|
|||||
|
Porn Users Forum » User Ranks » User Post History |
Post History:
lk2fireone (0)
|
1751-1800 of 3618 Posts | < Previous Page | 1 | 2 | 7 | 12 | 17 | 22 | 27 | 35 | Page 36 | 37 | 42 | 47 | 52 | 57 | 62 | 72 | 73 | Next Page > |
06-26-17 06:56am - 2736 days | #4 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
I'VE BEEN A MEMBER OF SOME CLASS ACTION SUITS. BUT I'VE NEVER REALLY MADE ANY MONEY ON ANY OF THEM. I REMEMBER ONE SUIT, AGAINST GATEWAY COMPUTERS. THEY SOLD COMPUTER MONITORS THAT OFTEN FAILED IN A SHORT PERIOD OF OWNERSHIP. MY COMPENSATION WAS A $10 TICKET THAT I COULD USE TO PURCHASE ANOTHER GATEWAY PRODUCT. WHILE THE LAWYERS MADE MILLIONS OF DOLLARS CASH FOR THEIR COMPENSATION. THAT IS THE USUAL RESULT OF MOST CLASS ACTION SUITS: THE LAWYERS GET A HUGE AMOUNT OF COMPENSATION, AND THE PEOPLE WHO WERE DAMAGED, USUALLY GET LITTLE OR NOTHING. ====== ====== http://www.zdnet.com/article/anthem-cust...ach-after-2015-hack/ Anthem customers to get less than $1 each after 2015 breach The lawyers who brought the suit get up to one-third of the $115 million settlement. Zack Whittaker By Zack Whittaker June 26, 2017 Anthem, the largest health insurance firm, has agreed to settle a class action suit following a 2015 hack of its systems for a record-breaking $115 million. But after lawyer fees and costs, the victims of the breach -- all 78.8 million current and former customers, according to a company statement last week -- will only see a fraction of the settlement figure. The proposed settlement goes before a federal judge next month. If approved, it will be the largest data breach settlement in history. The $115 million fund pays for at least two years of credit monitoring; compensation for those who already paid for credit monitoring; and out-of-pocket expenses incurred by the breach. But attorneys' costs and fees can take up to one-third of the fund -- $37.9 million -- leaving every affected customer with about 97 cents each. Here's how the rest of that fund breaks down: Credit monitoring firm Experian gets $17 million from the fund to provide credit monitoring services for each of the affected current and former customers for two years. For those who already enrolled in credit monitoring, the fund will provide cash compensation. That so-called "alternative compensation" will pay out $36 each, or up to $50 if there are still funds available, and so long as the affected customer applies for it within three months of the settlement agreement. The fund also allows current and former Anthem customers to claim back "out-of-pocket expenses incurred by consumers as a result of the data breach." The settlement agreement states that any evidence to show a customer took preventative measures after the breach, such as obtaining credit monitoring or credit freezes, would be "fairly traceable" and considered for reimbursement. If the aggrieved customer proves their case, they can get reimbursed from a $15 million pot, which pays out case-by-case and only lasts as long as there are available funds. If there's anything left in the settlement pot after that, it will be split equally between Purdue University's Center for Education and Research in Information Assurance Security, and the non-profit rights group Electronic Frontier Foundation. One lawyer, who did not want to be named, told me that these kinds of settlements give attorneys a "huge payday." all while their clients "get enough to buy a couple sticks of gum each." Anthem is also mandated to allocate an unknown level of non-settlement funds to update its systems to an industry-standard level, such as encrypting data and installing access controls. As a result of the settlement, Anthem can avoid admitting guilt or wrongdoing for the breach, meaning it won't take any responsibility for its own failures to use encryption and other security measures. A company spokesperson downplayed the breach, saying that there was no evidence any compromised data was sold or used to commit fraud. That probably isn't much solace to the millions of customers whose data was stolen, and whose breach of private information is reduced to less than a dollar. 2017 CBS Interactive. | |
|
06-22-17 10:08am - 2740 days | #3 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
IF YOU THINK THAT EMAILS OR OTHER INTERNET COMMUNICATION SENT TO ANYONE IS SECURE FROM US SPYING WITHOUT A SEARCH WARRANT, THINK AGAIN. ANY ELECTRONIC COMMUNICATION IS OPEN TO THE FBI, LAW ENFORCEMENT, OR OTHER AGENCIES, OFTEN WITHOUT A SEARCH WARRANT. ----- ===== http://www.zdnet.com/article/legal-looph...84754384421679931766 NSA's use of 'traffic shaping' allows unrestrained spying on Americans By using a "traffic shaping" technique, the National Security Agency sidestep legal restrictions imposed by lawmakers and the surveillance courts. Zack Whittaker By Zack Whittaker for Zero Day | June 22, 2017 -- 13:00 GMT (06:00 PDT) | Topic: Security A new analysis of documents leaked by whistleblower Edward Snowden details a highly-classified technique that allows the National Security Agency to "deliberately divert" US internet traffic, normally safeguarded by constitutional protections, overseas in order to conduct unrestrained data collection on Americans. According to the new analysis, the NSA has clandestine means of "diverting portions of the river of internet traffic that travels on global communications cables," which allows it to bypass protections put into place by Congress to prevent domestic surveillance on Americans. CBS News coverage: Legal loopholes could allow wider NSA surveillance, researchers say The new findings, published Thursday, follows a 2014 paper by researchers Axel Arnbak and Sharon Goldberg, published on sister-site CBS News, which theorized that the NSA, whose job it is to produce intelligence from overseas targets, was using a "traffic shaping" technique to route US internet data overseas so that it could be incidentally collected under the authority of a largely unknown executive order. US citizens are afforded constitutional protections against surveillance or searches of their personal data. Any time the government wants to access an American's data, they must follow the rules of the Foreign Intelligence Surveillance (FISA) Court, a Washington DC-based court that authorizes the government's surveillance programs. But if that same data is collected outside the US, the bulk of the NSA's authority stems from a presidential decree dating back more than three decades. The so-called Executive Order 12333, signed into law by President Ronald Reagan in 1981, went on to become the bulk of the NSA's authority, expanding the agency's collection capabilities to both foreign and domestic targets. The order is far more permissive than the Foreign Intelligence Surveillance Act, as enacted by Congress, as it falls solely under the watch of the executive branch and is not reviewed by the courts. A former NSA executive turned whistleblower Bill Binney once described the executive order as a "blank check" for the intelligence agencies to conduct surveillance when other laws fail or don't reach far enough. Although the new research notes that the agency's ability to carry out the traffic shaping technique is unknown due to the highly classified nature of any surveillance program, the NSA can use its legal powers to "sidestep legal restrictions imposed by Congress and the surveillance courts," said Goldberg, who authored the report. The government's use of traffic shaping exploits a fundamental principle about internet traffic: data takes the quickest and most efficient route, which sometimes means bouncing from different countries around the globe, rather than staying within a country's borders. That allows the NSA to vacuum up data it treats as an overseas communication -- with little regard for whether or not the data belongs to an American. One leaked top secret document from 2007 details a technique that allows the intelligence agency to exploit the global flow of internet data by tricking internet traffic into traveling through a set and specific route, such as undersea fiber cables that the agency actively monitors. Leaked NSA document from 2007. (Image: source document) The document's example noted Yemen, a hotspot for terrorism and extremist activity but difficult to monitor because the NSA has almost no way to passively monitor internet traffic from the cables that run in and out of the country. By shaping the traffic, the agency can trick internet data to pass through undersea cables that are located on friendlier territory. Goldberg's research takes that logic and focuses it on US citizens, whose data and communications is out of bounds for the intelligence agencies without a valid warrant from the surveillance court. The government only has to divert their internet data outside of the US to use the powers of the executive order to legally collect the data as though it was an overseas communication. Two Americans can send an email through Gmail, for example, but because their email is sent through or backed up in a foreign datacenter, the contents of that message can become "incidentally collected" under the executive order's surveillance powers. "Instead, the NSA could use 'traffic-shaping' techniques to deliberately send traffic from within the US to points of interception on foreign territory, where it could be swept up as part of operations that would be illegal if conducted on US territory," said Goldberg. To that point, former US State Department official John Tye, who had classified knowledge about how the executive order worked, confirmed in a 2014 interview that the government could "keep and use" the data collected on potentially millions of Americans, even if the sole target was an overseas foreigner. The research cites several ways the NSA is actively exploiting methods to shape and reroute internet traffic -- many of which are well-known in security and networking circles -- such as hacking into routers, or using the simpler and less legally demanding option of forcing major network providers or telecoms firms, into cooperating and diverting traffic to a convenient location. Goldberg noted that sans any conclusive legal or public definitions from the FISA surveillance court on whether or not the practice is legal, the loophole remains, and "eliminating it calls for a realignment of current US surveillance laws and policies," she added. "The modern Internet has changed the way that Americans communicate," said Goldberg. "These changes call for a fundamental realignment of US surveillance law -- specifically, the legal boundaries that distinguish interception of Internet traffic on US territory from interception abroad must be broken down," she said. "Americans' Internet traffic should enjoy the same legal protections, regardless of whether it is intercepted on US territory, or intercepted abroad." As it stands, the law that governs the NSA's use of collecting foreign and overseas collection -- the so-called Section 702 statute -- is set to expire at the end of the year, five years after it was first reauthorized after its debut in 2008 under the FISA Amendments Act. "Congress should not miss this opportunity to consider revising FISA's definition of 'electronic surveillance' in order to eliminate loopholes that allow the executive branch to unilaterally conduct surveillance of American Internet traffic," said Goldberg. "Undertaking this revision is a crucial step toward ensuring that legislative and judiciary branches have a firm hand at protecting the privacy of American communications." An NSA spokesperson would not comment on the report. "We do not comment on speculation about foreign intelligence activities; however, as we have said before, the National Security Agency does not undertake any foreign intelligence activity that would circumvent US laws or privacy protections," a spokesperson said. | |
|
06-22-17 08:51am - 2740 days | #2 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
HAVE ANY PU MEMBERS SEEN THE NEW WONDER WOMAN? I'M THINKING OF GOING. AND IF SHE IS AS GREAT AS I THINK SHE IS, I NOMINATE HER TO BE VICE PRESIDENT OF THE UNITED STATES, TO SERVE AS DONALD L. TRUMPS RIGHT-HAND WOMAN. SHE WILL BE ABLE TO FIGHT OFF ALL NON-LEGAL CROTCH-GRABBERS WITH STRENGTH AND VIGOR. | |
|
06-22-17 08:38am - 2740 days | Original Post - #1 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
June 20, 2017 President Donald Trump took to Twitter on Thursday morning to bash former President Barack Obama for not doing more to stop Russia’s meddling with the election, because any alleged interference would have occurred during his administration. ======== ======== TRUMP IS COMMANDER IN CHIEF OF THE UNITED STATES. HE HAS THE POWER TO SEND THE ELITE FIGHTING FORCES OF THE UNITED STATES TO SEIZE BARACK OBAMA AND QUESTION HIM ON HIS ALLEGED TIES TO RUSSIA AND OTHER CRIMINAL ELEMENTS. IF THE SECRET SERVICE AGENTS WHO ARE ASSIGNED TO GUARDING THE FORMER PRESIDENT OBABAMA, OUT OF A MISPLACED SENSE OF LOYALTY TO OBAMA, GET IN THE WAY OF OFFICIAL AGENTS OF THE U.S. COMMANDER IN CHIEF, THE AGENTS HAVE THE RIGHT AND DUTY TO GUN DOWN ANY AND ALL ENEMY AGENTS. HAIL TO TRUMP. LET'S CLEAR UP THE RUSSIAN CONSPIRACY THREAT BY SEIZING OBAMA, DEAD OR ALIVE, AND FORCING HIM TO DISCLOSE HIS TIES TO RUSSIAN POLITICOS AND GANGSTERS. A TRUMP SUPPORTER AND LOYALIST. LET'S MAKE AMERICA GREAT AGAIN!!! | |
|
06-21-17 01:59am - 2741 days | #6 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
================================ I READ A DIFFERENT ARTICLE A SHORT WHILE BACK. THIS WAS IN CALIFORNIA. WHERE A POLICE OFFICER SHOT AND KILLED AN UNARMED MAN. THE OFFICER CLAIMED HE WAS IN FEAR OF HIS LIFE, WHICH JUSTIFIED THE SHOOTING. BECAUSE THE OFFICER CLAIMED HE THOUGHT THE MAN WAS REACHING FOR A GUN. THERE WAS NO GUN. AND FROM WHAT I READ, THE MAN WAS FOLLOWING INSTRUCTIONS FROM THE OFFICER. THE OFFICER TOLD THE MAN NOT TO MOVIE. THE OFFICER TOLD THE MAN TO SHOW BOTH HIS HANDS. WHEN THE MAN MOVED HIS RIGHT HAND TO SHOW THE OFFICER, THE COP SHOT THE MAN, BECAUSE THE COP SAID THE MAN WAS APPARENTLY REACHING FOR A GUN (EVEN THOUGH THE COP TOLD THE MAN TO SHOW BOTH HIS HANDS TO THE OFFICER. HOW CAN YOU FOLLOW THESE INSTRUCTIONS? DON'T MOVE. SHOW ME BOTH OF YOUR HANDS. AND WHEN THE MAN MOVED HIS RIGHT HAND TO SHOW THE OFFICER HIS HAND, THE OFFICER SHOT AND KILLED THE MAN (BECAUSE THE OFFICER THOUGHT THE MAN HAD A GUN, OR WAS REACHING FOR A GUN--EVEN THOUGH THE ONLY GUN INVOLVED WITH THE COP'S GUN). THE OFFICER WAS NOT CHARGED IN THE FATAL SHOOTING. I DON'T REMEMBER THE EXACT WORDS, BUT THE OFFICER WAS CLEARED BECAUSE HE WAS FOLLOWING POLICE PROCEDURE. ================================ http://www.nationalreview.com/corner/448...-miscarriage-justice The Philando Castile Verdict Was a Miscarriage of Justice by David French June 17, 2017 2:27 PM Yesterday, a Minnesota jury acquitted St. Anthony, Minnesota, police officer Jeronimo Yanez of second-degree manslaughter charges in the shooting of Philando Castile. In considering the rightness of the verdict, pay close attention to the transcript of the fatal encounter. Here it is, via CNN: 9:05:00 p.m. — Castile’s vehicle came to a complete stop. 9:05:15 – 9:05:22 p.m. — Yanez approached Castile’s car on the driver’s side. 9:05:22 – 9:05:38 p.m. — Yanez exchanged greetings with Castile and told him of the brake light problem. 9:05:33 p.m. — St. Anthony Police Officer Joseph Kauser, who had arrived as backup, approached Castile’s car on the passenger’s side. 9:05:38 p.m. — Yanez asked for Castile’s driver’s license and proof of insurance. 9:05:48 p.m. — Castile provided Yanez with his proof of insurance card. 9:05:49 – 9:05:52 p.m. — Yanez looked at Castile’s insurance information and then tucked the card in his pocket. 9:05:52 – 9:05:55 p.m. — Castile told Yanez: “Sir, I have to tell you that I do have a firearm on me.” Before Castile completed the sentence, Yanez interrupted and replied, “Okay” and placed his right hand on the holster of his gun. 9:05:55 – 9:06:02 p.m. — Yanez said “Okay, don’t reach for it, then.” Castile responded: “I’m… I’m … [inaudible] reaching…,” before being again interrupted by Yanez, who said “Don’t pull it out.” Castile responded, “I’m not pulling it out,” and Reynolds said, “He’s not pulling it out.” Yanez screamed: “Don’t pull it out,” and pulled his gun with his right hand. Yanez fired seven shots in the direction of Castile in rapid succession. The seventh shot was fired at 9:06:02 p.m. Kauser did not touch or remove his gun. 9:06:03 – 9:06:04 p.m. — Reynolds yelled, “You just killed my boyfriend!” 9:06:04 – 9:06:05 p.m. — Castile moaned and said, “I wasn’t reaching for it.” These were his last words. 9:06:05 – 9:06:09 p.m. — Reynolds said “He wasn’t reaching for it.” Before she completed her sentence, Yanez screamed “Don’t pull it out!” Reynolds responded. “He wasn’t.” Yanez yelled, “Don’t move! F***!” If you read carefully, you’ll note that it appears that the officer shot Castile for doing exactly what the officer told him to do. Yanez asked for Castile’s license. Castile told him that he had a gun, and the officer – rather than asking for his carry permit, or asking where the gun was, or asking to see Castile’s hands – just says, “Don’t reach for it then.” At that point, Castile is operating under two commands. Get his license, and don’t reach for his gun. As Castile reaches for his license (following the officer’s orders), and he assures him that he’s not reaching for the gun (also following the officer’s orders). The entire encounter, he assures Yanez that he’s following Yanez’s instructions. He died anyway. Yes, the evidence indicates that Yanez was afraid for his life. He thought he might have been dealing with a robber (a fact he apparently didn’t tell Castile), and he testified that he smelled marijuana. But Castile was following Yanez’s commands, and It’s simply false that the mere presence of a gun makes the encounter more dangerous for the police. It all depends on who possesses the gun. If he’s a concealed-carry permit-holder, then he’s in one of the most law-abiding demographics in America. In recent months we’ve seen a number of cases where courts have excused police for shooting citizens even after the police made mistakes — and the citizens were doing nothing wrong — simply because these citizens were exercising their Second Amendment rights. This is unacceptable, and it represents the most extreme possible deprivation of civil rights and civil liberties. I understand the inherent danger of police work. I also understand the legal responsibilities of men and women who volunteer to put on that uniform, and the legal rights of the citizens they’ve sworn to protect and serve. I’m aware of no evidence that Yanez panicked because Castile was black. But whether he panicked because of race, simply because of the gun, or because of both, he still panicked, and he should have been held accountable. The jury’s verdict was a miscarriage of justice. | |
|
06-19-17 12:05pm - 2743 days | #4 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
IF A COP SHOOTS AND KILLS AN UNARMED CIVILIAN, THE CIVILIAN IS AUTOMATICALLY DEEMED A THREAT TO THE COP'S SAFETY. THAT EXPLAINS WHY COPS CARRY GUNS, AND IF A CIVILIAN CARRIES A GUN, THE CIVILIAN IS AUTOMATICALLY DEEMED A THREAT. AND IF THE CIVILIAN DOES NOT CARRY A GUN, THE CIVILIAN IS A THREAT, BECAUSE THE COP BELIEVES THE CIVILIAN MAY BE HIDING A GUN. SO: A COP IS JUSTIFIED SHOOTING A CIVILIAN, BECAUSE THE COP IS IN FEAR OF VIOLENCE. AND THE BEST STRATEGY TO AVOID VIOLENCE (BY THE COP) IS TO SHOOT FIRST, AND ASK QUESTIONS LATER. WHICH IS A STRONG LEGAL DEFENSE. EVEN IF THE CIVILIAN HAS STOPPED AND HOLDS HIS HANDS ABOVE HIS HEAD, THE COP IS STILL JUSTIFIED IN SHOOT TO KILL, BECAUSE THE CIVILIAN MIGHT HAVE A GUN, OR EVEN WORSE, BE ON DRUGS. EVERYONE KNOWS THAT A CIVILIAN ON DRUGS IS DANGEROUS. I'VE READ THAT IF A CIVILIAN SHOOTS A PERSON IN THE BACK, THE CIVILIAN IS A LOWER-THAN-DOG CRIMINAL. BUT IF A COP OR COPS SHOOT A CIVILIAN 5 OR 10 TIMES IN THE BACK, IT'S A MATTER OF THE COP(S) ACTING IN SELF-DEFENSE. JUSTICE IS A TWO-WAY STREET. ONE STREET FOR COPS. A DIFFERENT STREET FOR CIVILIANS. | |
|
06-17-17 05:08pm - 2745 days | Original Post - #1 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
Judge finds Michelle Carter guilty of manslaughter in texting suicide case By Ray Sanchez and Natisha Lance, CNN Updated 5:22 AM ET, Sat June 17, 2017 Story highlights Conrad Roy III, 18, killed himself in July 2014 A Massachusetts judge decides Michelle Carter's fate after she waived her right to a jury trial (CNN)In a case that hinged largely on a teenage couple's intimate text messages, Michelle Carter was found guilty of involuntary manslaughter Friday in the 2014 death of her boyfriend, who poisoned himself by inhaling carbon monoxide in his pickup truck, a Massachusetts judge ruled. Carter's own words -- preserved in hundreds of text messages presented as evidence over six days of testimony -- helped seal her conviction in the death of 18-year-old Conrad Roy III, Bristol County Juvenile Court Judge Lawrence Moniz said during a 15-minute explanation of his rationale. "She admits in ... texts that she did nothing: She did not call the police or Mr. Roy's family" after hearing his last breaths during a phone call, Moniz said. "And, finally, she did not issue a simple additional instruction: Get out of the truck." Carter, 20, cried silently as Moniz spoke. She stood to receive the ruling, which could set legal precedent for whether it's a crime to tell someone to commit suicide. 'There are no winners here' Prosecutors had argued that Carter sent Roy numerous text messages urging him to commit suicide, listened over the phone as he suffocated and failed to alert authorities or his family that he'd died. The judge agreed. "This court has found that Carter's actions and failure to act where it was her self-created duty to Roy since she put him in that toxic environment constituted reckless conduct," the judge said. "The court finds that the conduct caused the death of Mr. Roy." With Carter standing, Moniz said, "This court, having reviewed the evidence, finds you guilty on the indictment with involuntary manslaughter." Although Cater was not present when Roy killed himself, her text messages and conversations with him proved damning. One July 2012 exchange of texts messages was typical: Roy: "I'm overthinking" Carter: "I thought you wanted to do this. The time is right and you're ready, you just need to do it! You can't keep living this way. You just need to do it like you did last time and not think about it and just do it babe. You can't keep doing this every day." Roy's relatives, who sat near Carter in the front row of the courtroom, wept as the judge ticked through the steps Roy took to end his life, as well as Carter's complicity. Sitting opposite them, Carter's family members also sobbed. "Although we are very pleased with the verdict, in reality there are no winners here," prosecutor Katie Rayburn told reporters later. "Two families had been torn apart and will be affected by this for years to come. We hope verdict will bring some closure... It's been an extremely emotionally draining process for everyone involved." Roy aspired to be a tugboat captain and would be alive if not for Carter's actions, Rayburn said. He had been trying to better himself, and "we all wish he had the opportunity" to grow up, she said. Added Roy's father, Conrad Roy Jr.: "This has been a very tough time for our family, and we would just like to process this verdict that we are happy with." Moniz let Carter, who was tried as a juvenile because she was 17 at the time of the crime, remain free on bail until her sentencing on August 3. She could face up to 20 years in prison, though experts say such a lengthy sentence is unlikely. She was ordered to have no contact with members of the Roy family. She cannot apply for or obtain a passport, nor can she leave Massachusetts without permission from a judge. Case was watched closely The ruling, which may spur lawmakers to codify the behavior highlighted in the case as criminal, was closely watched by legal experts. "Given the expansive definition of manslaughter under Massachusetts law, the guilty verdict is not a surprise," CNN legal analyst Danny Cevallos said. "Still, this verdict is concerning because it reflects a judicial willingness to expand legal liability for another person's suicide, an act which by definition is a completely independent choice," he said. "Historically, suicide has been considered a superseding act which breaks the chain of legal causation." In charging Carter with involuntary manslaughter, prosecutors were threading a legal needle, another legal expert said. "I thought it was a square peg in a round hole, it wasn't a great fit for manslaughter," Daniel Medwed, professor of law and criminal justice at Northeastern University, said after the decision. "Her behavior was so morally reprehensible, but I wasn't sure how, as a matter of law, it constituted as manslaughter." Medwed said manslaughter involves direct action such as a drunk driver who slams into a car or someone who fires a gun into a crowd to recklessly cause a death. "This case involves mainly words, but ultimately [Roy] decided to do the deed, so it didn't fit in with the classic patter of manslaughter," he said. "But the facts are so powerful, so compelling and her behavior so apparent that I'm not shocked she got convicted for manslaughter." Texts drove suicide, prosecutors argued Carter secretly nudged Roy toward suicide by sending him numerous text messages encouraging him to take his life, prosecutors said. In closing arguments Tuesday, prosecutors said Carter berated her vulnerable boyfriend when he had second thoughts about killing himself, listened by phone as he died and used his suicide to get from friends the attention that she desperately craved. Teens and texts: Suicide case exposes risks of messaging Carter went from offering "words of kindness and love" to aggressively encouraging Roy via text message to carry out longtime threats to commit suicide, Rayburn told the court. "It got to the point that he was apologizing to her, ... apologizing to her for not being dead yet," she said in her closing argument. Rayburn reminded the judge of text messages in which Carter encouraged Roy to get back in the truck. In text messages to a friend, she described hearing his final words and breaths on the phone. Roy's body was found July 13, 2014, a day after his suicide in his parked truck in a Kmart parking lot in Fairhaven, nearly 40 miles from his home. 'Tragic ... not a homicide,' defense said Carter's attorney argued she was a troubled, delusional young woman who was "dragged" into the suicidal journey of Roy, who had long been intent on killing himself. Assistance or coercion? Intent is key in text message suicide case, experts say "The evidence actually established that Conrad Roy caused his own death by his physical actions and by his own thoughts," defense attorney Joseph Cataldo said. "You're dealing with an individual who wanted to take his own life. ... He dragged Michelle Carter into this." Carter was "overwhelmed" by Roy's talk of suicide while at the same time dealing "with all of her baggage," including the side effects of medication for depression, Cataldo said. "It's sad, it's tragic," he said. "It's just not a homicide." Earlier in the trial, a psychiatrist testified that Carter was delusional after becoming "involuntarily intoxicated" by antidepressants. She was "unable to form intent" after switching to a new prescription drug months before Roy's suicide, and she even texted his phone for weeks after he died, the psychiatrist testified. CNN's Michelle Krupa, Jessica Suerth, Sarah Jorgensen and Darran Simon contributed to this report. | |
|
06-15-17 07:49am - 2747 days | #204 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
ALL FINE GIRLS PART OF THE DIESEL NETWORK: ALL FINE GIRLS WOW GIRLS WOW PORN PU LISTS WOW GIRLS AND WOW PORN, BUT NOT ALL FINE GIRLS. IT USED TO LIST ALL FINE GIRLS UNDER THE PREVIOUS NAME OF 18 ONLY GIRLS. | |
|
06-07-17 01:53pm - 2755 days | #4 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
I'VE NEVER BEEN TO AFRICA. I'VE GOTTEN EMAILS FROM NIGERIA BEFORE, TELLING ME I HAVE FUNDS AVAILABLE. BUT THIS IS THE FIRST TIME I'VE GOTTEN AN EMAIL FROM BENIN, WHICH USED TO BE CALLED DAHOMEY. BUT SINCE I WILL BE ROLLING IN THE GREEN STUFF, I WILL BE PAYING A VISIT, NOT JUST TO PU HEADQUARTERS, BUT TO THE AFRICAN NATIONS THAT ARE GOING TO SUPPORT MY BILLIONAIRE LIFESTYLE. | |
|
06-07-17 11:05am - 2755 days | Original Post - #1 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
I SEEM TO HAVE BEEN PUT ON A WINNING EMAIL LIST. THAT LIST HAS GIVEN ME MILLIONS OF DOLLARS TO COLLECT. AS SOON AS I HAVE THE TIME TO COLLECT MY WINNINGS, I WILL BE VISITING THE PU HEADQUARTERS AND HOLDING A CELEBRATION FEAST. ALL MY PU SUPPORTERS ARE INVITED. BELOW IS THE LATEST NOTICE OF MY UNCOLLECTED WINNINGS: === === YOUR OVERDUE PAYMENT People Federal Ministry Of Finance Today at 3:34 AM To fmf.0000@yahoo.com Message body Your overdue payment sum of $3,500,000.00 usd has been released today from Federal High Court Benin and we are hereby to let you know that the first payment of $5000 with the MTCN: (493-088-6481 have been transferred to your Name for you to pick up but you have to pay the sum of $110 usd to activate it before you can pick up the $5000 .contact now so that we can give you the Receivers name to send the activation fee and collect your $5000 immediately within 45 minutes. Again we give you 48hrs to respond and after 12hrs you did not respond we can cancel your payment file and return the total fund to Government Treasury Account kindly contact Pastor Ben Edu for your payment, Contact information: E-mail: westernunion.ecobk@qualityservice.com Name: Pastor Ben Edu, Tele: +229 6334 1177 Respond as soon as you receive this massage we are waiting, Regard MR.BEN EDU, Director Federal Ministry Of, Finance Benin Republic Federal Ministry Of Finance Benin Republic | |
|
06-04-17 07:45pm - 2758 days | Original Post - #1 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
(NOTE: THIS POST IS IN HONOR OF TRUMP'S FAKE NEWS THEORY.) IN RECOGNITION OF VLADIMIR PUTIN'S ROLE IN HELPING DONALD TRUMP WIN THE PRESIDENCY, SO TRUMP CAN MAKE AMERICA GREAT AGAIN, TRUMP HAS NOMINATED PUTIN FOR THE MEDAL OF HONOR. NOTE: PUTIN MODESTLY SAYS THAT RUSSIA DOES NOT CARE WHO THE PRESIDENT OF THE UNITED STATE IS. BUT EVERYONE KNOWS THAT PUTIN AND TRUMP ARE BEST BUDDIES. >>>>>>>>> >>>>>>>>> http://www.thewrap.com/megyn-kelly-drill...ias-ties-with-trump/ Megyn Kelly Drills Vladimir Putin on Presidential Election Hack, Russia’s Ties With Trump “In the grand scheme of things, we don’t care who’s the head of the United States,” Russian president says on “Sunday Night With Megyn Kelly” premiere Debbie Emery June 4, 2017 @ 5:35 PM Former Fox News Channel star Megyn Kelly launched her latest NBC News show with a bang on Sunday by securing a one-on-one interview with Russian president Vladimir Putin. In her introduction on “Sunday Night with Megyn Kelly,” the host described the “testy exchanges” that occurred at the St. Petersburg International Economic Forum, where Kelly moderated a panel that included Putin and other world leaders. Predictably, Kelly asked the president about the hacking accusations and Russia suspected interference in the presidential election, pointing out that “hundreds of factors point to Russia,” including IP addresses and fingerprints. “What fingerprints or hoof-prints or horn-prints, what are you talking about?” Putin responded as the conversation quickly became heated. “IP addresses? They can be invented, you know? There are a lot of specialists who can even make it so it comes from your home IP address as if your three-year old daughter carried out the attack.” The combative tone continued in the subsequent sit-down interview. “This week you floated the idea of patriotic hackers doing it. Why the change and why now?” Kelly asked, in a transcript obtained by TheWrap from NBC News. “I hadn’t said anything. It’s just that French journalists asked me about those hackers. I told them the same thing I can tell you. Hackers can be anywhere. They can be in Russia, in Asia … even in America, Latin America,” Putin replied. “They can even be hackers, by the way, in the United States who very skillfully and professionally, shifted the blame, as we say, on to Russia. Could you accept that? “In the midst of a political battle, by some calculations, it was convenient for them to release this information, so they released it, calling out Russia. Can you imagine something like that? I can,” he continued. The Russian leader went on to refer to JFK’s assassination and the conspiracy theory that it was carried out by U.S. intelligence. “So, if this theory is correct and that can’t be ruled out, then what could be easier, in this day and age, than using all the technical means at the disposal of the intelligence services, and using those means to organize some attacks,” Putin said. “And then pointing the finger at Russia.” He went on to say that America interferes with elections in many other countries. “Put your finger anywhere on a map of the world, and everywhere you will hear complaints that American officials are interfering in internal electoral processes,” he said. “With respect, that sounds like a justification,” Kelly quipped back, but her interview subject claimed it was a statement of fact. “Presidents come and go, and even the parties in power change, but the main political direction does not change. That’s why, in the grand scheme of things, we don’t care who’s the head of the United States,” Putin continued. “We know more or less what is going to happen. And so in this regard, even if we wanted to, it wouldn’t make sense for us to interfere,” he added. He also denied that there were meetings between the Russian government and the Trump campaign. “There were no meetings. When I saw this, my jaw dropped,” Putin stated, adding that for him to know what all of his ambassadors are doing around the world is “complete nonsense!” He said he knows nothing about a proposal from Trump’s son-in-law Jared Kushner, either. “You created a sensation out of nothing. And out of this sensation, you turned it into a weapon of war against the current president,” he told the news anchor. “Well, this is, you know, you’re just, you people are so creative over there. Good job. Your lives must be boring.” When asked about his contact with former U.S. National Security Adviser Michael Flynn, Putin replied: “You and I, you and I personally, have a much closer relationship than I had with Mr. Flynn. “You and I met yesterday evening. You and I have been working together all day today. And now we’re meeting again. “When I came to the event for our company, Russia Today, and sat down at the table, next to me there was a gentleman sitting on one side,” he continued. “I made my speech. Then we talked about some other stuff. And I got up and left. And then afterwards I was told, ‘You know there was an American gentleman. He was involved in some things. He used to be in the security services’ … that’s it. I didn’t even really talk to him … That’s the extent of my acquaintance with Mr. Flynn.” The interview ended as it began — on a testy note, with Kelly asking Putin what he thinks of Americans thinking “he runs a country full of corruption, a country in which journalists who are too critical could wind up murdered, a country in which dissidents could wind up in jail or worse.” “Why do you feel you have the right to ask us these kinds of questions? And do it all the time. To moralize and to give us lessons on how to live?” he replied. “We’re ready to listen to comments, when it is done constructively, with the goal of establishing a relationship, creating a common environment. But we will absolutely not accept when these sorts of things are used as an instrument of political conflict. I want everyone to know that. That’s our message.” | |
|
06-02-17 11:28am - 2760 days | #203 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
18 VIRGIN SEX ALTHOUGH THIS SITE IS ALREADY LISTED AT PU, I WANTED TO GIVE THE SITE A SHOUT OUT FOR ITS EXCELLENT THEME: VIRGINAL SEX. MANY OF THE GIRLS ARE FAMILIAR, IF YOU'VE EVER VISITED TEEN MEGA WORLD, DIESEL NETWORK, OR OTHER SITES WHICH FEATURE RUSSIAN HARDCORE MODELS. HOWEVER, 18 VIRGIN SEX GOT THESE MODELS WHEN THEY WERE STILL VIRGINS. AND THESE MODELS ARE EXCEPTIONAL: NOT ONLY ARE THEY CUTE, AND VIRGINS, BUT THEY ARE EXPERT AT BLOWJOBS, SEXUAL INTERCOURSE, AND WHATEVER ELSE IT TAKES TO GET THEIR PARTNERS OFF. IT MUST BE SOMETHING IN THE GENES OF THESE RUSSIAN CUTIES. | |
|
06-02-17 03:36am - 2760 days | #5 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
I WAS THINKING ABOUT THE TIME SPENT BY BEST BUY EMPLOYEES THAT IS SPENT SPYING FOR THE FBI TO SEARCH COMPUTERS. ARE THE CUSTOMERS TOLD ABOUT THE SEARCHES? OBVIOUSLY, NOT. ARE THE CUSTOMERS CHARGED EXTRA FOR THE SEARCHES, SINCE THE SEARCHES TAKE TIME TO COMPLETE? OR WOULD BEST BUY DENY THE SEARCHES ARE ILLEGAL, BECAUSE NO ONE HAS SUED THEM OR FORCED THEM TO STOP? ENQUIRING MINDS WANT TO KNOW. LET THE PU COMMUNITY RISE UP AND DEMAND ACCOUNTABILITY FROM BEST BUY. ETERNAL VIGILANCE IS THE PRICE OF FREEDOM. WE MUST SNOOP ON BEST BUY BUSINESS PRACTICES, IF WE ARE TO LIVE TOGETHER IN PEACE AND HARMONY. CAN WE NOT ORGANIZE A BOYCOTT ON BEST BUY? END OF RANT. | |
|
06-01-17 08:04am - 2761 days | #3 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
IF YOU SUSPECTED THAT, KNOWINGLY OR UNKNOWINGLY, YOUR HARD DRIVE OR SSD EVER HAD A POSSIBLY QUESTIONABLE IMAGE ON IT, MERELY WIPING THE DRIVE WOULD NOT BE SUFFICIENT. YOU WOULD NEED AN INDUSTRIAL STRENGTH PROGRAM THAT WOULD COMPLETELY WIPE THE DRIVE CLEAN. QUOTING FROM A DIFFERENT ARTICLE: According to Riddet's motion(Riddet is the doctor's lawyer), (FBI) agents omitted that the images found on the hard drive were remnants of deleted files that required specialized computer forensics tools to view. That also means, Riddet argues, that nobody can be sure exactly when the images were placed on the drive, when they were deleted or whether Rettenmaier ever viewed them. The motion also contends that FBI agents looked at only one image on the hard drive before requesting the warrant and that the picture they looked at is not technically child pornography because it doesn't show a sexual act, even though it depicts a naked girl. =================== THE CASE AGAINST THE DOCTOR IS NOT THAT SIMPLE. THERE ARE OTHER FACTS INVOLVED. BUT--IF YOU BRING YOUR COMPUTER IN TO BEST BUY, AND IT EVER HAD PORN ON IT, THAT COULD BE DANGEROUS. IT MIGHT BE REPORTED TO LAW ENFORCEMENT. THAT'S ALL I'M SAYING. | |
|
05-31-17 10:42pm - 2761 days | Original Post - #1 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
ONE DOCTOR WAS CHARGED AFTER GEEK SQUAD EMPLOYEES ALLEGEDLY FOUND AN ILLICIT IMAGE DURING REPAIRS ON HIS COMPUTER. NO WARRANT FOR THE SEARCH. ONE IMAGE? YOU BRING IN YOUR COMPUTER FOR REPAIRS TO BEST BUY, YOU MIGHT END UP IN JAIL, IF YOUR COMPUTER HAS ANY PORN IMAGES ON IT. ======== ======== Privacy group sues to find out more about FBI relationship with Best Buy employees who detected illegal content during computer repairs Susan Seager May 31, 2017 @ 8:04 PM The Justice Department was sued Wednesday by a privacy group seeking information on the FBI’s alleged recruitment of Best Buy employees to search consumer computers for child pornography during repairs. The Electronic Frontier Foundation (EFF) filed a Freedom of Information Act lawsuit against the Trump administration’s Justice Department, demanding access to records about any FBI training and payment to Geek Squad workers to search customer computers without a court warrant. At issue isn’t the criminality of child pornography or efforts to stop the exploitation of children by sexual predators. EFF is concerned that the FBI may be violating the constitutional requirement that law enforcement agencies obtain judge-approved search warrants, based on evidence there is probable cause of a crime, to search computers. “Informants who are trained, directed, and paid by the FBI to conduct searches for the agency are acting as government agents,” EFF civil liberties director David Greene said in a written statement. “The FBI cannot bypass the Constitution’s warrant requirement by having its informants search people’s computers at its direction and command.” The San Francisco-based non-profit privacy group sued the Justice Department after it refused a request for documents about how the FBI recruits, trains, and pays Best Buy workers to find illegal child pornography on customer computers sent to Best Buy for repairs. “The public has a right to know how the FBI uses computer repair technicians to carry out searches the agents themselves cannot do without a warrant,” EFF senior counsel David Sobel said in a statement. “People authorize Best Buy employees to fix their computers, not conduct unconstitutional searches on the FBI’s behalf.” The FBI refused to provide records to EFF based on the agency’s policy of not confirming or denying ongoing investigations. But court documents in federal court in Santa Ana, California, argue that the FBI has launched a program of training and paying Geek Squad employees to look for child pornography on customer computers sent in for repairs, and to report the porn to authorities. The OC Weekly first reported in March that court documents revealed an “extensive secret relationship . . . between the FBI and Best Buy’s Geek Squad, including evidence the agency trained company technicians on law-enforcement operational tactics, shared lists of targeted citizens and, to covertly increase surveillance of the public, encouraged searches of computers even when unrelated to a customer’s request for repairs.” The relationship between the FBI and Best Buy came to light in the criminal case of U.S. v. Rettenmaier. Dr. Mark Rettenmaier, a Newport Beach, California obstetrics and gynecology specialist, is charged with knowingly possessing child pornography after Geek Squad employees reported to authorities that they allegedly found an illicit image during repairs of his computer in 2011. The criminal case was delayed after Rettenmair challenged the search of his computer and his home. Rettenmaier’s lawyers argue that sealed government documents reveal the FBI trained and paid Geek Squad employees, turning them into FBI agents, and therefore would have required a search warrant before Geek Squad employees could search the doctor’s computer, according court documents cited by the Washington Post. Best Buy admits that some employees were paid by the FBI. | |
|
05-26-17 11:38am - 2767 days | #193 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
SECRETS-ART.COM HIGH CLASS PORN WITH AN ARTISTIC APPROACH. THE SAME AS WHAT THE METART SITES ARE STRIVING FOR, AND DOING A BETTER JOB OF IT, FROM THE FEW VIDEOS I'VE BEEN ABLE TO SEE. | |
|
05-25-17 06:13pm - 2768 days | #192 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
http://www.tokyodoll.tv/ A SOFTCORE GLAMOR SITE. MAYBE SOME COSPLAY. BUT THE MODELS ARE CAUCASIAN, NOT ASIAN. EXPENSIVE SITE. PRICES ARE IN JAPANESE YEN. ABOUT $45/MONTH (U.S. DOLLARS) 3 MONTH SUB IS $107 U.S. DOLLARS. NO IDEA WHY IT'S SO EXPENSIVE. FOR A SOFTCORE SITE. APPARENTLY, THIS IS A JAPANESE SITE. EVEN THOUGH THERE IS A VERY GOOD ENGLISH-LANGUAGE VERSION OF THE SITE. SO THAT MIGHT EXPLAIN WHY IT'S SO EXPENSIVE. IN JAPAN, THEY CHARGE A LOT, FOR PORN, AND FOR PHOTO BOOKS, DVDs, ETC. BUT SOME OF THE PHOTO SETS ARE REALLY NICE. GOOD LOOKING MODELS. NICE COSTUMES. MUCH SOFTER THAN THE AMERICAN AND EUROPEAN SOFTCORE SITES. NO EXPOSED VAGINAS (BUT NO PIXELATION, EITHER). Edited on May 25, 2017, 07:03pm | |
|
05-24-17 09:41am - 2769 days | #15 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
"SLAVE GIRLS FROM BEYOND INFINITY" WAS AN ENJOYABLE, LOW-BUDGET SCI-FI MOVIE. A REMAKE OF THE "THE MOST DANGEROUS GAME", IT HAD A FEW TOPLESS SCENES OF LOVELY GIRLS, SOME HUMOR, A GOOD SCRIPT, AN EVIL VILLAIN. I DON'T REMEMBER IF THE GIRLS HAD A RFID CHIP FOR THEIR SPACESHIP DRIVERS LICENSE, HOWEVER. | |
|
05-24-17 09:31am - 2769 days | #14 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
I LIKED "DARK ANGEL" (ALSO TITLED "I COME IN PEACE"). BETTER ACTORS, MORE BELIEVABLE ACTION. MUCH BETTER MOVIE THAN "THEY LIVE", IN MY HUMBLE OPINION. | |
|
05-24-17 09:17am - 2769 days | #5 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
SEND AN EMAIL TO THE MISSION IMPOSSIBLE TEAM. THEY ARE FAMOUS FOR HAVING THINGS THAT SELF-DESTRUCT AFTER THE MESSAGE IS TRANSMITTED. YOU COULD HAVE THE SELF-DESTRUCT MECHANISM LINKED TO YOUR HEARTBEAT: NO HEARTBEAT FOR 10 MINUTES, THEN SELF-DESTRUCT SEQUENCE TAKES OVER. | |
|
05-23-17 11:58am - 2770 days | #7 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
IF YOU LOOK AT THE HISTORY OF WHAT THE U.S. GOVERNMENT HAS DONE TO SOME WHISTLEBLOWERS, YOU WILL SOON REALIZE THAT THE LAWS THAT PROTECT PRIVATE CITIZENS HAVE VERY LITTLE PROTECTION. OR READ ABOUT HOW POLICE CAN SHOOT AND KILL UNARMED CIVILIANS. AS LONG AS THE POLICE CLAIM SELF-DEFENSE, IT'S RARE FOR A POLICEMAN WHO KILLS AN UNARMED CITIZEN TO BE PROSECUTED, LET ALONE GOING TO JAIL. IN THEORY, THE GOVERNMENT HAS ACCOUNTABILITY. SO DO THE POLICE. IN PRACTICE, IF A POLICEMAN TELLS YOU TO MOVE ALONG, YOU'D BETTER OBEY. JUST COMMON SENSE. THE LOS ANGELES POLICE MOTTO IS "TO SERVE AND TO PROTECT". WONDERFUL IDEAL. Edited on May 23, 2017, 12:02pm | |
|
05-22-17 06:00pm - 2771 days | #5 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
WITH A RFID CHIP, IF YOUR NEW LICENSE HAS ONE, THE FEDS (AND THE LOCAL POLICE, I ASSUME) CAN NOW TRACK YOUR WHEREABOUTS 24 HOURS A DAY. I DON'T KNOW IF THEY CAN TELL WHEN YOU MOVE FROM THE BEDROOM TO THE BATHROOM, BUT THEY CAN DEFINITELY TRACK WHEN YOU LEAVE YOUR HOUSE, WHERE YOU GO TO, AND ANY STOPS IN-BETWEEN. | |
|
05-20-17 08:40pm - 2773 days | #2 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
INTERESTING, BUT CONFUSING ARTICLE. SHE RAMBLES A LOT. AND YOU HAVE TO KNOW A LOT OF HER BACK STORY TO UNDERSTAND WHAT SHE'S TALKING ABOUT. SHE SEEMS TO BE A VERY CAPABLE PERSON WITH A LOT OF DRIVE AND SMARTS. AS A FORMER PORN STAR, SHE NEEDS A BULLET-PROOF SKIN AND ATTITUDE TO DEAL WITH THE HATE AND MEANNESS FROM PEOPLE. WISHING HER WELL. | |
|
05-19-17 03:15pm - 2774 days | #2 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
OK. I SEE ONE REQUIREMENT: DHS has required the use of RFID chips in its Enhanced Driver's License program, which the Department is proposing as an alternative to REAL ID. JESUS, YOU NEED TO WALK AROUND WITH A RFID CHIP, SO THE GOVERNMENT AND THE POLICE AND WHO KNOWS WHO ELSE CAN TRACK YOUR MOVEMENTS, TO BE ALLOWED TO ENTER A COMMERCIAL AIRPLANE OR FEDERAL BUILDING? 1984? POLICE STATE? DONALD TRUMP TRAMPLES ALL OVER ANY LAWS AND RULES AS PRESIDENT, BUT THE COMMON CITIZEN IS TREATED AS A POSSIBLE CRIMINAL THREAT? | |
|
05-19-17 02:55pm - 2774 days | Original Post - #1 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
YOU WILL PROBABLY NEED A TSA COMPLIANT DOCUMENT TO BOARD A COMMERCIAL AIRPLANE OR TO ENTER A FEDERAL BUILDING, WITHIN A FEW YEARS. I LIVE IN CALIFORNIA. TO GET A CA DRIVER'S LICENSE, YOU MUST SUBMIT TO: YOUR NAME SIGNATURE PHOTOGRAPHED AT THE DRIVER'S LICENSE BUREAU FINGERPRINTED (THUMB PRINT) RESIDENCE ADDRESS GIVE BASIC PHYSICAL STATS (HEIGHT, WEIGHT, EYE COLOR, HAIR COLOR, SEX, DATE OF BIRTH. THE CA DRIVER'S LICENSE IS LAMINATED. HAS A HOLOGRAM. IT HAS A BAR CODE. IT HAS A COMPUTER GRAPHIC (DIFFERENT FROM A BAR CODE) TO BE SCANNED. IT HAS A MAGNETIC STRIPE (LIKE A CREDIT CARD). IT HAS AN EXPIRATION DATE. BUT IT IS NOT TSA COMPLIANT. WHAT THE FUCK? WHAT MORE DOES IT NEED, TO BE TSA COMPLIANT? Edited on May 19, 2017, 03:05pm | |
|
05-18-17 10:21pm - 2774 days | #4 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
THIS IS MY LUCKY WEEK. NOT ONLY DID I FIND I HAVE MONEY BEING HELD AT A U.S. AIRPORT, BUT TODAY I FOUND $550,000 (U.S. DOLLARS) IN MY YAHOO ACCOUNT. THE DETAILS ARE SHOWN BELOW. BUT BEWARE: I AM THE ONLY ONE THAT CAN CLAIM THIS MONEY! ======= ======= Yahoo Mail Today at 8:13 PM Message body Yahoo! We are delighted to inform you that your e-mail have won (550,000.00. USD) in our 2017 Yahoo (email) draws. To file for claim, please contact below: ------------------------------------------------------- Mr.Michael Mc-Elhatton Claims Officer Asian Regional Sector E-mail: michaelcradford@gmail.com ------------------------------------------------------- You are to establish contact with the Following details,Kindly Confirm Your: Name Residential/Office Address Telephone Fax Number Age Sex Note: Your file will expire after 14 days if there is no response, Your swift response will enhance our service. Thanks for your co-operation; Thanks & Regards Mrs. Georgina Rowland Executive Secretary (AfDB) Yahoo Asia Pte. Ltd. YAHOO! ASIA -------------------------------------------------------------------------------------------------------------------- Yahoo Asia Pte. Ltd. (Co. Reg. No. 199700735D) VERIFIED BY YAHOO ASIA -------------------------------------------------------------------------------------------------------------------- | |
|
05-18-17 10:08am - 2775 days | #21 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
THE FBI AND NSA ARE FIGHTING COMPUTER MALWARE. BUT THEY ARE ALSO RESPONSIBLE FOR SPREADING MALWARE, BUT LEGALLY AND ILLEGALLY. READ THE ARTICLE BELOW: ======= ======= Ransomware has evolved to take on bigger targets, and has become more dangerous along the way. By Steve Ranger May 16, 2017 -- 13:18 GMT (06:18 PDT) Topic: Cyberwar and the Future of Cybersecurity Ransomware was already becoming a higher priority before the WannaCry epidemic of last week, but it's clear that it has now made the shift from nuisance to serious threat. Ransomware has been an irritation for more than a decade, but only in the last few years has it become a real problem. In the early days the victims were mostly home users, who had unwisely clicked on an a bogus attachment in an email and found their PC locked and their files and family photos encrypted. In the last couple of years, however, the focus has turned to businesses, who have more PCs and more data to compromise -- and deeper pockets to pay the ransom. But now the UK's National Cyber Security Centre has described WannaCry as a "global coordinated ransomware attack" on thousands of private and public sector organisations across dozens of countries, showing how ransomware has taken another big step -- becoming a threat to nations and not just businesses. What makes ransomware so effective is that it targets what's really important: data, be it a family's wedding photos or a company's invoices. It might lack finesse -- the malware simply encrypts anything it can find -- but it's brutally effective. This evolution has not gone unnoticed: both the head of the US Cyber Command Admiral Michael Rogers and US Director of National Intelligence Dan Coats mentioned the risks of ransomware in recent testimony to US senate committees. But neither will have expected such immediate confirmation as the WannaCry epidemic, which went global last week. Rogers warned that over the last year the US has seen increased use of ransomware against individuals and businesses. While this is usually seen as a standard police issue, or for the FBI to deal with, Rogers said ransomware was something that could become a military concern. "Criminal actors become a military concern when malicious state cyber actors pose as cyber criminals, or when cyber criminals support state efforts in cyberspace. This means that we take notice when cybercriminals employ tactics, techniques and procedures used by state adversaries," he said (PDF). The WannaCry ransomware was so potent largely because of a software exploit stolen from the NSA -- also, ironically, headed by Rogers. This also reflects the complicated set of factors underlying WannaCry's effectiveness. The US Intelligence worldwide threat assessment (PDF) presented by Coats to the US senate select committee on intelligence also highlighted that ransomware had become a particularly popular tool of extortion, noting that criminals employing ransomware had turned their focus to the medical sector, "disrupting patient care and undermining public confidence in some medical institutions". There are over 50 different ransomware variants in circulation and -- as the rise of WannaCry shows -- it's relatively easy to bolt on additional features that can make the malware more powerful. In this case, what made it so effective was the ability for the malware to spread from PC to PC without user intervention. Some police forces and cybersecurity firms have done a good job of making it easier to foil ransomware -- for example, the No More Ransom initiative hosts a number of tools that can free encrypted data without having to pay a ransom. But the difficulty of finding and prosecuting those behind ransomware attacks, plus the ease with which they can be assembled, mean that this threat is likely to be with us for the foreseeable future. 2017 CBS Interactive. | |
|
05-17-17 02:10pm - 2776 days | #3 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
THE WOMAN IS A GREAT ACTRESS, WHO DESERVES TO BE IN MOVIES. BUT--- SHE NEEDS TO BE CAREFUL. https://www.youtube.com/watch?v=fi39f70cc2s&t=319s THE IRS AGENT IS NAMED OFFICER JOHN WICK. ISN'T THAT THE CHARACTER KEANU REEVES PLAYS IN THE JOHN WICK MOVIES (JOHN WICK AND JOHN WICK 2)? IF THAT WOMAN ISN'T CAREFUL, JOHN WICK (KEANU REEVES) MIGHT DROP BY AND START SHOOTING UP HER HOUSE AND ALL THE OCCUPANTS. WHERE CAN I GO TO SCHOOL TO LEARN TO BE A JOHN WICK, AND AN IRS AGENT? THAT WOULD MAKE ME ONE OF THE MOST POWERFUL AND FEARED PEOPLE ON THE ENTIRE PLANET. GO, JOHN WICK! | |
|
05-17-17 10:59am - 2776 days | #8 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
MAYBE I'M OLD-FASHIONED, BUT PART OF THE FASCINATION OF WATCHING SOME OF THESE BEAUTIFUL TRANNIES IS NOT KNOWING WHETHER THEY ARE MEN OR WOMEN OR A COMBINATION OF BOTH. AND THAT'S WHY MY REACTION IS CONFUSED. SHOULD I BE TURNED ON BY WATCHING THESE SCENES? I MUST ADMIT I WAS. | |
|
05-16-17 11:19pm - 2776 days | #6 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
HOW ABOUT AN ALTERNATIVE APPROACH? HAVE YOU EVER EXPLORED A GREAT TRANNY SITE? OR WHAT ABOUT A GREAT GAY SITE? THE FIRST TIME I EXPLORED A TRANNY SITE (IT WAS PART OF A NETWORK), I WAS CONFUSED. I DIDN'T KNOW WHETHER I LIKED IT, OR SHOULD I LIKE IT? IT RAISED SOME QUESTIONS IN MY MIND. I HAVEN'T REALLY EXPLORED THAT NICHE VERY MUCH, BUT THE FIRST TIME I WENT THROUGH A TRANNY SITE FOR A REVIEW, IT WAS A VERY DIFFERENT EXPERIENCE. MAYBE I SHOULD TRY SOME MORE TRANNY SITES. OR A GAY SITE. TO EXPAND MY BOUNDARIES. YOU ONLY LIVE ONCE. AND JOINING THESE SITES IS LIKE BEING A VOYEUR, NOT ACTUALLY DOING IT. SO IT'S SAFER, THAT WAY. BUT THESE NICHES, AND MAYBE SOME OTHERS, WILL GIVE YOU A DIFFERENT EXPERIENCE THAN YOUR NORMAL BLOW JOB. | |
|
05-16-17 05:21pm - 2777 days | #20 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
Apple fixes dozens of security bugs for iPhones, Macs The company released iOS 10.3.2 for iPhones and iPads. It also released macOS 10.12.5. Zack Whittaker By Zack Whittaker for Zero Day May 15, 2017 -- 19:06 GMT (12:06 PDT) Topic: Security Apple has squashed dozens of security bugs in its latest releases of its iPhone, iPad, and Mac operating systems. The Cupertino, Calif.-based company rolled out 23 security fixes in iOS 10.3.2 and another 30 fixes in macOS 10.12.5, both of which were released on Monday. Among the bugs, two bugs in iBooks for iOS could allow an attacker to arbitrarily open websites and execute malicious code at the kernel level. Over a dozen flaws were found in WebKit, which renders websites and pages on iPhones and iPads, that could allow several kinds of cross-site scripting (XSS) attacks. A separate flaw in iBooks for macOS desktops and notebooks could allow an application to escape its secure sandbox, a technology used to prevent data loss or theft in the case of an app compromise. Almost half of the bugs found were attributed to Google's Project Zero, the search giant's in-house vulnerability-finding and security team. One of the iOS bugs credited to Synack security researcher Patrick Wardle described a kernel flaw in which a malicious application could read restricted memory, such as passwords or hashes. In a blog post last month, Wardle explained how he found the zero-day flaw following a supposed fix in an earlier version of macOS 10.12. He said that Apple's patch "did not fix the kernel panic" and worse, "introduced a kernel info leak, that could leak sensitive information" that could bypass the operating system's security feature that randomizes the kernel's memory address locations. In an email, Wardle admitted he "didn't realize it affected iOS too." Patches are available through the usual automatic update channels. 2017 CBS Interactive. | |
|
05-16-17 03:11pm - 2777 days | Original Post - #1 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
I GOT THIS EMAIL TODAY, INFORMING ME THAT MY MONEY IS BEING HELD AT CHARLESTON AIRPORT. I HOPE IT'S LOT OF MONEY, BECAUSE I WANT TO GO TO VEGAS! HAS ANYONE ELSE HIT IT LUCKY? =================================================================== Re: YOUR CONSIGNMENT WAS HELD AT (CHS) SC USA People Andrew J Savage Today at 12:44 PM To @ Message body Very Urgent!!! My Name is Mr. Andrew J. Savage, III, Senior Storage officer at Charleston International Airport (CHS) SC USA. During our recent withheld package routine check at the Airport Storage Vault, we had discovered an abandoned shipment from one Diplomat agent, under shipping forwarder from Hatfield-Jackson Atlanta Intl Airport to our facility custody here in Charleston International Airport SC and when scanned, it revealed an undisclosed sum of money in one Metal Trunk Box. The consignment was abandoned because the Contents of the consignment was not properly declared by the consignee as MONEY rather it was declared as personal effect to avoid diversion by the shipping agent or inability of the diplomat to pay for United States Inspection charges. The details of the consignment including your name/address and official documents from United Nations were tagged on the consignment box, Please note that this consignment supposed to return to the United States Treasury Account as an unclaimed fund due to your delays in contacting us for the claims. So i will urgently advise you to write back to me for further instruction on how to claim your fund which await delivery at Charleston International Airport SC. Warmest Regards, Mr. Andrew J. Savage, III, the Senior Storage officer at Charleston International Airport SC. =================================================================== | |
|
05-16-17 03:08pm - 2777 days | #2 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
SORRY, I DON'T KNOW OF A SPECIFIC SITE THAT WILL KNOCK YOUR SOCKS OFF. BUT EVERY ONCE IN A WHILE, YOU WILL STILL FIND A VIDEO OR PHOTO SET THAT IS TRULY HOT. SO AS LONG AS YOUR FEET ARE ABLE TO WALK, THERE'S HOPE. | |
|
05-15-17 07:08pm - 2778 days | #13 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
THAT'S THE USUAL REASON GIVEN FOR WHY TRADITIONAL CREDIT CARD COMPANIES DON'T WANT TO DO BUSINESS WITH PORN SUPPLIERS. BUT I THINK THAT THERE'S ALSO THE ADDED IDEA THAT PORN IS "BAD", AND THE CREDIT CARD COMPANIES AND PROCESSORS DON'T WANT TO BE ASSOCIATED WITH PORN COMPANIES. PAYPAL FOR MANY YEARS REFUSED TO DO BUSINESS WITH PORN COMPANIES. THEN, A FEW YEARS AGO, STARTED DOING BUSINESS WITH SOME PORN COMPANIES (ALLOWING MONEY TO BE SENT TO THEIR PAYMENT PROCESSORS). BUT THEN PAYPAL STARTED REFUSING SOME PORN BUSINESSES. QUITE OFTEN, WHEN I TRY TO PAY FOR A PORN MEMBERSHIP WITH A MAJOR CREDIT CARD, THE PAYMENT IS REFUSED: DISCOVER, MASTERCARD, VISA. BUT IT DEPENDS ON THE BANK ISSUING THE CARD. MASTERCARD OR VISA FROM SOME BANKS WILL BE REFUSED (BY THE CREDIT CARD COMPANY), BUT FROM ANOTHER BANK IT MIGHT BE ACCEPTED. SO I GUESS THE BANKS MAKE RULES AND REGULATIONS ON HOW THE CARDS CAN BE USED. AND IF THE CARD IS ATTEMPTED TO USE WITH A KNOWN PROCESSOR SUCH AS CCBILL OR EPOCH, THAT ATTEMPT IS AUTOMATICALLY BLOCKED. I'VE HAD HOLDS PLACED ON DIFFERENT CREDIT CARD ACCOUNTS, WHEN I TRIED TO JOIN PORN SITES THROUGH CCBILL AND EPOCH--UNTIL I CALLED THE CREDIT CARD COMPANY AND ASKED FOR THE HOLD TO BE REMOVED. | |
|
05-13-17 06:56pm - 2780 days | #16 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
I READ THAT YEARS AGO, THAT WAS TRUE: THAT MOST MALWARE WAS FOR THE PC, INSTEAD OF THE MAC. BUT IN RECENT YEARS, DUE TO THE GROWING POPULARITY OF MACS, MALWARE FOR MACS ARE BECOMING MORE COMMON. SO I WOULD GUESS THAT MACS SHOULD BE PROTECTED BY A STRONG ANTI-VIRUS PROGRAM, IN ADDITION TO PCS BEING PROTECTED BY A STRONG ANTI-VIRUS PROGRAM. BUT THE TRUTH IS, ANY DATA ON YOUR PC OR MAC CAN BE VULNERABLE TO HACKS. THE ARTICLE ABOVE IS ONE EXAMPLE WHERE HACKERS ADDED MALWARE TO A PROGRAM THAT WAS INSTALLED BY THE MANUFACTURER (HP) ON THEIR NEW COMPUTERS. I'VE READ ARTICLES WHERE HACKERS INSTALLED MALWARE ON NEW HARD DRIVES (BEFORE THEY WERE INSTALLED BY THE MANUFACTURERS ON NEW PCS. | |
|
05-13-17 09:27am - 2780 days | #20 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
IS THERE ANY WAY YOU CAN STREAM MOVIES AND MUSIC TO MY PHONE OR LAPTOP? I MIGHT EVEN BE WILLING TO PAY A MONTHLY FEE, IF THE SERVICE IS UP TO MY STANDARDS. BUT A ONE-TIME CHARGE WOULD BE EVEN BETTER! | |
|
05-12-17 01:16pm - 2781 days | #13 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
COMPUTER SECURITY IS A COMPLEX ISSUE. HACKERS CAN USE INGENIOUS METHODS TO CAPTURE YOUR DATA. READ THE ARTICLE BELOW, TO SEE HOW HACKERS INSTALLED MALWARE ON BRAND-NEW HP COMPUTERS. ============================================================ http://www.zdnet.com/article/keylogger-f...84754384421679931766 HP issues fix for 'keylogger' found on several laptop models A security researcher says an audio driver is recording every keystroke entered, accessible to any person or malware that knows where to look. Zack Whittaker By Zack Whittaker for Zero Day | May 12, 2017 -- 00:30 GMT (17:30 PDT) | Topic: Security An audio driver installed in several HP laptops contains a keylogger-type feature that records every keystroke entered into the computer into a log file, according to a security researcher. Swiss security firm Modzero said in a security advisory posted Thursday that the keylogger activity was discovered in the Conexant HD audio driver package (version 1.0.0.46 and earlier), found on dozens of HP business and enterprise laptop models, including HP Elitebook, ProBook, and ZBook models -- including the latest Folio G1 laptop. Anyone (or malware) with local access to the user's files on an affected computer, could obtain passwords, visited web addresses, private messages, and other sensitive information. HP has since rolled out patches to remove the keylogger, which will also delete the log file containing the keystrokes. A spokesperson for HP said in a brief statement: "HP is committed to the security and privacy of its customers and we are aware of the keylogger issue on select HP PCs. HP has no access to customer data as a result of this issue." HP vice-president Mike Nash said on a call after-hours on Thursday that a fix is available on Windows Update and HP.com for newer 2016 and later affected models, with 2015 models receiving patches Friday. He added that the keylogger-type feature was mistakenly added to the driver's production code and was never meant to be rolled out to end-user devices. Nash didn't how many models or customers were affected, but did confirm that some consumer laptops were affected. He also confirmed that a handful of consumer models that come with Conexant drivers are affected. The pre-installed audio driver installs a driver located in the Windows system folder, which is scheduled to start every time the user logs in. Modzero describes the application as a crude way to check to see if a hotkey was pressed by monitoring "all keystrokes made by the user to capture and react to functions such as microphone mute/unmute keys/hotkey." The application then logs each keystroke into an unencrypted log file stored in the user's home directory. The log file is overwritten every time the user logs in. In the case that a log file doesn't exist, Modzero says that the driver's API can allow malware to "silently capture sensitive data by capturing the user's keystrokes." We weren't immediately able to confirm the findings, but a security researcher (who wanted to remain nameless) confirmed the findings of the advisory in a message to ZDNet. Conexant did not respond to a request for comment at the time of writing. Updated at 8:30pm: with commentary from HP. | |
|
05-12-17 12:29pm - 2781 days | #182 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
http://interactivegf.com/ I JUST RECEIVED AN OFFER TO JOIN THIS SITE BECAUSE I AM A MEMBER OF MR SKIN. NEVER HEARD OF THE SITE BEFORE. SOME KIND OF PORN ROLE-PLAYING GAME. | |
|
05-12-17 10:30am - 2781 days | Original Post - #1 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
IN 2014 CAPTAIN AMERICA: THE WINTER SOLDIER REVEALED TO THE WORLD THAT THE TERRORIST ORGANIZATION HYDRA WAS ACTIVE IN AMERICA. NOW, THE SUPER TRUTH IS REVEALED: TYPE THE URL ADDRESS: HAIL-HYDRA.COM INTO YOUR BROWSER, AND IT REDIRECTS TO THE OFFICIAL WHITEHOUSE WEBSITE FOR PRESIDENT DONALD TRUMP. IN THE COMICS AND MOVIES THE BADDIES WERE WHISPERING "HAIL HYDRA" TO EACH OTHER, JUST LIKE THE NAZIS USED TO DO. SOON, WE WILL BE FORCED TO HAIL TRUMP! WILL CAPTAIN AMERICA RISE UP (OR TONY STARK OR AN OTHER SUPER-HERO?) TO SAVE US? NOTE: TYPING HAIL-HYDRA.COM INTO YOUR INTERNET BROWSER ADDRESS DOES REALLY RE-DIRECT YOU TO THE OFFICIAL WHITEHOUSE WEBSITE. NO JOKE. | |
|
05-12-17 05:50am - 2781 days | #3 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
IF YOU'RE GOING TO USE ALEXANDER SKARSGARD AND KATE BECKINSALE IN YOUR PORN PIZZA SCENE, IT WILL PROBABLY COST THOUSANDS OF DOLLARS, INSTEAD OF HUNDREDS. THAT'S IF YOU CAN ACTUALLY GET THEM. | |
|
05-10-17 08:47am - 2783 days | #11 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
USENET IS STILL AROUND. IT'S VERY CHEAP TO USE (TO BUY A MONTHLY MEMBERSHIP). BUT MY MAIN INTEREST WAS IN COLLECTING PHOTOS OF PLAYBOY PLAYMATES. AND THOSE SITES DON'T SEEM TO BE AS ACTIVE AS THEY USED TO BE FORMERLY. SO IT'S HARDER TO COLLECT ALL THE PHOTOS OF THE PLAYBOY PLAYMATES. YOU COULD JOIN FOR A MONTH, AND DO A SEARCH FOR THREADS THAT MIGHT INTEREST YOU. THE COST WOULD BE VERY LOW. MAYBE $6 OR LESS. THERE ARE ALSO FREE TRIALS AVAILABLE FOR 30 DAYS. YOU WOULD NEED A PROGRAM TO HELP DOWNLOAD FILES, SOME OF THOSE PROGRAMS ARE FREE. BUT THERE ARE THOUSANDS OF THREADS, MOST OF THEM NOT ACTIVE. ON DIFFERENT TOPICS. SO IS IT WORTHWHILE HAVING A USENET ACCOUNT? THE PRICE IS VERY LOW. BUT IT DEPENDS ON WHAT YOUR INTERESTS ARE. WHETHER YOU WILL FIND THREADS THAT INTEREST YOU. AND IF YOU HAVE THE TIME FOR THEM. AND THERE IS A LEARNING CURVE, IF YOU HAVEN'T USED USENET IN A WHILE. AND YES, IT'S STILL LIKE THE WILD WEST. LOTS OF VIRUSES/MALWARE. A LOT OF SPAM ON MOST THREADS. YOU DEFINITELY NEED A STRONG ANTI-VIRUS PROGRAM. IS USENET USEFUL OR WORTHWHILE FOR YOU? THAT'S A PERSONAL DECISION. THAT YOU HAVE TO MAKE. | |
|
05-10-17 04:37am - 2783 days | Original Post - #1 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
http://variety.com/2017/film/asia/film-i...n-jae-in-1202421834/ Variety Election of New South Korean President Heralds Film Industry Reforms Sonia Kil May 9, 2017 | 09:49PM PT The election of Moon Jae-in as South Korea’s new president heralds multiple changes in the country’s cultural and entertainment industries, including the rollback of a government blacklist of artists and a shakeup of state-controlled funding programs. Moon, a liberal former human-rights lawyer, was elected with 41% of the vote Tuesday to replace disgraced former President Park Geun-hye. Park was impeached, and now languishes in jail as she faces criminal charges of corruption and abuse of power. Moon was sworn in Wednesday morning. He says he will reverse policy in many of the areas where Park faces legal proceedings, including in South Korea’s film industry, the world’s sixth-largest. Supported by her political cronies, including former culture minister Cho Yoon-sun and chief of staff Kim Ki-choon, Park was involved in blacklisting more than 9,000 cultural figures deemed to be anti-government. The list was compiled to exclude artists and companies from state-controlled funding programs. Moon has pledged to undo the damage of Park’s interference in the arts. “The blacklist is a national violence [against art and artists] that infringed upon the fundamental basis of democracy,” he said in April. He also wants the resignation of the heads of state organizations, such as the Korean Film Council, that acquiesced to Park’s demands. It was recently revealed that the council had tried to sway public opinion by anonymously submitting a newspaper column justifying drastic budget cuts to the troubled Busan film festival. The council’s chairman, Kim Sae-hoon, is now on the verge of resigning. The Busan film festival’s woes were sparked by the local mayor’s intervention in the fest’s programming in a bid to protect Park’s image. Moon has gone on record as saying that sitting mayors should not be allowed to serve as festival heads. He has said he would provide an institutional strategy to protect film festivals’ independence and autonomy. Under Park, a state-controlled fund accessed by nearly 40% of Korean films each year was diverted to give more support to pro-government, nationalistic movies. Critics say that the fund’s manager, the Korea Venture Investment Corp., operated as a de facto censor. Moon says he wants to reduce the size of the profit-seeking fund, currently worth $880 million (KRW 1 trillion), and to support art-house and indie titles. Moon is also promising to reform the powerful family-run conglomerates, known as chaebols, that dominate Korean industry. Chaebols have long had close relations with government and politicians, and stood accused of unfair business practices, including awarding contracts to affiliates and forcing price markdowns from subcontractors. Korea’s top entertainment firms – Samsung, CJ and Lotte – have all been caught up in Park’s bribery and influence-peddling scandals. But if reforming the conglomerates is a tough task, so is overhauling foreign policy, which also has implications for the entertainment industry. In the last year, China has adopted punitive measures against Korean entertainment, tourism and cosmetics companies in retaliation for the installation on Korean soil of a U.S. missile-defense system known as THAAD. Korea-China co-productions have been canceled, and Korean actors have even had their faces blurred out on Chinese TV. Advocates of THAAD say it is necessary to protect against the threat of a missile attack from North Korea. As a candidate, Moon was circumspect on the issue, saying only that the deployment deal should be “reviewed” and that decisions should be left to the new administration. On North Korea, Moon wants to end the hard line pursued by Park and her predecessor, Lee Myung-bak, and instead revive the “sunshine policy” of dialogue with Pyongyang. Moon says that a decade of confrontation has done nothing to arrest North Korea’s nuclear program. | |
|
05-09-17 01:17pm - 2784 days | #7 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
I SOMETIMES DOWNLOAD FROM USENET SITES. AND SOME FILES CAN BE INFECTED. BUT SINCE I ALSO HAVE NORTON ANTI-VIRUS PROTECTION, THAT USUALLY ISOLATES AND REMOVES ANY MALWARE PROGRAMS. I HAVEN'T USED THE USENET SITES VERY MUCH LATELY. BUT THEY WERE A GOOD SOURCE FOR GETTING THE OLD PLAYBOY PHOTOS OF PLAYMATES. A MUCH BETTER SOURCE THAN THE PLAYBOY SITES THEMSELVES, FOR SOME REASON. BETTER FILES FROM THE USENET THREADS: MORE COMPLETE, AND BETTER FORMATTED JPG FILES. BUT I AGREE WITH YOUR EXPERIENCE FROM PORN PAYSITES: I DON'T RECALL EVER GETTING ANY MALWARE FROM A PORN PAYSITE, IN ALL THE YEARS I'VE BEEN STREAMING AND DOWNLOADING. I USED TO EXAMINE EACH FILE I DOWNLOADED FROM ANY PORN PAYSITE WITH NORTON ANTI-VIRUS. I NEVER FOUND A SINGLE INSTANCE WHERE A FILE WAS INFECTED. THAT'S BEEN OVER 10 YEARS, NOW. OR MORE. BUT LATELY, I'VE STOPPED CHECKING THE FILES FROM METART. I FIGURE: 1. THE FILE IS ALMOST CERTAINLY CLEAN. 2. IF THE FILE IS INFECTED, NORTON ANTI-VIRUS WILL ISOLATE IT, WHEN I EXPAND THE ZIP FILE. 3. GETTING LAZY IN MY OLD AGE. Edited on May 09, 2017, 01:28pm | |
|
05-07-17 02:45pm - 2786 days | #10 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
MY BEST GUESS IS THAT MANY GOVERNMENTS, INCLUDING THE GOOD OLD USA, HAVE ACCESS TO NOT JUST ONLINE STORAGE DATA, BUT MOST DATA STORED ON COMPUTERS THROUGHOUT THE WORLD. LEGAL AND QUASI-LEGAL ACCESS. IF YOU READ THE NEWS, THERE ARE CONSTANT ARTICLES THAT STATE THE US GOVERNMENT KEEPS ASKING FOR BACK-DOORS INTO CLOUD STORAGE, ISP DATA, BIG-BUSINESS PROGRAMS, ETC., ETC. THAT'S IN ADDITION TO THE SPY AGENCIES THAT ARE ALLOWED (LEGAL AND QUASI-LEGAL) TO SNOOP ON COMPUTERS AND ANY OTHER ELECTRONIC DEVICES THAT USE THE NET, OR COMMUNICATE ELECTRONICALLY (CELL PHONES, WHATEVER). JUSTIFIED BY POLICE AND TERRORIST CONCERNS, OF COURSE. | |
|
05-05-17 01:52pm - 2788 days | Original Post - #1 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
Liam Neeson Makes Surprise Appearance at Sandwich Shop that Promised Him Free Food Zach Seemayer Entertainment Tonight May 4, 2017 If you offer Liam Neeson free sandwiches, be prepared for the action legend to come calling. The actor stopped by Big Star Sandwich Co., an eatery in Vancouver, Canada, on Tuesday after employees put a sign up out front that read "Liam Neeson eats here for free." Employees at the sandwich shop obviously jumped at the opportunity to pose for a snapshot with the star, who provided one of his iconic Taken glares for the epic snapshot. "Holy f**k, it worked! #liamneeson," Big Star Sandwich Co. captioned the awesome pic. MORE: 8 Reasons Why We're Bummed Liam Neeson Is Quitting Action Films In an interview with The Huffington Post, Big Star manager Matt Prium explained that he'd heard Neeson would be in the neighborhood filming an new thriller, Hard Powder. On the off chance that the actor might walk by, he wrote the message on the chalkboard sign offering him free food. On the other side of the sign, Prium wrote, "Come in and get taken away by our sandwiches." WATCH: Jimmy Fallon Challenges Liam Neeson to Arm Wrestling According to Alex Johrden, director of operations for Big Star, the sign was put out at 11 a.m., and seven hours later Neeson showed up at the restaurant and asked, in his famously gravelly tone, "Where's my free sandwich?" It turns out, Neeson was in a hurry and couldn't actually chow down on a free meal, but he did take the time to pose for a pic with the sign. In honor of the icon, Big Star created a signature sandwich called The Neeson, which they described as having "lots of beef, a one-two punch of bacon and hickory sticks, and spice that'll get revenge on you tomorrow!" | |
|
04-28-17 08:59am - 2795 days | #9 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
WHY DO MEMBERS OF CONGRESS PASS LAWS FOR THE NATION, BUT EXEMPT THEMSELVES FROM THOSE LAWS? IN OTHER WORDS, DO WHAT I TELL YOU TO DO, NOT WHAT I DO. THAT USED TO BE CALLED A DOUBLE STANDARD, BACK IN THE DAY. =============================== =============================== The Wrap Colbert Calls House GOP Members ‘D—–bags’ Over ‘Zombie Trumpcare’ Exemption (Video) “It is just exhausting … watching this man try to accomplish something,” the “Late Show” host jokes on Trump’s first 100 days Tony Maglio | April 28, 2017 @ 7:51 AM Like most of you, Stephen Colbert cannot wait for President Trump’s first 100 days to officially be over — if for no other reason than so we can all finally stop talking about it. Fortunately, Monday will mark that milestone. “It is just exhausting … watching this man try to accomplish something,” the “Late Show” host quipped on Thursday. Over the course of his still-young term, Trump’s healthcare bill has been particularly tough to follow in all of its iterations. The Affordable Care Act’s replacement is now being referred to as “Zombie Trumpcare,” as the proposed law is pretty much a shell of its original form. “Unlike Obamacare, under the new plan, individual states would be allowed to not cover pre-existing conditions,” Colbert explained the proposal’s continued resistance. “In preparation for this passing — just in case — yesterday, the House GOP exempted themselves from Zombie Trumpcare,” he added, receiving a predictable shower of boos from the studio audience. “Do not be too hard on these guys, you have to understand: They all would have lost their coverage, because being a douchebag is a pre-existing condition for [them].” | |
|
04-27-17 01:03pm - 2796 days | #176 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
IT'S PROBABLY BETTER TO STICK WITH SITES THAT HAVE A HIGH RATING FROM PU/TBP. AT LEAST YOU HAVE REVIEWS THAT YOU CAN READ THE PROS AND CONS AND OTHER DETAILS. MUCH SAFER. BUT NOT AS SATISFYING AS FINDING A GREAT SITE ON YOUR OWN, OF COURSE. EXCEPT YOU WILL PROBABLY HIT A FEW CLINKERS ALONG THE WAY. | |
|
04-27-17 11:22am - 2796 days | #174 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
HOW DO YOU TELL IF THE MODELS ARE ACTUALLY KOREAN? THEY COULD BE JAPANESE OR CHINESE, FROM WHAT I AM SEEING. | |
|
04-27-17 11:17am - 2796 days | #7 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
TRUMP HAS PROMISED TO MAKE AMERICA GREAT AGAIN. ONCE THE PEOPLE HAVE SEEN WHAT TRUMP HAS ACCOMPLISHED, THE REPUBLICAN CONGRESS WILL BE FORCED TO MAKE TRUMP PRESIDENT FOR LIFE. WITH HIS ELDEST DESCENDENT HIS NATURAL HEIR. I WANT EVERYONE TO WAKE UP IN THE MORNING, SINGING "AMERICA THE BEAUTIFUL". WHAT A GREAT PLACE TO LIVE FREE. END OF RANT. | |
|
04-26-17 11:02pm - 2796 days | #5 | |
lk2fireone (0)
Active User Posts: 3,618 Registered: Nov 14, '08 Location: CA |
THIS IS NOT BREAKING NEWS. BUT I MISSED IT WHEN IT CAME OUT, AND I THINK IT'S WORTH NOTICING: ===================== ===================== US Congress Just Gave Internet Providers The Green Light To Sell Customers' Browsing History Without Consent Libby Watson Mar 29, 2017, 1:30pm The US House of Representatives voted today to repeal rules preventing internet service providers from selling their customers' web browsing and app usage data without explicit consent. The Senate passed the same bill last week, which means the only obstacle that remains is a signature from President Trump — and the White House has already signalled he will do so. The rules would have required ISPs to get explicit opt-in consent from customers before selling their sensitive data, including web browsing history and app usage data. The rules hadn't gone into effect yet, and Federal Communications Commission (FCC) chairman Ajit Pai stopped the first provision, which would have required ISPs to keep customer data secure — what a concept! — from going into effect earlier this month. Without these rules, "there will be no strong federal protection for consumers when it comes to how their ISP can use their information," Dallas Harris, a policy fellow at the privacy advocacy group Public Knowledge, told Gizmodo. Under the current statute, customers must be allowed to opt out of letting their ISP sell their data, but without a rule to interpret that statute, it's much harder to enforce. And the 2-1 Republican majority at the FCC is hardly desperate to enforce that rule. Eric Null, the policy counsel at the Open Technology Institute, told Gizmodo it's "highly unlikely" that we'd see any enforcement by the FCC if a provider doesn't provide reasonable measures to opt out. The rules were repealed using the Congressional Review Act, which was used only once before the Trump administration, but has been implemented seven times since January. Essentially, this means the FCC can't issue any "substantially similar" rules in the future. Gigi Sohn, former counsellor for ex-FCC chairman Tom Wheeler, told Gizmodo that it isn't clear whether this means the FCC would be prevented from passing stronger rules in the future, and that ISPs may not have "given a whole lot of thought" to that possibility. But it seems that ISPs are betting that this would act as a "nuclear option", eliminating the possibility of future regulation by the FCC. So, what does this mean for US consumers? Harris told Gizmodo that they will "have to take their privacy into their own hands". Practically speaking, Harris said, this means Americans should "get online right now, get on [their] ISP's website" and opt out of having their data sold. It might also mean getting a VPN — a private network that routes all traffic through its servers — though they'll have to pick one they trust not to sell their data, too. Harris also fears that the repeal will have a "chilling effect" on broadband adoption among those who still aren't online. As the Electronic Frontier Foundation has pointed out, there are also serious implications for security: If ISPs look to sell consumer data, "internet providers will need to record and store even more sensitive data on their customers, which will become a target for hackers". Even if they anonymise your sensitive data before they sell it to advertisers, they need to collect it first — and these companies don't exactly have a perfect track record in protecting consumer data. In 2015, for example, Comcast paid $US33 million ($43 million) as part of a settlement for accidentally releasing information about users who had paid the company to keep their phone numbers unlisted, including domestic violence victims. This is all made much more difficult for consumers by the dearth of broadband competition in the US. More than half of Americans have either one or even no options for providers, so if you don't like your ISP's data collection policies, chances are you won't be able to do much about it, and providers know that. It's highly unlikely that providers, particularly the dominant companies, will choose to forego those sweet advertising dollars in order to secure their customers' privacy, when they know those customers don't have much choice. After the Senate passed its version of the repeal last week, the bill was blasted by multiple open internet advocacy groups, including the Center for Democracy and Technology. There was also a last-minute push by advocacy groups to turn the public against the bill prior to the vote. The EFF and ACLU called on the public to call their representatives, which got a boost of sorts from actress Alyssa Milano: Meanwhile, lobbying groups that represent internet providers and tech companies lauded the bill. Last week, the Consumer Technology Association, which represents companies including Facebook, Apple and Twitter, said the privacy regulation "threatens to undermine innovation and competition in the internet ecosystem". (Gigi Sohn told us that's a "stock line they use any time they get regulation they don't like".) The criticism that the rule is inconsistent with the FTC's privacy framework is utter garbage. Not only is it largely meaningless to almost everyone — who the hell knows what the FTC's privacy framework is? — it's also a rhetorical trick to obscure what ISPs actually want, which is weaker regulation. The FTC's privacy framework was only really different in one crucial way that ISPs hated: It doesn't consider web browsing and app usage "sensitive", which requires opt-in consent, but the FCC does, and advertisers really want to get their hands on that valuable web browsing data. Repealing the FCC rules "doesn't create a level playing field, it just creates a hole in protections," says Harris. All is not completely lost. US ISPs still has to allow people to opt out of having their data sold, so customers can call them or go online to find out how to do that. But today's news is devastating for privacy overall. Consumers could have had more control over their privacy; your data could have been safer. Things could have been better, if Congress had done what it usually does and done nothing. Instead, they made things worse for anyone who doesn't run an internet company or an advertising agency. There's no policy justification and no public interest in doing this; consumers are deeply fearful, in fact, about their privacy online. It was an action solely designed to benefit some already very rich companies that barely anyone wanted. | |
|
1751-1800 of 3618 Posts | < Previous Page | 1 | 2 | 7 | 12 | 17 | 22 | 27 | 35 | Page 36 | 37 | 42 | 47 | 52 | 57 | 62 | 72 | 73 | Next Page > |
|