Enter your email address to subscribe to Irregular Times and receive notifications of new posts by email.

Join 253 other subscribers

Irregular Times Newsletters

Click here to subscribe to any or all of our six topical e-mail newsletters:
  1. Social Movement Actions,
  2. Credulity and Faith,
  3. Election News,
  4. This Week in Congress,
  5. Tech Dispatch and
  6. our latest Political Stickers and Such

Contact Us

We can be contacted via retorts@irregulartimes.com

Telling Your Kids The Truth About Being Safe On The Internet

Neither the Net Cetera manual nor OnGuard Online ever acknowledge the threat to the privacy of American children posed by the electronic spying system created by the National Security Agency. They don’t even mention the existence of the NSA. They pretend that all cybersecurity threats come from unscrupulous individuals. [...]

Many Law Enforcement Agencies Given Easy, Searchable Access To YOUR Private Communications

What the NSA didn’t own up to is that The Intercept discovered that the personal communications of millions upon millions of Americans living within US borders, who are not suspected of any wrongdoing, are also pulled into the NSA surveillance search engine. While they were never targets of any criminal investigation, and are not in any sense foreign, the private communications of these Americans is nonetheless made easily searchable to people from 23 federal government agencies. [...]

Why Is The FBI Withholding Privacy Reports About Its Spying Programs In The USA?

Yesterday, Jim noted that, despite promises of reforms of extraordinary spying powers created under the FISA Amendments Act, the Foreign Intelligence Surveillance Court has failed to create the position of Public Advocate that was recommended by a Presidential commission at the end of last year. The President’s Review Group on Intelligence and Communications Technologies seems [...]

Despite NSA Review Panel Recommendation, Public Advocate Position at FISA Court Goes Nowhere

The Foreign Intelligence Surveillance Court is supposed to stop abuses of warrantless surveillance power. But out of the thousands of requests for warrantless surveillance made this decade by the administration of President Barack Obama, the Foreign Intelligence Surveillance Court has not rejected a single request. Not one. This isn’t surprising; all of the members of [...]

Roll Call: Only 8 In House of Reps Vote Against Funding NSA Spying Operations

Friday saw an an opportunity to finally set things right by defunding the abusive NSA, Congress instead decided to continue with the same old unconstitutional arrangement. [...]

In Process: A Report On Surveillance By The 2016 Presidential Candidates

This report, which we will update several times during the primary campaign and general election, will summarize what actions the different declared and likely presidential candidates are taking to incorporate surveillance software into their own political web sites. [...]

Are WordPress And Automattic Purposefully Sneaking Surveillance Bots Into Jetpack For Self-Hosted Bloggers?

Despite earlier promises that Wordpress would be secured, Kissmetrics tracking software has been placed by Wordpress onto a huge number of independent web sites without their permission. [...]

Electronic Frontier Foundation Notes Many Serious Flaws In USA FREEDOM ACT

Will the USA FREEDOM ACT protect you from Big Brother at the NSA? Until these problems in the legislation are dealt with, you can’t be sure. [...]

Allow More Internet Freedom, Lectures NSA Spying Obama Administration

“Our principle is clear: if you have interests in how the Internet works, you get to play a role in how it’s governed!”

That’s a line from the sermon about online freedom that Secretary of State John Kerry delivered yesterday, remotely, to a meeting of the Freedom Online Coalition Conference.

By the very fact that [...]

How To Opt Out Of Corporate Surveillance Programs

Smart Store Privacy is a start, but only a start. It’s a little token of respect for privacy, providing a small territory of safety within a wide open field under the continual scrutiny of data hunters. [...]