For Growth. NYC named the Nanny State for its position on Soda Size, says Tablets would save NY the over $100 million a year that textbooks cost the Big Apple. LA has set aside over $500 million to start by students Tablet. McAllen Texas distributed over 6800 Apple tablets at a cost of $20.5 million.  Eanes Independent School District is distributing iPads, at a cost of $1.2 million, from K-12. Chromebooks has not addressing their invading PRIVACY OF CHILDREN.

Rep. Bill Cassidy (R-La.), said he feels ‘unempowered’ when talking about his daughter possibly accessing an application his teenage son may have downloaded. Cassidy stated the obvious that a parent can monitor a Television show their child is watching but a seemingly age appropriate App “takes you places that look very different.” Apple, through its devices and iTunes stores, collects information about users’ buying habits and location. Google gathers user information to serve up customized ads. Parental concerns about online privacy as students spend more and more time online at school are vindicated. 

Under the radar is what is being taught to students. The Daily Caller reported on a Lumberton High School World Geography teacher told students she was told to change the students perception of ISLAM and teach terrorists are Freedom Fighters using CSCOPE http://www.cscope.us/ an online K-12 curriculum. School girls were told to put on burqas. Class ended with students being told to write a paper “how Egypt was a good country until democracy took over then corrected when the Muslim Brotherhood came in to power.”

CSCOPE curriculum has taught Christianity is a cult paralleling death and insurrection in the story of Osiris, Egyptian God of the Dead. A prior CSCOPE lesson was the Boston Tea Party was an act of Terrorism. CSCOPE calls Republicans lovers of Bug Business Over Labor Unions. Democrats are described to spend more tax dollars on education to benefits each individual. Even calling Nazism ‘conservative.’ http://www.cscope.us/faq.html

The reality is with online schooling, as with online contracts, data changes rapidly ,at will of the company, and often rarely being noticed, let alone caught. The case for digital textbooks is being made, whether or not parents like it OR until Parents Seeking Child Privacy speak up. VERY LOUDLY!

________________________________________________________
TECH@STATE - YOUR ISP IS FOR SALE or RENT or WHATEVER THE UNKNOWN USER WILL DO (c) Carrie Devorah :
________________________________________________________

The emerging agenda of the US Copyright Office is to whore out Copyrights, limit the Freedoms of Copyright owners and traffic Creative works to drum up some green, it seems. The Copyright Office is the only profitable government agency I hear. Makes Government sense to vulture off the dreams of citizens seeking to make livings in a downward spiraling economy. So when I received notice of TECH@STATE at GW, an annual initiative set in play by former Secretary of State Hillary Clinton, I signed up.

I am happy I did.

I was known as the hardest working photographer in DC when I covered the White House, the Hill and places in between. Sometimes my image seeking, ended me up in places I sometimes wondered why am I here only to find out later, why. TECH@STATE turned out to be one of those lightbulb moments. I was meant to be at TECH@STATE to connect dots people would not otherwise know about. Or connect to in a world of Rapid Fire Remarks.

TECH@STATE was an initiative of the US Department of States OFFICE OF E DIPLOMACY. TECH@STATE was the offices 10th event. The event was presented in conjunction with the GLOBAL INTERNET FREEDOM and HUMAN RIGHTS DISTINGUISHED SPEAKER series held by GEORGE WASHINGTON UNIVERSITY  LAW SCHOOL. The ‘sell sheet’ said “TECH@STATE:INTERNET FREEDOM will examine the techniques and methods that can be used to enhance and expand Internet Freedom,” all well and good to read until I saw who the Keynote Adress was from, my BBF (not) ANDREW McLAUGHLIN. Andrew is the former DEPUTY CHIEF TECHNOLOGY OFFICER  of the UNITED STATES 2009-2011. Yes, Andrew helped move BO & MO into the WHITE HOUSE with an incredibly slick and greased Technological takeover that, hats off, left behind in the dust the GOP (does make one think GULP doesn’t it)

Plenary panels filled the rest of the morning, broken up with coffee, cookie, apple & banana breaks. Following the Modus Operandi was the IGNITE sessions except there was no Lottery Prize to be voted on by VC Venture Capital guys. Seems the cash was already all in. It was the themes that began to make me realize, I was not in Political Kansas anymore. The thread that tied the presenters together was Freedom USING THE INTERNET to spark and incite and get data in and out. Listen, as a Holocaust loser of family, I am conflicted knowing the cost of not getting the word out AND of getting the word out but not being able to get people to see the cost to life & soul, but I understood, RAPIDLY, this was not about getting the word out THIS Internet Freedom was about getting the word OR as it is in technology getting the WORMS in. One panelist, a homie, sounded the alarm to the days attendees still warming the seats (as with most events, once the brightest bulb in the pack leaves so do they) this is dangerous what they are doing. I heard him. I didn’t get the sense others were really listening to his reality check that ONCE YOU LET THE GENIE OUT OF THE BOTTLE IT IS HARD TO GET BACK IN.

Did I realize the SOS the panelist from TO was sounding? As I looked around the room, yes. I didn’t see traditional media. I saw his warning loud and clear. I saw VOA Voice of America. I didn’t see Fox or Greta or Sean or Bill. I didn’t see scrubbed young conservatives with pearls and/or bowties. What I saw? Let me tell you about after lunch. OMG. Enough to make me collapse in exhaustion and not stay for the Grip & Greet with “leading experts in Internet Freedom.”

The IGNITE presenters were DIGITAL DEFENDER PARTNERSHIPS, STATE OF INTERNET FREEDOM, LOCAL VIRTUAL ASSEMBLY: THE IMPLICATIONS OF MESH-NETWORKING IN RESTRICTED ENVIRONMENTS and LANTERN: INTERNET FREEDOM BY DESIGN. Adam Fisks logo, a lantern, was my WHOA factor. Shades of the Underground Railroad. If I had not clued in before I was clued in now. This forum was not about protecting copyrights, although STAVROS LAMBRIDINIS gave a wake up factor to how the EU is now approaching IP in the OPEN WORLD. Stavros says the EU is now banking on FREEDOM OF EXPRESSION something I stand for with my God project GOD IN THE TEMPLES OF GOVERNMENT, mission statement FREEDOM OF ARTISTIC EXPRESSION. Stavros says IP is a Human Right. Spot On. But there we part company. Stavros says IP is under the perview of Human Trafficking. It is in a unique way. But….

The kitser, nexus, of TECH@STATE emerged in the Breakout Sessions. INTERNET GOVERNANCE FOR TECHIES, the FUTURE OF ADVOCACY, NEXT GENERATION Anti-Censorship TOOLs….

Ian Schuler founder of NEW RIGHTS GROUP moderated the panel. Roger Dingledine, project leader/director/researcher of THE TOR PROJECT sat on the panel along with Doug Tygar of Berkleys Computer Science and Information Management and James Vasile director of Open Internet Tools Project. Description “Anti-censorship tools have become increasingly popular and as a result are being overwhelmed by demand. Online bottlenecks slow the tools and often make them inaccessible. At the same time, the technologies of internet repression, monitoring and control continue to advance and spread as the tools that oppressive governments use to restrict internet access and to track citizen online activities grow more sophisticated. Sophisticated, secure and scalable technologies are needed to continue to advance internet freedom. This panel will focus on enhancements and improvements to anti censorship tools and how they can be employed to help provide secure and unrestricted internet access to all citizens….” The other option was INTERNET GOVERNANCE FOR TECHIES.

And then…. I got it. I looked around the room. I looked at the panel and yes, I asked a question prefaced with “I am shocked at what I just heard you are willing to sacrifice Americans to overthrow a regime.” TECH@STATE, Hillary Clinton’s initiative, wasn’t about copyright at all. It is about the cyber work, hacking, that STATE encourages to upset foreign regimes. Benghazi is nothing compared to what is at risk here. Yes, for all the rumors I had dispensed of, the truth was here and now. The administration’s relationship with technological giants, the uprising in public squares in Middle East countries isn’t untouched or unprovoked by American hands. THE TOR PROJECT founder laid out clearly the goal of TOR is to facilitate 3000 subversives in foreign governments get information in and out mitigating their loss of life but at a cost in that VOLUNTEERS, knowing or unknowing, were loaning their IPS the TOR (and other groups) were converting through multiple switches that flipped to disguise the ‘speaker’, the source, the subversive. Volunteers knowingly offer up their IPs. It’s the innocent visitor that becomes the sacrificial lamb of sorts not knowing their IP has been ‘loaned,’ conscripted by   project coordinators to use for their end goal. There is no coincidence in groups like Hop The Fence attending the event. This is our STATE DEPARTMENT dollars at work.


The reality is, TOR’s founder admitted, is that TOR and other groups that facilitate STATE never really know WHO they presumed subversive is in that identities are not revealed. For all they know, TOR and groups like it maybe working with the regimes themselves, unwittingly. I’ve seen this movie before. It never ends well. The race, though, this stunned me, the TOR and other panelists are sharing in, they blatantly call an ARMS RACE. I read the news. Geez louise. It is a NUCLEAR arms race with, not 3000 subversive lives at risk but all of America- a game being played in hotspots like Sunnyvale California and elsewhere. This isn’t a game. It is real life. The war being fought isn’t just on foreign shores with guns and boats. It is a cyberwar being fought in basements and garages in America. And we will never know who the enemy is. It may be the nice lady next door or the granny wearing pink. Or the kid who got turned down by the girl of his dreams. The terrorist’s tool of choice is no longer the gun or PC.

The terrorists tool of choice may be the Cyber Network set up for one intention by STATES hackers who then turn those skills on us. There is no doubt that American companies activity in foreign countries has weight in cyberwarfare. Jean Case runs the Case Foundation with her husband Steve Case of AOL. A few years back Steve Case’s wife hosted a program at the US Chamber of Commerce on H Street in downtown DC. Sometimes links illustrate louder than words http://www.casefoundation.org/search/site/israel Middle Eastern countries were represented, all except Israel, that is. Jean Case is an activist for Philanthoactivism. http://www.philanthrocapitalism.net/tag/jean-case/ Intel, Cisco and other technological giants announced their work to help employ youth in the West Bank, the Soros Economic Development Fund, Skoll Foundation , the European Investment bank, Aspen Institute, USAID, Cisco, Intel, Microsoft, Google to name a few, joined with the US-Palestine Development Fund http://casefoundation.org/pressroom/releases/leading-investors-announce-commitments-palestinian-technology-venture-fund .  Case was asked by then U.S. Secretary of State Condi Rice to serve as a co-chair of the U.S.-Palestinian Partnership to promote economic opportunity for the Palestinian people, prepare Palestinian youth for the responsibilities of citizenship and good governance, and marshal new private investment in the West Bank. http://www.solelstrategicgroup.com/Articles/Foreign_Policy_Conflict_Management/isrlpal_aspen_magazine.pdf The information overload is conceptually conflicting.

Terrorism is no longer a single enemy.

Everyone in the social networking age is an enemy or complicit- knowingly or unknowingly as the world connects ‘on the go.’ Marketing of this season’s PDA of choice …. your cell phone… a walk by, a call is being pushed in more ways than one … …. and….. BOOM…

________________________________________________________
DO YOU KNOW WHERE YOU ARE? YOU SHOULD BECAUSE EVERYONE ELSE DOES (c) Carrie Devorah :
________________________________________________________

Google is rocking RICO, potentially, as are other Search Engines and ISPs. One would think Metallica’s suit citing RICO in 2000 versus Napster also naming several universities in the suit claiming the universities violated Metallica’s music copyright by students illegally file sharing Metallica songs via Napster access through university servers would be lesson enough for Congress to get it that Fair Use does not constitute a defense against copyright infringement.

Used to be telephone calls routed through a telephone company had implications on Fraud conducted through the wires. ID theft alone climaxes, annually, way above 1.9 million…Fair Use? Safe Habor? Theft is theft. Wires? Fibres? Whats the diff when it come
s to Theft by Techno Titan? Congress is moving to slow in its efforts to get ahead of the Copyright Identity and Intellectual Property Ball to stop it in its tracks. One would think the news of Legislators and Staffers  Information stored in someplace you don’t know waiting for another Snowden to happen is lesson enough to learn Aesop’s Fable of the Scorpion and the Fox (www.youtube.com/watch?v=O2cu5HauS1E)

But, gosh darn, if Ben Franklin didn’t it right hundreds of years ago. The Founding Father didn’t need to know about Google. Ben Franklin knew about people. “They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.”

18 USC § 1343 – Fraud by wire, radio, or television “ Whoever, having devised or intending to devise any scheme or artifice to defraud, or for obtaining money or property by means of false or fraudulent pretenses, representations, or promises, transmits or causes to be transmitted by means of wire, radio, or television communication in interstate or foreign commerce, any writings, signs, signals, pictures, or sounds for the purpose of executing such scheme or artifice, shall be fined under this title or imprisoned not more than 20 years, or both. If the violation occurs in relation to, or involving any benefit authorized, transported, transmitted, transferred, disbursed, or paid in connection with, a presidentially declared major disaster or emergency (as those terms are defined in section 102 of the Robert T. Stafford Disaster Relief and Emergency Assistance Act (42 U.S.C. 5122), or affects a financial institution, such person shall be fined not more than $1,000,000 or imprisoned not more than 30 years, or both…”

Google didn’t tell people in 1979, the Master Plan was to capture people’s Identity, Property and the People’s ways to make a living or that Google intended to talk about putting chips in peoples brains and such. In 1979, Google said in a court case “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” The Court said people’s communications are processed by the recipient’s ECS, electronic communication service, provider in the course of delivery.

Consumer Watchdog director John Simpson says “Google has finally admitted they don’t respect privacy. People should take them at their word; if you care about your email correspondents’ privacy don’t use Gmail.” Courts explained in using the telephone, a person “voluntarily convey(s) numerical information to the telephone company and ‘expose(s)’ that information to its equipment in the ordinary course of business.” The difference between the phone and the Internet is that while a person conveys their email adress to the Search Engine and ISP, while THAT information is being exposed voluntarily the expectation was not their written content and attachments were being exposed then taken for profit making.

A four year old “WATCH THIS alert” revived on the Internet is making Email Rounds again. The warning focuses on Privacy Loss and Risk of Cell personal pics sent from a Cell Phone. SNOPES the online “rumor has it’ detective (www.snopes.com) confirmed it is true that Cell phone and PDA photos posted online give your life away. The security alert focuses consumers on disengaging automatic geotagging information, included in cell phone pictures, that once sent then posted online, can have the geotagging data in the photos read by anyone. Even criminals. Even Search Engines and ISPs who bundle and sell users, human trafficking, to sites like dating websites, www.spokeo.com ‘like and others. Hear anything about the vascular bump in Identity Theft recently? Javelin Strategies released their “2013 IDENTITY FRAUD REPORT: Data Breaches Becoming a Treasure Trove for Fraudsters” (www.javelinstrategy.com/brochure/276) Now you have a bit of an insight where the ID Bump is happening, lightning fast on a curve up, as the lure for Capitol invested into software and Jump-On-Board-Free-Apps startups are hitting their stride for Venture Capitalists and Investors. You also know another piece of technology’s Bigger Picture like why newer technology like Smartphones are coming without removable backs. The big bad VOODOO DADDY want to know where you are always. Identity Fraud is going to continue to increase.

Geotagging should scare consumers, globally.

A person’s identity that used to be given away in the malls for that chance to win that Brand New Car or two week free gym membership. My, from Mall to Mobile, how advertising has changed. Not! Its all about data capture. The high price for free e-books, free APPS is that photos of Johnny and Jane sent to Grandma from and/or to PDAs are telling Persons Unknown where you are, what you look like, who you know, where you are and where you are going. And where Grandma is…too. Persons Unknown  are collecting your geodata – Latitude and Longitude- saved in the metadata of the pictures.  That APP? Comes with a very steep price.

The Warning Alert on cell phones being the GPS that gives your whereabouts away wasn’t 100% accurate. The E-Alert is wider. E-caution is in the Cards, the sandisk cards and other cards that are inserted into devices. All those phone numbers, passwords, birthdates, calendar reminders, diaries stored in the Cell Phone? One would have to be naïve to not admit there is an APP for accessing all that too. At risk too.

There is a remedy. One word…

Metadata.


Metadata is data about data. Metadata is embedded in a file containing accurate information it tells to computer programs. We never used to see Metadata. As a news photographer, I knew I was typing information into my Images that I sent to my Agency so my Image editors could see what I was shooting, where, who, why, when along with a three line pitch and then naively, embedding my adress and my European bank details into the File Info too. We didn’t need to talk in the phone moreso in an industry where seconds count in the race to post ‘News’ before anyone else. I was changing zipcodes, often, when I was shooting International Horseracing (http://animalfair.com/and-theyre-off-the-best-of-horseracing), Royals, boxing and Arnold gripping Maria’s cheeks (yes, those ones… ewww… but it was news) And then one day, OMG, a DC decade later, my confidential private life details were on Flickr along with my photo of Don King. Another day another story about Chilling Effects and DMCA Take Down notices violating an author’s copyright to their correspondence and emails but one day, my Confidential Take Down notice was online too with dedacted information gathered from information that changed when I did- 90210 for the UK, plus.

Metadata is a foreign language. Like English or Spanish or French, metadata must be learned before it can bewritten. Metadata cannot write itself. The ‘find and steal that Metadata’ command is programmed telling software to recognize and/or unlock information like the camera used, the software was used to create documents, how things are encoded, the dates and who the creator of the file was, camera settings (ISO, Aperture, Flash, lens type), processing software and location. As a photographer, EACH AND EVERY of my JPEG (and accidentally TIF) images went out to my Agency with my ‘© Carrie Devorah’ embedded in the photo.  Let me repeat. EACH AND EVERY left my PC. How can I prove I did not release Orphan Works (http://carriedevorah.wordpress.com/2013/07/26/carrie-devorahs-orphan-works-comment-filed-with-the-register-of-copyrights/)? By producing the backups of my images that show my images were not released to the Internet scraped of my Metadata details as Technology Search Engines, ISPs  etc are intentionally doing to orphan 2D IP and ID.

Now, I know we weren’t born yesterday, either, yet understanding HOW my Copyright got scraped off my image and how my images were getting everywhere many without my ‘© Carrie Devorah’ has been a headscratcher. I am a new girl to Ruby, learning to Code because I want to understand more of this coding puzzlement. Piecing info together here and there I learned about webcrawlers and spybots and one day it hit me. Lord, I wish I could pull back EVERY image I sent out from around the world, at least to get my data out of the Image back and lock my Copyright symbol on the image front. Grin, check me out on Google images. Thousands of my images there all without license in defiance of Fair Use and Safe Harbor, EVEN images I personally defaced by putting my Copyright notice across my image front.

So, here is how it goes…. Things every photographer knows  but didn’t quite understand despite each and every time we did image rescue or recovery off of our Digital Cards. Metadata data doesn’t go away. It comes back to life on the internet with each new APP that comes along, it seems. Exchangeable Image File format, Exif, is standard use in Digital photographic device… Smartphones, iPads, cell phones, digital cameras. A good explanation can be read here (http://en.wikipedia.org/wiki/Exchangeable_image_file_format) The Exif records the date and time the photo was taken along with other data photographers inset into the image. Professional photographers imbed information stored as metada such as their copyright along with who they photographed, when and where, addresses payments are sent to or if working internationally where the paycheck is sent to. Criminals exploit the photo Metadata information as well, to find out to the people on the photo in the world. If you upload a geotagged photo to the Internet then anyone with the ability to view the photo can check the location the photo was taken. After all Facebook Algorithms guess where we live and sites like www.spokeo.com bundle our ‘Nibbles and Bits’ together selling access to our data.

Where and how personal photographs are posted on the Internet makes a difference. Contrary to what the news video linked above suggests, some photo-sharing and social media web sites (such as Facebook and Twitter) automatically strip some or all of the Exif metadata from uploaded pictures. They claim they do so in order to protect privacy. In fact, they are creating Orphan Works referred to above, part of the Internet Association expressed agenda to “We want to show Congress that the Internet impacts every city, every district, and every state in every economic sector — from Main Street to rural America. The Internet is not just Silicon Valley…” Michael Beckerman, President & CEO- “Every day, the Internet provides access to information and personalized content to hundreds of millions of people around the globe – free of charge and free of political interference….Internet Freedom.” How best to Free of Charge 2D IP, Intellectual Property and ID, Identity, make it ones self.

Game. Set. Match.

Enforce legislation that anyone or any entity who does not leave Exif metadata intact, participates in removing Identity from others property is under 18 USC § 1343 – Fraud by wire, radio, or television “ Whoever, having devised or intending to devise any scheme or artifice to defraud, or for obtaining money or property by means of false or fraudulent pretenses, representations, or promises, transmits or causes to be transmitted by means of wire, radio, or television communication in interstate or foreign commerce, any writings, signs, signals, pictures, or sounds for the purpose of executing such scheme or artifice, shall be fined under this title or imprisoned not more than 20 years, or both.”

Checkmate.

So in the same way the metadata valuable for photographers organizing/archiving/stating ownership claim is, as usual, has bad that comes with the good. Metadata is valuable to thieves too for algorithms, demographics and stats analysis, that the everyday person (which Legislators are too) doesn’t know about until it is too late.

Bubbling to the surface, are solutions for Legislators to employ to stave Technology’s crush to remove Arts ownership 2D IP, ID and Commerce towards mitigating © Copyright theft. The solutions are not new. The solutions just need to be enforced. Legislators must defer to Title XVIII, the Criminal Code, as Legislators, not just on the Judiciary, adress Title XVII. The conversation on Capitol Hill has been going round and round about Privacy, Copyright and Technology. Theft is theft AND covering up a crime is moreso aggregious than just stealing. Why is taking metadata out of a JPEG less of a crime than taking license plates off a car at the Chop Shop or grinding an owners name off a piece of silver or a bike? It isnt except in the Judiciary perview under the Technology push to change the Founding Fathers gift of Property Rights. Expand RICO to include FIBRES, the Cloud and other such technological advancements since one thing isnt going to change. Taking what belongs to others is theft.

Bottom line….


RICO RESOURCE FACILITATOR:
 (1) “racketeering activity” means (A) any act or threat involving murder, kidnapping, gambling, arson, robbery, bribery, extortion, dealing in obscene matter, or dealing in a controlled substance or listed chemical (as defined in section 102 of the Controlled Substances Act), which is chargeable under State law and punishable by imprisonment for more than one year; (B) any act which is indictable under any of the following provisions of title 18, United States Code: Section 201 (relating to bribery), section 224 (relating to sports bribery), sections 471, 472, and 473 (relating to counterfeiting), section 659 (relating to theft from interstate shipment) if the act indictable under section 659 is felonious, section 664 (relating to embezzlement from pension and welfare funds), sections 891–894 (relating to extortionate credit transactions), section 1028 (relating to fraud and related activity in connection with identification documents), section 1029 (relating to fraud and related activity in connection with access devices), section 1084 (relating to the transmission of gambling information), section 1341 (relating to mail fraud), section 1343 (relating to wire fraud), section 1344 (relating to financial institution fraud), section 1351 (relating to fraud in foreign labor contracting), section 1425 (relating to the procurement of citizenship or nationalization unlawfully), section 1426 (relating to the reproduction of naturalization or citizenship papers), section 1427 (relating to the sale of naturalization or citizenship papers), sections 1461–1465 (relating to obscene matter), section 1503 (relating to obstruction of justice), section 1510 (relating to obstruction of criminal investigations), section 1511 (relating to the obstruction of State or local law enforcement), section 1512 (relating to tampering with a witness, victim, or an informant), section 1513 (relating to retaliating against a witness, victim, or an informant), section 1542 (relating to false statement in application and use of passport), section 1543 (relating to forgery or false use of passport), section 1544 (relating to misuse of passport), section 1546 (relating to fraud and misuse of visas, permits, and other documents), sections 1581–1592 (relating to peonage, slavery, and trafficking in persons)., [1] section 1951 (relating to interference with commerce, robbery, or extortion), section 1952 (relating to racketeering), section 1953 (relating to interstate transportation of wagering paraphernalia), section 1954 (relating to unlawful welfare fund payments), section 1955 (relating to the prohibition of illegal gambling businesses), section 1956 (relating to the laundering of monetary instruments), section 1957 (relating to engaging in monetary transactions in property derived from specified unlawful activity), section 1958 (relating to use of interstate commerce facilities in the commission of murder-for-hire), section 1960 (relating to illegal money transmitters), sections 2251, 2251A, 2252, and 2260 (relating to sexual exploitation of children), sections 2312 and 2313 (relating to interstate transportation of stolen motor vehicles), sections 2314 and 2315 (relating to interstate transportation of stolen property), section 2318 (relating to trafficking in counterfeit labels for phonorecords, computer programs or computer program documentation or packaging and copies of motion pictures or other audiovisual works), section 2319 (relating to criminal infringement of a copyright), section 2319A (relating to unauthorized fixation of and trafficking in sound recordings and music videos of live musical performances), section 2320 (relating to trafficking in goods or services bearing counterfeit marks), section 2321 (relating to trafficking in certain motor vehicles or motor vehicle parts), sections 2341–2346 (relating to trafficking in contraband cigarettes), sections 2421–24 (relating to white slave traffic), sections 175–178 (relating to biological weapons), sections 229–229F (relating to chemical weapons), section 831 (relating to nuclear materials), (C) any act which is indictable under title 29, United States Code, section 186 (dealing with restrictions on payments and loans to labor organizations) or section 501 (c) (relating to embezzlement from union funds), (D) any offense involving fraud connected with a case under title 11 (except a case under section 157 of this title), fraud in the sale of securities, or the felonious manufacture, importation, receiving, concealment, buying, selling, or otherwise dealing in a controlled substance or listed chemical (as defined in section 102 of the Controlled Substances Act), punishable under any law of the United States, (E) any act which is indictable under the Currency and Foreign Transactions Reporting Act, (F) any act which is indictable under the Immigration and Nationality Act, section 274 (relating to bringing in and harboring certain aliens), section 277 (relating to aiding or assisting certain aliens to enter the United States), or section 278 (relating to importation of alien for immoral purpose) if the act indictable under such section of such Act was committed for the purpose of financial gain, or (G) any act that is indictable under any provision listed in section 2332b (g)(5)(B);

(2) “State” means any State of the United States, the District of Columbia, the Commonwealth of Puerto Rico, any territory or possession of the United States, any political subdivision, or any department, agency, or instrumentality thereof;

(3) “person” includes any individual or entity capable of holding a legal or beneficial interest in property;

(4) “enterprise” includes any individual, partnership, corporation, association, or other legal entity, and any union or group of individuals associated in fact although not a legal entity;

(5) “pattern of racketeering activity” requires at least two acts of racketeering activity, one of which occurred after the effective date of this chapter and the last of which occurred within ten years (excluding any period of imprisonment) after the commission of a prior act of racketeering activity;

(6) “unlawful debt” means a debt

(A) incurred or contracted in gambling activity which was in violation of the law of the United States, a State or political subdivision thereof, or which is unenforceable under State or Federal law in whole or in part as to principal or interest because of the laws relating to usury, and

(B) which was incurred in connection with the business of gambling in violation of the law of the United States, a State or political subdivision thereof, or the business of lending money or a thing of value at a rate usurious under State or Federal law, where the usurious rate is at least twice the enforceable rate;

(7) “racketeering investigator” means any attorney or investigator so designated by the Attorney General and charged with the duty of enforcing or carrying into effect this chapter;

(8) “racketeering investigation” means any inquiry conducted by any racketeering investigator for the purpose of ascertaining whether any person has been involved in any violation of this chapter or of any final order, judgment, or decree of any court of the United States, duly entered in any case or proceeding arising under this chapter;

(9) “documentary material” includes any book, paper, document, record, recording, or other material; and

(10) “Attorney General” includes the Attorney General of the United States, the Deputy Attorney General of the United States, the Associate Attorney General of the United States, any Assistant Attorney General of the United States, or any employee of the Department of Justice or any employee of any department or agency of the United States so designated by the Attorney General to carry out the powers conferred on the Attorney General by this chapter. Any department or agency so designated may use in investigations authorized by this chapter either the investigative provisions of this chapter or the investigative power of such department or agency otherwise conferred by law.


FIGHT THEFT OF COPYRIGHTS
<>
SUPPORT

A ROCKSTAR
AGAINST
IP & ID ABUSE BY
TECHNOLOGY

_________________
WRITE YOUR CONGRESSMAN
____________________
___________________
Capitol Hill Switchboard
(202) 224 3121 _____________________

WRITE YOUR
SENATOR
___________________
__________________
KNOW YOUR CONGRESSMAN OR
SENATOR
?
SEARCH BY ZIPCODE
__________________
Create
The 2D ARTS IP
INTELLECTUAL PROPERTY
PROTECTION
ACT
FOR

TREASURED
HEIRLOOM
ARTS
LEGACY

INTELLECTUAL
PROPERTY

PROTECTION
SIGN THE PETITION


______________
__________________
TELL HERE HOW COPYRIGHT INFRINGEMENT HURT YOU ______________

___________________
TELL
TECHNOLOGY

KEEP YOUR HANDS OFF
MY COPYRIGHT
______________


HONORING THOSE WHO GAVE THEIR ALL
SO WE MIGHT HAVE OUR
PROPERTY RIGHTS
THANK YOU


______________________________________________________________________________________________
ALL INTELLECTUAL PROPERTY STARTS with a Pencil &Paper in 2D(dimension) 
Everything Else about IP(intellectual property) comes down to COMMERCE
.
_______________________________________________________________________________________________
 (C) Carrie Devorah [ applies to Relevant Text by Carrie & Design ]
. THE CENTER FOR COPYRIGHT INTEGRITY .
562 688 2883  .  [email protected] 
 www.centerforcopyrightintegrity.com  
 
                                                                                                                                                                                  

EVERYTHING ON THIS SITE IS (C) CARRIE DEVORAH UNLESS OTHERWISE STATED even then its presentation & design is (c) Carrie Devorah
NOTHING MAY BE REPRODUCED . COPIED . WEBCRAWLER STOLEN . USED FOR ADVERTISING DOLLARS and so much more

WITHOUT WRITTEN LICENSE FROM CARRIE DEVORAH.