WHERE IS THE ANTITRUST LAW IMMUNE RESPONSE TO PARTRIMONAL CAPITALISM?

It’s so out of control

THE MONOPLY
Trends in governing have eroded the beliefs, norms and processes by which we learn to be accommodating citizens in a pluralistic, deliberative democracy. By manufacturing rights that limit democratic decision-making, centralizing power in Washington far from citizens’ lives, and empowering unelected bureaucrats in federal regulatory agencies, we’ve obstructed Americans’ practice of self-government.

WHERE IS THE ANTITRUST LAW IMMUNE RESPONSE TO PARTRIMONAL CAPITALISM?
Is law in the hands of the consumer or big business or the presidents colleagues?

Jerry Nadler is demanding information on Trump’s business and ties to Russia as well as the administration’s activities.
Representative Adam Schiff, the chairman of the House Permanent Select Committee on Intelligence, has hired Daniel Goldman, who served as an Assistant United States Attorney in the Southern District of New York from 2007 to 2017, as the committee’s senior adviser and director of investigations. He is a  veteran prosecutor with experience fighting Russian organized crime to lead his investigation of the Trump Administration.

Predatory Monoply Control
What the 1% Knows and you don’t
Capital in the 21st Century by Thomas Piketty
Moyers & Company
Economist Paul Krugman explains how the United States is becoming an oligarchy – the very system our founders revolted against.
Patrimonial Capitalism Oligarchy Wealth – inherited wealth
https://www.youtube.com/watch?v=QzQYA9Qjsi0

!!!!!! Documenting all the places personal data goes.
https://thedatamap.org/

►Top MultiState Buyers of Personal Health Information
https://thedatamap.org/map2013/statebuyers.php

HIBP Have I Been Pawned?
https://pastebin.com/search?q=%40aol.com

►Rich Uncle Penny Bags trolls Equifax Hearing
https://cyberplayground.org/2019/03/03/monoply-mr-moneybags-russia-graphic/

► The words “common” and “predominate” spell out the problem with 50-state cybersecurity class actions
A Congresswoman gave Equifax data breach lawsuits a gift
https://finance.yahoo.com/news/a-congresswoman-gave-equifax-data-breach-plaintiffs-a-gift-190737413.html

► The 50-State Cybersecurity Class Action Is Here to Stay. How to Defend Against It!
https://finance.yahoo.com/news/50-state-cybersecurity-class-action-033054371.html

Amazon CEO Jeff Bezos hates when he is spied on but loves to spy on everyone else.

How the National Enquirer obtained the intimate photos exchanged between Bezos and his mistress. Jeff Bezos new girlfriend, says she ‘loved being on camera’ sending Lauren Sanchez text messages.
https://www.aclu.org/blog/privacy-technology/surveillance-technologies/amazon-google-and-microsoft-are-odds-dangers-face

The world’s richest billionaire and a notorious labor abuser, Amazon CEO Jeff Bezos Builds a Sprawling Surveillance State for Everyone Else but doesn’t like it when his girlfriends phone gets hacked showing his sexting sexy texts of the adulterous affair via sms. It’s easy to trick cellular providers into essentially giving them access to the person’s phone number. Hackers just call up.

  • Verizon, impersonate you, and convince the company to redirect his text messages to a different SIM card, intercepting your one-time login codes.
  • Comcast set Xfinity mobile phone set pins to “0000,” for all it’s customers and no way for them to change it — helping attackers steal phone numbers Xfinity Mobile deploys fix after weak PIN system fueled number-porting attacks. Comcast help page was edited this week 3/1/19 to remove any references to the account PIN. xfinity Mobile does not allow adding a PIN to your number and the PIN is 0000 for all numbers.
  • Kanye West’s iPhone X password was 000000
  • Zuckerberg’s password across multiple accounts dadada

SO HEY YOU SHOULD STOP USING TEXTS FOR TWO-FACTOR AUTHENTICATION
sexting / text messages are easily hacked / sms insecure
SMS text messages are often the weakest link in two-step logins

Hack Someone’s Phone to View Text Messages
Reddit Hacked, Despite SMS Two-Factor Authentication The hacker gained access to Reddit’s internal systems by circumventing SMS-based two-factor authentication on employee accounts. “We learned that SMS-based authentication is not nearly as secure as we would hope,” a website engineer said.
https://www.pcmag.com/news/362871/reddit-hacked-despite-sms-two-factor-authentication

Push is an application level service, sitting on the top of existing WAP stack. The server does not simply send push content to the phone, the user would surely not accept, for instance, interrupting of a voice call.

SMS services are content services initiated by SMS message to certain (usually short) phone number, which then answers with requested content, if available. It can also be used to send regular text as well as advanced content like operator logos, ringing tones, business cards and phone configurations. Lastly… SMS, short messaging service, is a way to send short (160 character) messages from one GSM phone to another. Push over GPRS can only simplify matters. BUT QUITE SIMPLY, PHONES CURRENTLY OPERATE THIS WAY. Using two bearers seems to be an unnecessary complication. Because Push Proxy Gateway tokenizes SI and SL documents, it may fit one SMS message (if not, it is segmented for transfer). The push content is sent to the phones over SMS, but the content is fetched by the phone over IP bearer, for instance CSD or GPRS. Then the user can decide does he accept push or not. It contains an URL specifying the service and a text for user describing the content. These inform the user about the content become available, and it is displayed only when it is not interrupting anything. Instead it sends a specific XML document, either Service Indication or Service Loading. It defines three kind of XML documents, one for the push data itself and another for protocol purposes (these are called pap document or push control documents). OTA is a lightweight protocol speaking with WAP stack (to be more specific, with WSP), PAP speaks with the push initiator. It defines two protocols, OTA and PAP. For this purpose WAP Forum defined WAP Push. There is, however, situations when the server (called in this context a push initiator) should be the initiator, for instance, when it must send a mail notification or a stock quote. ^ explains pull mode of operation: the phone initiates the transaction. Therefore, Kannel (Twitter) functions simultaneously as both a WAP and an SMS gateway. Although WAP is the hot and technically superior technology, SMS phones exist in huge numbers and SMS services are thus quite useful.
https://en.m.wikipedia.org/wiki/Push_Proxy_Gateway

Turn on the service Text “on” to 40404
Turn off mobile updates but keeep an active account on the web you can test “off” to 40404 or visit Twitter.com and trun off phone alerts. To delete your account text “delete me” to 40404 or visit your settings page and click “Delete your account.”

ALL THIS SPYING ON YOU !!!! is just fine with Jeff he just doesn’t like it when it happens to him.

2017, Amazon’s Rekognition AI face-recognition software used by governments and police forces around the world to spy on crowds.

Amazon is vying for a $10 billion contract with the Department of Defense to consolidate and host its data on the cloud.
Google is no longer competing for the $10 billion contract, and it decided not to renew an AI contract with the Pentagon after employees signed a petition.

Jeff Bezos says his companies will continue to do business with the US Department of Defense, despite internal and external criticism.
“If big tech companies are going to turn their back on the DoD, this country is going to be in trouble,” said Bezos on stage at the Wired25 conference in San Francisco on Monday.
The billionaire has faced backlash from Amazon (AMZN) employees over its business deals with government agencies.

Amazon CEO Jeff Bezos acknowledged his company’s Amazon’s AI Rekognition face-recognition software might be put to “bad uses,” buh he said the solution was to wait for society’s eventual “immune response” to take care of the problems.

REPEAT THIS TO YOUR FRIENDS

► ► “When they substitute their knowledge for ours, we grow angry because they have robbed us of our agency.”

Trends in governing have eroded the beliefs, norms and processes by which we learn to be accommodating citizens in a pluralistic, deliberative democracy. By manufacturing rights that limit democratic decision-making, centralizing power in Washington far from citizens’ lives, and empowering unelected bureaucrats in federal regulatory agencies, we’ve obstructed Americans’ practice of self-government.
https://cyberplayground.org/2018/12/04/when-they-substitute-their-knowledge-for-ours-we-grow-angry-because-they-have-robbed-us-of-our-agency/

► Google employees walked out for the right to sue their bosses.
“This is just the beginning of a movement for more employee control of what gets built and for whom.”
https://cyberplayground.org/2019/03/01/google-employees-walked-out-for-the-right-to-sue-their-bosses/

► Amazon worker pushes Bezos to stop selling facial recognition tech to law enforcement
https://thehill.com/policy/technology/411622-amazon-workers-push-bezos-to-stop-selling-facial-recognition-tech-to-law

I’m an Amazon Employee. My Company Shouldn’t Sell Facial Recognition Tech to Police.
Amazon’s ‘Rekognition’ program shouldn’t be used as a tool for mass surveillance
https://medium.com/s/powertrip/im-an-amazon-employee-my-company-shouldn-t-sell-facial-recognition-tech-to-police-36b5fde934ac

A couple weeks ago, my co-workers delivered a letter to this effect, signed by over 450 employees, to Jeff Bezos and other executives. The letter also contained demands to kick Palantir, the software firm that powers much of ICE’s deportation and tracking program, off Amazon Web Services and to institute employee oversight for ethical decisions.
https://medium.com/s/oversight/shock-anger-disappointment-an-amazon-employee-speaks-out-88d927792950

►ACLU, “Rekognition can identify, track, and analyze people in real time and recognize up to 100 people in a single image.
It can quickly scan information it collects against databases featuring tens of millions of faces.” “Amazon’s Rekognition raises profound civil liberties and civil rights concerns.” “Amazon’s Rekognition raises profound civil liberties and civil rights concerns.”
https://www.aclu.org/blog/privacy-technology/surveillance-technologies/amazon-google-and-microsoft-are-odds-dangers-face

► Kent Walker, google’s general counsel and senior vice president of global affairs, made it clear that Google — unlike Amazon and Microsoft — will not sell a face recognition product until the technology’s potential for abuse is addressed.

Amazon encourages governments to use its technology to track “persons of interest” and monitor public spaces, comparing everyone to databases with tens of millions of faces.
Amazon even suggested pairing face recognition with police body cameras, a move that would transform devices meant for police accountability into roving mass-surveillance devices.

► Amazon’s Rekognition falsely matched 28 members of Congress against a mugshot database. Tellingly, congressional members of color were disproportionately misidentified, including civil rights leader Rep. John Lewis, D-Ga. And that test wasn’t based on a hypothetical: Law enforcement has already been using Rekognition to match pictures against arrest-photo databases.

► We’re All Spies, Now—And Not Even Trump Can Hide From Our Prying Eyes
“Loose tweets destroy fleets,” the U.S. Air Force advised in 2015.
Amateur plane-spotters tracked Air Force One as it secretly made its way to Iraq, demonstrating the power of readily-available tools to reveal covert military operations. Taking advantage of plane- and ship-tracking websites, commercial satellite imagery, internet forums for aviation photographers and other social media, these amateurs have become a new kind of hybrid journalist and spy. They call their practice “open-source intelligence,” or OSINT and claim they’re keeping people informed and holding government accountable.
https://www.thedailybeast.com/were-all-spies-nowand-not-even-trump-can-hide-from-our-prying-eyes
► Compromised supply chain attacks are a well-established, if underappreciated, method of surveillance — and much work remains to be done to secure computing devices from this type of compromise.
https://theintercept.com/2019/01/24/computer-supply-chain-attacks/
https://theintercept.com/document/2019/01/23/dod-2011-strategy-for-operating-in-cyberspace-supply-chain-excerpts/

►Federal lobbying law:
If the Saudis or any other foreign government did direct or pay any company to produce such a magazine, that company would be required to register with the government under the Foreign Agent Registration Act.

These revelations give rise to serious concerns about abuse.
“It’s important to remember that the NSA’s surveillance activities are anything but narrowly focused — the agency is collecting massive amounts of sensitive information about virtually everyone.” “A U.S. person is entitled to greater legal protections against NSA surveillance than foreigners are.” ~Jameel Jaffer, deputy legal director of the American Civil Liberties Union

The Associated Press show that a Pro Saudi digital copy of the magazine, produced by American Media Inc., was quietly shared with officials at the Saudi Embassy in Washington almost three weeks before its publication. Trump administration has aggressively courted the Saudis and found a willing partner on a range of issues, including Iran, counterterrorism and Middle East peace, in the kingdom’s royal family.

►Metadata embedded in the PDF file, obtained by the AP from two different individuals, show it was produced by an AMI production employee at 8:41 p.m. on Feb. 19. By the next day — Feb. 20 — Saudi officials had started forwarding it to Washington foreign policy contacts, giving them an early look.
► Pecker dined at the White House with Trump and a French businessman with close business ties to the Saudis, and later traveled to Riyadh to pitch Saudi investors on helping AMI acquire Time magazine, The New York Times reported.
► Kushner’s family real estate firm, The Kushner Cos., once sought money from a Saudi investor to buy out its partner in a Manhattan skyscraper that had been losing money for years.
► “Catch and Kill” AMI paid $30,000 8 months earlier to a former doorman at a Trump building requiring him to sign a contract that  prevented him from going public. AMI said it paid the doorman not for his silence, but for exclusive rights to the story
https://www.apnews.com/d293d282a9ec4d0c83fe0a25ff5f285c
►The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target’s credibility, reputation and authority.
https://theintercept.com/2019/02/08/jeff-bezos-protests-the-invasion-of-his-privacy-as-amazon-builds-a-sprawling-surveillance-state-for-everyone-else/
►Wherever you are, the NSA’s databases store information about your political views, your medical history, your intimate relationships and your activities online,” he added. “The NSA says this personal information won’t be abused, but these documents show that the NSA probably defines ‘abuse’ very narrowly.
►The NSA possesses embarrassing sexually explicit information about at least two of the targets by virtue of electronic surveillance of their online activity. The report states that some of the data was gleaned through FBI surveillance programs carried out under the Foreign Intelligence and Surveillance Act.
► James Bamford, a journalist who has been covering the NSA since the early 1980s, said the use of surveillance to exploit embarrassing private behavior is precisely what led to past U.S. surveillance scandals
<https://www.huffpostbrasil.com/2013/11/26/nsa-porn-muslims_n_4346128.html?ec_carp=8743119989930048067>
► Trump Ordered Officials to Give Jared Kushner a Security Clearance
https://www.nytimes.com/2019/02/28/us/politics/jared-kushner-security-clearance.html

EQUIFAX Has your email, password, or SSN #security been breached? Fire John Ford Chief Privacy Officer #FAIL

#FIX

Go to https://haveibeenpwned.com/
type in the email address and if your found it listed as breached go change it.

#FAIL

Richard F. Smith

EQUIFAX CHAIRMAN AND CHIEF EXECUTIVE OFFICER

Rick Smith has been chairman and chief executive officer of Equifax Inc. since 2005. Headquartered in Atlanta, Equifax is a $3.14 billion global company (NYSE: EFX)

Email Breach
CHIEF PRIVACY OFFICER JOHN FORD
http://www.zoominfo.com/p/John-Ford/7063545
HQ Phone:  (404) 885-8000
LYING ABOUT HOW THEIR #1 FOCUS IS PROTECTION OR YOUR DATA  https://financialservices.house.gov/media/pdf/060403jf.pdf
USELESS CORPORATE LEADERSHIP
http://www.equifax.com/about-equifax/corporate-leadership
Technology Committee ASLEEP AT THE WHEEL!!
John A. McKinley, Chair Mark L. Feidler G. Thomas Hough Elane B. Stock Mark B. Templeton
EQUIFAX INC.
CIK Number: 0000033185
IRS Number: 580401110
Industry: SERVICES-CONSUMER CREDIT REPORTING, COLLECTION AGENCIES [7320]
Company address: 1550 PEACHTREE ST NW ATLANTA 30302
Former name: RETAIL CREDIT CO, date of change: 1976-02-22 People related to EQUIFAX INC
SECURITY ALERTS ARE A JOKE
http://www.equifax.com/security/
Why the Equifax breach is very possibly the worst leak of personal info ever Consumers’ most sensitive data is now in the open and will remain so for years to come

SSN Equifax Breach

Equifax is one of the three major American firms that offers credit monitoring services, along with TransUnion and Experian, which also lost 15 million Social Security Numbers of T-Mobile customers in the fall of 2015.
2017 143 Million Social Security Numbers Stolen
Hackers have stolen the personal details of 143 million people, including their names, social security numbers, birth dates, and home addresses, according to credit monitoring firm Equifax, which disclosed the breach on Thursday.

For perspective, that’s nearly half of all Americans.

The First Problem is Equifax said there was  No Evidence of Unauthorized Access to Core Consumer or Commercial Credit Reporting Databases – OMG

so . . . if the 143 million people’s data wasn’t protected in their CORE DATABASE where the hell was that info stored??? on Pluto?
if YOUR INFORMATION WASN’T IN THEIR CORE  then the magnitude of their incompetence demands a class action suit.

But Equifax will offer Free Identity Theft Protection and Credit File Monitoring to All U.S. Consumers
Want to Know If Your SSN Was Included in the Equifax Breach? Good Luck!
They give this address to https://www.equifaxsecurity2017.com/ 
Second Problem
https://www.equifaxsecurity2017.com/
REDIRECTS TO
Equifax-Hacked
Ines Gutzmer
Corporate Communications
mediainquiries@equifax.com
404-885-8555

TOTAL FAIL

That site isn’t showing the correct cert so the  chrome browser says it is an  insecure phishing site so no one should be using it!!!!
Equifax-Hacked2
 

What kind of total incompetence is this? 

TrustedID Premier Terms of Use

https://trustedidpremier.com/static/terms
Effective Date: September 6, 2017
TrustedID, Inc. (“TrustedID,” “we,” “us,” “our”), an Equifax company, provides its products to you (“You,” “Your”) through various websites (including www.TrustedID.com) and its related applications and products (collectively, the “Product(s)” which term includes any new features, products and applications offered by us from time to time), subject to the following Terms of Use (as amended from time to time, the “Agreement”).
TrustedID is not a credit repair organization, or similarly regulated organization under other applicable law and does not provide any form of credit repair advice or counseling.
If you have any questions about your product or need more information, please contact one of our customer care representatives at:
E-mail: customer.care@equifax.com
Toll-Free Phone Number: 1.888.548.7878
Hours of Operation: 7 am – 8 pm, CST, 7 days a week
 
PRIVACY POLICY
https://trustedidpremier.com/static/privacy-policy
You may request deletion of your TrustedID account by contacting us directly as set forth below or, if you are a TrustedID customer, by calling our customer service number. Please note that some information may remain in our records after deletion of your account.
How to Contact Us
If you have questions or comments about this Privacy Policy, please e-mail us at privacy@Equifax.com or write to
Chief Privacy Officer,
Equifax Inc.,
1550 Peachtree Street, NW, Atlanta, GA 30309.
Please reference “Privacy Notice – TrustedID,” when contacting us about this policy.
 
The Equifax Online Behavioral Advertising Notice also provides information about how you may opt out from receiving ads based on your online behavior. Please visit the websites operated by the following organizations to learn more, including to learn about choices to opt out of targeted advertising.
REPORT A COMPLAINT http://www.aboutads.info/enforcement
Consumer Complaint Resolution
If you believe that you have witnessed a practice or ad that may violate the Principles, you can report the incident to either the CBBB or the DMA.  Complaints may be filed by either consumers, business entities, or other stakeholders.

Click to
Report a Complaint
to the CBBB

Click to
Report a Complaint
to the DMA

The CBBB and DMA will coordinate investigation of all complaints received.  Please click below to learn more about each organization’s complaint handling procedures

AAAAAAH  . . . FINALLY

The Monopoly guy has gone to Washington. A person dressed in a black top hat and bushy white mustache, occasionally putting on a monocle or dabbing forehead sweat with giant paper money, sat in the audience of the Senate Banking Committee hearing on the Equifax data breach on Wednesday. Former Equifax CEO Richard Smith didn’t seem to notice. The person was dressed to resemble the character Rich Uncle Pennybags from the classic board game.

@Public_Citizen sent the Monopoly man to the #Equifax hearing to send a message: FORCED ARBITRATION GIVES @EQUIFAX A MONOPOLY OVER OUR JUSTICE SYSTEM
Equifax ran code for *years* that executed s/w from abandoned domains, including a malware server since last Fall.
On Thursday, security researchers at security vendor Malwarebytes Corp. identified a small piece of code on Equifax’s website that connected users to the Netflame.cc internet domain, which was the source of the malicious software. That domain once was used by Digital River Inc., an e-commerce and digital-marketing vendor, for a now-defunct web-analytics product called Fireclick, Digital River said. But the domain’s registration was released in October 2016, three months after Digital River ended support for Fireclick as part of an “ongoing domain cleanup,” said Christopher Rence, the company’s chief information and risk officer. That domain was registered Nov. 15 to an individual with an address listed southeast of Bangkok, according to internet records. On Thursday, the Netflame.cc domain was serving up a variety of malicious software, including fraudulent online surveys, adware and software designed to steal online-banking credentials, said Jerome Segura, an analyst with Malwarebytes. It is common for scammers to be on the lookout for soon-to-expire web domains so they can snatch them up and use them to deliver malicious software, he said. Mr. Segura also discovered the Central America site of TransUnion, an Equifax competitor, connecting to the Netflame.cc domain, he said.