Join the Unexplained Mysteries community today! It's free and setting up an account only takes a moment.
- Sign In or Create Account -
Sign in to follow this  
Followers 3
Yamato

IRS to read your email, Facebook, Twitter

48 posts in this topic

Yerp and thats why there trying to change the LAWS in the name of Homeland Security

Share this post


Link to post
Share on other sites

email is not a "private" medium. It never has been. Sorry.

then in that case, I want you to publish every single e-mail you've sent. Tomorrow. Start a thread and we'll hapoily read them.

1 person likes this

Share this post


Link to post
Share on other sites

then in that case, I want you to publish every single e-mail you've sent. Tomorrow. Start a thread and we'll hapoily read them.

FTR, he's not entitled to if he doesn't want to. The point is that your personal information is written away once you allow another individual to claim ownership of it. It's all in the fine print bro.

Share this post


Link to post
Share on other sites

Since we are using UM personal posts as an example. A few questions to ask your self. Are UM personal posts are stored on your computer? Or are they stored by a third party (UM or someone else) on their server? Where is the UM server? What exactly are the rules of ownership for your personal posts on UM? Who has access to your personal posts?

1 person likes this

Share this post


Link to post
Share on other sites

Since we are using UM personal posts as an example. A few questions to ask your self. Are UM personal posts are stored on your computer? Or are they stored by a third party (UM or someone else) on their server? Where is the UM server? What exactly are the rules of ownership for your personal posts on UM? Who has access to your personal posts?

I believe I've read in the rules that info won't be sold but may be given to authorities or reported to authorities if extreme threats of violence or generally extreme loonyness is taking place. I made up 'loonyness'. I coud be wrong.

Share this post


Link to post
Share on other sites

That's fine by me. I make sure I have nothing that can be used against me online.

Share this post


Link to post
Share on other sites

3 things a person can truely count on death taxes and your gov lieing to you

3 people like this

Share this post


Link to post
Share on other sites

Court Rules Email Protected by Fourth Amendment

DECEMBER 14, 2010 BY PAUL OHM

Today, the United States Court of Appeals for the Sixth Circuit ruled that the contents of the messages in an email inbox hosted on a provider’s servers are protected by the Fourth Amendment, even though the messages are accessible to an email provider. As the court puts it, “[t]he government may not compel a commercial ISP to turn over the contents of a subscriber’s emails without first obtaining a warrant based on probable cause.”

https://freedom-to-tinker.com/blog/paul/court-rules-email-protected-fourth-amendment/

Share this post


Link to post
Share on other sites

Posted (edited)

Thanks Lightly but I beat you to it when ninja told me my life belongs to the government. He could have found that with a simple search too but that'd wreck his world knowing we have rights to privacy.

Edit: don't mistake that for me thinking the Feds follow the rules...

Edited by -Mr_Fess-
1 person likes this

Share this post


Link to post
Share on other sites

That's fine by me. I make sure I have nothing that can be used against me online.

Your personal information is in many databases. I'd be a wee bit more guarded than to use the word "nothing" and believe it.

What if something could be used against others online? Is that really fine with you just because it's not you personally? What if it happened to a loved one, a best friend, a husband, the father of your children, etc.

3 people like this

Share this post


Link to post
Share on other sites

excuse me ? If you get onto my computer and bypass my security to read my emails you have committed the crime of hacking.

Only if your "email" never actually goes into the internet. You do understand how the internet works, right?

Share this post


Link to post
Share on other sites

Only if your "email" never actually goes into the internet. You do understand how the internet works, right?

Unfair. We exist on the internet the same way we do offline, we have a real address we're connecting to the internet from. If this isn't akin to digital private property it probably should be. If it's written in pencil and paper and we're carrying it to the taxman under our jackets we deserve the same degree of privacy as someone who files with Turbotax or HRBlock or with their tax preparer via email.

Could you imagine if some individual stole your information from an email and used it against you? Should there be no defense against this?

Share this post


Link to post
Share on other sites

Unfair. We exist on the internet the same way we do offline, we have a real address we're connecting to the internet from. If this isn't akin to digital private property it probably should be. If it's written in pencil and paper and we're carrying it to the taxman under our jackets we deserve the same degree of privacy as someone who files with Turbotax or HRBlock or with their tax preparer via email.

Could you imagine if some individual stole your information from an email and used it against you? Should there be no defense against this?

Are you seriously comparing Internet protocol and routers (run by private enterprise) to the US Postal Service? Unless your data is encrypted, it stored and forwarded through possibly many ISP's.

And it's already basic legal tenets that you have zero expectation of privacy when sending email from a company that you work for.

All of you are forgetting the CARRIER. Your email doesn't appear in your inbox by magic. Your mail doesn't appear in your mailbox by magic.

The TCP/IP protocol suite , which is very widely used today, was developed under the sponsorship of the Department of Defense. Despite that, there are a number of serious security flaws inherent in the protocols. Some of these flaws exist because hosts rely on IP source address for authentication; the Berkeley ``r-utilities'' are a notable example. Others exist because network control mechanisms, and in particular routing protocols, have minimal or non-existent authentication.
http://insecure.org/stf/tcpip_smb.txt
When TCP/IP was designed in the early 1980's, security was not a primary concern. However, in the years since their inception, the lack of security in the TCP/IP protocols has become more of a problem. The widespread use and availability of the TCP/IP protocol suite has exposed its weaknesses. Presented here are a number of well-known vulnerabilities of both TCP/IP itself, and of some protocols commonly used along with TCP/IP (such as DNS).
http://www.linuxsecurity.com/resource_files/documentation/tcpip-security.html
Internet service providers in many countries are legally required (e.g. CALEA in the U.S.) to allow law enforcement and intelligence agencies to monitor some or all of the information transmitted by the ISP. Modern ISPs integrate a wide array of surveillance and packet sniffing equipment into their networks, which then feeds the data to law-enforcement/intelligence networks and software such as DCSNet in the United States, or SORM in Russia, allowing them to monitor Internet traffic in real time
https://en.wikipedia.org/wiki/Internet_service_provider
The captured information is decoded from raw digital form into a human-readable format that permits users of the protocol analyzer to easily review the exchanged information. Protocol analyzers vary in their abilities to display data in multiple views, automatically detect errors, determine the root causes of errors, generate timing diagrams, reconstruct TCP and UDP data streams, et
https://en.wikipedia.org/wiki/Packet_sniffer

Share this post


Link to post
Share on other sites

Are you seriously comparing Internet protocol and routers (run by private enterprise) to the US Postal Service? Unless your data is encrypted, it stored and forwarded through possibly many ISP's.

And it's already basic legal tenets that you have zero expectation of privacy when sending email from a company that you work for.

All of you are forgetting the CARRIER. Your email doesn't appear in your inbox by magic. Your mail doesn't appear in your mailbox by magic.

http://insecure.org/stf/tcpip_smb.txt

http://www.linuxsecu...p-security.html

https://en.wikipedia...ervice_provider

https://en.wikipedia.../Packet_sniffer

It doesn't get to my inbox by magic and it doesn't get to my tax preparer's office by magic either. In order to convince me, you must find differences not more similarities.

Because privacy is grossly forsaken on the internet doesn't mean it should be nor must continue to be. A reasonable expectation of privacy should be provided by the technology. If the 1s and 0s across the wire are encrypted by their source then that should be the fence that even statist interpretations admit is meaningful in a 4th Amendment case. Obama has an expectation of privacy in his electronic communications Given how the technology works, it's as the previous poster alluded to. If we're going to have transparency, when do people get to read the Fed's emails?

You also changed the subject to law enforcement agencies which the IRS is not, so reminding me that crime is fought on the internet doesn't help me accept standards so low that there's no reasonable expectation of privacy from anyone.

The internet is a lean mean free market machine right now and it's interested in cost efficiency.

2 people like this

Share this post


Link to post
Share on other sites

Things that one might post in entire innocence can be taken out of context or rearranged or taken selectively. Trial attorneys do this sort of thing all the time (they get the stuff during "discovery") in order to confuse the jury and put the other side on the defensive.

The IRS and other law enforcement agencies often have some "bad guy" they are after, but can't quite "get," so they resort to this sort of thing.

Consequently, it doesn't quite do to just dismiss it all and say one has nothing to worry about if one is truly innocent. To be sure, innocence is better than being in a situation of trying to hide guilt, and you are more likely to come out okay, but there is no guarantee.

Share this post


Link to post
Share on other sites

Use encryption whenever possible.

Share this post


Link to post
Share on other sites

Well until you get a subpoena asking for the decription password.

Share this post


Link to post
Share on other sites

. Obama has an expectation of privacy in his electronic communications

No he doesn't and neither should you. You have to actually use secure/encrypted options. It doesn't happen unless you actually use it.

Share this post


Link to post
Share on other sites

No he doesn't and neither should you. You have to actually use secure/encrypted options. It doesn't happen unless you actually use it.

He doesn't? How do you know? I don't know of anyone who secretly compromises Obama's electronic communications and posts them online somewhere; you'll have to refer me to where this ever happens.

Neither "should" I? Why not?

I don't "have to" do anything. It has nothing to do with the subject either way. If emails are being secretly read by hackers, this is a legal matter not a technological one. Your grand political philosophy of "the government can do whatever it wants and you have to deal with it" airs itself openly as usual. If ISPs release email records of a suspect in the act of fighting crime, that's a different issue for a different subject not relevant to my post you replied to. You've been wrong with everything you've responded with so far. Your initial attempt at a relevant reply "the technology makes everyone's emails vulnerable to everyone" wasn't relevant when everyone's property is vulnerable no matter what form it happens to take. I can put an extra lock on my door. My place can still be broken into by criminals or government agents. Just because one doesn't live on an island fortress their papers and effects must still be granted protection under the law.

1 person likes this

Share this post


Link to post
Share on other sites

Couldn't we say the technology behind snail mail leaves all of our mail vulnerable to be seen or read by everyone. It's a federal offense to open someone else's mail and look at it. What is it about a sealed envelope that makes it so much more sacred than a password protected email box? Much of the information in today's emails is as sensitive as traditional mail.

1 person likes this

Share this post


Link to post
Share on other sites

All I gotta say is good luck trying. Alll email comes to a local server in my house. They are not allowed to search my house with out a warrant :) This server is also used for my asterisk voip server (House Phone) and local media streaming (DNLA) for my TV.

Share this post


Link to post
Share on other sites

That's fine by me. I make sure I have nothing that can be used against me online.

How can you be sure what you say won't be taken out of context, or manipulated, or you might say something that you think is harmless but they put it together with other information to make something incriminating out of it?

Share this post


Link to post
Share on other sites

I don't think there is any way to be "safe" from government or employer or associate or criminal or family or corporation or anyone else spying on your internet posts and emails and perhaps misinterpreting them and causing you trouble. Caution is called for, but safety is just not there and will never be. Don't be over-confident. Even encrypted messages are subject to subpoena where you have to turn over the password and deleted messages are very often recovered.

Material on a ram drive (where the material is wiped out when the power goes off) is probably absolutely safe, but not of much use in communication. You can use one to hide material you would rather your family didn't see, and then easily and absolutely delete it by rebooting. Still this may destroy the material, but not the record of where you've been.

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 3

  • Recently Browsing   0 members

    No registered users viewing this page.