Kathy Griffin Will Face Investigation by the U.S. Secret Service after photo of President Trump’s fake bloody head

Kathy-Griffin-Donald-Trump-Behead-Photo

One of my favorite comedians is about to be arrested for threatening the President of the United States of America. It was supposed to be a joke. But, she has gone too far.

Snoop Dogg in a recent music video, shot a man wearing a Donald Trump mask. Will this be treated with the same the same concern and severity?

CNN announced today it has terminated its agreement with Kathy Griffin to appear on the network’s New Year’s Eve program after the comedian posted a photo of herself holding what appears to be a bloody, severed fake head of President Donald Trump.

Griffin has co-hosted CNN’s “New Years Eve Live” with CNN anchor Anderson Cooper from New York’s Times Square for the past 10 consecutive years.

Trump fired back at Griffin on Twitter earlier today, calling the image “sick” and said she “should be ashamed of herself.”

“My children, especially my 11-year-old son, Barron, are having a hard time with this,” he added.

In a statement obtained by ABC News today, first lady Melania Trump said the image is “very disturbing” and “simply wrong.”

“As a mother, a wife, and a human being, that photo is very disturbing. When you consider some of the atrocities happening in the world today, a photo opportunity like this is simply wrong and makes you wonder about the mental health of the person who did it,” she said.

The photo was taken by celebrity photographer Tyler Shields. Shields and Griffin posted it on their social media accounts Tuesday.

“I caption this ‘there was blood coming out of his eyes, blood coming out of his … wherever,'” Griffin tweeted, referring to an exchange between Donald Trump and former Fox News anchor Megyn Kelly during the presidential primary season.

In an attempt to appease those who were offended by the image, the controversial comedian then tweeted, “OBVIOUSLY, I do not condone ANY violence by my fans or others to anyone, ever! I’m merely mocking the Mocker in Chief.”

Condemnation of the image was widespread, and the photo received sweeping bipartisan disapproval. Chelsea Clinton, the daughter of Trump’s Democratic rival in the election, was among the harshest critics, calling Griffin’s photo “vile and wrong.”

The backlash prompted Griffin to tweet a video of herself apologizing.

“Hey, everybody, it’s me, Kathy Griffin,” she said in the video. “I sincerely apologize. I am just now seeing the reaction to these images. I’m a comic. I crossed the line. I move the line, then I cross it. I went way too far. The image is too disturbing. I understand how it offends people. It wasn’t funny. I get it. I’ve made a lot of mistakes in my career. I will continue. I ask your forgiveness. Taking down the image. I am going to ask the photographer to take down the image. And I beg for your forgiveness. I went too far, I made a mistake, and I was wrong.”

Comedy and satire have its place. I should know. At times though, we must use sound judgement, restraint, and common sense. Otherwise, anyone, especially your humble blogger can end up in serious trouble like Kathy Griffin.

And, that’s no joke! Not a laughing matter at all.

Link: ABC News

Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices

Plan on carrying your laptop, phone or tablet with you overseas on vacation? You might want to think again and take some precautions. This is a guide from the EFF (Electronic Frontier Foundation) to help you.

PDF – Defending Privacy at the U.S. Border: A Guide for Travelers Carrying Digital Devices – download here https://www.eff.org/files/filenode/eff-border-search_0.pdf

Our lives are on our laptops – family photos, medical documents, banking information, details about what websites we visit, and so much more. Thanks to protections enshrined in the U.S. Constitution, the government generally can’t snoop through your laptop for no reason. But those privacy protections don’t safeguard travelers at the U.S. border, where the U.S. government can take an electronic device, search through all the files, and keep it for a while for further scrutiny – without any suspicion of wrongdoing whatsoever.

Why might people want to protect their data at the border?

Business travelers, lawyers, doctors, or other professionals may have confidential or privileged information on their laptops that they don’t want others to see or that they are obligated by law or contract to protect.

People may have sensitive personal information on their devices such as medical records, financial documents, and years of correspondence with family, friends and business associates.

Some travelers may have repeated difficulties crossing the border, and wish to take proactive steps to protect their data in light of their past experiences.

Some may feel as a matter of principle that the government shouldn’t be able to view their private information simply because they choose to travel internationally.

For doctors, lawyers, and many business professionals, these border searches can compromise the privacy of sensitive professional information, including trade secrets, attorney-client, and doctor-patient communications, research, and business strategies, some of which a traveler has legal and contractual obligations to protect. For the rest of us, searches that can reach our personal correspondence, health information, and financial records are reasonably viewed as an affront to privacy and dignity and inconsistent with the values of a free society.

Despite the lack of legal protections against the search itself, however, those concerned about the security and privacy of the information on their devices at the border can use technological measures in an effort to protect their data. They can also choose not to take private data across the border with them at all, and then use technical measures to retrieve it from abroad. As the explanations below demonstrate, some of these technical measures are simple to implement, while others are complex and require significant technical skill.

Why Can My Devices Be Searched at the Border?

The Fourth Amendment to the United States Constitution protects us against unreasonable government searches and seizures. This generally means the government has to show a court probable cause that a crime has been committed and get a warrant before it can search a location or item in which you have a reasonable expectation of privacy. But searches at places where people enter or leave the United States may be considered “reasonable” simply because they happen at the border or an international airport.

Several federal courts have considered whether the government needs any suspicion of criminal activity to search a traveler’s laptop at the U.S. border. Unfortunately, so far they have decided that the answer is no.1 Congress has also weighed several bills to protect travelers from suspicionless searches at the border, but none has yet passed.2

For now, a border agent has the legal authority to search your electronic devices at the border even if he/she has no reason to think that you’ve done anything wrong.

How the Government Searches Devices at the Border

There are two government agencies primarily responsible for inspecting travelers and items entering the United States: the Department of Homeland Security’s Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE). (Occasionally, CBP or ICE can make special arrangements to question a passenger departing from the United States or inspect her belongings, but neither agency routinely does so.)

Which Three-Letter Acronym Was That Again?

The Department of Homeland Security (DHS) has several departmental missions, including to “secure[] the nation’s air, land and sea borders to prevent illegal activity while facilitating lawful travel and trade.” Department of Homeland Security Missions and Responsibilities, http://www.dhs.gov/xabout/responsibilities.shtm.

Customs and Border Protection (CBP) is the primary agency that inspects and searches travelers entering the United States. For example, when you arrive in the U.S., you can expect to be interviewed at the border by a CBP agent and to present your Customs declaration to another CBP agent.

Immigration and Customs Enforcement (ICE) investigates violations of laws related to borders. Although ICE has border search authority, it isn’t routinely involved in searching or interviewing travelers at ports of entry.

The Transportation Security Administration (TSA) is responsible for transportation security within the United States and does not perform searches at the border. Normally, TSA searches travelers before they board a plane, not after they land. You can expect to be searched by TSA when departing the U.S. by air, but the screening TSA performs is usually identical for domestic and international passengers.

The law gives CBP and ICE agents a great deal of discretion to inspect items coming into the country. While it’s impossible to know for sure how they’ll handle every border search situation, agencies have published their policies for searching electronic devices and data.

CBP tells its agents that “with or without individualized suspicion,” they can inspect electronic devices and data encountered at the border.3 The agency can keep your computer or copies of your data for a “brief, reasonable” amount of time to be searched on- or off-site. Ordinarily, this isn’t more than five days.4 CBP recognizes that agents might run across privileged or sensitive information stored on devices, but does not clearly explain the procedures for handling it.5 When CBP agents experience technical difficulties or encounter information that is encrypted or written in a foreign language, they may send the device or a copy of the data to other government agencies that might be able to help access the information.6 Border agents don’t need any suspicion of wrongdoing to seek this assistance,7 and it’s unclear whether the cooperating agencies can keep copies of the data they receive indefinitely.

Like CBP agents, ICE agents may inspect electronic devices and the information on them “with or without individualized suspicion.”8 ICE will typically complete searches of devices and copies of data within 30 days,9 though anecdotal reports suggest that travelers’ devices are sometimes detained for significantly longer periods of time.10 ICE’s policy, like CBP’s directive, says that agents may seek technical assistance from others to translate or decrypt data,11 and is similarly vague about how agents should handle privileged or sensitive information.12

Beyond seizing the device at the border, the government may take a device to a location away from the border for further inspection.13 If this occurs, searches of devices that are conducted at a time and/or place removed from the initial border stop can become extended border searches that require reasonable suspicion of wrongdoing or even regular searches that require a probable cause warrant.14

In short, border agents have a lot of latitude to search electronic devices at the border or take them elsewhere for further inspection for a short period of time, whether or not they suspect a traveler has done anything wrong.

For now, the government searches only a small percentage of international travelers’ electronic devices. According to documents obtained by the American Civil Liberties Union through the Freedom of Information Act, more than 6,500 people traveling to and from the United States had their electronic devices searched at the border between October 2008 and June 2010, an average of more than 300 border searches of electronic devices a month. Almost half of those travelers were U.S. citizens.15 This means that these searches are a regular occurrence, but one that most travelers will never encounter given the number of travelers who cross the border each month.

The frequency of technology-oriented searches at the border may increase in the future. Researchers and vendors are creating tools to make forensic analysis faster and more effective, and, over time, the forensic analysis will require less skill and training.16 Law enforcement agencies may be tempted to use these tools more often and in more circumstances as their use becomes easier.

Deciding How to Protect Your Data

Different people will choose different kinds of precautions to protect their data at the border based on their experience, perception of risk, and other factors. There is no particular approach we can recommend for all travelers. These are some of the considerations you might take into account:

Case Scenario: Business Concerns

Alice is a frequent business traveler who often needs access to proprietary information that her company considers highly sensitive and confidential. When she travels for work, she takes a special laptop that contains the minimum information necessary for her trip. Before she leaves the country, she uses strong cryptography to encrypt that information. She also sets up two separate log-in accounts on the computer: a protected account where the encrypted files may be accessed, and a separate account for other uses of the laptop. Anyone who wants to view the confidential data must log in to the protected account and then decrypt the files. Only Alice’s employer knows the passwords to the account and encrypted data, and the company’s IT department sends the passwords to her in an encrypted email message so that she can access the data abroad. Before she returns to the U.S., she securely wipes her laptop.
* Your citizenship, immigration, or residence status. If you are not a U.S. citizen, you may be more easily denied entry into the country, and so you may want to be especially careful to avoid situations where border agents might consider you uncooperative for taking steps to protect your data or politely refusing to provide encryption passwords.
* Time sensitivities. Is it important for you to reach your destination by a certain time? If border agents hold you up with questioning or attempt to search your devices, it may wreak havoc on your travel schedule.
* How much hassle you’re willing to tolerate from border agents. If you want to secure your data but are uncomfortable about the possibly of appearing uncooperative with border agents, it might be best to avoid such awkward situations altogether. For example, you might choose to take a blank device over the border and download your data once you reach your destination rather than face an uncomfortable interaction with a border agent who wants to search the data on your device.
* How important it is for you to have access to your data during your journey. Consider whether you’ll need your data with you on the plane, or whether you can wait until you’ve crossed the border to access it.
* How good your Internet access will be during your travels. If you’ll have access to lots of bandwidth, you might be able to download the data you need once you reach your destination.
* The countries you’ve visited before entering the United States. Travel to certain countries may draw additional scrutiny from border agents.
* Your history with law enforcement. If you are subject to an ongoing investigation or otherwise under suspicion for any reason, you may be screened or questioned more intensively.

Some Basic Precautions

All computer users who carry important information on portable devices should be aware of two basic precautions:

* Making regular backups, which ensures that your important information stays available to you if your computer is ever taken from you, lost, or destroyed. (If you don’t have access to your computer, you’ll still have access to your data.)
* Encrypting the information on the computer, which ensures that your information stays confidential from other people whom you don’t authorize to access it. (If you lose control of your computer, other people won’t have access to your data.)

In the infancy of personal computing, experts put particular emphasis on the need to make backups. Today, we think these two precautions are really halves of a larger whole: making sure that that information stays available to those you want to have it, and that it’s not available to others. Applying these precautions can help you deal with travel incidents well beyond the comparatively unusual case of border searches, like if you leave a laptop in a taxi or if someone steals your backpack or purse from a café.

The right time to get started with both of these precautions is before your trip when you’re at home or at work and have more time and greater access to other people who can help you get set up appropriately.

There are also other more elaborate precautions which you might find useful. After discussing the basics, we’ll suggest several of these below. Note that many of the precautions we will discuss address the possibility that your electronic devices are taken away from you, and examined for hours by a trained expert. For travelers who feel that this is an important concern, it’s worth understanding what the capabilities of that expert examiner may be.

Hard Drive Image Backups

If you have a large external hard drive at home, you can make a byte-for-byte image copy of your laptop hard drive before your trip; then you can install a fresh operating system for travel purposes, overwriting the laptop contents. When you return home, you can restore the image copy onto your laptop (overwriting the travel operating system) and pick up where you left off.

Regardless of what operating system you usually run, you can do this most easily with a Linux live CD. (This operation happens below the level of the operating system so it can be used on any operating system.) The external drive to which you make the backup should itself be encrypted because the backup contains all of the information from your hard drive (including things you may think are deleted, and including saved passwords and authorization credentials) in a usable, accessible form.

Note that making or restoring a full-drive backup can take a long time; it’s usually limited by the capacity of the connection to the external hard drive and could be up to several hours for a large laptop drive.

Since hard drive sizes have been growing faster than Internet connection speeds, image backups over the Internet are unlikely to be feasible except in the most highly Internet-connected places. (An Internet-based image backup is similar to swapping hard drive images onto an external disk, except that the external disk isn’t physically plugged into the local computer but is located somewhere else. Encryption should be used to protect the hard drive’s contents.)

Backups

Every year millions of computer users lose important information accidentally for want of a good, current backup, so there are many good reasons other than the possibility of a border search or seizure for you to have a current backup. In modern practice, backups are most often made onto another computer over a network. (See our discussion of on-line service privacy in the next section – Backups Using the Internet.) You can also back up to an external hard drive, which can be extremely quick and easy.

Backups are especially important for travelers, since, aside from the possibility of a border search or seizure, travel presents many opportunities for losing your computer or data.

Backups Using the Internet

When you’re backing up your computer over a network, bear in mind that

* Your connection to the server should be encrypted to prevent eavesdropping that would reveal the contents of your backup.
* The content of your backups should also be encrypted so that the backup service itself can’t read them. (Currently, only a few services automate this process for you.)
* Your backups should be frequent, especially while you’re traveling away from home. They can be incremental so that only things that have changed since your previous backup are actually transmitted over the network.
* Your Internet access will need to be fast enough to transfer the amount of information you have to back up in the time you have available.

Storing information with an online service, sometimes also called a “cloud service,” is a popular choice today; it may have significant benefits for reducing the amount of data that could be exposed to a border search. For instance, you could keep your email with a webmail provider and not on your laptop, or edit documents on a network service like Google Docs, or store files with a service like SpiderOak instead of on your computer. Devices like Chromebooks can do this automatically so that you rarely physically store information on a laptop at all. Relying on network services and network storage has both advantages and disadvantages for privacy.

Pro: Data is not stored on your device, is not actually carried across the border and is not subject to a physical border search. You can truthfully tell agents that the data is simply not present on your device at all; you are not carrying it with you.

Con: Some data that you store with a third-party online service provider in the United States enjoys less legal protection than data you store on your own computer.

You can get the best of both worlds when you encrypt your data separately before storing it with a cloud storage provider. Then the cloud storage provider does not know the information required to decrypt the data, so it can’t access your data at all. Some cloud storage providers like SpiderOak17, Tarsnap18, and Wuala19 make this kind of protection a standard part of their services, while tools like Duplicity20 and Tahoe-LAFS21 let you set up your own encrypted backup infrastructure.

If you decide to move some files into cloud storage before crossing the border rather than keeping your files there all along, remember that merely deleting files won’t always remove their names or contents from your device. See The Challenges of Secure Deletion, below.

Backups Using an External Hard Drive

You can also easily make a backup onto an external hard drive instead of (or in addition to) a network server. This hard drive can, and should, be encrypted so that only someone who knows the proper passphrase can read its contents. In general, store and transport your backup and your computer separately. In particular, we recommend you don’t carry your backup across the border at the same time as the computer it’s backing up!

Case Scenario: Doctor Confidentiality

Akina is a doctor in Japan. She is traveling to the United States with her young son to attend a relative’s wedding. She wants to ensure that she can access any email messages that her patients send her while she is abroad, and considers it critical to protect the confidentiality of those messages. On the other hand, she doesn’t want any confrontation with the border agents — she worries that being detained will upset her child, and, if they are refused entry, they will miss the wedding. Akina chooses not to carry a laptop at all. Instead, before her trip, she mails a travel laptop to her relative in the United States. After the wedding, she securely wipes the laptop and takes it back to Japan with her.

Remember that backups can take time, so plan accordingly. Using a USB connection, a 60 GB laptop drive could take over 15 minutes to back up (probably longer), while a 1 TB drive could take around five hours. You can use incremental backups together with encryption to make the time a bit shorter. USB’s peak data rate is 60 MB/s (for USB 2, the latest version you can assume is widely supported), so plan ahead and use incremental backups where appropriate. Note that current computers might let you connect external drives using Firewire, or eSATA interfaces as well, although the most universally compatible are USB, which is also the slowest (unless you have USB 3, which is still uncommon as of mid-2011).

A 2 TB external drive (self-contained and ready to use) is relatively cheap and is probably more than sufficient for a complete encrypted backup of any computer you’re likely to use. You can also get an enclosure to turn an internal hard drive into an external hard drive. High-quality enclosures are also relatively inexpensive and protect the internal drive against physical damage, as well as providing power and making it easy to plug and unplug the drive.

Minimizing Data You Carry

One strategy for protecting your data when traveling is to minimize how much data you carry. This can be as simple as choosing not to bring a device which may hold sensitive data with you during a border crossing, or it can involve removing data you don’t want border agents to access. There are a wide variety of ways to effectively remove data, depending on the devices and network access that you have.

One approach is to physically remove the hard drive from your laptop before your trip. You might purchase a separate laptop hard drive for travel purposes and install a fresh operating system on it. Then you can switch hard drives before and after your trip and pick up where you left off when you get back home.

Case Scenario: Philosophical Grounds

Howard firmly believes as a matter of principle that the government has no business sifting through the contents of his laptop, and he’s willing to stand up for that belief. He is entering the United States after traveling around Asia for three months. He backs up his data on a remote server before his trip. He also uses strong cryptography to encrypt his hard drive and chooses a strong passphrase. If the border agents ask him for the passphrase, he intends to say no. He knows this might cause the agents to seize the laptop, but they are unlikely to break the password, and he can still have access to the information on the laptop because he has stored it remotely.

Alternatively, you can remove your hard drive before your trip and use your computer with no hard drive at all (by starting an operating system from a CD, USB drive, or SD card). See the Operating System on an SD Card section below for a more detailed discussion. Instead of storing files on a hard drive, you can store them on a USB or SD medium or on a network server that you access via an encrypted connection. Again, in this scenario, you can put your normal laptop hard drive back in when your trip is complete. In any case, you can ensure that the information on your laptop while you’re traveling is minimized and that you have only the information you’ll need during the trip.

You could also use an inexpensive travel computer on which, by design or by practice, you avoid saving files, instead storing them “in the cloud” on network servers. A traditional netbook is suitable for this, while a Chromebook running ChromeOS helps automate the process. (Bear in mind that common application software could leave forensically recoverable data on the local hard drive even if you normally only save files on network servers.) They could make good investments for frequent travelers. Note that, if you do consider using cloud data storage, it’s important to keep in mind the privacy concerns associated with giving a service provider access to your data; for instance, though Chromebooks store little data locally, Google can access the information these devices store in Google’s cloud service. We discuss these issues in Backups Using the Internet, above.

As a way of limiting what they physically carry across an international border, some travelers will send computers, hard drives, USB flash drives, or SD cards through the mail or other shipping services. The legal protection afforded to computers and data sent via international mail is not appreciably better than at border crossings,22 but travelers can at least know that they won’t be questioned about those devices while they and the devices are both under border agents’ control.

The Challenges of Secure Deletion

Simply deleting data from your hard drive with your normal OS file deletion features is not secure and the data is still present and recoverable on your hard drive. Just because deleted files are no longer visible in your operating system’s file manager does not mean that a forensic expert can’t undelete them or deduce that they were once present. The forensic software will examine the bytes actually stored on disk, which contain much more information than your operating system shows you.

Even if you delete files securely when uploading them, there might still be local traces of those files’ contents because of cached copies, metadata, and swap space issues.23 For example, file names of cloud-stored files may still be mentioned on your hard drive. Perhaps copies of some of them are temporarily downloaded while you’re working on them, and the local traces or even the complete contents would then be visible with appropriate forensic software.

Securely erasing files requires overwriting them, not just pressing “delete” in the user interface or emptying an electronic wastebasket. As Simson Garfinkel explains, it also doesn’t work to just “format” a hard drive on most systems.24 Remember: an action may appear to erase or sanitize data but may be easily undone by a knowledgeable forensic examiner.25

You can use DBAN26 to delete entire laptop hard drives (or external hard drives or memory cards) safely. According to more recent research, multiple-pass overwriting (something extensively promoted during the 2000s) is probably not necessary. This is important because multiple-pass overwriting often takes most of a full day and has discouraged people from using secure deletion tools, especially if they’re in a hurry. Single-pass overwriting in a correctly-implemented secure deletion tool is qualitatively much better than nothing, and especially much better than deciding not to overwrite data at all because of the time it would take!

There are some types of software — known as secure file deletion utilities or Secure Empty Trash — which might be useful for erasing individual files safely. However, in modern computing environments, these methods are not necessarily fail-safe when faced with expert forensic analysis. We do not recommend that you rely on them for removing your sensitive data from a device.

Some operating systems have a useful way to “clear free space” on a disk. If your system has this feature, it helps make most kinds of deleted data hard to undelete, but deleted regions or data within files or databases may not be purged if the files or databases themselves still exist. For example, clearing free space should prevent the undeletion of deleted files, but perhaps not undeletion of deleted emails and web history if they were stored inside of larger files that still exist.

A perennial problem is that many kinds of application software invisibly leave traces behind when you open or work with files. For example, applications might make a temporary copy, or list a file’s name in a “Recently used documents” list. Forensic software is written to be aware of these traces and search them out. This is also a substantial risk for people who use disk encryption to protect data on removable storage devices.27 With this concern in mind, the most prudent course would be to assume that some trace of any files viewed or edited on a particular computer could still be present on that computer’s hard drive. That’s why using full-disk encryption is, according to some researchers, “the safest strategy” (although less helpful if you anticipate turning over your passphrase if asked).

Operating System on an SD Card

On the most modern laptops, it’s possible to use an SD card like a hard drive; thus, you can choose to use an SD card in place of a conventional hard drive and keep your entire operating system and all your data on on it. (You should still use disk encryption for the data on the SD card.) Since you can keep the SD card in your pocket or wallet when it’s not in use, it’s considerably harder for someone to take it from you without your knowledge or tamper with it (although, since it’s so tiny, it’s much easier to lose).

You can also easily prepare several different operating system images on separate SD cards, for separate purposes or separate trips. In this case, it’s easier to send them in the mail or even easily erase or destroy a card when you no longer need it. Privacy expert Chris Soghoian, who described this technique, reports that his laptop gets better battery life when he uses an SD card in place of a hard drive28.

You can even use the same SD card in a digital camera for taking photos so that a single card serves both as your camera storage medium and your encrypted hard drive.

Encryption

Disk encryption protects your data if your computer is ever lost or stolen during your travels, so it’s a useful precaution even for people who plan to cooperate completely with border agents’ requests for assistance in inspecting devices. Also, using encryption can help ensure you know whether your computer was actually searched because you are “in the loop” — a successful search will not happen without your knowledge. If you don’t use full-disk encryption, border agents can search your computer in another room and you won’t necessarily know whether this has happened because they will not require your cooperation.

Threats to Disk Encryption

Full-disk encryption is not an impregnable solution to all concerns about data privacy.  It could conceivably be bypassed in certain ways:

* By breaking into your computer while you’re using it (with a Trojan horse or spearphishing, or exploiting a vulnerability in software that you use).
* With a cold boot attack if the attacker has control of your computer while it’s turned on after you’ve already entered your passphrase (even if the screen is locked or the computer is in “suspend” mode).
* With an evil maid attack if the attacker has control of your computer while it’s turned off and you use it later on without realizing the attack has happened.
* By learning your encryption passphrase or key with high-tech surveillance techniques (such as video surveillance or emanations monitoring).

A simple precaution against cold boot attacks at the border is available. You should always turn off your computer (physically power off, not “suspend” or “hibernate”, and not just closing the lid) before crossing the border. If a computer is on and you have previously entered the disk encryption passphrase, there are techniques for extracting it directly from the computer’s memory (even if the screen is locked). Powering the computer off prevents these techniques from working.

Account Passwords Versus Full-Disk Encryption

People often decide that they need to “set a password on their computer” in order to protect their data. This intuition is right, but the details matter quite a lot; not all ways of “setting a password” provide the same kind of protection, and many don’t involve any encryption.

An account password or screen-lock password is enforced by the operating system code. The operating system is configured to ask for the password and won’t allow access unless the right one is provided. But the data is still simply present on the hard drive. An account password is easily bypassed by accessing the same disk using a different operating system, which won’t require that the correct account password is entered. Alternatively, the hard drive could be physically removed from the computer and read using a different computer; again, no password would be needed.

By contrast, disk encryption uses mathematical techniques to scramble data so it is unintelligible without the right key. This mathematical protection works independently of the policies configured in the operating system software. A different operating system or computer cannot just decide to allow access because no computer or software can make any sense of the data without access to the right key.

This distinction makes a major practical difference. Bypassing an account password is a routine operation that can be done automatically with forensic software that bypasses the operating system and looks directly at the disk, interpreting its contents for the forensic analyst; your account password is no obstacle for this forensic software. CBP, ICE, and other federal law enforcement agencies have staff with extensive training in the use of forensic software and are prepared to use it if they think the contents of your computer are interesting enough.

Fortunately, modern computer systems come with comparatively easy full-disk encryption tools that let you encrypt the contents of your hard drive with a passphrase that will be required when you start your computer. Using these tools is the most fundamental security precaution for computer users who have confidential information on their hard drives and are concerned about losing control over their computers — not just at a border crossing, but at any moment during a trip when a computer could be lost or stolen.

Choosing a Disk Encryption Tool

Choosing encryption tools is sometimes challenging because there are so many options available. For the best security, choose a full-disk encryption tool that encrypts everything on your computer rather than a file-encryption tool that encrypts individual files separately. This may need to be set up at the time your operating system is first installed. Every major operating system now comes with encryption options.

Case Scenario: Documentary Filmmaker

Bill is a filmmaker who has made several documentaries over the past few years about the efforts of authoritarian governments to suppress dissent in their nations. He traveled to a couple of Middle Eastern countries last year and has faced heavy questioning at the U.S. border ever since. He is working on a new project in Tunisia, where he filmed interviews with several dissidents, and he wants to do everything possible to protect the confidentiality of this footage. He needs to transport several hundred GBs of video into the United States from Tunisia. His Internet access is not good, so uploading it to a remote server is not a realistic option. Bill chooses to store the encrypted video files on discs with a strong passphrase and asks a friend to mail them to him in the United States. Then he securely wipes his laptop and brings it back into the United States with him.

* Microsoft BitLocker in its most secure mode is the gold standard because it protects against more attack modes than other software. Unfortunately, Microsoft has only made it available with certain versions of Microsoft Windows.
* TrueCrypt has the most cross-platform compatibility.
* Mac OS X and most Linux distributions have their own full-disk encryption software built in.

For more detailed information about the advantages and disadvantages of various tools, consult the Wikipedia article on comparison of full-disk encryption software.29

Choosing a Secure Passphrase

Unlike other passwords, cryptographic passwords specifically need to be long and extremely hard to guess. This is because a computer (or a cluster of many computers) can be programmed to try trillions or quadrillions or more of possibilities automatically. If the password is too short or otherwise constructed in too predictable a way, this brute force guessing approach will eventually succeed in cracking the password by trying every possibility.

Approaches to choosing encryption passwords that don’t take account of this reality are obsolete. For instance, many users have historically been trained to use random passwords around 7-8 characters and containing letters, numbers, and punctuation marks, like these:

1rThlr’9   &&0HfxEV   iq#tW}i7   9/NKgKaI   G>oX/7Ip   s@;30:[E

These passwords are certainly hard to remember and hard for a human being to guess, but they’re simply not safe enough as cryptographic passwords against modern crypto-cracking devices, which would easily be able to guess each of them. In 1999, EFF built a crypto-cracking machine that could try 2^56 possibilities in under nine days.30 That’s about enough to try every nine-letter password made of letters, numbers, and punctuation. Bear in mind that this was a non-profit organization’s proof-of-concept project from twelve years ago! It’s a certainty that government agencies can crack even longer passwords with ease today.

Fortunately, modern practice provides useful alternatives. Instead of using a single word as an encryption password, it’s now normal to use a long text called a passphrase.31 Arnoud Engelfriet defines a passphrase this way:

A passphrase is a sentence or phrase used instead of a single password. Because of its length, a passphrase is more secure than a password. By using a phrase, it still is easy to remember.32

While some traditional advice emphasizes (correctly) that one should not use a dictionary word as one’s password, modern practice shows that using multiple dictionary words in one’s passphrase is useful. Our calculations confirm that relatively short series of truly randomly chosen English dictionary words are secure; many people find these somewhat more memorable. The important thing is to choose enough words and to choose them in a random way. A useful technique for choosing secure passphrases with combinations of words is called Diceware; this approach was devised by Arnold G. Reinhold.33 The Diceware approach can be carried out with actual physical dice, or using any of a variety of software applications, and offers a complete recipe for making safe and memorable passphrases.

A major advantage of passphrases made of words is that it’s often possible to think of a mnemonic that allows you to easily memorize your passphrase. Randall Munroe’s xkcd comic shows a typical example of the Diceware-like phrase “correct horse battery staple”34: a horse is being congratulated on correctly identifying a staple protruding from a battery.

Note: this phrase, while memorable, is likely not long enough to be truly secure against cracking by specialized encryption-cracking tools or machines, since Munroe’s advice doesn’t aim to protect against this kind of attack. A strong passphrase would be longer or incorporate words from a larger word list, like: “exultantly barnacle slipshod Vancouver rumble.” This is also memorable! The Diceware article discusses in more detail how to ensure your passphrase is long enough.

Another popular modern approach is to use a phrase, sentence, song lyric, poem, or long acronym that has been modified in an unguessable way, such as by changing the spacing, punctuation, spelling, or capitalization in an idiosyncratic way, or altering the topic of the text or combining several unrelated texts together.35

When encryption passphrases are forgotten, the disk contents will become completely unusable. By design, the disk encryption software author is unable to override or bypass the protection. Some systems like BitLocker suggest making a spare copy of the passphrase and storing it somewhere safe and inconspicuous, physically distant from the computer it protects. There are also technologies for allowing multiple people to share parts of the passphrase so that it can only be recovered if several of them cooperate (usually, implementations of Shamir’s Secret Sharing Scheme, such as the ssss36 and Secret Sharp37 software). If you worry that you might forget your passphrase, you could use this software to securely split it into pieces and store the pieces in different places.

Border Agent Demands for Access to Data

TrueCrypt Hidden Volumes

The TrueCrypt encryption software tries to provide “deniability” by letting you create multiple encrypted disks protected by separate passwords in such a way that the existence of additional hidden data can’t be easily proven or disproven.  These additional encrypted disks are known as hidden volumes. Although TrueCrypt hidden volumes may have some practical applications, we think they are unlikely to be useful in the border search context because they are most helpful when lying to someone about whether there is additional hidden data on a disk. Lying to border agents is not advisable because it can be a serious crime.

If a border agent asks you to provide an account password or encryption passphrase or to decrypt data stored on your device, you don’t have to comply. Only a judge can force you to reveal information to the government, and only to the extent that you do not have a valid Fifth Amendment right against self-incrimination.38

However, if you refuse to provide information or assistance upon request, the border agent may seize your device for further inspection or consider you uncooperative, which the agent may take into consideration when deciding whether to allow you to enter the United States.

If you are planning to bring encrypted or password-protected information over the border, it’s best to decide ahead of time how you would respond to a border agent’s request for help to inspect data. The best answer for your particular circumstance may be to cooperate or to politely decline to provide information. You could also choose to avoid the situation altogether by bringing a blank device over the border and downloading your data once you reach your destination.

Another option is to generate a long and not-very-memorable encryption password before your trip, and then have someone else hold onto it and send it to you later after you’ve crossed the border. This might be especially practical with a work computer if you have support from an IT department at your workplace because the IT department could hold onto the password for you and let you know it when you check in with them again.39

For more advice on dealing with agents at the border, see the section titled Interacting with Border Agents.

Technology-specific Considerations

Flash Drives

Flash memory devices (including USB flash drives and SD cards) are used as the internal storage in most cell phones and digital cameras. Securely erasing their contents can pose an extra challenge because of a technology called wear leveling, which tries to prevent you from repeatedly writing to the same place on the disk. That means that special forensic techniques involving physically disassembling the flash drive can sometimes reconstruct contents that you attempted to overwrite because the flash drive decided to put the overwriting data in a different physical location from the overwritten data.40 This kind of forensic examination is much rarer than basic disk forensics and is probably only a concern in a tiny number of situations.

Mobile Phones and Similar Devices

Devices like mobile phones increasingly hold a tremendous amount of sensitive information, including photos and email messages that just a few years ago might have been found only in cameras and laptops. Often, they contain lists of your friends and colleagues and detailed logs of when you communicated with them. Some mobile phones also store detailed logs of your physical location over time.

Case Scenario: Activist Associations

Vera has lots of friends who are involved in controversial activism, and some of them have had their laptops seized at the U.S. border. Vera isn’t an activist herself but worries that the government will take an interest in her if it learns that she’s friendly with people who are activists. She takes a travel laptop on an international trip with the minimum information necessary, leaving most of her data at home. Before she enters the United States, she signs out of her Gmail, Twitter and Facebook accounts and makes sure that the passwords aren’t stored in her browser. She also uses WhisperCore’s full disk encryption app to secure the contacts, text messages, and other content stored on her Android phone. If asked for the passwords, she intends to say no. She knows this might cause the agents to seize the devices, but they are unlikely to break the passwords, which are very strong. If that happens, Vera will still be able to access all the information on the devices because she has stored it remotely.

Although setting a password on your phone can be a sensible precaution, it’s worth emphasizing that the password and screen-locking features that come with most phones provide no meaningful protection against a skilled examiner. These passwords are like user account passwords on a PC, not like passphrases for disk encryption; an examiner will not need to discover what the password is in order to bypass it.

Temporary Phones for Travel

If your mobile phone uses the international GSM standard (usually the case for non-U.S. mobile subscribers, or for U.S. customers of T-Mobile and AT&T Wireless), you can avoid taking your normal phone on your international trip at all, even if you want to use your existing phone number.41 Just get a different GSM-compatible phone and transfer your SIM card from your regular phone to the new phone. Your temporary phone will have far less of your private data on it, but since your phone number is associated with the SIM card rather than with the phone itself, you can still be reached at your normal telephone number (assuming that you have chosen to enable international roaming services on your cell phone account). When your trip is over, you can swap the SIM card back.

Secure Deletion of Data and Disk Encryption for Mobile Devices

It’s very hard to be sure that information on mobile devices has been truly deleted. You might choose to delete information such as SMS messages so that they are not visible to someone looking through your phone, but there is typically no meaningful secure deletion option. A sophisticated forensic analysis may still reveal the contents of these deleted messages.

If your mobile device has a removable memory card such as an SD card, you can most securely wipe its contents by physically removing it from the mobile device and wiping it using secure deletion software on a PC.

In most cases, it may be better to travel with a separate mobile device that holds little private data rather than trying to rely on your phone’s security features to prevent border agents from reading private data.

If you prefer to travel with your everyday mobile device, it may support specialized encryption software. The most recent release of Android for tablets (but not mobile phones) has a comprehensive encryption option, while some Android devices can be protected with add-on software like WhisperCore (which requires a fresh installation of the phone software). WhisperCore also supports making a networked backup of a phone’s contents, securely erasing them, and re-downloading them later. BlackBerry devices also have potentially effective security options that may be able to protect data even against an expert; if you have an enterprise-managed BlackBerry, you can check out your user manual or ask your IT department about these features.

Digital Cameras

Agents may well ask to look through the contents of cameras, whether to try to disprove someone’s claim about where they traveled, in search of sexually explicit photographs, or simply out of curiosity.

Be aware that border agents may search your camera, copy its contents, or try to undelete images or videos that you believe you’ve deleted and that are no longer visible from the camera’s user interface.42 There is no simple precaution against this, although low-level formatting or low-level overwriting a memory card in its entirety, using a computer and not a camera, should prevent undeletion; you should not rely on this unless you’re familiar with exactly what the formatting process is doing. (Notably, high-level formatting of memory cards, or of hard drives, is totally ineffective against forensic analysis.)

The same considerations apply to camcorders and to the camera in your mobile phone.

Interacting with Border Agents

Border agents have a great deal of discretion to perform searches and make determinations of admissibility at the border. Keep in mind that any traveler, regardless of citizenship status or behavior, can be temporarily detained by border agents for more detailed questioning, a physical search of possessions, or a more extensive physical search.43 Refusal to cooperate with searches, answer questions, or turn over passwords to let agents access or decrypt data may cause lengthy questioning, seizure of devices for further examination, or, in extreme circumstance, prevent admission to the country.44

For this reason, it may be best to protect your data in ways that don’t require you to have awkward confrontations with border agents at all. If you find yourself in such a situation, however, keep these tips in mind:

Don’t Lie

It’s extremely important that you do not tell a lie to a border agent. Doing so is a serious crime for which you may be prosecuted even if your lie was not told to conceal any wrongdoing.45 If you are absolutely sure that you don’t want to answer a specific question, it’s better to politely decline to answer than to give a false answer.

Don’t Obstruct an Agent’s Investigation

Once it’s clear that a border agent is going to search your device or other possessions, don’t take any steps to destroy data or otherwise obstruct that process. Like lying, knowingly interfering with a border agent’s investigation is a serious crime.46 Write down the agent’s identifying information and collect a receipt for the property if appropriate. Then file a complaint or consult a lawyer about getting the item back. (For information on filing a complaint to CBP or ICE, see the Appendix to this paper.)

Courtesy

It’s in your interest to be courteous to agents at all times during the border inspection process. CBP agents should also be courteous and professional while searching your belongings, detaining, or questioning you. If they fail to do so, you can file a complaint.

Appendix

Resources for International Travelers With Border Search Issues
Problems with or questions about an ICE or CBP examination?

If you have a question about CBP or wish to submit a formal complaint about a CBP examination, please go to <https://help.cbp.gov/app/forms/complaint>.

To file a civil rights complaint against either CBP or ICE, you can file a complaint with the Department of Homeland Security Office of Civil Rights and Civil Liberties. You may download a complaint form at <http://www.ice.gov/doclib/secure-communities/pdf/crcl-complaint-submission-form-english.pdf>.

Have you been repeatedly referred to secondary screening? Do you suspect your name is on a watch list?

You may submit a complaint to the Department of Homeland Security’s Traveler Redress Inquiry Program at <https://trip.dhs.gov/>.

Want to know what information CBP or ICE has on file about you?

Anyone can seek copies of records about themselves through the Freedom of Information Act. You can use the Privacy Act to ask for the same information if you’re a U.S. citizen or lawful permanent resident.

For information about submitting a request to CBP, see <http://www.cbp.gov/xp/cgov/admin/fl/foia/reference_guide.xml>.

To request records from ICE, see <http://www.ice.gov/foia>.

Feel as though your privacy or civil rights have been violated during a border search?

Please visit the Department of Homeland Security’s Traveler Redress Inquiry Program to specify all scenarios that apply to your travel experience at <https://trip.dhs.gov/>.

Do you have further questions? Contact an attorney for help.

A 1,000 Pack of Beer (Only in Finland)

Look at this 1,000 pack of beer, it’s only available in Finland. Possibly a Finnish equivalent to Costco?

Screen-Shot-2017-05-03-at-2.31.55-PM

Created by the Finnish brewery Nokian Panimo, this behemoth of a party pack actually contains 1,080 cans of Keisari, made by combining five stacks of beer, each 12 beers wide by 18 beers long according to GrubStreet.

This behemoth of a package is quite the monument to behold, and it was all constructed in the name of being petty.

Rival beer Karjala released a 100-pack of beer last month which, obviously, now pales in comparison to this lifetime supply.

The 1,000 pack is being sold in Finnish supermarkets for €2,150 each, or about $2,345. That’s a little more than $2 a beer, about the same bulk discount as your average 6 pack. That being said, the machismo of a 1,000 pack? Priceless.

These things aren’t exactly flying off the shelves (read: they were probably never expected to), presumably because any amount of beer that requires a pallet truck to transport seems like more effort than it’s worth.

Remarkably, there have been sightings of customers actually purchasing the entire packs.

Now, these beer lovers can be reminded of their love not only through, you know, drinking it but by the constant present of a nearly endless supply of Keisari, a beer we really hope they don’t start to hate the taste of after a while.

Grocery stores are starting to break down the packs into smaller packs as of May 1.

Well, I live in Washington, D.C. that has this no “single can” law that’s supposed to keep people from loitering in front of liquor stores. It hasn’t stopped people from hanging on the corner in front of liquor stores.

So, I don’t think a Guinness World Records-sized pack of Guinness is going to be sold in any DC Area Costco or Bj’s Warehouse anytime soon.

Links:

You can now buy a 1,000 pack of beer in Finland — Mashable.com http://mashable.com/2017/05/03/1000-pack-beer/?utm_cid=a-rr-social-media#qflfReAkmaq4

A DIRECT MESSAGE TO THE PRESIDENT OF THE UNITED STATES

prestrump.jpg
Courtesy of political analyst, legal research consultant, and U.S. Naval veteran, Radcliffe Lewis of Intellexae Magazine: WWW.INTELLEXAE.WORDPRESS.COM:
[Dear President Trump:]

Dude, you need to fire your daughter. We did not hire her.

In the past you lost one round of the Presidential Debates because you took her advice and kept the mittens on, and now you are going to lose a whole lot of support because she is running all over the place suggesting you should let refugee terrorists in.

Here is what will happen. Your loving daughter is going to scowl when you let her know her positions do not fit with the political platform mandate you ran on, but We the People did not Elect or Chose Ivanka Kushner to be President or Vice President of the United States. We did not elect her husband either.

The White House is not the Trump-Kushner Family House, it is a House to house the President of the United States, not the Trump-Kushner family business. Get rid of her already. The West Wing is not a place for nuptials. Get rid of them already. Okay.

/s/ R. Lewis

This message, right here, by Mr. Lewis, gave me a good laugh and made my day!

College Is a Waste If You Want to be Rich

“Most of the geniuses of America – men like Benjamin Franklin, Abraham Lincoln, Thomas Edison, Mark Twain and Andrew Carnegie – never went to college and had few years of primary education. Others more modern geniuses like Buckminster Fuller left prestigious colleges to do real thinking or like Ray Bradbury never really considered going to college.” — Replacing Colleges with Hope, by Bruce Walker http://mensnewsdaily.com/archive/w/walker/04/walker021504.htm

I came across the following, in my email inbox today that is eerily similar to a sentiment I made years ago in this blog. I pulled the above quote from that posting. Here is the following from James Altucher:

“If you’re eighteen years old asking, “Well, how am I going to have millions of dollars later on?”, the first thing I’ll tell you to do is don’t spend two hundred thousand dollars on a college degree and waste four years of your life…”

I can go right now into the center of Times Square in NYC and shout, “Jesus is Satan!” and people would just walk around me and think, “OK, it’s free speech”

But if I shouted, “Don’t send your kids to college”, WHOAH!!

Lock this guy up! Take away his kids!

Seriously…I’ve had death threats on this opinion.

People can’t handle it.
We’re told from an early age there is this magic formula. Degree = Job.

That’s a lie…worse than a lie.

More than half of unemployed people DO have a college degree.

But no job.

Instead, they have the burden of nearly inescapable debt. When you spend years taking on $10’s of thousands of debt to an institution who can’t deliver on its big sales pitch?

That’s not magic…it’s a scam.

Oh, and guess what? Even if you do get a job incomes are getting lower every year. This will never stop.

Since 1993, income for people ages 18-35 have gone from $36,000 to $33,000. This seems like a small amount.

It’s not. It’s the first time ever that income has gone down over such a long period (more than a year).

This means: relying on a college, job, promotion, security, stability, retirement pension, retirement income = thing of the past.
So what should people do instead?

Forget what you know…forget what you’re told is the right way. Instead, invest in yourself…reinvent yourself.

Because everything that used to be safe…

It doesn’t exist anymore.

Debt has gone straight up. Incomes are down.

But OPPORTUNITIES…opportunities are endless.

And that’s how you’re going to make money.

Not by buying into the broken promises of “a degree”, but by investing in your own ability to take advantage of rapidly appearing new opportunities.
There has never been a better time than today to make money without a “job”. And this week I’m going to show you one of the best ways to get started (no matter your age or experience).

I can’t tell you what to do.

I can only tell you what works for me…I can also tell you what I see working for others.

 

James Altucher
P.S. – If you’re eighteen years old asking, “Well, how am I going to have millions of dollars later on?”

The first thing I’ll tell you to do is don’t spend two hundred thousand dollars on a college degree and waste four years of your life.

But what if you already went to college?

What if you already have (a ton) of debt?

Don’t worry, it doesn’t matter…everything I’m going to talk about you can do to.

Now, I don’t know what Mr. Altucher is selling, but the point he makes is clear:

A college education cannot guarantee a job. These days it can barely pay the bills. Let alone, make you rich.

 

Corporatism in the 21st Century

The modern corporation has evolved into the “corporate commune“. It sounds like a contradiction in terms, because if you use communism the right way, it easily fits right in the corporate agenda. — Rick Smith, Interview, YouTube

Back in June 2002, on my post, EPISODE #3: ANACOSTIA DIARIES: A PISSED OFF YOUNG BLACK MAN SPEAKS OUT, I came up with the term, corporate communism:

corporate communism – n. 1. property communally owned by individuals or corporations, with the production and distribution of goods and services, supported and determined mainly by competition in the marketplace. 2. Also, a type of Fascism. 3. A system of government in which a corporate networked social structure controls corporate-owned means of production. 4. The corporate-military-industrial complex as mentioned by President Dwight Eisenhower.

The corporations control the government. The corporations own the means of production. The corporations run the economy.

Did Mr. Smith somehow come across a copy of my book or blog? Or, maybe it was coincidence that he came to the same conclusion as I did based on a knowledge of history, facts and observation?

This system that currently exists is not true capitalism. It is a type of state socialism in which the state supports corporations which, in turn control the government that is also a corporation. A system of “checks and balances” in which the checks go into the politicians pockets.  I actually expanded the definition from my blog/book.

A professor from the University of California at Santa Cruz, G. William Domhoff actually has a paper on “Power in America” that goes into more detail about the “Interlocking interpersonal/social networks” among corporations and individuals that serve aboard “two or more corporate boards” and government agencies.

As it is said, “it’s not just what you know, it’s who you know.” No truer words have been spoken on this modern transnational/global, soon to be an interplanetary corporate system.

References:

Domhoff, G. William. “Power in America.” Who Rules America: The Corporate Community. University of California at Santa Cruz, Aug. 2005. Web. 09 Apr. 2017.

Underyourskindvd. “Richard Smith / UFO Teacher Interview 3 / 3 – “United Moors”.” YouTube. YouTube, 13 Mar. 2013. Web. 09 Apr. 2017.

Is Airbnb Racist?

2017-04-06 18_46_05-Asian Woman and Three Friends Faced Airbnb Discrimination - YouTube

I ask this question because there are several incidents in which people have been discriminated in various ways by owners/hosts of properties registered with Airbnb. Recently, an Asian woman’s reservation was canceled at the last minute.

This woman and her three friends were on their way to an Airbnb house they booked for a weekend in Big Bear, California. Right before they arrived, the host abruptly canceled; citing President Trump for the reason, and telling the woman “One word says it all. Asian.”

As you can see the text in the video, once the owner/host saw that she was Asian, the host canceled saying, “One word says it all, Asian. It’s why we have Trump. And I will not allow this country to be told what to do by foreigners.” She is an American citizen.

This is far from the first incident involving Airbnb.

Airbnb may hope that its new anti-discrimination policy, along with changes to hiring and booking practices, all unveiled on Thursday morning, will have that effect–but right now it will settle for slowing the outpouring of complaints from minority customers. 2016 has been a year of growth for the San Francisco-based home-sharing service, which hit 100 million total guest arrivals and a $30 billion valuation in recent months. But Airbnb’s triumphant arrival as a major competitor to the likes of Priceline and Hilton has been marred by a racial profiling controversy. Many black customers say they were denied accommodations that were later made available to potential white guests.

— Airbnb Plans To Fight Racism With Diversity. But Will It Be Enough?, https://www.forbes.com/sites/briansolomon/2016/09/08/airbnb-racism-discrimination-plan/#472c1e731b9c

The #AirbnbWhileBlack controversy exploded earlier 2016 leading to some new business opportunities. They’re based on the simple idea that Black folks own properties too.

Speaking out wasn’t enough for the founders of two start-up companies, Innclusive and Noirbnb, however. Though two separate entities, Innclusive and Noirbnb have a similar mission: to make their guests feel at home without worrying about being denied or judged for who they are.

“Our vision is to make sure we can provide awesome service but also to just connect our people, not just on a national level, but on a global level,” Noirbnb co-founder Stefan Grant told The Huffington Post.

Grant knows the frustrations of #AirbnbWhileBlack. Atlanta police showed up to a house Grant was renting with their guns drawn after a neighbor told the cops that he broke in. Airbnb reached out to Grant after the tweets he sent about the incident went viral.

— These Airbnb Alternatives Want To Make Travel More Welcoming For Black People, https://www.huffingtonpost.com/entry/innclusive-noirbnb-airbnb-alternatives_us_5768462ae4b0853f8bf1c675

 

Does Airbnb Enable Racism?, https://www.nytimes.com/2016/08/23/opinion/how-airbnb-can-fight-racial-discrimination.html?_r=0

Airbnb Bans Host Who Dumped Guest Because She’s Asianhttps://www.huffingtonpost.com/entry/airbnb-asian-guest-racist-host-big-bear_us_58e665dfe4b07da81324755e

 

Colin Kaepernick Blackballed by NFL

colin-kaepernick-mia-khalifa

He stood up for what he believed was right. Now, he’s literally paying the price: loss of his NFL career. Kaepernick is now damaged goods. A leper in the professional football community.

To quote the Complex.com article:

When Muhammad Ali, at the height of his career, said he was a “conscientious objector” and refused to be drafted into the Vietnam War, he was arrested, his title was immediately stripped, and his boxing license was revoked. When NBA player Mahmoud Abdul-Rauf refused to stand during the National Anthem on the grounds of his religion, he was shuffled out of the league, losing out on millions and enduring death threats. His home was burned to the ground. After Tommie Smith and John Carlos raised the Black Power salute on the podium in the 1968 Olympics, they were expelled from the Games. You have to imagine Kaepernick took all this into account. Yet, when he was asked why he did not stand during the National Anthem, he did not tiptoe, like Tom Brady did when asked about the Make America Great Again paraphernalia he intentionally placed in his locker. Kaepernick, on the other hand, gave a simple and direct answer:

I am not going to stand up to show pride in a flag for a country that oppresses black people and people of color. To me, this is bigger than football and it would be selfish on my part to look the other way.

The 32 owners of the NFL have blackballed this man for taking a stand for his people. Boycotting the NFL sounds like a good idea, but it is not going to happen. What if all the Black players in the NFL chose not to play? Like that’s going to happen anytime soon. Where is Black Lives Matter?

When one man tries to play a game, he gets tackled. When a team of men plays a game, they have a better chance at winning.

See where I’m going with this?

Link: Complex.com – Colin Kaepernick Saw This Coming http://www.complex.com/sports/2017/03/colin-kaepernick-saw-this-coming

You Think That You Have Problems

How, about this? Your humble blogger has been going through hell for the last few months. Sheer hell! Where can I start?

June 2016: I lost my good paying, Union job as a houseman at the Marriott Marquis Washington hotel due to a bunch of asshole co-workers. I chose to resign, rather than risk an assault charge. Then the DC Department of Employment Services (DOES) gave me a hard time about getting unemployment insurance from them. Evidently, my former job had some issues about my resignation. I eventually got the benefits, only to get them cut off weeks later!

September 2016: I was finally able to get my unemployment insurance reinstated to last until March 2017.

December 2016: To get a job, I needed a to get a security clearance. I went through the company background check with no problems. Then the Federal clearance took forever. I waited patiently until January 2017 to find out I didn’t pass. No one gave me a reason why. No email, text, phone call or letter. Nothing. And, my mother had a small stroke!

February 2017: I receive a court summons inserted in my front door knocker. I had to come up with two months back rent or get evicted. Luckily, I filed my tax return. I was able to send all my $2000 dollars out of my Federal return to the landlord. So I paid off
December 2016 and January 2017 off. When I showed up to court, I found out it wasn’t enough. He wanted February’s rent too. Thanks, to help from some Legal Aid attorneys, I was able to file a continuance until April 21 to get time to pay rent. So, me and my roommates were able to pay off February rent into the court registry. On February 28, the landlord claimed that the neighbor across the hall was complaining about bed bugs. He said they were coming from our apartment. This is wrong since he already had an exterminator treat my apartment for bed bugs. I’ve had no problems since. While he was “treating” the apartment for bed bugs, he went into my roommate’s room and sprayed his bed and all around his room. He even set off bug bombs (foggers) while we were all inside! I have it on video. He claimed we had 48 hours notice. The letter said nothing about having to evacuate the apartment so he can set off the bug bombs (foggers). All of us were coughing and almost suffocated to death! We had to open all the windows and doors.

March 2017: We paid off March rent into the court registry. My landlord is a pissed off f—— asshole so he sent me a 30-Day-Notice to Correct Violation or Vacate form. He claimed that my roommates we not on the lease, so they were “unauthorized on the premises” and that I had to evict them. Even though they have stayed with me for over a year and when I first moved in, I specifically asked him, “Can I have roommates?” He said, “It’s none of my business.” Now, all of a sudden, my roommates are a concern. Oh, and he claims that my apartment has “unsanitary conditions, dirty bathroom, dirty carpet, dirty kitchen, debris, trash, and pests.”

I went to the DC Office of Tenant Advocate for help. It was a joke. A f—— waste of time. The intake person there did not take me seriously at all. He was a damn asshole taking the landlord’s side admitting that he was a landlord himself. To summarize: My landlord can do whatever he wants to on his property. I have no rights and there is nothing I can do about it. The whole Landlord-Tenant court system in DC is geared in favor of the Landlords. Even though there is a “Tenant Bill of Rights” it doesn’t mean s—.

My mother had another small stroke on March 18. My hard-headed, autistic sister wouldn’t stop lashing out at the doctors and the nurses, which is understandable because they were taking so long to tell my mother what was wrong with her after all the tests they did on her. Me and my mother kept trying to get her to calm down or the security would show up to kick us out of the hospital. My mother wanted me and my sister to go home and come back tomorrow. My sister got it in her mind that she was not welcome back in the hospital if the security was going to kick her out. After, trying to tell her many times that she could come back to the hospital, I was just trying to get her to calm down so that we wouldn’t get kicked out of the hospital. She was not convinced. So I lost my patience and left. Yes, I left my mother and sister in the hospital. Do I regret it? Of course, I do. I have my own problems that I have to worry about. Although my sister autism and ADHD, she was acting like a spoiled b—-! Now, we are at odds, sending nasty, mean texts at each other over Google+ and I refuse to answer the phone when she calls. She leaves mean, smart ass messages on my voicemail.

On Saturday morning, March 25, my roommate comes in telling me that the landlord was behind him taking pictures of him when put his key in the front door. This unnerved my roommate (as it should) because this man had no right stalking him and sneaking up behind him taking photos without his permission. So I called the police. After taking 30 minutes to finally show up, I told the officer what happened and he said that there was nothing he could do. I tried to talk to the landlord with the officer beside me, but the landlord refused to speak to us. So the officer left.

I tried to talk to the landlord again and he refused to speak to me. I was pissed! So I attempted to attack him. His handyman/bodyguard (who also happens to be my neighbor) fought me, blocking me from the landlord pushing me out into the hallway. Then, he called me “A crazy motherf—–. Do you want an assault charge?” Then moments later, the same cop that left, called me outside and said that the landlord filed a restraining order against me. He said that he should arrest me, but he did not want to. On Friday, March 31, I was told my a DC Superior Court judge to stay 50 feet away from the landlord for six months.

April 2017: As of today, the landlord refused to add my roommates to the lease. He wants “a 30-day notice from me before I vacate and to leave the keys.” There is still a court date on April 21 to forward to and that may have been pushed to the 28th. Stay tuned.

So, you see, I have enough drama for a TV series. I’m still looking for a job. As Jay-Z said, “I’ve got 99 problems and a b—- ain’t one.”

Please donate to me at this Generosity site.  Or buy my books. Thank You.

Buy my Books. Please!

Comedian Rodney Dangerfield’s famous joke was, “Take my wife. Please!” In the same tone, I ask you all to, “Buy my book. Please!”

No matter what cover you see, it is all the same book. Just like a woman, puts on different makeup and outfits every day, I’m rotating my best covers. From the classic cover, by our Media and Graphic Arts Director, JTW to the various covers done by artists on Fiverr, it’s the same ebook on Amazon.com. It’s at the introductory price of $0.99 cents. Yes, almost a dollar! If you want a printed copy, it’s a little bit more.

The same goes for the second part of the Anacostia Diaries, This Black Hole: The Anacostia Diaries Continues. Again, the printed copy costs a little more.

You will be helping to put a few dollars into your humble blogger’s pocket which will go right back into this blog, more books, my small business, legal costs, bills, rent, transportation (Uber/Lyft and Metro ain’t cheap!) and production/logistical costs.

Did I tell you my landlord is a real f—— asshole? Buy my book. Please!