Skip to main content

$21 trillion of unauthorized spending by US govt discovered

© Lee Jae Won / Reuters
The US government may have misspent $21 trillion, a professor at Michigan State University has found. Papers supporting the study briefly went missing just as an audit was announced.

Two departments of the US federal government may have spent as much as $21 trillion on things they can’t account for between 1998 and 2015. At least that’s what Mark Skidmore, a Professor of Economics at MSU specializing in public finance, and his team have found.

They came up with the figure after digging the websites of departments of Defense (DoD) and Housing and Urban Development (HUD) as well as repots of the Office of the Inspector General (OIG) over summer.

The research was triggered by Skidmore hearing Catherine Austin Fitts, a former Assistant Secretary in the HUD in the first Bush administration, saying the Inspector General found $6.5 trillion worth of military spending that the DoD couldn’t account for. She was referring to a July 2016 report by the OIG, but Skidmore thought she must be mistaking billion for trillion. Based on his previous experience with public finances, he thought the figure was too big even for an organization as large as the US military.

“Sometimes you have an adjustment just because you don’t have adequate transactions… so an auditor would just recede. Usually it’s just a small portion of authorized spending, maybe one percent at most. So for the Army one percent would be $1.2 billion of transactions that you just can’t account for,” he explained in an interview with USAWatchdog.com earlier this month.

After discovering that the figure was accurate, he and Fitts collaborated with a pair of graduate students to comb through thousands of reports of the OIG dating back to 1998, when new rules of public accountability for the federal government were set and all the way to 2015, the time of the latest reports available at the time. The research was only for the DoD and the HUD.

“This is incomplete, but we have found $21 trillion in adjustments over that period. The biggest chunk is for the Army. We were able to find 13 of the 17 years and we found about $11.5 trillion just for the Army,” Skidmore said.

The professor would not suggest whether the missing trillions went to some legitimate undisclosed projects, wasted or misappropriated, but believes his find indicates that there is something profoundly wrong with the budgeting process in the US federal government. Such lack of transparency goes against the due process of authorizing federal spending through the US Congress, he said.

Skidmore also co-authored a column on Forbes, explaining his research.

The same week the interview took place the DoD announced that it will conduct its first-ever audit“It is important that the Congress and the American people have confidence in DoD’s management of every taxpayer dollar,” Comptroller David Norquist told reporters as he explained that the OIG has hired independent auditors to dig through the military finances.

“While we can’t know for sure what role our efforts to compile original government documents and share them with the public has played, we believe it may have made a difference,” Skidmore commented.

Interestingly, in early December the authors of the research discovered that the links to key document they used, including the 2016 report, had been disabled. Days later the documents were reposted under different addresses, they say.

Source: $21 trillion of unauthorized spending by US govt discovered by economics professor

AZ Cop Acquitted for Killing Man Crawling While Begging for His Life

Body camera footage released after jury reaches verdict.

Photo Credit: Mesa Police body camera footage.

Arizona jurors watched the video below, which shows former Mesa, Arizona, police officer Philip Mitchell Brailsford shooting and killing a man who was begging for his life and attempting to follow the officer’s orders to crawl down a hotel hallway.

Yesterday, the jurors found Brailsford not guilty of second-degree murder and reckless manslaughter. Do you agree?
(Warning: The video is pretty graphic.)

The incident occurred in January 2016. Daniel Shaver apparently was showing off a pellet gun, and it was visible through the hotel room window. This prompted someone to call to the hotel front desk, which prompted a call to the police.

So it wasn’t unreasonable for police to approach the hotel room thinking the encounter might be dangerous. They knew there was a gun there, and they didn’t know it was a pellet gun. But that video shows some truly baffling decisions by Brailsford that escalated the situation to make it even scarier, not the least of which was that Brailsford’s bluster and open threats of violence made him appear as terrified as Shaver. (CORRECTION: The orders being barked out in the video are not from Brailsford, but by Sgt. Charles Langley, who retired four months after the shooting and defended Brailsford’s actions in court.)

The contents of the body camera footage had been described to the public before, when Brailsford was first charged, but the video itself was withheld until this morning. NBC notes:

The detective investigating the shooting had agreed Shaver’s movement was similar to reaching for a pistol, but has said it also looked as though Shaver was pulling up his loose-fitting basketball shorts that had fallen down as he was ordered to crawl.

The investigator noted he did not see anything that would have prevented officers from simply handcuffing Shaver as he was on the floor.

Forcing Shaver to crawl toward the police like this increased the likelihood that Shaver would lose balance and make wild movements, and Langley’s bizarre orders were probably confusing even to a sober person.

Oh, and here’s an interesting detail from the Arizona Republic:

The judge did not allow jurors to hear about an etching on the dust cover of the rifle Brailsford used to shoot Shaver, which said “You’re f–ked”, because he felt it was prejudicial.

Shaver’s parents have filed a wrongful death lawsuit against the city of Mesa. Brailsford was fired for poor performance two months after the shooting. Would anybody care to bet that he tries either to get his job back in Mesa or to get a job with another law enforcement agency elsewhere?

This post has been corrected to properly identify that Brailsford was not the officer giving orders in the video.

Source: Arizona Cop Acquitted for Killing Man Crawling Down Hotel Hallway While Begging for His Life – Reason.com

Related: Wife of man killed in Arizona police shooting speaks out – Dec 12, 2017

NYT: Harvey Weinstein Paid Off Sexual Harassment Accusers for Decades

During that time, after being confronted with allegations including sexual harassment and unwanted physical contact, Mr. Weinstein has reached at least eight settlements with women, according to two company officials speaking on the condition of anonymity. Among the recipients, The Times found, were a young assistant in New York in 1990, an actress in 1997, an assistant in London in 1998, an Italian model in 2015 and Ms. O’Connor shortly after, according to records and those familiar with the agreements

In 2015, the year Ms. O’Connor wrote her memo, his company distributed “The Hunting Ground,” a documentary about campus sexual assault. A longtime Democratic donor, he hosted a fund-raiser for Hillary Clinton in his Manhattan home last year. He employed Malia Obama, the oldest daughter of former President Barack Obama, as an intern this year, and recently helped endow a faculty chair at Rutgers University in Gloria Steinem’s name …

At Fox News, where the conservative icons Roger Ailes and Bill O’Reilly were accused of harassment, women have received payouts well into the millions of dollars. But most of the women involved in the Weinstein agreements collected between roughly $80,000 and $150,000, according to people familiar with the negotiations…’

Source: Harvey Weinstein Paid Off Sexual Harassment Accusers for Decades – The New York Times

I used to think gun control was the answer. My research told me otherwise.

 

A 9mm pistol. (Jahi Chikwendiu/The Washington Post)
A 9mm pistol. (Jahi Chikwendiu/The Washington Post)

Evidence suggests that no one broad gun-control restriction could make a big difference.

By Leah Libresco, a statistician and former newswriter at FiveThirtyEight, a data journalism site. She is the author of “Arriving at Amen.”

Before I started researching gun deaths, gun-control policy used to frustrate me. I wished the National Rifle Association would stop blocking common-sense gun-control reforms such as banning assault weapons, restricting silencers, shrinking magazine sizes and all the other measures that could make guns less deadly.

Then, my colleagues and I at FiveThirtyEight spent three months analyzing all 33,000 lives ended by guns each year in the United States, and I wound up frustrated in a whole new way. We looked at what interventions might have saved those people, and the case for the policies I’d lobbied for crumbled when I examined the evidence. The best ideas left standing were narrowly tailored interventions to protect subtypes of potential victims, not broad attempts to limit the lethality of guns.

After a shooting in Las Vegas left at least 59 people dead and injured hundreds, Sen. Chris Murphy (D-Conn.) on Oct. 2 said Congress’s failure to pass gun-control legislation amounts to an “unintentional endorsement” of mass shootings. (U.S. Senate)

researched the strictly tightened gun laws in Britain and Australia and concluded that they didn’t prove much about what America’s policy should be. Neither nation experienced drops in mass shootings or other gun related-crime that could be attributed to their buybacks and bans. Mass shootings were too rare in Australia for their absence after the buyback program to be clear evidence of progress. And in both Australia and Britain, the gun restrictions had an ambiguous effect on other gun-related crimes or deaths.

The story must be told.

When I looked at the other oft-praised policies, I found out that no gun owner walks into the store to buy an “assault weapon.” It’s an invented classification that includes any semi-automatic that has two or more features, such as a bayonet mount, a rocket-propelled grenade-launcher mount, a folding stock or a pistol grip. But guns are modular, and any hobbyist can easily add these features at home, just as if they were snapping together Legos.

As for silencers — they deserve that name only in movies, where they reduce gunfire to a soft puick puick. In real life, silencers limit hearing damage for shooters but don’t make gunfire dangerously quiet. An AR-15 with a silencer is about as loud as a jackhammer. Magazine limits were a little more promising, but a practiced shooter could still change magazines so fast as to make the limit meaningless.

As my co-workers and I kept looking at the data, it seemed less and less clear that one broad gun-control restriction could make a big difference. Two-thirds of gun deaths in the United States every year are suicides. Almost no proposed restriction would make it meaningfully harder for people with guns on hand to use them. I couldn’t even answer my most desperate question: If I had a friend who had guns in his home and a history of suicide attempts, was there anything I could do that would help?

However, the next-largest set of gun deaths — 1 in 5 — were young men aged 15 to 34, killed in homicides. These men were most likely to die at the hands of other young men, often related to gang loyalties or other street violence. And the last notable group of similar deaths was the 1,700 women murdered per year, usually as the result of domestic violence. Far more people were killed in these ways than in mass-shooting incidents, but few of the popularly floated policies were tailored to serve them.

By the time we published our project, I didn’t believe in many of the interventions I’d heard politicians tout. I was still anti-gun, at least from the point of view of most gun owners, and I don’t want a gun in my home, as I think the risk outweighs the benefits. But I can’t endorse policies whose only selling point is that gun owners hate them. Policies that often seem as if they were drafted by people who have encountered guns only as a figure in a briefing book or an image on the news.

Instead, I found the most hope in more narrowly tailored interventions. Potential suicide victims, women menaced by their abusive partners and kids swept up in street vendettas are all in danger from guns, but they each require different protections.

Older men, who make up the largest share of gun suicides, need better access to people who could care for them and get them help. Women endangered by specific men need to be prioritized by police, who can enforce restraining orders prohibiting these men from buying and owning guns. Younger men at risk of violence need to be identified before they take a life or lose theirs and to be connected to mentors who can help them de-escalate conflicts.

Even the most data-driven practices, such as New Orleans’ plan to identify gang members for intervention based on previous arrests and weapons seizures, wind up more personal than most policies floated. The young men at risk can be identified by an algorithm, but they have to be disarmed one by one, personally — not en masse as though they were all interchangeable. A reduction in gun deaths is most likely to come from finding smaller chances for victories and expanding those solutions as much as possible. We save lives by focusing on a range of tactics to protect the different kinds of potential victims and reforming potential killers, not from sweeping bans focused on the guns themselves.

Source: I used to think gun control was the answer. My research told me otherwise. – The Washington Post

Are you being watched? Government spy tool found hiding as WhatsApp and Skype

Malware used by intelligence agencies spotted in 7 countries, experts said

Glenn Carstens-Peters/Unsplash
Glenn Carstens-Peters/Unsplash

Legitimate downloads of popular software including WhatsApp, Skype and VLC Player are allegedly being hacked at an internet service provider (ISP) level to spread an advanced form of surveillance software known as “FinFisher”, cybersecurity researchers warn.

FinFisher is sold to global governments and intelligence agencies and can be used to snoop on webcam feeds, keystrokes, microphones and web browsing. Documents, previously published by WikiLeaks, indicate that one tool called “FinFly ISP” may be linked to the case.

The digital surveillance tools are peddled by an international firm called Gamma Group and have in the past been sold to repressive regimes including Bahrain, Egypt and the United Arab Emirates (UAE).

In March this year, the company attended a security conference sponsored by the UK Home Office.

This week (21 September), experts from cybersecurity firm Eset claimed that new FinFisher variants had been discovered in seven countries, two of which were being targeted by “man in the middle” (MitM) attacks at an ISPlevel – packaging real downloads with spyware.

Companies hit included WhatsApp, Skype, Avast, VLCPlayer and WinRAR, it said, adding that “virtually any application could be misused in this way.”

When a target of surveillance was downloading the software, they would be silently redirected to a version infected with FinFisher, research found.

When downloaded, the software would install as normal – but Eset found it would also be covertly bundled with the surveillance tool.

The stealthy infection process was described as being “invisible to the naked eye.”

The seven countries were not named for security reasons, Eset said. WhatsApp and VLC Player did not respond to request for comment by the time of publication.

A Microsoft spokesperson, referencing the Skype infections, told IBTimes UK: “Windows Defender antivirus cloud protection already automatically identifies and blocks the malware.

“For non-cloud customers, we’ve deployed signatures to protect against this in our free antivirus software”, the statement added.

An Avast spokesperson said: “Attackers will always focus on the most prominent targets.

“Wrapping official installers of legitimate apps with malware is not a new concept and we aren’t surprised to see the PC apps mentioned in this report.”

“What’s new is that this seems to be happening at a higher level.”

“We don’t know if the ISPs are in cooperation with the malware distributors or whether the ISPs’ infrastructure has been hijacked.”

The latest version of FinFisher was spotted with new customized code which kept it from being discovered, what Eset described as “tactical improvements”. Some tricks, it added, were aimed at compromising end-to-end (E2E) encryption software and known privacy tools.

One such application was Threema, a secure messaging service.

“The geographical dispersion of Eset’s detections of FinFisher variants suggests the MitM attack is happening at a higher level—an ISP arises as the most probable option”, the team said.

“One of the main implications of the discovery is that they decided to use the most effective infection method and that it actually isn’t hard to implement from a technical perspective”, FilipKafka, a malware researcher at Eset, told IBTimes UK.

“Since we see have seen more infections than in the past surveillance campaigns, it seems that FinFisher is now more widely utilized in the monitoring of citizens in the affected countries.”

Breaking encryption has become a major talking point of governments around the world, many of which conduct bulk communications collection. Politicians argue, often without evidence, that software from companies such as WhatsApp has become a burden on terror probes.

WhatsApp
Microsoft to shut Skypes London offices and make most of its 400 employees redundant

VLC Player for Windows 10
WhatsApp, Skype and VLC all targeted by FinFisher spyware. Image credits (L/R): iStock, Reuters, Windows Phone Store

One WikiLeaks document on FinFly ISP touted its ability to conduct surveillance at an ISP level.

The software’s brochure boasted: “FinFly ISP is able to patch files that are downloaded by the target on-the-fly or send fake software updates for popular software.”

It added that it “can be installed on an internet service provider’s network” and listed one use case when it was previously deployed by an unnamed intelligence agency.

Eset found that all affected targets within one of the countries were using the same ISP.

“Unprecedented”

“The deployment of the ISP-level MitM attack technique mentioned in the leaked documents has never been revealed – until now”, the researchers said in their analysis.

“If confirmed, these FinFisher campaigns would represent a sophisticated and stealthy surveillance project unprecedented in its combination of methods and reach.”

It remains unknown who was behind the fresh hacking campaigns, but FinFisher is almost exclusively tailored to government, police or intelligence agency use.

“We cannot say for sure who is behind the campaign but the ISP re-direction could be a service ordered from FinFisher”, Kafka said.

“This question should be addressed to FinFisher.”

“We [have] very limited information on this, who specifically was targeted, but generally the targets were catered to what FinFisher is generally used for”, he added.

Gamma Group did not immediately respond to a request for comment from IBTimes UK.

Computer code
The variant was spotted in 7 countriesMarkusSpiske/Unsplash

This is not the first time that the company, which has offices in Europe, has been linked to questionable business practices.

In 2013, tech firm Mozilla sent it a cease and desist letter after its software was caught posing as a version of its Firefox browser.

“We cannot abide a software company using our name to disguise online surveillance tools that can be – and in several cases actually have been – used by Gamma’s customers to violate citizens’ human rights and online privacy”, it complained in a blog post.

The same year, Reporters without Borders branded Gamma Group as one of the “Corporate Enemies of the Internet” in an annual report. The creepy and invasive spyware can also be spread via more traditional means – malicious email attachments, for example.

Back in 2011, it emerged that Gamma International, a UK subsidiary, was selling a malware Trojan disguised as an update for Apple’s iTunes media player.

Before being patched, the gaping vulnerability had been exploited for approximately three years, found security journalist Brian Krebs at the time.

Source: Are you being watched? FinFisher government spy tool found hiding as WhatsApp and Skype

With a single wiretap order, U.S. authorities listened in on 3.3 million phone calls

“They spent a fortune tracking 26 people and recording three million conversations and apparently got nothing … I’d love to see the probable cause affidavit for that one and wonder what the court thought on its 10 day reviews when zip came in … I’m not surprised by the results because on average, a very very low percentage of conversations are incriminating, and a very very low percent results in conviction”. When reached, a spokesperson for the Justice Department did not comment.

Continue reading: With a single wiretap order, US authorities listened in on 3.3 million phone calls

The Dangers of Empathy

It can distract us from rational thought and meaningful compassion.


Jimmy Kimmel (Reuters photo: Kevork Djansezian)

Just over 14 years ago, my daughter almost died minutes before entering the world. My wife had to have an emergency C-section. The whole thing was harrowing. Someday I’ll tell the whole story. But because of that experience, and simply because I am a father, I could empathize with late-night host Jimmy Kimmel’s story about his son’s birth. His story is almost surely more harrowing than my story, but that doesn’t matter. Empathy is the [imagined] ability to feel what someone else is feeling.

Empathy is different than sympathy or compassion. Sympathy is when you feel [bad] for someone. Compassion is when you do something about it.

But empathy is something else. Researchers studying the brain can actually see how the various centers controlling certain feelings light up when we observe [and/]or imagine the experiences of others. “If you feel bad for someone who is bored, that’s sympathy,” writes Yale psychologist Paul Bloom in his brave and brilliant new book, Against Empathy: The Case for Rational Compassion, “but if you feel bored, that’s empathy.”

Bloom, a liberal transplant from Canada, distrusts empathy because empathy is like a drug. It distorts our perspective, causing us to get all worked up about an individual or group. He compares it to a spotlight that illuminates a specific person or group, plunging everything and everyone else into darkness.

“When some people think about empathy, they think about kindness. I think about war,” Bloom writes. He’s got a point. Look at the Middle East today. Sunni nations empathize with the plight of suffering Sunnis, and that empathy causes them to further hate and demonize Shiites. Many people around the world empathize with the Palestinians, blinding them to the legitimate concerns of Israelis. And vice versa.

Adolf Hitler was a master of empathy — for ethnic Germans in the Sudetenland, Austria, and elsewhere. The cause of nationalist empathy for the German tribe triggered profound moral blindness for the plight, and even the humanity, of Jews, Gypsies, and Slavs.

Again, Bloom is a squishy liberal by his own account, but he’s also a leading scholar of how the mind actually works, not how we wish it would work.

Human beings are naturally inclined to sympathize and empathize with people like them. There has never been a society where people didn’t give priority to helping family and friends over strangers. This tends to blind us “to the suffering of those we do not or cannot empathize with,” writes Bloom. “Empathy is biased, pushing us in the direction of parochialism and racism.”

Look at the intractable debate over the phrase “black lives matter.” The slogan itself is a kind of spotlight, argue supporters, highlighting the legitimate complaints of African Americans. But it also blinds them to why others respond to the term by saying “all lives matter.”

I don’t go as far as Bloom in detesting empathy. It seems to me not only natural but also defensible to give priority to figuratively kindred people. England is a lot more like America than, say, Singapore. That similarity has forged a long and important bond, both formally (e.g., treaties and shared institutions) and informally in terms of an emotional and cultural bond. If England were attacked, our empathy for its plight would inform our response in ways that I think are important and useful.

But where I agree with Bloom is that empathy alone is dangerous and can distract us from rational thought and meaningful compassion.

Which brings me back to Jimmy Kimmel. His story about his son aroused a riot of empathy across the nation. And he used that response to make an argument about health-care policy that was largely devoid of any consideration of the facts, trade-offs, or costs of what is the best way to deal with people, including babies, who have pre-existing medical conditions. He was largely wrong on the facts: Babies with dire medical conditions are covered by their parents’ insurance, and when their parents are uninsured, doctors don’t just let the baby die on the table. That doesn’t mean there aren’t inequities in the system or that the current health-care regime is anywhere close to perfect.

But it is very difficult to have a rational discussion about the trade-offs inherent to any health-care system — including socialized medicine — when all anyone can think about is the ordeal of a newborn baby and his loving parents.

By JONAH GOLDBERG | Copyright © 2017 Tribune Content Agency, LLC

No, NSA HASN’T Stopped Mass Spying On American Citizens

’The #MainstreamPress says that the #NSA has “ended” its bulk phone records collection program. Does that mean we can all relax and forget about #MassSurveillance?

‘NSA has long recorded the content,  and not just the metadata, of Americans’ phone calls … The NSA is also converting our spoken words into text.

Bottom line: No, the #government hasn’t stopped mass #surveillance on the American people.’

Continue reading:

Is The Average U.S. Speed Limit Dangerously Low?

‘Americans nearly universally speed, and excess speed is a factor in many #accidents. But what if higher speed limits made roads safer?

“We all #speed, yet months and months usually pass between us seeing a crash,” Lt. Megge tells us when we call to discuss #speedlimits. “That tells me that most of us are adequate, safe, reasonable #drivers. #Speeding and #traffic #safety have a small correlation”.’

Continue reading:

IRS took millions from innocent people due to how they managed their money

Wall St. Cash | Simon Dawson — BLOOMBERG
(Simon Dawson — BLOOMBERG)

’In most cases, the report found, agents followed a protocol of “seize first, ask questions later.” Agents only questioned individuals and business owners AFTER they had already seized their money…’

Continue reading:

“The Internal Revenue Service has seized millions of dollars in cash from individuals and businesses that obtained the money legally, according to a new Treasury Department inspector general’s report …

Simply depositing cash in sums of less than $10,000 was all that it took to arouse agents’ suspicions, leading to the eventual seizure and forfeiture of millions of dollars in cash from people not otherwise suspected of criminal activity …

The report found that in 91 percent of those cases, the individuals and business had obtained their money legally.”

How to secure your browser in 10 minutes for free (and why you urgently need to)

‘Soon every mistake you’ve ever made online will not only be available to your internet service provider (ISP) — it will be available to any corporation or foreign government who wants to see those mistakes.

Thanks to last week’s US Senate decision (update March 28: and today’s House decision), ISPs can sell your entire web browsing history to literally anyone without your permission. The only rules that prevented this are all being repealed, and won’t be reinstated any time soon (it would take an act of congress).

You might be wondering: who benefits from repealing these rules? Other than those four monopoly ISPs that control America’s “last mile” of internet cables and cell towers? … these politicians — who have received millions of dollars in campaign contributions from the ISPs for decades — have sold us out.

VPN company Private Internet Access paid $600,000 to run this full-page ad in Sunday’s New York Times — even though they would make a ton of money if these rules were repealed. That’s how this CRA is — even the VPN companies are campaigning against it.

…ISPs can now continue doing these things as much as they want…

  1. Sell your browsing history to basically any corporation or government that wants to buy it
  2. Hijack your searches and share them with third parties
  3. Monitor all your traffic by injecting their own malware-filled ads into the websites you visit
  4. Stuff undetectable, undeletable tracking cookies into all of your unencrypted traffic
  5. Pre-install software on phones that will monitor all traffic — even HTTPS traffic — before it gets encrypted. AT&T, Sprint, and T-Mobile have already done this with some Android phones …

How VPNs can protect you

VPN stands for Virtual Private Network.

  • Virtual because you’re not creating a new physical connection with your destination — your data is just traveling through existing wires between you and your destination.
  • Private because it encrypts your activity before sending it, then decrypts it at the destination.

People have traditionally used VPNs as a way to get around websites that are blocked in their country (for example, Medium is blocked in Malaysia) or to watch movies that aren’t available in certain countries. But VPNs are extremely useful for privacy, too.

There are several types of VPN options, with varying degrees of convenience and security.

Experts estimate that as many as 90% of VPNs are “hopelessly insecure” and this changes from time to time. So even if you use the tools I recommend here, I recommend you take the time to do your homework.

Most VPNs are services that cost money, but the following options are convenient and free to use, with some limited functionality:


Desktop VPN apps

Probably the most secure, trustworthy free VPN you can install (as of when this article was last updated) is ProtonVPN. It’s made by the folks who also make the most secure free email, ProtonMail (which we also highly recommend)

To learn more about why we recommend this stellar VPN, check out BestVPN’s Comprehensive ProtonVPN Review


Mobile Device VPN apps (smartphone, tablet, etc.)

Windscribe – This is our choice for best freemium VPN, since they earn high marks for privacy and give you 10GB free/month. Check out BestVPN’s Review

Opera VPN – While there are definitely better VPNs available, OperaVPN is one of the very few that offer free ulimited bandwitdh. See BestVPN’s Review


Browser-based VPNs

Opera is a popular web browser that comes with some excellent privacy features, like a free built-in VPN and a free ad blocker (and as you may know, ads can spy on you).

Opera’s free VPN service offers a choice of ‘virtual’ country locations to connect through.

I recommend setting the U.S. as your location for Americans, unless you’re quite familiar with the ins & outs of how VPNs work.

Also be advised that you will likely need to disable your VPN in order to use certain websites or apps.

If you just want a secure way to browse the web without ISPs being able to easily snoop on you and sell your data, Opera is a great start. Let’s install and configure it real quick. This takes less than 5 minutes.

Before you get started, note that this will only anonymize the things you do within the Opera browser. Also, I’m obligated to point out that even though Opera’s parent company is European, it was recently purchased by a consortium of Chinese tech companies, and there is a non-zero risk that it could be compromised by the Chinese government.

Having said that, here’s how to browse securely with Opera:

Step #1: Download the Opera browser

Step #2: Turn on its ad blocker by clicking on the Opera menu (upper left) and going to Preferences

Step #3: Turn on its VPN:

That’s it! You can now browse much more privately than you likely had been.

For secure messaging, you may also want to check out Edward Snowden-recommended Open Whisper Systems’ mobile and desktop app called Signal.

Click here for the original article torhis was excerpted from.

Have you subscribed to our free posts by email yet?

If not, simply enter your email below
(Which we will, of course, never distribute!)
for our free email digest of our headline topics:


 

If you already have, you should see a link above to customize the digest to include exactly which topics interest you! (Free registration required)