Updating a Samsung Galaxy S3 ATT phone to CyanogenMod 12.1

Mark shows off his Samsung Galaxy S3 phone with CyanogenMod 12.1

I updated my 4 year old Samsung Galaxy S3 ATT phone with CyanogenMod.

The original Android version was sluggish, boring and insecure. The new Android version is lively, fresh and more secure.

CyanogenMod is an open source Android operating system for Android smartphones.

I am very happy with the end result.

Note that the process to update an Android phone is very specific to the phone model and my experience is with the Samsung Galaxy S3 sold by ATT USA model SGH-I747 with the original Android 4.4.2 (Jelly Bean).

Pros and cons to upgrading an Android phone to CyanogenMod

The good

  • New life for an old phone
  • New clean user interface
  • New features
  • No vendor crapware
  • Faster performance
  • Updates
  • Open source
  • Free

The bad

  • The Internet is filled with multiple ways to update, some outdated, some inaccurate
  • Complicated project that requires a level of technical knowledge
  • Time consuming project – research, backups, file copies, installing Android SDK, first boot are all time consuming

The ugly

  • Possible to brick the phone (render it broken)

I always wanted to try CyanogenMod being a big fan of open source software and clean user interfaces.

But I was afraid to experiment with my one phone, fearing the worst, bricking it then be suddenly without a phone.

Then I bought a new mobile phone and that left me free to experiment.

After a lot of research on the Internet and watching YouTube videos I realized that I could do it but wanted to find the easiest and most reliable path to CyanogenMod.

There is a confusing variety of methods for

  • carrier unlocking (if needed)
  • rooting (if needed)
  • boot unlocking (if needed)
  • flashing a bootloader
  • selecting the CyanogenMod ROM
  • backing up the original ROM
  • transferring files to the phone’s SD storage
  • flashing the CyanogenMod ROM
  • flashing Google Apps
  • and other details

I chose going to the origin, CyanogenMod, for the instructions and links to required software. CyanogenMod is abbreviated CM and the website is cyanogenmod.org.

I found the CM instructions for my phone good but not detailed and I did have some glitches.

If you are going to follow my path, I recommend using the CM instructions and reading my notes below.

I am very pleased with the results! My 4 year old Samsung Galaxy S3 is a joy with the new clean interface, lively performance, new features and security updates. Well done CyanogenMod people.

CM 12.1 (the ROM I chose) is based on Android 5.1 Lollipop. The new features I have discovered so far include Task Switcher, photo editing features, tethering, Encrypt phone and File Manager Secure storage.

I do not miss the crapware installed by ATT and Samsung on the original issue carrier locked phone.

When my 2 year contract with ATT completed I asked for the carrier unlock code which they supplied.  I carrier unlocked my phone so that I could transfer my service to a less expensive pay as you go carrier and I kept my same phone number.

Google has discontinued support for Android KitKat. Plenty of security vulnerabilities have been found and exploited for this OS. No security updates is inexcusable and an ugly industry dirty secret.

I made sure my phone information was synced to my Google account so I did not mind wiping it. If your phone has important data (apps, SMS, contacts, photos, whatever) please backup.

Here are the notes on my path to update. I used a Windows 7 PC in the process. This worked for me Nov 26, 2016. I do not guarantee this process or the results.

How to install CyanogenMod on this phone.

https://wiki.cyanogenmod.org/w/Install_CM_for_d2att

Heimdall is a cross-platform, open source tool for interfacing with Download Mode on Samsung devices. The preferred method of installing a custom recovery is through this boot mode.

Rooting the stock firmware is neither recommended nor necessary.

The Heimdall Suite requires a SPECIFIC version of Microsoft Visual C++ 2012 Redistributable Package (x86/32bit) make sure you grab the right one.

How to install the new bootloader.

I used TWRP (Team Win Recovery Project, I was curious about the acronym) https://dl.twrp.me/d2att/twrp-2.8.7.0-d2att.img

I did not see a “blue transfer bar” as described in the instructions.

After installing this bootloader is is a good idea to backup your present ROM to the SD card (careful, the default is to internal storage)

Downloads

For CM I used “Download Latest Release” from

https://download.cyanogenmod.org/?device=d2att

For Google Apps (required if you will use Google Store) I downloaded CyanogenMod 12.1 OpenGApps from https://wiki.cyanogenmod.org/w/Google_Apps

Later you can flash them both at the same time.

How to install Android Studio. This will give you the adb utility and full app development if you want to play with that. Note installing this software takes a long time.

https://developer.android.com/studio/index.html

How to make adb command work from any folder with a Windows path edit

https://wiki.cyanogenmod.org/w/Doc:_adb_intro

Add to Windows path

;C:\Users\username\AppData\Local\Android\sdk\platform-tools\

In the string above, modify username to match your path.  Also, your path may be different.

Then reopen Windows terminal for the path to be in effect.

Adb issues and a workaround

Adb utility did not work for me so I could not issue the “adb reboot nvbackup” command or adb push commands. Maybe something to do with enabling Developer options and USB debugging https://wiki.cyanogenmod.org/w/Doc:_developer_options but this step is not in the instructions. Maybe Windows USB driver issues.

I ended up copying the CM ROM and Google Apps ROM manually to my SD card and flashing them from SD.

In retrospect is Google Studio with adb even necessary if it is only used to push files from the PC to the phone? There are other ways to put the files that you need on the phone’s SD card.  Put the SD card in your PC SD card slot or use a SD card adapter and copy files.  Or before the update, plug a USB cable into the PC and phone and copy files.  Copy files to the SD card root folder.  The two files that you need are the CyanogenMod and OpenGApps, both .zip files in my case.

Terminology

The terms used for installing and updating Android are confusing. The memory on the phone where Android is installed is interchangeably called ROM, firmware, flash memory and memory.  Android is called a mobile operating system, Operating System and OS.  The Android file is called software, image, package or zip file.  The process of installing and updating Android is also called flashing.

People often say “flashing the ROM” meaning installing the software, ie CyanogenMod, to the phone.

Yes ROM means Read Only Memory and is a historical term still used but not accurate.

First boot of CM takes forever! Do not panic!

Resources

Wikipedia

Cyanogenmod.org

Cyanogenmod.org wiki

How to Reset the phone to factory, not required but here for reference http://www.wikihow.com/Reset-a-Samsung-Galaxy-S3

Samsung Galaxy S 3 (S III) SGH-I747 for ATT (AT&T) specifications.

Posted in Uncategorized | Tagged , , | Leave a comment

Raspberry Pi

The Raspberry Pi is a simple, low cost, single-board computer.

Raspberry_Pi_B-_u

Raspberry Pi B+ single board computer

The Raspberry Pi was developed in the UK to teach computers and programming to students.  The default R P runs Linux and has the Python programming language installed.  First released in 2012, several updated models have been released since.  The list price has remained at $35USD.

https://www.raspberrypi.org

The hardware specs are similar to a smartphone or tablet as far as processor and memory but the architecture is more like a desktop with an HDMI video connector, USB ports for keyboard, mouse and other peripherals, RJ45 for network and an SD card for storage.

https://en.wikipedia.org/wiki/Raspberry_Pi

Don’t get ready to replace your desktop with the R P just yet.  The fact that it runs Linux will stop many and it is rather underpowered. Browser performance is slow and YouTube worse.

But if you are looking for a single board computer to learn about computers/Linux/Python or you have a maker/builder project in mind, the R P  can’t be beat.

To set up a complete R P system you will need:

– The Raspberry Pi single board computer
– Monitor with HDMI input and cable
– USB keyboard
– USB mouse
– SD card 16 or 32 GB
– Power adapter (charging adapter for a smartphone or tablet works) with a cable ending in Micro USB

If you don’t have the supporting hardware and are on a budget, think friends, garage sales, second hand stores.

Now you need a R P Operating System (OS) on the SD card.  The default recommended is Raspbian.  You can buy an SD card with Raspbian ready to go or use a computer connected to the Internet to download it and write it to the SD card.  For example with Windows download Raspbian and use Win32DiskImager to write the bootable Raspbian OS to the SD card.

Optional
– Internet connection for updates, new software and just doing Internet things.
– Case for R P (it is a bare naked PCB which is cool to look at but in a rough environment needs a case)
– Speakers (if not built into your HDMI capable monitor) more better amplified speakers because the sound output of the R P is weak
– USB wireless adapter for Ethernet instead of the RJ45 cable

Isis says so hook up your new Raspberry Pi computer and lets see what it does

Isis says so hook up your new Raspberry Pi computer and lets see what it does

Here are my notes on setting up a R P computer.  There are several hardware versions and many software options so your mileage may vary.

There are tons of resources out there for everything R P.  Use your favorite search engine to find what you need.

For example here are great instructions about getting started

http://lifehacker.com/5976912/a-beginners-guide-to-diying-with-the-raspberry-pi

I will warn you that bumps in the road are ahead

– fractured support for different models
– the GB keyboard will confound you by switching the @ and “
– Internet browsers run slow

Assemble your R P and boot

Raspberry Pi boot and at the prompt.  This Raspberry Pi is in a case.

Raspberry Pi boot and at the prompt. This Raspberry Pi is in a case. The connections are (starting lower left and moving counter clockwise) USB micro power, HDMI video, RJ45 Ethernet, USB keyboard, USB mouse.

Linux boots!  You are at a login command prompt!

raspberrypi login:  pi
Password:  raspberry

You are back at the command prompt!

Now what?  Two suggestions – start the xwindows graphical environment and start exploring or configure your system.

Xwindows GUI

To start Xwindows, at the command prompt type startx

Point and click!  Explore the Menu and see what you have available.

Epiphany Web Browser
File Manager
Terminal
Python programming language
Leafpad text editor
Accessories like Help, Calculator, Image viewer, PDF viewer, other stuff.

In Xwindows –
End Xwindows back to the command prompt:  Menu > Logout (keyboard shortcut:  <Ctrl><Alt><Backspace>)
Shutdown the computer:  Menu > Shutdown

RP configuration

sudo raspi-config will get you into the R P Software Configuration Tool where you can expand your filesystem to use the entire SD card, Internationalisation Options, and Overclock

Expand your filesystem is a good thing to use the entire SD card space.

Internationalisation.  The default UK keyboard swaps @ and “.   Change the keyboard to US layout here.
Generic 102
English (US)
The default
No Compose
Ctrl+Alt+Backspace Yes

Overclock.  R P seems to encourage overclocking.  As the R P is slow, try it.

New software and OS updates

In R P the way to get new software and OS updates is with the package manager.  The package manager connects to trusted repositories of software.  This is like an app store.  Updating and installing software from repositories is more secure.

To update all package availabilities:  sudo apt-get update

To install a program for example Firefox type the command (but note the name change, there is some drama)

apt-get install iceweasel

Say hello world in Python

Create a Python script and run it –

In Xwindows,
Menu, Accessories, Text Editor,
enter
print “Hello world”
File, Save As, Select folder pi, Name: hello_world.py
Menu, Accessories, Terminal,
type
python hello_world.py

This is a really simple overview of R P.

R P is a very cool computer with unlimited potential.  Well done R P.

5 million R Ps have been sold.

The latest version is Raspberry Pi 2 with a faster processor and more memory.

Microsoft has announced support for Windows 10 on the R P 2

The R P has a 40 pin GPIO for builders.

There is a large community to support and promote R P.

Builders find more and more uses for R P and share their work.

Posted in Uncategorized | Tagged , | Leave a comment

Big data is tracking me and my cat

My cat buddy Horus coughs and sneezes a lot so I typed the symptoms into
google.com.

I learned that heartworms are a possible cause of coughing.

So I visited several web sites about cats and heartworms to educate myself.

Three months later I received in the mail an offer for dog heartworm
medicine.

bayer_heartworm_mailer_address

Coincidence?  I think not.  Google and/or big data is collecting, saving,
correlating and selling my personal Internet data.

The downside to all this correlation is false data gets entered into your
file.

I have never owned a dog.  I like dogs.

There are no heartworm medicines for cats.

Sorry Horus my buddy.

Horus and MCE

Horus helping me work on a computer.

=======================================

Another example of being tracked – selling a Supermicro server on craigslist gets me a full page Supermicro server ad in Time magazine.

In January of 2015 I sold several old computers on craigslist including a Supermicro brand server.

I have a subscription to Time magazine in my name and address and in the June 1, 2015 issue there appeared a full page ad for Supermicro servers.  I doubt that the typical reader of Time magazine is interested in full page ads for Supermicro computer servers so I suspect the connection was made and I was targeted.

The Supermicro full page ad in my issue of Time magazine.

The Supermicro full page ad in my issue of Time magazine.

Posted in Uncategorized | Tagged , | Leave a comment

Quick and Free fix for your slow PC! (removing junk software with MalwareBytes)

If your PC is getting slow, I have a quick fix for you – remove the junk software that has accumulated on your PC.

Junk software includes toolbars, search tools, adware, programs that claim to fix your PC and other unwanted programs.

The junk software removal tool that I recommend is MalwareBytes (free version available at malwarebytes.com).  I have had good experiences with it and it is well respected in the IT community.

Install MalwareBytes.  Update the virus database.  Run a Threat Scan.  Follow the instructions to remove the malware.  Done.

Of course this will not fix all PC problems but will help with the one I encounter most frequently these days – slow PC clogged with junk software.  Your mileage may vary.

Read on for a more detailed discussion of junk software, malware and malware removal.

Slow PC caused by junk software

People complain to me that their PC is running slow.

So I check out their PC and I find  a lot of junk software installed on their PC – toolbars, adware, browser hijacks and junk programs that claim they will fix fake problems such as “driver errors,” “slow PC,” “registry problems,” “virus/spyware/malware found.”

Junk software accumulates as people roam the Internet and when offered updates or new software they click yes because they don’t want to be bothered or don’t understand what is offered.  Unfortunately clicking yes gives any web site permission to install junk software on the PC.  Clicking links in emails can also install junk software.

Junk software runs the gamut from benign to malicious.  Benign junk software may simply offer you targeted ads which some people enjoy.  Malicious junk software will track you on the Internet, hijack your browser, try to sell you scam junk software, try to steal your passwords and identity, try to steal or delete your data, and worse.

Junk software always slows your PC down.

Remove the junk software and be more careful what you click on in the future!

Do not click on software that is offered to you and do not click on links offered in emails.

More about malware and malware removal

I prefer to call any unwanted software malware (short for malicious software).  Malware includes a wide software, ranging from benign to downright destructive,  from suggesting ads to stealing your passwords.  Malware includes viruses, worms, adware, spyware, browser hijackers, spammers, etc.

If your PC still has malware issues, there are more things to try

Other malware removal tools to try –

  • SuperAntiSpyware
  • JRT – Junkware Removal Tool
  • AdwCleaner
  • Avast Browser Cleaner
  • Stand alone (boot) antivirus, such as Microsoft Defender off-line or Avast!

With your installed antivirus, run a full system scan.

Note that full drive scans can take hours.

Run MalwareBytes or other antivirus in safe mode.

If you know you have a particular malware, search engine it to find tools and techniques to remove it.

Use System Restore to set the computer back to a time before it was infected.

Sometimes malware can be found and removed by hand.

Places to look for malware and malware settings include

  • Programs and Features
  • Browser Add-ons and Extensions
  • Browser toolbars
  • Startup
  • Firewalls
  • Task Scheduler
  • System32 directory
  • Temporary directories
  • Use the Task Manager to find processes and resource usage

Manually uninstall programs that you don’t need, especially toolbars, search engine tools, adware, programs that claim to “fix your drivers” or “improve your PC performance” or “fix registry problems” or “remove found malware.”

Review and block programs from starting up automatically on booting that you don’t need ie Skype, printer updaters, etc.  CCleaner has a nice interface.

Removing malware and unwanted programs will speed up your PC in general, especially when browsing the Internet and booting up.

A few notes about drives

Removing temporary files and browser cache files will often speed up a PC.  An excellent tool for this is CCleaner (free version available at piriform.com).

Hard drives and the Windows file system are usually robust but failing hard drives and corrupt file systems can really slow a PC down.  Windows has utilities to scan the file system and drive.  An excellent tool for drive maintenance and recovery is SpinRite (available at grc.com/spinrite $89USD).  Note full disk scans can take hours.

Is the PC now clean?

After successful malware removal and a scan result of “No Threats Found,” is the PC free of all malware?

Maybe.  Scanning with multiple tools, full disk scans and scanning with a stand alone boot tool will increase your confidence that the PC is now free of malware.

BUT there always is the possibility some malware was not removed – examples are brand new malware that the anti-malware companies have not yet seen and added to their removal capabilities (called zero day malware) or well hidden malware (some are called rootkits),

Some people suggest that once your PC is infected, you must reinstall Windows to obliterate the malware.  But that may not be enough if the malware lives in CMOS, the boot sector, other partition on the drive, a USB drive, mobile phone, router, wireless device, a device owned by someone that visits, the list goes on…

After removing malware you may have to do some cleanup, such as reset your browser home page, reset your proxy settings and reinstall programs that inadvertently got removed, for example a coupon printer.

Malware can be very bad

A list of some things that malware can do –

  • track and report your every move on the Internet
  • create a profile of you in a big data database
  • hijack your browser to web sites you don’t want
  • block web sites that you do want
  • clutter your browser with toolbars
  • send you to fake web sites that look like the real thing to steal information
  • disable your Internet connection
  • block anti-malware
  • steal your passwords
  • steal any and all private information and identity theft
  • sell you scam junk software (and steal your credit card number in the process)
  • use your PC to do evil work such as DDOS, spamming, email relay and botnets
  • steal your computer resources to mine bitcoins
  • watch you on your webcam, listen to your microphone
  • delete your files
  • encrypt your files and ask for a ransom (ransomware)
  • make your PC run slow
  • crash your PC

Final notes

The best way to avoid malware and scams is to be careful about what you do and click on.  Don’t accept software offered or click on links offered in email.  Use good passwords.  Anything that looks suspicious probably is.  Don’t give up personal information unless you are sure who is getting it.  Don’t click on links purportedly from your bank, if you need to visit a secure site, type in the address yourself.  Keep Windows and your software up to date.  Don’t use Internet Explorer, use an alternate browser like Firefox or Chrome.  Realize that when you use social media or search engines or free email services that you are giving up a lot of personal information.  Be aware of your surroundings in parking lots.  You get the idea.

Now that MalwareBytes is installed on your PC, run it periodically or immediately if you suspect that you got infected!  Run CCleaner occasionally.

If you need help, consult your local nerd or computer professional.

Please always backup your important data.

Your mileage may vary.  Share your experiences and ideas.

Posted in Uncategorized | Tagged , , , , , , | 2 Comments

Privacy in the USA. Some resources.

Privacy in the USA is rapidly changing.

Technology, government and business all factor into this change.  The Internet, mobile phones, laws to protect us from terrorism and business fuel the change.

Here are some resources that I found interesting during my study of privacy –

  • Internet web sites
  • the Constitution of the United States
  • quotes
  • novels
  • TV documentaries
  • TV shows
  • movie documentaries
  • popular music lyrics

Updated March 7, 2015.  Comment and share your favorites.

Internet web sites

The Constitution of the United States

Privacy and the expectation of have been interpreted in the constitution.  The Constitution of the United States is available at archives.gov

  • First Amendment.  (freedom of speech)
  • Fourth Amendment.  (reasonable search, warrants)
  • Fifth Amendment.  (self incrimination)
  • Fourteenth Amendment.  (states may not deprive citizens of property without due process)

quotes

“… the only thing we have to fear is…fear itself ”
– US President Franklin D. Roosevelt at his inauguration address March 4, 1933.  http://en.wikipedia.org/wiki/First_inauguration_of_Franklin_D._Roosevelt

You have zero privacy anyway.  Get over it.
– Scott McNealy, CEO of Sun Microsystems, January 1999 (source)

You never let a serious crisis go to waste. And what I mean by that it’s an opportunity to do things you think you could not do before.
–  Rahm Emanuel, politician, November 2008 (source)

SEN. RON WYDEN: Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?
JAMES CLAPPER: No, sir.
– James Clapper, Director of National Intelligence, March 12, 201, (lying under oath to congress)  (source)

———-

Marcus Ranum interview on surveillance –

Paul Asadoorian (host):  How has technology impacted our ability to monitor the government and vice versa, it kind of seems like privacy is a two way street, you have kind of an interesting take on this.

Marcus Ranum:  Yeah, well that’s an interesting one.

I believe that, well, if you want to take a kind of utilitarian perspective on this stuff what we’re basically saying is that the idea embodied in the 4th Amendment that someone would need go get a warrant to go search my stuff from a legal standpoint, that’s built into the body of law because the founding fathers of the United States were a bunch of smugglers that were actually concerned  and revolutionaries who were actually concerned about things like search and seizure because they would have gotten hung for being treasonous or, they would have been fined for smuggling, so thats why those things are built into that.

If we take a utilitarian perspective, what we say is we grant society the ability to protect itself from criminality through these laws and we also would acknowledge that the reason we let somebody be searched with a warrant is because we have identified that person as possibly more threatening to society and therefore society is willing to abrogate that person’s rights to some degree under some sort of control.

So what we then say is the people that are the most dangerous are the people that should be the subject of most monitoring, the people are that are the most likely to cause damage to society are the people whose privacy rights should be the most strongly impacted.

So that I would say that all politicians should be subject to public 24 7 surveillance completely makes sense.

All police officers, after all society has given all police officers the right and duty to carry a deadly weapon in society’s name and possibly deploy it, we absolutely have a right to see that it is done correctly and then another way of looking at it is to say perhaps we should also have ubiquitous 24 7 ubiquitous surveillance on the wealthy we’ve seen with the Koch brothers and Michael Bloomberg and what not is the the wealthy have moved into politics as well in order to cement their oligarchic control over society so perhaps what we have to do is say that if you are a significant political contributor you should also be subject to 24 7 surveillance of course that’s not going to happen right because they don’t want that and they are the people that really run society.

I mean yeah you can really throw it both ways, one of the tropes that came a lot during the Ed Snowden disclosures was what do you need to hide, what are you afraid of, if you are not doing anything wrong you don’t have anything that you have to hide.  You can turn that around and throw it right back at the surveillance state and say well if you politicians are behaving you’ve got nothing to hide right, right, the fact that the politicians are so deeply concerned about their privacy is not because their privacy is essential to legislation, and their ostensible democracy, in fact privacy on the part of law makers is a farce.  Everything is ostensibly is being done in our name, it should be open, none of these people should have any privacy at all.

Try floating that by them and see what they say.

This is my transcription of this excellent interview, any errors are my bad. Hear the interview at http://wiki.securityweekly.com/wiki/index.php/Episode400  recorded December 14, 2014

——————–

If people did the right thing we wouldn’t need regulations.  Paul Henry on Security Weekly January 22, 2015   securityweekly.com

books – fiction

Nineteen Eighty-four by George Orwell (1949)  This classic novel imagines a future of oppressive government surveillance.  It is available to read online.  A four minute YouTube video by Thugs Notes.

Little Brother by Cory Doctorow (2008)  This is a contemporary novel with teenagers resisting government surveillance and has some good technology descriptions.  It is available for free download.

Whiskey Tango Foxtrot by David Shafer (2014)  A contemporary novel about big data collecting all the data in the world and holding it ransom.

TV documentaries

“United States of Secrets.”  May 2014.  PBS TV documentary explores how US government agencies and businesses are collecting data.  Frontline TV show in two parts available with additional materials here.

  • United States of Secrets part 1 120 minutes broadcast May 13, 2014
  • United States of Secrets part 2 60 minutes broadcast May 20, 2014

“Inside the Mind of Edward Snowden.” May 28, 2014.  NBC TV news anchor Brian Williams interviews Edward Snowden.  Approximately 40 minutes.  Available at nbcnews.com with some additional video

TV shows – fiction

Government surveillance themes are appearing in popular TV shows including The Good Wife and Person of Interest.

The Good Wife.  “The Bit Bucket” Season 5 Episode 2  10/6/2013.  “Neil Gross of internet giant Chum Hum, seeks Lockhart & Gardner’s help in fighting the NSA regarding its recently leaked PRISM surveillance program. The NSA, while actively eavesdropping on the firm’s phone calls, discovers a possible link to terrorism in a former client of theirs” (Wikipedia)

The Good Wife.  “All Tapped Out.”  Season 5 Episode 18.  4/20/2014. “When Florrick/Agos takes  on the case of an NSA whistleblower, they learn the agency has been monitoring both the firm and Alicia’s personal life.” (Microsoft Media Center)

Person of Interest.  “Deus Ex Machina (Finale)” Season 3 Episode 23. 5/13/2014.  “The team work to stop Samaritan from coming online and targeting them; the battle against Vigilance reaches a conclusion.” (Microsoft Media Center)

movie documentaries

Citizenfour by Laura Poitras (2014).  This 114 minute movie reveals how the NSA documents collected by Edward Snowden were released to the media.  Laura Poitras tells the story of how she and Guardian newspaper reporters Glenn Greenwald and Ewen MacAskill worked with Edward Snowden to publish the NSA documents.  The NSA documents show the many techniques it uses to collect all the data it can, including data on US citizens.  This movie won the Oscar for Best Documentary Feature 2014.

music

Surveillance themes in popular music.

“Integral” by Pet Shop Boys. (2007) Video at YouTube.

“Integral” by Pet Shop Boys. (2007) JCRZ – QR Code Video Remix. Video at YouTube.

“Somebody’s Watching Me” by Rockwell (1984)   Video at YouTube.

========================================

Following are excerpts from the resources cited above.

Constitution of the United States (excerpts)

Amendment I
Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.

Amendment IV
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized

Amendment V
No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.

AMENDMENT XIV
(Excerpt Section 1 by markdigital.com)
Section 1.
All persons born or naturalized in the United States, and subject to the jurisdiction thereof, are citizens of the United States and of the State wherein they reside. No State shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any State deprive any person of life, liberty, or property, without due process of law; nor deny to any person within its jurisdiction the equal protection of the laws.

————————————
Nineteen Eighty-four by George Orwell (1949) Excerpt by markdigital.com

“… in the past no government had the power to keep its citizens under constant surveillance. The invention of print, however, made it easier to manipulate public opinion, and the film and the radio carried the process further. With the development of television, and the technical advance which made it possible to receive and transmit simultaneously on the same instrument, private life came to an end. Every citizen, or at least every citizen important enough to be worth watching, could be kept for twenty-four hours a day under the eyes of the police and in the sound of official propaganda, with all other channels of communication closed. The possibility of enforcing not only complete obedience to the will of the State, but complete uniformity of opinion on all subjects, now existed for the first time.”  Part Two, Chapter 9.

————————————-

Person of Interest.  “Deus Ex Machina (Finale)” Season 3 Episode 23. 5/13/2014.  Screen captures.

Person of Interest TV show screen capture.

Person of Interest TV show screen capture.

Person of Interest TV show screen capture.

Person of Interest TV show screen capture.

Person of Interest TV show screen capture.

Person of Interest TV show screen capture.

———————————
“Integral” by the Pet Shop Boys.  Lyrics from the Internet.

If you’ve done nothing wrong
You’ve got nothing to fear
If you’ve something to hide
You shouldn’t even be here
Long live us
The persuaded we
Integral
Collectively
To the whole project
It’s brand new
Conceived solely
To protect you
One world
One reason
Unchanging
One season
If you’ve done nothing wrong
You’ve got nothing to fear
If you’ve something to hide
You shouldn’t even be here
You’ve had your chance
Now we’ve got the mandate
If you’ve changed your mind
I’m afraid it’s too late
We’re concerned
You’re a threat
You’re not integral
To the project
Sterile
Immaculate
Rational
Perfect
Everyone has
Their own number
In the system that
We operate under
We’re moving to
A situation
Where your lives exist
As information
One world
One life
One chance
One reason
All under
One sky
Unchanging
One season
If you’ve done nothing wrong
You’ve got nothing to fear
If you’ve something to hide
You shouldn’t even be here
You’ve had your chance
Now we’ve got the mandate
If you’ve changed your mind
I’m afraid it’s too late
We’re concerned
You’re a threat
You’re not integral
To the project
One world
One life
One chance
One reason
All under
One sky
Unchanging
One season
If you’ve done nothing wrong
You’ve got nothing to fear
If you’ve something to hide
You shouldn’t even be here
You’ve had your chance
Now we’ve got the mandate
If you’ve changed your mind
I’m afraid it’s too late
We’re concerned
You’re a threat
If you’ve done nothing wrong
You’ve got nothing to fear
If you’ve something to hide
You shouldn’t even be here
We’re concerned
You’re a threat
You’re not integral
To the project
Sterile
Immaculate
Rational
Perfect

 

“Somebody’s Watching Me” by Rockwell.  Lyrics from the Internet.

I’m just an average man with an average life
I work from nine to five, hey, hell, I pay the price
All I want is to be left alone in my average home
But why do I always feel like I’m in the twilight zoneI always feel like somebody’s watching me
And I Have No Privacy
I always feel like somebody’s watching me
Tell Mi Is It Just A Dream When I come home at night
I bolt the door real tight
People call me on the phone, I’m trying to avoid
But can the people on TV see me or am I just paranoid

When I’m in the shower I’m afraid to wash my hair
‘Cause I might open my eyes and find someone standing there
People say I’m crazy, just a little touched
But maybe showers remind me of Psycho too much
That’s why

I always feel like somebody’s watching me
And I Have No Privacy
I always feel like somebody’s watching me
Who’s Playin’ Trics On Me

I don’t know anymore
Are the neighbors watching me
Well is the mailman watching me
And I don’t feel safe anymore, oh what a mess
I wonder who’s watching me now— (BOOO!) -The IRS?

I always feel like somebody’s watching me
And I Have No Privacy
I always feel like somebody’s watching me
Tell Me Is It Just A Dream

I always feel like somebody’s watching me
And I Have No Privacy
I always feel like somebody’s watching me
I always feel like somebody’s watching me

I always feel like somebody’s watching me
I always feel like somebody’s watching me
Tell Me This Can’t Be

I always feel like somebody’s watching me
I always feel like somebody’s watching me

Posted in Uncategorized | Tagged , | Leave a comment