Retweet January 2012

Here I am reblogging some retweets for the past month that broken down by subject matter. Some of these tweets also cover events that occurred in January 2012 such as the ongoing Occupy Wall Street, and the continuing revolutions in the Middle East. If you like to follow along, befriend xwoop and lolprez and I’ll be sure to follow back.


  • Obama’s Campaign: If you don’t vote for Obama, you must be racist.
  • Obama has more skeletons in his closet than raincoats.
  • The State of the Union sounded a lot like The State of the Complaining.
  • Being president doesn’t make you sultan.

Got Gov?

  • The US is not building a Big Brother surveillance program, it is building a Big Nanny surveillance program.
  • Wow.. I thought the US Air Force was going to bomb the AFC Championship game. #militarization #sports
  • Instead of a war on terror why not declare war on cancer? Instead of radio active naked body scanners at airports, why not cancer detecting mammograms instead?
  • The police are sworn to protect the status quo.
  • The RIAA is afraid that someone is going to pirate a $10 CD that they are pirating our rights and freedoms.
  • Trust no politician!


  • Network news hate to report the news, they want I make news… That’s why they also produce political polls.
  • Half of what you see or read on the news is driven by PR.
  • Hipsters are an invented peoples.
  • Death to all hipsters.
  • Not surprising the first examples of use of terrorism in history comes from the middle east, see Zealotry on Wikipedia.
  • The revolution will be liked on Facebook.


  • Society made me do it.
  • Hormones made me do it.
  • Coincidence is not a conspiracy.
  • Paula Deen is the embodiment of what is wrong with America.
  • Paula Deen doesn’t want to be buried or cremated. Paula Deen wants to e deep fried.
  • Watching sport games all day is the worst activity a person can do for his health.

In Da Future

  • In the future, store surveillance cameras will automatically check you in on Facebook and Foursquare and the National Location Database.
  • In the future, the FBI and NSA will have a REST API that all app developers have to include in their apps to monitor behavior and usage.
  • In the future, to search on Google you will have to use a google account with a verified name.
  • In the future, everything will be illegal unless you pay the fee for a permit.

KimJongNumberUn Will Destroy All The Things

Kim Jong-Un has been trending on Twitter since he became the head of the government of North Korea with the passing of his father, the Kim Jong-Il. Most recently, Kim Jong-Un has been trending because of rumors of his death have gone viral on social networking sites. As it’s customary, for every trending topic there must be a satire account on Twitter and so there is a fake Kim Jong-Un account @KimJongNumberUn. Event though the @KimJonNumberUn account is not real, I sounds real enough. Here are a few choice tweets from @KimJongNumberUn.

  • I could not sleep last night worrying about one of those four madmen getting nuclear weapons. #cnndebate #flprimary
  • Still four of them? What was the point of the last debate if no one was executed? #cnndebate
  • If the Arizona governor stuck her finger in my face, you know what I’d call that? A free snack.
  • My critics say I’m out of touch. But if that’s true, how come I have so many friends on MySpace? #BOOM
  • Here’s my state of the union: it’s fuckin dope. Peace out yall.
  • In case you’re wondering where Facebook’s privacy policy came from, they stole it from the N Korean government. #PROPS
  • Once a year I, too, gather all my political opponents in one room, to shoot them. #SOTU
  • Sending people to a crowded freezing place and making them watch indie films is one form of torture we haven’t tried.
  • The negative ads Americans use to destroy other politicians seem crazily expensive compared to our system of poisoning.
  • So the Republican leader pays no taxes and gets rich on the labor of others? American bastards have stolen our system.
  • Dope news, y’all – just decided that our national bird will be Angry.
  • The US claims it stands for human rights, and yet it banned Four Loko. #hypocrisy
  • Does my population make me look fat?
  • I have 20,000 followers after only 7 days. Not bad for a dude who banned the Internet. #pimpin
  • At moments like this it terrifies me that the US has nuclear weapons. #GOPDebate
  • Yall played this dope new game Farmville? Imaginary farms grow imaginary food. Just like North Korea. #sofaking #dope
  • Willing to trade nuclear fuel rod for XBox 360 in good condition. IM me on MySpace.

What You Tweet Will Be Held Against You

Two things that most governments don’t get, sarcasm and how the internet works. If you asked me what countries routinely monitor Facebook and Twitter, I would have replied repressive and corrupt governments such as China or Belarus. But recent events reveal that the United States and other first world nations are actively monitoring for dissident not social networking sites.

The FBI is said to be looking to monitor all public information posted on social networking sites such as Facebook and Twitter. The FBI put out a request for proposal on a social networking and monitoring application. You have the right to ignore a friend request from the FBI.

Maybe the FBI is lagging behind social media compared to other agencies because already shortly after news broke out about the deportation of two British tourists after they tweeted the following: Free this week, for quick gossip/prep before I go and destroy America?

Tweeting that you going to do anything not nice to America will get you deported and barred from entering the country again. I don’t doubt that in the future, as part of the citizen naturalization process, a social media background check will be conducted before you can be made a citizen.

South Korea has detained a South Korean citizen for posting sarcastic comments and images on Twitter about North Korea and maybe charged for retweeting North Korean propaganda under South Korea’s National Security Law. So tweeting, retweeting, and following a North Korean organization is a national security violation in South Korea!?

Blogmouth Year in Review 2011

The end of the year is a good time to reflect over the last year. 2011 was a water shed year, Osama bin Laden was killed in Pakistan, Occupy Wall Street occupied mostly public parks, the Arab Spring bloomed into bloodshed, US troops pulled out of Iraq after Iraq said so, and much more. All said and done, it was a good year. To help celebrate here are some of my favorite posts from 2011.

Occupy Revolution




Retweet 2011

Future of Security Screening

The federal government, TSA, FAA, and other agencies know that airport security is security theater. The current airport screening policies, mechanisms, and technology is a joke and potentially dangerous to TSA staff and passengers as is the case with the naked body scanners. Current screening procedures and equipment keep changing ever few years but the future of airport screening is clear. TSA’s wet dream is to have everybody walk through the same screening machine. In the future, you will see that the screening checkpoint will be a enclosed tunnel where people will walk in a single file, much like the scene in Total Recall.

Scene From Total Recall

Scene From Total Recall

It’s clear that the government would prefer if everybody goes through an excessive full body naked scan to board a flight. It’s also clear that government agencies are usurping unprecedented power, that they are removing our civil liberties, our privacy, our rights one by one. The Department of Homeland Security would prefer of everybody goes through the same invasive machine, they want to remove the option of a pat down, remove the option or going through a metal detector, or other means.

The future of security checkpoint screening is to have everybody walk in a single file in a tunnel as they are scan multiple times at multiple frequencies with multiple naked body scanners. An array of naked body scanners can be installed along a long passageway that can capture passengers biometric information such as, retinal scans, facial scans, posture, walking sample, body temperature, heart rate, tattoos scans through clothing, etc. Video and audio recording is just the tip of the iceberg of what police will monitor, screen, and scan in public places for in the near future.

Climate Engineering and Troll Propaganda

I recently saw a comic by Joel Pett that made me realize that the climate change debate is more about money, marketing, and control that it is about the climate. The comic depicted a lecture on climate where the presenter (possibly Al Gore) had a slide with a few bullets; Energy Independence, Preserve Rain forests, Sustainability, Green Jobs, Livable Cities, Healthy Children, etc, etc. At the same time, a guy in the back of the lecture hall says, “What if it’s a big hoax and we create a better world for nothing?”

Climate Summit by Joel Pett

Climate Summit by Joel Pett

So what’s wrong with the above comic? It’s troll propaganda. Most people have have issues with how the current climate change debate is framed are not concern about creating a better world for nothing. I believe the better question is “What if it’s a big hoax and we create a better world for whom and for how much?” I also have issues with the bullet points in the slide. I would have changed them to Carbon Cap, Consumption Tax, CRV Fee, Force Relocation, etc, etc.

Take green jobs for example. It’s been recently reported that a $500 million green job program run by the government has been mostly a failure, with only about 15% of participants landing jobs. Another half a billion dollar failure in the green job sector has been Solyndra. After receiving over $500 million loan from the federal government Solyndra still went bankrupt.

Climate change is normal planetary and geological evolution, just like continental drift, but certainly pollution and high emissions don’t have not helped to maintain the climate at which humans prefer. But having lived through the financial mismanagement in part both by the government and the financial institutions that are paid to manage financial risk, I can assure that any effort or agreement on climate change will not benefit the people.

The Use of Stingray Devices by Law Enforcement Agencies

A few days ago, the Wall Street Journal had an article describing how the FBI and other law enforcement agencies are using electronic and cellphone monitoring and tracking devices known as stingray. As described in the article, the Stingray device functions as a mobile cellphone tower and can trick near by cellphones from connect with it. When a cellphone connects with it, the signal strength can be an indicator of how close the cellphone is and in this fashion you can collect enough information to triangulate the suspects location. This technology will work even if you are not using your cellphone an law enforcement has used it in situations where they don’t have a search warrant.

If the use this device without a search warrant alone was not problematic enough, the government does not disclose the information about it’s use or the data gathered by using the device even on the subsequent trial for the suspect whom they tracked with such device. From the article…

The Federal Bureau of Investigation considers the devices to be so critical that it has a policy of deleting the data gathered in their use, mainly to keep suspects in the dark about their capabilities, an FBI official told The Wall Street Journal in response to inquiries.

There is a big glaring error in the above sentence, the FBI delete the data gathered in the use of stingray devices to keep the general public in the dark, not the suspects. Because stingray devices mimic cell towers, hundreds and thousands of cell phones will connect with it that are nearby. To catch one suspect, law enforcement is using sweeping powers and technology that log and track a whole wide range of people. If you use a stingray device in New York City, you are gathering data from thousands of cell phones not just the suspect.

Another big problem with this technology is that it can monitor voice and data transmissions. Since stingray devices mimic a cell tower it can intercept voice and data transmissions. To this point the article quoted a law enforcement officer from the sheriff’s department in Maricopa County, Ariz. describing that they “can’t listen in on communications.” This means that the sheriff’s department there doesn’t have the latest model. If you can mimic a tower you can definitely intercept, capture, and log all data the flows through the fake honey pot cell tower.

Another point not mentioned in the Wall Street Journal article about the use of stingray devices is that they are not necessary. Law enforcement agencies can get the location of a cell phone by going to the cell phone carriers. Telecommunication companies like Comcast, AT&T, and even Google have portals where law agencies can request information on their systems on a suspect.

So if law enforcement agencies can get the location of a suspect without the use of stingrays, why are police departments stocking up on these devices? So if law enforcement can track the location of a suspect by having a warrant and going to the cell phone carriers, they prefer the use of stingray devices because they don’t require a warrant, they can delete the data they gather afterwards, they can cast wider nets, and because it’s a cool gadget!

Filed under: Search warrants? We don’t need no stinkin’ search warrants!

Sting Ray II

Sting Ray II

Email Someone A Lot, You Maybe A Computer Hacker

Here is another court ruling that demonstrates that many in the legal profession do not understand simple everyday technology. There is a case recently ruled by the Sixth Circuit appeals court where a labor union asked all its member to email a company. The company in question in turn sued the labor union and the court has ruled that the labor union can be sued under the Computer Fraud and Abuse Act (CFAA) for hacking. So emailing someone multiple times can be considered hacking! I am just dumbfounded!

This is the most absurd complaint ever. Emails are especially easy to filter based on email address, subject, body, ip addresses, keywords, and other criteria. You can block email addresses out right as spam, or filter emails to different folders, and going through a few hundred emails about the same topic is fairly easy to do. The offline equivalent to emails is postal mail. This is just the same as receiving coupons and circulars in the mail. I usually never read the ads, circulars, and other unsolicited mail that I receive in a typical day. So I quickly scan and put them in the recycling bin. I’m not going to sue Little Caesar’s because the keep sending me coupons in the mail.

DIY Weapons of the Libyan Rebels

The ingenuity of the the rebels in Libya inspiring. The Atlantic has a set of photos of how the rebels, or insurgents (whatever you want to call them), recycle all sorts of weapons left being by government forces. These rebels can mount soviet era rocket launcher pods that were designed for airplanes and attack helicopters on top of pickup trucks. Some of these pictures are straight out of Mad Max, light weight pickup trucks with heavy armor welded to make Do It Yourself tanks.

Homebrew Tank

Homebrew Tank

Small Business Internet Phone Service

A good phone number is still one of the principal methods of doing business. Most small business still list the phone number in yellow pages or other small business listing service. A phone number allows your customers to reach you about your store hours, store locations, and available services. A good domain name, Twitter account, and Facebook page are important but a business phone number is essential.

There are a lot of online services that can help you manage your phone line and number for your small business. At this point I would not use a fixed land line, but a Voice Over Internet Protocol (VOIP) service to provide all my telephony needs. The primary phone number I give personal friends and contacts to reach me is provided by Google Voice. For my small home business, I use Skype phone service. And there are other telephony services that can be useful for small business owners.

What I like about Google Voice is that your GVoice phone number can be forwarded to any other phone, or multiple phones. You customers call you at your GVoice phone number and Google forwards the call to your cell phone, store phone number, or any other number until someone answers it or it goes to voice mail. If the call goes to voice mail Google will transcribe the message and email you the text transcription.

I also use Skype and have a Skype Call-out account which provides me a phone number where my customers can reach me at from a cell phone or landline. In addition, Skype also has some great chat messaging, video conference, screen sharing, and collaboration option that make it an integral solution for my small business communication needs.

Yahoo! has the Yahoo! Voice phone service that fits somewhere between Google Voice and Skype. All of these services can be managed and used to call out and receive calls on your smart phone. The iPhone and Android app for Google Voice allows you to call out and receive calls. In the US, the iPhone app for Skype only allows you to call out when you are on a WiFi internet access.

The one feature I really wish either Google Voice, Skype, or Yahoo! Voice had was the ability to send and receive faxes. Fax support is a popular and commonly request feature in Google Voice that I think that Google will build support for it but there are other online telephony services that already include this feature.

Ring Central is a paid mobile business phone system that includes internet fax services. You don’t need a fax machine in your office to send and receive fax documents. Ring Central also provides a 1 800 toll free number. In addition to Ring Central, I would consider Grasshopper. Grasshopper is a virtual phone system designed for businesses and entrepreneurs. Grasshopper has toll free numbers, unlimited extension, call forwarding, voicemails transcriptions, and other feature suitable for small to mid-sized companies.