Facebook Doubles Down On Misusing Your Phone Number
By Gennie Gebhart When we publicly demanded that Facebook stop messing with users’ phone numbers last week, we weren’t expecting the social network to double…
By Gennie Gebhart When we publicly demanded that Facebook stop messing with users’ phone numbers last week, we weren’t expecting the social network to double…
By B.N. Frank The Telecom Industry can’t even say that 5G technology is safe. Insurance companies don’t even cover them anymore – it’s too risky….
By B.N. Frank 66% of Americans don’t want to live in “Smart Cities.” Smart Cities require Internet of Things (IoT) technology which has an almost…
By John W. Whitehead “When the President does it, that means that it is not illegal.”—Richard Nixon Who pays the price for the dissolution of…
By Tyler Durden Just south of Tampa, Fla., students at the Manatee School for the Arts (MSA) roam the hallways past an armed combat veteran…
By Aaron Leibowitz for ProPublica Illinois, and Sarah Karp, WBEZ Chicago This is a collaboration between ProPublica Illinois and WBEZ Chicago. In January 2017, after…
By Cooper Quintin It’s hard to talk about the vulnerabilities in cellular technology without increasing the amount of fear, uncertainty, and doubt. There is already…
By B.N. Frank An op-ed by former FCC Chairman, Tom Wheeler, was published in The New York Times: “If 5G Is So Important, Why Isn’t…
By John W. Whitehead “For seven decades we have been yielding our most basic liberties to a secretive, unaccountable emergency state – a vast but…
Activist Post Editor’s Note: Despite the many warnings about the increased privacy invasion from this technology, as well as evidence showing that it is far…
By Jeremy McCoy The new political realities inspire doubts January 4, Anonymous hackers released the new batch of documents from the Integrity Initiative – a…
By B.N. Frank This is not breaking news. Electronic devices being hacked and people being cyberstalked has been going on for many years already. More…
By Jennifer Granick and India McKinney In 2018, we learned that expanded biometric surveillance is coming to an airport near you. This includes face recognition,…
By B.N. Frank The Internet of Things (IoT) is used to connect multiple devices to the Internet. According to countless security experts, IoT is vulnerable,…