<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>LewRockwell &#187; Bill Rounds</title>
	<atom:link href="http://www.lewrockwell.com/author/bill-rounds/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.lewrockwell.com</link>
	<description>ANTI-STATE  &#60;em&#62;•&#60;/em&#62;  ANTI-WAR  &#60;em&#62;•&#60;/em&#62;  PRO-MARKET</description>
	<lastBuildDate>Wed, 16 Oct 2013 16:10:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<copyright>Copyright © The Lew Rockwell Show 2013 </copyright>
	<managingEditor>john@kellers.net (Lew Rockwell)</managingEditor>
	<webMaster>john@kellers.net (Lew Rockwell)</webMaster>
	<ttl>1440</ttl>
	<image>
		<url>http://www.lewrockwell.com/assets/podcast/lew-rockwell-show-logo-144.jpg</url>
		<title>LewRockwell</title>
		<link>http://www.lewrockwell.com</link>
		<width>144</width>
		<height>144</height>
	</image>
	<itunes:new-feed-url>http://www.lewrockwell.com/podcast/feed/</itunes:new-feed-url>
	<itunes:subtitle>Covering the US government&#039;s economic depredations, police state enactments, and wars of aggression.</itunes:subtitle>
	<itunes:summary>Covering the US government&#039;s economic depredations, police state enactments, and wars of aggression.</itunes:summary>
	<itunes:keywords>Liberty, Libertarianism, Anarcho-Capitalism, Free, Markets, Freedom, Anti-War, Statism, Tyranny</itunes:keywords>
	<itunes:category text="News &#38; Politics" />
	<itunes:category text="Government &#38; Organizations" />
	<itunes:category text="Society &#38; Culture" />
	<itunes:author>Lew Rockwell</itunes:author>
	<itunes:owner>
		<itunes:name>Lew Rockwell</itunes:name>
		<itunes:email>john@kellers.net</itunes:email>
	</itunes:owner>
	<itunes:block>no</itunes:block>
	<itunes:explicit>no</itunes:explicit>
	<itunes:image href="http://www.lewrockwell.com/assets/podcast/lew-rockwell-show-logo.jpg" />
		<item>
		<title>Can You Still Protect Your Privacy?</title>
		<link>http://www.lewrockwell.com/2013/06/bill-rounds/can-you-still-protect-your-privacy/</link>
		<comments>http://www.lewrockwell.com/2013/06/bill-rounds/can-you-still-protect-your-privacy/#comments</comments>
		<pubDate>Tue, 18 Jun 2013 15:20:53 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://archive.lewrockwell.com/rounds/rounds68.1.html</guid>
		<description><![CDATA[It is hard to argue that the American surveillance state is much different from the surveillance state of communist East Germany, the Soviet Union, or any other dictatorship. Many East Germans, Soviet Russians, and those living under the boot of a dictator accepted such perverted surveillance as inevitable and unavoidable. Many Americans will do the same. But the perverse invasion of our fundamental human right to be free from ubiquitous surveillance can be avoided. Stop PRISM surveillance with a few simple tools and techniques. Whether you are Marty McFly, doing some “bird watching” or you are surreptitiously video recording a sports reporter &#8230; <a href="http://www.lewrockwell.com/2013/06/bill-rounds/can-you-still-protect-your-privacy/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<table border="0" cellspacing="0" cellpadding="0" align="right">
<tbody>
<tr>
<td width="15"></td>
<td><iframe frameborder="0" height="250" marginheight="0" marginwidth="0" scrolling="no" src="http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/cj_K_lW0d4_1uozLhRxfn4qtU5dyI5Xg/view.html?1841190634&amp;ASTPCT=http://adclick.g.doubleclick.net/aclk?sa=L&amp;ai=Br9ujlXrAUYLzOKzJsQf3ooHgD_C6p5sDAAAAEAEgmvetAzgAWLj_zdthYMmmyYfgo7QQsgEPbGV3cm9ja3dlbGwuY29tugEKMzAweDI1MF9hc8gBCdoBMWh0dHA6Ly93d3cubGV3cm9ja3dlbGwuY29tL3JvdW5kcy9yb3VuZHM2OC4xLmh0bWzgAQKYAqwbwAIC4AIA6gICQjL4AoLSHpAD4AOYA6QDqAMB4AQBoAYW&amp;num=0&amp;sig=AOD64_1pVZVbQk4YGQpGBs5eGb9u0FiiGg&amp;client=ca-pub-9106533008329745&amp;adurl=" width="300"></iframe></td>
</tr>
<tr>
<td width="15"></td>
<td></td>
</tr>
</tbody>
</table>
<p>It is hard to argue that the American surveillance state is much different from the surveillance state of communist East Germany, the Soviet Union, or any other dictatorship. Many East Germans, Soviet Russians, and those living under the boot of a dictator accepted such perverted surveillance as inevitable and unavoidable. Many Americans will do the same.</p>
<p>But the perverse invasion of our fundamental human right to be free from ubiquitous surveillance can be avoided. <a href="http://www.howtovanish.com/2013/06/surveillance-is-for-perverts-stop-prism-surveillance/" target="_blank">Stop PRISM surveillance</a> with a few simple tools and techniques. Whether you are Marty McFly, doing some “bird watching” or you are surreptitiously video recording a sports reporter in her hotel room, surveillance of this kind is for perverts.</p>
<h2>Extent of PRISM Surveillance</h2>
<p>To stop PRISM surveillance, you need to understand exactly what information the US government has been collecting about you. If you haven’t taken specific steps to protect your privacy, the government has collected:</p>
<p>All of the phone numbers you dial,</p>
<p>Every phone number who dials you,</p>
<p>The owner of each of those phone numbers,</p>
<p>The length of each call,</p>
<p>The location of both phones involved in the call,</p>
<p>The <a href="http://news.cnet.com/8301-13578_3-57589495-38/nsa-spying-flap-extends-to-contents-of-u.s-phone-calls/" target="_blank">content of what was said, if desired</a>,</p>
<p>Every website you have visited,</p>
<table border="0" cellspacing="0" cellpadding="0" align="right">
<tbody>
<tr>
<td><iframe frameborder="0" height="240" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?lt1=_blank&amp;bc1=FFFFFF&amp;IS2=1&amp;nou=1&amp;bg1=FFFFFF&amp;fc1=000000&amp;lc1=0000FF&amp;t=lewrockwell&amp;o=1&amp;p=8&amp;l=as4&amp;m=amazon&amp;f=ifr&amp;ref=ss_til&amp;asins=B000M047TI" width="125"></iframe></td>
</tr>
</tbody>
</table>
<p>Every term you have typed into a search engine,</p>
<p>The content of every email you have sent,</p>
<p>All activity on Facebook,</p>
<p>All activity on Skype,</p>
<p>All of your Instant Messages,</p>
<p>Your bank information,</p>
<p>Your credit card information.</p>
<p>And much, much more.</p>
<p>Conversations with your lawyer or spouse are not exempt. In a digital society, a collection of these records on any individual represents a very complete picture of the innermost thoughts and desires, as well as almost all of the daily actions, whether you are technologically savvy or not. Although this surveillance currently affects hundreds of millions of Americans, there are specific steps that can be taken to stop PRISM surveillance of much of this information.</p>
<h2>Strategies to Stop PRISM Surveillance</h2>
<p>Government reform will no doubt be the focus of many to stop perverted PRISM surveillance. Government reform can be effective if it reduces the power of the government to be a peeping Tom on law abiding people. Creating another government body to oversee the current surveillance apparatus, on the other hand, will be like putting a second fox in charge of overseeing the fox that is guarding the hen house. The <a href="http://en.wikipedia.org/wiki/United_States_Foreign_Intelligence_Surveillance_Court" target="_blank">secret FISA court</a> is one such fox that failed to prevent unconscionable abuses of Americans.</p>
<table border="0" cellspacing="0" cellpadding="0" align="right">
<tbody>
<tr>
<td><iframe frameborder="0" height="240" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?lt1=_blank&amp;bc1=FFFFFF&amp;IS2=1&amp;nou=1&amp;bg1=FFFFFF&amp;fc1=000000&amp;lc1=0000FF&amp;t=lewrockwell&amp;o=1&amp;p=8&amp;l=as4&amp;m=amazon&amp;f=ifr&amp;ref=ss_til&amp;asins=B006SRTOUG" width="125"></iframe></td>
</tr>
</tbody>
</table>
<h2>Legislative Effort to Stop PRISM Surveillance</h2>
<p>Legislators write the statutes that innocent people rely on to protect themselves from unwarranted government intrusion. The<a href="http://www.law.cornell.edu/anncon/html/amdt4frag1_user.html" target="_blank">Fourth Amendment to the Constitution</a> is one such statute which was drafted, in part, in reaction to writs of assistance, general authorization granted to British soldiers to search any house for contraband, without any suspicion of a crime being committed. It has been held by the courts that “<a href="http://supreme.justia.com/cases/federal/us/387/294/case.html" target="_blank">the principal object of the Fourth Amendment is the protection of privacy</a>.”</p>
<p>Arguably, the Fourth Amendment should already apply to the perverted surveillance of the PRISM program. If the Fourth Amendment, as interpreted and applied, does not cover the records gathered by the PRISM program, every effort to extend statutory protection to those records should be made.</p>
<p>Passing new laws, or repealing old ones, may or may not achieve widespread success. The legislative abortion of the <a href="http://en.wikipedia.org/wiki/Patriot_Act" target="_blank">PATRIOT Act</a>, the <a href="http://en.wikipedia.org/wiki/Bank_Secrecy_Act" target="_blank">Bank Secrecy Act</a>, <a href="http://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_Act" target="_blank">FISA</a>, and numerous other actions by Congress and other legislative bodies have done wonders to erode the fundamental right of privacy of Americans over the past several years. Plus, there are plenty of <a href="http://www.techdirt.com/articles/20130611/17450923413/even-ap-is-calling-bull-government-claims-prism-helping-stop-nyc-subway-bomb.shtml" target="_blank">perverts currently in Congress</a>defending the digital raping of Americans.</p>
<h2>Judicial Reform to Stop PRISM Surveillance</h2>
<p>The court system is another tool to effect change to protect the human freedom for law abiding people to privately communicate. Whether through lawsuits in civil court, appeals of criminal court rulings, or creation of other supervising courts, real change can and has occurred through the judicial branch.</p>
<p>This option is less attractive than effecting change through the legislature. Although there are many strong judicial advocates for privacy, like <a title="Alex Kozinski Vehicle Tracking Devices" href="http://www.howtovanish.com/2010/09/alex-kozinski-and-vehicle-tracking-devices/" target="_blank">Alex Kozinski</a> in the Ninth Circuit, himself a survivor of a Romanian dictatorship, the judicial branch has had mixed success at protecting privacy in recent years. Courts also have significant hurdles to overcome to apply the principal of protecting the fundamental right of privacy in all of the records collected in the PRISM program.</p>
<table border="0" cellspacing="0" cellpadding="0" align="right">
<tbody>
<tr>
<td><iframe frameborder="0" height="240" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?lt1=_blank&amp;bc1=FFFFFF&amp;IS2=1&amp;nou=1&amp;bg1=FFFFFF&amp;fc1=000000&amp;lc1=0000FF&amp;t=lewrockwell&amp;o=1&amp;p=8&amp;l=as4&amp;m=amazon&amp;f=ifr&amp;ref=ss_til&amp;asins=B000FC1BQA" width="125"></iframe></td>
</tr>
</tbody>
</table>
<p>The ability of the government to collect certain records of phone calls is <a href="http://en.wikipedia.org/wiki/Smith_v._Maryland" target="_blank">well engrained in American jurisprudence</a>, as well as the inability to protect the most <a title="bank privacy" href="http://www.howtovanish.com/2010/01/bank-privacy-a-fundamental-right/" target="_blank">private records that you share with others</a>. The judicial branch was also tapped to protect the rights of Americans in secret FISA courts, but we <a href="https://ssd.eff.org/foreign/fisa" target="_blank">see where that check and balance has gotten us</a>.</p>
<h2>Executive Reform to Stop PRISM Surveillance</h2>
<p>The executive branch could issue an order, draft a policy memo, or take some other step to limit its collection of private information of Americans. This does not prevent the next perverted president from issuing his own secret orders to start the PRISM program again. Plus, it is the executive branch that has been abusing the law secretly in the first place.</p>
<p><a href="http://www.newyorker.com/online/blogs/johncassidy/2013/06/why-edward-snowden-is-a-hero.html" target="_blank">Executive officials have repeatedly lied to Congress and the American people over this</a>, and <a href="http://www.reuters.com/article/2013/05/23/us-usa-irs-scandal-analysis-idUSBRE94M05E20130523" target="_blank">other actions</a>. Nixon, W., Obama, it does not matter the political party, all have abused the rights of Americans through surreptitious and illegal surveillance. What makes us think the next president will be any different?</p>
<h2>Corporate Protection to Stop PRISM Surveillance</h2>
<p>Many of the service providers whose customer information was siphoned off by PRISM have fallen all over themselves to prove to the public that they have not revealed private customer information. Their efforts to pacify their customers may be motivated more by the enormous profits they make when you provide them with data than with their protection of your fundamental rights. Verizon, Facebook, Yahoo, Skype and the dozens of other companies whose data is now in the hands of the Feds cannot protect your privacy, especially if they have any business in the U.S.</p>
<p>Not only are these companies prohibited by law from telling you if they have gotten any secret orders to provide customer data, the Fourth Amendment is least likely to protect the data you give up to companies. They can be easily compelled to be a witness against you.</p>
<h2>How To Stop PRISM Surveillance</h2>
<p>The most effective way to stop PRISM surveillance of as much information as possible, in both the short term and long term, is for each individual to protect their own privacy. There are numerous tools and techniques, most of which we have already discussed on <a href="http://howtovanish.com/">HowToVanish.com</a>, to protect your fundamental right to be unbothered by perverts. All of the tools and techniques follow two important principles.</p>
<table border="0" cellspacing="0" cellpadding="0" align="right">
<tbody>
<tr>
<td><iframe frameborder="0" height="240" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?lt1=_blank&amp;bc1=FFFFFF&amp;IS2=1&amp;nou=1&amp;bg1=FFFFFF&amp;fc1=000000&amp;lc1=0000FF&amp;t=lewrockwell&amp;o=1&amp;p=8&amp;l=as4&amp;m=amazon&amp;f=ifr&amp;ref=ss_til&amp;asins=B004D4Y1MW" width="125"></iframe></td>
</tr>
</tbody>
</table>
<h2>Open Source Software to Stop PRISM Surveillance</h2>
<p>First, wherever possible use open source software to communicate. Open source software is free and available to anyone. The code is publicly reviewable so any weaknesses and backdoors can be found and revealed. If software code isn’t open source, it can’t be reviewed and may contain code which allow perverts in the company, or in the NSA, to watch you. Open source software usually has no central organization to coerce into spying on you.</p>
<h2>Use Resources in Foreign Countries to Stop PRISM Surveillance</h2>
<p>The second best option is to use service providers in other countries, or who are partly in other countries. Although foreign service providers are subject to coercion just like US companies, it is at least better than having all of your data in one jurisdiction.</p>
<h2>Email -</h2>
<p>Use <a href="http://www.howtovanish.com/2011/12/set-up-free-email-encryption-in-15-minutes/" target="_blank">Thunderbird with the Enigmail plugin</a> to get PGP encryption of your email for free. <a href="http://www.howtovanish.com/2011/12/set-up-free-email-encryption-in-15-minutes/" target="_blank">See the specific steps a previous How To Vanish article on how to set up free email encryption</a>.</p>
<p><a href="http://www.howtovanish.com/privacy-tools-and-resources/privacy-software/" target="_blank">Hushmail</a> is a good second option for encrypted email based outside of a US jurisdiction with <a href="http://www.howtovanish.com/2010/03/husmail-husmail-login/" target="_blank">some free options and some paid options</a>.</p>
<p><a href="https://silentcircle.com/web/home/" target="_blank">Silent Circle</a> is another good encrypted email solution.</p>
<h2>Phone -</h2>
<p><a href="http://www.howtovanish.com/2011/06/use-redphone-to-encrypt-cell-phone-calls/" target="_blank">Redphone</a> from <a href="https://www.whispersystems.org/" target="_blank">Whispersystems</a> is a good open source option for Android phones to encrypt the content of your phone calls.</p>
<p><a href="https://silentcircle.com/web/home/" target="_blank">Silent Circle</a> also has encrypted phone and video conferencing services.</p>
<table border="0" cellspacing="0" cellpadding="0" align="right">
<tbody>
<tr>
<td><iframe frameborder="0" height="240" marginheight="0" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=lewrockwell&amp;o=1&amp;p=8&amp;l=as1&amp;asins=B005ESMGZU&amp;nou=1&amp;ref=tf_til&amp;fc1=000000&amp;IS2=1&amp;lt1=_blank&amp;m=amazon&amp;lc1=0000FF&amp;bc1=FFFFFF&amp;bg1=FFFFFF&amp;f=ifr" width="125"></iframe></td>
</tr>
</tbody>
</table>
<h2>Text Message/Instant Message -</h2>
<p><a href="http://www.pidgin.im/download/" target="_blank">Pidgin</a> is a free app that lets you to encrypt instant messages when used with the <a href="http://www.cypherpunks.ca/otr/" target="_blank">OTR (“off the record”) </a>plugin.</p>
<p>Although I wouldn’t rely on incompetence of the surveillance apparatus as a strategy, even the <a href="http://news.cnet.com/8301-13578_3-57577887-38/apples-imessage-encryption-trips-up-feds-surveillance/" target="_blank">encryption of text messages offered by Apple created some problems for the federales</a> in Washington who were trying to surveil to no avail.</p>
<h2>Web Surfing</h2>
<p><a href="https://www.torproject.org/" target="_blank">Tor</a> is <a href="http://www.howtovanish.com/2011/12/is-privacy-dead/" target="_blank">free open source software</a> that lets you keep your internet activity private.</p>
<p><a href="http://cryptohippie.com/" target="_blank">Cryptohippie</a> is a paid service that is very robust and does a good job at protecting internet privacy.</p>
<p><a href="http://www.howtovanish.com/IdentityCloaker">Identity Cloaker</a> is another paid service based outside the US.</p>
<h2>Stop PRISM Surveillance</h2>
<p>Using these basic tools for communication, for little time and effort you can stop the NSA perverts from spying on everything you do. You will greatly reduce the scope of surveillance of your personal life and hopefully help you get rid of that icky feeling of being watched by perverts. You must take control of your privacy if you hope to retain any.</p>
<p align="center"><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html">The Best of Bill Rounds</a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2013/06/bill-rounds/can-you-still-protect-your-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Taxing Baby Jesus</title>
		<link>http://www.lewrockwell.com/2013/03/bill-rounds/taxing-baby-jesus/</link>
		<comments>http://www.lewrockwell.com/2013/03/bill-rounds/taxing-baby-jesus/#comments</comments>
		<pubDate>Fri, 29 Mar 2013 09:07:17 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://archive.lewrockwell.com/rounds/rounds67.1.html</guid>
		<description><![CDATA[Wise men visited the young Jesus, bringing gifts of gold, frankincense and myrrh. What if He wanted to sell those gifts later on to buy a donkey, feed the poor, clothe the naked, or buy a house? How would those first Christmas gifts, and subsequent transactions, be treated under US tax law? If you wouldn’t mind getting some gold or silver (or frankincense and myrrh) for Christmas, or if you are giving them, you might want to be aware of the potential taxes involved. This article is a follow up to some previous articles on the Liberty Dollar case and the discussion about trading gold or silver &#8230; <a href="http://www.lewrockwell.com/2013/03/bill-rounds/taxing-baby-jesus/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<table width="315" border="0" cellspacing="0" cellpadding="0" align="right">
<tbody>
<tr>
<td width="15"></td>
<td>
<div align="right">
<div id="google_ads_div_B2_ad_wrapper">
<div id="google_ads_div_B2_ad_container"><iframe src="http://this.content.served.by.adshuffle.com/p/kl/46/799/r/12/4/8/ast0k3n/cj_K_lW0d4_KFHtXV6PPxn6Y6wWiCVbA/view.html?905418308&amp;ASTPCT=http://adclick.g.doubleclick.net/aclk?sa=L&amp;ai=B721pkVlVUdmGBpOcigawkYCwC4j00_ACAAAAEAEgmvetAzgAWOj-4JpRYLEFsgEPbGV3cm9ja3dlbGwuY29tugEKMzAweDI1MF9hc8gBCdoBMWh0dHA6Ly93d3cubGV3cm9ja3dlbGwuY29tL3JvdW5kcy9yb3VuZHM2Ny4xLmh0bWzgAQKYArIZwAIC4AIA6gICQjL4AoLSHpADjAaYA6QDqAMB4AQBoAYW&amp;num=0&amp;sig=AOD64_2iILrNl_3fUzQH8B1Y44erTSEwnQ&amp;client=ca-pub-9106533008329745&amp;adurl=" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" width="300" height="250"></iframe></div>
</div>
</div>
</td>
</tr>
<tr>
<td width="15"></td>
<td></td>
</tr>
</tbody>
</table>
<p>Wise men visited the young Jesus, bringing gifts of gold, frankincense and myrrh. What if He wanted to sell those gifts later on to buy a donkey, <a href="http://www.endhunger.org/" target="_blank">feed the poor</a>, <a href="http://www.dressforsuccess.org/" target="_blank">clothe the naked</a>, or buy a house? How would those first Christmas gifts, and subsequent transactions, be treated under US tax law? If you wouldn’t mind getting some gold or silver (or frankincense and myrrh) for Christmas, or if you are giving them, you might want to be aware of the <a href="http://www.howtovanish.com/2011/12/taxing-baby-jesus/" target="_blank">potential taxes involved</a>.</p>
<p>This article is a follow up to some <a href="http://www.howtovanish.com/2011/03/liberty-dollar-trial-and-coin-values/" target="_blank">previous articles</a> on the <a href="http://www.howtovanish.com/2011/05/can-you-be-prosecuted-for-using-gold-or-silver-liberty-dollar-part-iii/" target="_blank">Liberty Dollar</a> case and the discussion about trading gold or silver coins that followed. Readers have asked me about the implications of the <a href="http://www.lvrj.com/news/53287717.html" target="_blank">Kahre case</a>, regarding trading legal tender <a href="http://www.howtovanish.com/GoldEagle">gold</a> and <a href="http://www.howtovanish.com/SilverEagle">silver</a> coins as opposed to privately minted gold or silver coins.</p>
<h2>Jesus, Wise Men and Taxes</h2>
<p>The facts set forth in the biblical account of the gifts of the Magi, along with a few facts and assumptions I throw in for good measure, provide a good hypothetical scenario for understanding the legal and tax consequences of trading goods, like gold, <a href="http://en.wikipedia.org/wiki/Frankincense" target="_blank">frankincense</a> and <a href="http://en.wikipedia.org/wiki/Myrrh" target="_blank">myrrh</a>, and legal tender gold or silver coins. For a more thorough understanding of the law regarding trading bullion, you might want to consult <a href="http://www.howtovanish.com/PiecesOf8">Pieces of Eight</a>.</p>
<p>The legal and tax consequences of trading gold and silver are important to privacy. <a href="http://www.howtovanish.com/products/how-to-vanish-book/" target="_blank">Privacy is freedom</a> and gold and silver as money protect people from violations of fundamental human freedoms.</p>
<h2>Transfer #1</h2>
<p>…and when they had opened their treasures, they presented unto him gifts; gold, and frankincense, and myrrh.</p>
<p>Matthew 2:11</p>
<p>Here we have wise men giving very expensive gifts to Jesus. Let’s look at whether Jesus has any income taxes to pay from receiving these gifts and if there might be a gift tax owed by the wise men.</p>
<h2>Income Tax Liability Of Jesus</h2>
<p>There are <a href="http://www.law.cornell.edu/uscode/usc_sec_26_00000102----000-.html" target="_blank">no income taxes owed when you receive a gift</a>. Fortunately, Jesus will not have to pay any income taxes on the gifts he received. However, since these wise men came from “the east” we will assume that they are foreigners. If any of Jesus’ gifts were worth more than $100,000, He will need to fill out <a href="http://www.irs.gov/businesses/article/0,,id=200722,00.html" target="_blank">Form 3520, Annual Return to Report Transactions with Foreign Trusts and Receipt of Certain Foreign Gifts</a>. Its a good thing the gift is well documented to defend himself in case the IRS thinks Jesus might have unreported income.</p>
<h2>Gift Taxes</h2>
<p>The <a href="http://www.irs.gov/businesses/small/article/0,,id=108139,00.html" target="_blank">GIVER of a gift must pay a tax</a> if they give someone a gift worth more than $13,000. There is an “exemption amount” that complicates this concept a bit, but for simplicity we will not address it here. Any one of the gifts worth more than $13,000 would cause the wise man who gave it, if they were subject to US taxes, to owe gift tax at approximately the same rate as his income tax (excluding any exemption amount issues). Maybe that’s why they didn’t stop by to see Herod on the way out of the jurisdiction.</p>
<h2>Basis</h2>
<p>It will be important to know what Jesus’ basis in the gifts are if he ever decides to sell them in the future. The basis is generally the <a href="http://www.law.cornell.edu/uscode/usc_sec_26_00001012----000-.html" target="_blank">amount the GIVER paid for the item</a>. Lets assume that the wise men picked up their gifts at a store in Bethlehem right before they gave them to Jesus. Their basis (and subsequently Jesus’ basis) is the market value of the goods at the time they were bought (let’s say $285 for an ounce of each, the approximate spot price of gold 13 years ago, since I don’t have the spot price of frankincense and myrrh handy).</p>
<p>Now let us imagine that Mary and Joseph were pretty good parents and saved these gifts to present to Jesus at His Bar Mitzvah which is, in our hypothetical, this year. The day after his Bar Mitzvah, Jesus contemplates buying all kinds of nice things with the gifts the wise men gave him almost 13 years before.</p>
<p>Transfer #2</p>
<p>The gifts from the wise men are spent.</p>
<h2>Capital Gains Tax</h2>
<p>To calculate the gain, we take the <a href="http://www.law.cornell.edu/uscode/26/usc_sec_26_00001222----000-.html" target="_blank">difference between the fair market value of the item when spent, less the basis</a> (essentially the original price paid). The price of gold has now risen to over $1,600. Lets also say that the other gifts have had similar gains.</p>
<p>When you recognize a gain on the exchange of an <a href="http://www.law.cornell.edu/uscode/26/usc_sec_26_00001221----000-.html" target="_blank">asset</a> (like gold, frankincense or myrrh) for something else (another good, cash, etc.), a capital gains tax will apply. For most assets, the <a href="http://www.law.cornell.edu/uscode/usc_sec_26_00000001----000-.html" target="_blank">capital gains tax is 15%</a> of the gain. Frankincense and myrrh would be taxed at 15%.</p>
<h2>Higher Capital Gains Tax On Gold – 28%</h2>
<p>Gold is different. Gold is specifically identified in the tax code, along with antiques, rugs, stamps, art and other collectibles, at a 28% capital gains tax rate. Jesus’ gain on gold, if exchanged for goods worth $1600, would be $1314 per ounce. Instead of paying 15% of this gain as a tax ($197 per ounce), He will have to pay capital gains tax at a rate of 28% ($367 per ounce).</p>
<p>This highlights a big reason why gold and silver are not regularly used as money, especially while they are appreciating in value. Capital gains tax makes gold and silver more expensive to use as money than other things that are less suited for being money, like frankincense and myrrh. He could get 13% more house if he trades frankincense or myrrh instead of gold.</p>
<h2>Legal Tender Value Of Gold Coins</h2>
<p>Some gold and silver coins are <a href="http://en.wikipedia.org/wiki/Gold_Bullion_Coin_Act_of_1985" target="_blank">official US legal tender</a>. Gold Eagles have a face value of $50, even though the value in Federal Reserve Note Dollars is much more. This has led some people to believe there might be some tax arbitrage.</p>
<p>One such individual was Robert Kahre, who paid his employees and independent contractors with legal tender gold and silver coins. He recorded the value of the transactions at the legal tender value on the coins, rather than the Federal Reserve Note value. In other transactions, such as purchasing a house, he declared the value of the coins at their Federal Reserve Note value.</p>
<p>There are numerous issues raised in the case, but if allowable, these types of transactions would have reduced reporting requirements, income taxes and a lot of other taxes for the participants. Kahre was ultimately convicted of tax evasion.</p>
<h2>$1 ≠ $1</h2>
<p>The state of the law is that a dollar does not equal a dollar. Thus we have the result of the Kahre case. It seems ridiculous to say that a dollar does not equal a dollar, but in order to avoid prosecution, it might be a good idea to record your transactions in legal tender gold and silver at the Federal Reserve Note Dollar value instead of the Gold Eagle Dollar value.</p>
<p>If Jesus traded a Gold Eagle for a fish-and-loaves dinner for 5,000, neither Jesus, nor the caterer should record the expense or income at $50. They should record the transaction somewhere between the fair market value of the coin or the food. The same is true if you trade a house worth $160,000 in Federal Reserve Notes for 100 ounces of gold with a “legal” tender value of $5,000. I’m sure the property tax assessor will tax you on the Federal Reserve Note Dollar instead of the Gold Eagle Dollar.</p>
<h2>Challenge?</h2>
<p>Some people may not be satisfied with this rule and may attempt to challenge it. There are certainly many facts that were not favorable to Mr. Kahre. For example, he paid individuals with gold and silver at one window, and just a few feet away at another window, bought back those gold and silver coins at fair market value for currency or other notes. A different factual scenario may have legitimate legal arguments to support the position and could lead to a different outcome, although I think it is unlikely.</p>
<h2>Conclusion</h2>
<p>Jesus would not have been taxed for the gifts he received from the Magi unless he traded them later for gains, at which point the tax on his gains in gold would have been significant. The Wise Men might have been taxed for giving a gift to Jesus. When dealing with legal tender gold and silver coins, it appears that in order to obey one law (the law as enforced in the Kahre case) one would have to disregard another law (the legal tender value of the coins) and report the Federal Reserve Note Dollar value instead. I can’t think of very many other instances of ridiculous outcomes in the law: a dollar is not the same as a dollar. I still prefer the gold ones.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2013/03/bill-rounds/taxing-baby-jesus/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Taxing Baby Jesus</title>
		<link>http://www.lewrockwell.com/2013/03/bill-rounds/taxing-baby-jesus-2/</link>
		<comments>http://www.lewrockwell.com/2013/03/bill-rounds/taxing-baby-jesus-2/#comments</comments>
		<pubDate>Fri, 29 Mar 2013 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds67.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Why To Beware of Privacy Intrusions Posed by Cell Phone Cameras &#160; &#160; &#160; Wise men visited the young Jesus, bringing gifts of gold, frankincense and myrrh. What if He wanted to sell those gifts later on to buy a donkey, feed the poor, clothe the naked, or buy a house? How would those first Christmas gifts, and subsequent transactions, be treated under US tax law? If you wouldn&#8217;t mind getting some gold or silver (or frankincense and myrrh) for Christmas, or if you are giving them, you might want to be aware of the potential &#8230; <a href="http://www.lewrockwell.com/2013/03/bill-rounds/taxing-baby-jesus-2/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds66.1.html"> Why To Beware of Privacy Intrusions Posed by Cell Phone Cameras</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p>Wise men visited the young Jesus, bringing gifts of gold, frankincense and myrrh. What if He wanted to sell those gifts later on to buy a donkey, <a href="http://www.endhunger.org/" target="_blank">feed the poor</a>, <a href="http://www.dressforsuccess.org/" target="_blank">clothe the naked</a>, or buy a house? How would those first Christmas gifts, and subsequent transactions, be treated under US tax law? If you wouldn&#8217;t mind getting some gold or silver (or frankincense and myrrh) for Christmas, or if you are giving them, you might want to be aware of the <a href="http://www.howtovanish.com/2011/12/taxing-baby-jesus/" target="_blank">potential taxes involved</a>.</p>
<p>This article is a follow up to some <a href="http://www.howtovanish.com/2011/03/liberty-dollar-trial-and-coin-values/" target="_blank">previous articles</a> on the <a href="http://www.howtovanish.com/2011/05/can-you-be-prosecuted-for-using-gold-or-silver-liberty-dollar-part-iii/" target="_blank">Liberty Dollar</a> case and the discussion about trading gold or silver coins that followed. Readers have asked me about the implications of the <a href="http://www.lvrj.com/news/53287717.html" target="_blank">Kahre case</a>, regarding trading legal tender <a href="http://www.howtovanish.com/GoldEagle">gold</a> and <a href="http://www.howtovanish.com/SilverEagle">silver</a> coins as opposed to privately minted gold or silver coins.</p>
<h2>Jesus, Wise Men and Taxes</h2>
<p>The facts set forth in the biblical account of the gifts of the Magi, along with a few facts and assumptions I throw in for good measure, provide a good hypothetical scenario for understanding the legal and tax consequences of trading goods, like gold, <a href="http://en.wikipedia.org/wiki/Frankincense" target="_blank">frankincense</a> and <a href="http://en.wikipedia.org/wiki/Myrrh" target="_blank">myrrh</a>, and legal tender gold or silver coins. For a more thorough understanding of the law regarding trading bullion, you might want to consult <a href="http://www.howtovanish.com/PiecesOf8">Pieces of Eight</a>.</p>
<p>The legal and tax consequences of trading gold and silver are important to privacy. <a href="http://www.howtovanish.com/products/how-to-vanish-book/" target="_blank">Privacy is freedom</a> and gold and silver as money protect people from violations of fundamental human freedoms.</p>
<h2>Transfer #1</h2>
<p style="padding-left: 60px">&#8230;and when they had opened their treasures, they presented unto him gifts; gold, and frankincense, and myrrh.</p>
<p style="padding-left: 60px">Matthew 2:11</p>
<p>Here we have wise men giving very expensive gifts to Jesus. Let&#8217;s look at whether Jesus has any income taxes to pay from receiving these gifts and if there might be a gift tax owed by the wise men.</p>
<h2>Income Tax Liability Of Jesus</h2>
<p>There are <a href="http://www.law.cornell.edu/uscode/usc_sec_26_00000102----000-.html" target="_blank">no income taxes owed when you receive a gift</a>. Fortunately, Jesus will not have to pay any income taxes on the gifts he received. However, since these wise men came from &#8220;the east&#8221; we will assume that they are foreigners. If any of Jesus&#8217; gifts were worth more than $100,000, He will need to fill out <a href="http://www.irs.gov/businesses/article/0,,id=200722,00.html" target="_blank">Form 3520, Annual Return to Report Transactions with Foreign Trusts and Receipt of Certain Foreign Gifts</a>. Its a good thing the gift is well documented to defend himself in case the IRS thinks Jesus might have unreported income.</p>
<h2>Gift Taxes</h2>
<p>The <a href="http://www.irs.gov/businesses/small/article/0,,id=108139,00.html" target="_blank">GIVER of a gift must pay a tax</a> if they give someone a gift worth more than $13,000. There is an &#8220;exemption amount&#8221; that complicates this concept a bit, but for simplicity we will not address it here. Any one of the gifts worth more than $13,000 would cause the wise man who gave it, if they were subject to US taxes, to owe gift tax at approximately the same rate as his income tax (excluding any exemption amount issues). Maybe that&#8217;s why they didn&#8217;t stop by to see Herod on the way out of the jurisdiction.</p>
<h2>Basis</h2>
<p>It will be important to know what Jesus&#8217; basis in the gifts are if he ever decides to sell them in the future. The basis is generally the <a href="http://www.law.cornell.edu/uscode/usc_sec_26_00001012----000-.html" target="_blank">amount the GIVER paid for the item</a>. Lets assume that the wise men picked up their gifts at a store in Bethlehem right before they gave them to Jesus. Their basis (and subsequently Jesus&#8217; basis) is the market value of the goods at the time they were bought (let&#8217;s say $285 for an ounce of each, the approximate spot price of gold 13 years ago, since I don&#8217;t have the spot price of frankincense and myrrh handy).</p>
<p>Now let us imagine that Mary and Joseph were pretty good parents and saved these gifts to present to Jesus at His Bar Mitzvah which is, in our hypothetical, this year. The day after his Bar Mitzvah, Jesus contemplates buying all kinds of nice things with the gifts the wise men gave him almost 13 years before.</p>
<p><b>Transfer #2</b></p>
<p>The gifts from the wise men are spent.</p>
<h2>Capital Gains Tax</h2>
<p>To calculate the gain, we take the <a href="http://www.law.cornell.edu/uscode/26/usc_sec_26_00001222----000-.html" target="_blank">difference between the fair market value of the item when spent, less the basis</a> (essentially the original price paid). The price of gold has now risen to over $1,600. Lets also say that the other gifts have had similar gains.</p>
<p>When you recognize a gain on the exchange of an <a href="http://www.law.cornell.edu/uscode/26/usc_sec_26_00001221----000-.html" target="_blank">asset</a> (like gold, frankincense or myrrh) for something else (another good, cash, etc.), a capital gains tax will apply. For most assets, the <a href="http://www.law.cornell.edu/uscode/usc_sec_26_00000001----000-.html" target="_blank">capital gains tax is 15%</a> of the gain. Frankincense and myrrh would be taxed at 15%.</p>
<h2>Higher Capital Gains Tax On Gold &#8212; 28%</h2>
<p>Gold is different. Gold is specifically identified in the tax code, along with antiques, rugs, stamps, art and other collectibles, at a 28% capital gains tax rate. Jesus&#8217; gain on gold, if exchanged for goods worth $1600, would be $1314 per ounce. Instead of paying 15% of this gain as a tax ($197 per ounce), He will have to pay capital gains tax at a rate of 28% ($367 per ounce).</p>
<p>This highlights a big reason why gold and silver are not regularly used as money, especially while they are appreciating in value. Capital gains tax makes gold and silver more expensive to use as money than other things that are less suited for being money, like frankincense and myrrh. He could get 13% more house if he trades frankincense or myrrh instead of gold.</p>
<h2>Legal Tender Value Of Gold Coins</h2>
<p>Some gold and silver coins are <a href="http://en.wikipedia.org/wiki/Gold_Bullion_Coin_Act_of_1985" target="_blank">official US legal tender</a>. Gold Eagles have a face value of $50, even though the value in Federal Reserve Note Dollars is much more. This has led some people to believe there might be some tax arbitrage.</p>
<p>One such individual was Robert Kahre, who paid his employees and independent contractors with legal tender gold and silver coins. He recorded the value of the transactions at the legal tender value on the coins, rather than the Federal Reserve Note value. In other transactions, such as purchasing a house, he declared the value of the coins at their Federal Reserve Note value.</p>
<p>There are numerous issues raised in the case, but if allowable, these types of transactions would have reduced reporting requirements, income taxes and a lot of other taxes for the participants. Kahre was ultimately convicted of tax evasion.</p>
<h2>$1 &#8800; $1</h2>
<p>The state of the law is that a dollar does not equal a dollar. Thus we have the result of the Kahre case. It seems ridiculous to say that a dollar does not equal a dollar, but in order to avoid prosecution, it might be a good idea to record your transactions in legal tender gold and silver at the Federal Reserve Note Dollar value instead of the Gold Eagle Dollar value.</p>
<p>If Jesus traded a Gold Eagle for a fish-and-loaves dinner for 5,000, neither Jesus, nor the caterer should record the expense or income at $50. They should record the transaction somewhere between the fair market value of the coin or the food. The same is true if you trade a house worth $160,000 in Federal Reserve Notes for 100 ounces of gold with a &#8220;legal&#8221; tender value of $5,000. I&#8217;m sure the property tax assessor will tax you on the Federal Reserve Note Dollar instead of the Gold Eagle Dollar.</p>
<h2>Challenge?</h2>
<p>Some people may not be satisfied with this rule and may attempt to challenge it. There are certainly many facts that were not favorable to Mr. Kahre. For example, he paid individuals with gold and silver at one window, and just a few feet away at another window, bought back those gold and silver coins at fair market value for currency or other notes. A different factual scenario may have legitimate legal arguments to support the position and could lead to a different outcome, although I think it is unlikely.</p>
<h2>Conclusion</h2>
<p>Jesus would not have been taxed for the gifts he received from the Magi unless he traded them later for gains, at which point the tax on his gains in gold would have been significant. The Wise Men might have been taxed for giving a gift to Jesus. When dealing with legal tender gold and silver coins, it appears that in order to obey one law (the law as enforced in the Kahre case) one would have to disregard another law (the legal tender value of the coins) and report the Federal Reserve Note Dollar value instead. I can&#8217;t think of very many other instances of ridiculous outcomes in the law: a dollar is not the same as a dollar. I still prefer the gold ones.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2013/03/bill-rounds/taxing-baby-jesus-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Your Cell Phone Is Threatening Your Privacy</title>
		<link>http://www.lewrockwell.com/2012/06/bill-rounds/your-cell-phone-is-threatening-your-privacy/</link>
		<comments>http://www.lewrockwell.com/2012/06/bill-rounds/your-cell-phone-is-threatening-your-privacy/#comments</comments>
		<pubDate>Wed, 13 Jun 2012 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds66.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Police Corruption Out of Control: Threatens Personal Information &#160; &#160; &#160; The issue of camera cell phone privacy is extremely important in today&#8217;s age and far-reaching. Many cell phone cameras by default and automatically reveal tremendous amounts of information such as the physical location of a picture, time, date, cell phone model, etc. Additionally, a number of phone companies and facilities along with laws and implementations have increased so much in recent times that it is often difficult to keep up on what privacy protections you have. Begin with checking the kind of subscriber information you &#8230; <a href="http://www.lewrockwell.com/2012/06/bill-rounds/your-cell-phone-is-threatening-your-privacy/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds65.1.html"> Police Corruption Out of Control: Threatens Personal Information</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p>The issue of <a href="http://www.howtovanish.com/2012/06/camera-cell-phone-privacy">camera cell phone privacy</a> is extremely important in today&#8217;s age and far-reaching. Many cell phone cameras by default and automatically reveal tremendous amounts of information such as the physical location of a picture, time, date, cell phone model, etc. Additionally, a number of phone companies and facilities along with laws and implementations have increased so much in recent times that it is often difficult to keep up on what privacy protections you have.</p>
<p>Begin with checking the kind of subscriber information you are providing to a company for services. Some employees and hackers have a tendency of using such private information for nefarious purposes. You might use a <a href="http://www.runtogold.com/get-a-ghost-address/">ghost address</a>. A pre-paid cell phone or SIM card can greatly increase your <a href="http://www.howtovanish.com/2011/06/cell-phone-security/">cell phone security</a> and privacy. A super ninja trick would be to <a href="http://www.bitmit.net/en/user/TangibleCrypto">use a pre-paid wireless service paid for with bitcoins.</a></p>
<p>Some networks give you the option of recharging your phone continuously without asking you for private information. But this habit may not be most effective if you change your pre-paid connections often in order to maintain privacy and escape notice of any miscreant. For example, you could use a <a href="http://www.google.com/voice">Google Voice number</a>, although anything with Google may be problematic for privacy concerns, to forward to your mobile phone number and then you could get different SIM cards every few months.</p>
<p>Many phone numbers are easily available in telephone directories or <a href="http://www.howtovanish.com/2009/11/transactional-databases-what-me-worry/">transactional databases</a>. Every time you give your number to a company chances are that they are recorded, databased and archived. These numbers are vulnerable because often criminals might use the number in order to create a completely false profile with the information and is another reason to <a href="http://www.howtovanish.com/2011/03/block-caller-id-prevent-reverse-phone-lookup-and-keep-your-phone-number-private/">keep your phone number private</a>. Cleaning up from <a href="http://www.howtovanish.com/2012/04/how-to-protect-internet-privacy/">identity theft</a> can be time consuming. Additionally, if the company has no valid reason to know your phone number then you could decide not to provide one or provide one which is not actively used.</p>
<p>In countries like the USA it is easy to block your caller ID details. Call forwarding or call screening, a service provided by Google Voice, is another excellent option to avoid callers who will disturb you and your privacy. With Google Voice you can even block numbers. These are great ways to protect your cell phone number.</p>
<p>Your location is an integral way in which you can easily be tracked. Make it a point to turn off the GPS navigation system or WiFi which decreases the probability that your physical location may be tracked. Prevent your phone from being too clogged up with data. From time to time it is a good idea to get delete messages, call records, contacts, files, etc. Then should you lose your phone anyone who finds it will not be able to access as much information and therefore you will be less vulnerable to all those who are seeking to expose your privacy.</p>
<p>If you take pictures with your cell phone and post them online then this can expose your camera cell phone privacy because often the physical location is encoded with the picture file. For example, the EXIF file may contain information such as when the picture was taken, what kind of phone model and if your cell phone has GPS then the coordinates.</p>
<p>Last but not the least, make sure that you do not stay away from your phone too long because you may never know who may access it. And, of course, password protect it!</p>
<p>Cell phone privacy is very difficult to attain. Protect as much of your confidential communications using your cell phone or smart phone as possible. Check out the book <a href="http://www.howtovanish.com/htvbookaddtocart">How To Vanish</a> or the <a href="https://www.coindl.com/page/author/61">Basic Privacy Guide</a> for more tips on taking control of and protecting your privacy.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<div class="lrc-iframe-amazon"></div>
<div class="lrc-iframe-amazon"></div>
<div class="lrc-iframe-amazon"></div>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/06/bill-rounds/your-cell-phone-is-threatening-your-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Cop Corruption Is Out of Control</title>
		<link>http://www.lewrockwell.com/2012/04/bill-rounds/cop-corruption-is-out-of-control/</link>
		<comments>http://www.lewrockwell.com/2012/04/bill-rounds/cop-corruption-is-out-of-control/#comments</comments>
		<pubDate>Mon, 16 Apr 2012 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds65.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Patient Privacy Rights and PrivateHospitals &#160; &#160; &#160; The San Diego Police Department has finally done it! They get their shot at having the highest incarceration rate in the world. But not among the residents of San Diego, among the ranks of the SDPD itself. Police Corruption Means High Percentage Of Police Are Criminals The SDPD currently has 11 officers out of 1,100 patrol officers under criminal or internal investigation. The alleged police corruption ranges from drunk driving and harassment, all the way to domestic violence, sexual assault and rape. That is a solid 1% of &#8230; <a href="http://www.lewrockwell.com/2012/04/bill-rounds/cop-corruption-is-out-of-control/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds64.1.html"> Patient Privacy Rights and PrivateHospitals</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p>The San Diego Police Department has finally done it! They get their shot at having the <a title="Police Corruption" href="http://www.howtovanish.com/2011/05/police-corruption-out-of-control-threatens-personal-information/" target="_blank">highest incarceration rate in the world</a>. But not among the residents of San Diego, among the ranks of the SDPD itself.</p>
<h2>Police Corruption Means High Percentage Of Police Are Criminals</h2>
<p>The<a href="http://www.voiceofsandiego.org/data-drive/article_02f549a8-889c-11e0-81ed-001cc4c002e0.html" target="_blank"> SDPD currently has 11 officers</a> out of <a href="http://www.sdblue.net/" target="_blank">1,100 patrol officers</a> under criminal or internal investigation. The alleged police corruption ranges from drunk driving and harassment, all the way to domestic violence, sexual assault and rape. That is a solid 1% of the police. If they play their cards right and all 11 get locked up, the SDPD will have about the <a href="http://en.wikipedia.org/wiki/Incarceration_in_the_United_States" target="_blank">same incarceration rate as the general US population</a>! That gives the SDPD a solid chance to take sole possession of first place very soon.</p>
<div class="lrc-iframe-amazon"></div>
<p><b>SDPD &#8212; Higher Percentage Of Criminals Than Any Other Population In The World</b></p>
<p>Having a higher incarceration rate than the general US population is quite an accomplishment. But, given the fact that the US has the highest incarceration rate in the world, the SDPD has a solid chance of taking sole possession of first place very soon. The closest competitor is <a href="http://www.nccd-crc.org/nccd/pubs/2006nov_factsheet_incarceration.pdf" target="_blank">Russia with a .6% rate</a>, a mark that the SDPD are very likely to beat, even if all the criminal officers aren&#8217;t incarcerated.</p>
<h2>Personal Information Available To Criminal Police Officers</h2>
<div class="lrc-iframe-amazon"></div>
<p>So what are innocent people to do when the boys in blue are just as likely to be a criminal as anyone else off the street. Is your information really protected when access is limited to law enforcement riddled with police corruption? Your internet activity, phone records, phone location, bank records and lots of other information are searchable by law enforcement. And what about the information that you are required to give law enforcement, like your name, address, drivers license, etc.?</p>
<p><b>Protect Personal Information From Police Corruption</b></p>
<p>There are lots of ways to limit or protect your information from falling into criminal hands, no matter what uniform they are wearing. <a title="anonymous web surfing" href="http://www.howtovanish.com/2009/08/anonymous-web-surfing/" target="_blank">Proxy servers or VPNs</a> based <a href="http://www.howtovanish.com/IdentityCloaker">in another country</a> keep your internet searches out of the jurisdiction of domestic authorities. VoIP phone services based in a foreign country can minimize the phone records available to law enforcement without a warrant. <a title="cell phone security" href="http://www.howtovanish.com/2010/01/cell-phone-security-mobile-phone-taps/" target="_blank">Removing the battery of your cell phone</a> keeps your location from being tracked. You could also bank in a foreign jurisdiction to increase the costs to law enforcement of searching your bank records. You could even go so far as getting a <a title="foreign drivers license" href="http://www.howtovanish.com/2011/05/foreign-drivers-license-protects-families/" target="_blank">foreign drivers license</a> so that you reveal less of your sensitive information, like <a title="keep your home address to yourself" href="http://www.howtovanish.com/2010/04/keep-address-private/" target="_blank">the address where you stay in the US</a>, to the 1% of the police officers that are criminals.</p>
<h2>Record Police Corruption Without Violating The Law</h2>
<p>It is also important to note how modest the record breaking police are about having their picture taken by admiring fans. Sometimes amateur camera men are <a href="http://gizmodo.com/5553765/are-cameras-the-new-guns" target="_blank">arrested and charged with a crime</a>, usually for recording a cop without their consent under wire tapping laws.<a href="http://www.copblock.org/" target="_blank"> CopBlock.org</a> is <a title="Cop Block" href="http://www.copblock.org/4826/nine-incidents-added-to-war-on-cameras-map/" target="_blank">full of these kinds of encounters</a>. Getting charged with a crime has a huge affect on your personal privacy.</p>
<div class="lrc-iframe-amazon"></div>
<p>A few states require you to get consent from everyone involved before you can record a conversation. Through some extreme distortions of <a href="http://www.ncsl.org/default.aspx?tabid=13492" target="_blank">these wire tapping laws</a>, and with the help of prosecutors and judges who possibly aid and abet police misconduct, prosecutions for filming cops are possible, although relatively rare.</p>
<p>It cannot be helped that some people, like Rosa Parks, will violate unjust laws in protest. Others who do not want to risk prosecution can avoid breaking the law and still contribute to protecting liberty.</p>
<div class="lrc-iframe-amazon"></div>
<h2>Don&#8217;t Record Sound When Recording Police</h2>
<p>To help prevent violation of a grossly distorted understanding of wire tapping laws, don&#8217;t forget to take your special Cop Cam that does not record sound. Since most wire tapping statutes require you to record a conversation to violate the law, if you don&#8217;t record the sounds of a conversation, you probably won&#8217;t be guilty of a crime. The individual facts of each situation will be important for your attorney before they can give you legal advice on the matter.</p>
<p><b>Conclusion</b></p>
<p>When the authorities are more likely than anyone else in the world to be a criminal, it is important to protect as many of your rights as possible. It is your right to protect as much of your information as you legally can. Using these tips, and others in the book <a href="http://www.howtovanish.com/htvbookaddtocart">How To Vanish</a>, you can legally prevent the police from gathering more information than you are legally required to provide. And you can prevent violating any laws when you are trying to contribute to helping the police set a record for the number of criminals in their ranks.</p>
<p>If you know of great offshore VoIP services, countries where it is easy to get a drivers license without sharing a lot of information, or other helpful tips to share with other readers, leave a comment about it!</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/04/bill-rounds/cop-corruption-is-out-of-control/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Do You Want Your Medical History To Be Public?</title>
		<link>http://www.lewrockwell.com/2012/04/bill-rounds/do-you-want-your-medical-history-to-be-public/</link>
		<comments>http://www.lewrockwell.com/2012/04/bill-rounds/do-you-want-your-medical-history-to-be-public/#comments</comments>
		<pubDate>Sat, 14 Apr 2012 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds64.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Living Trusts Protect FinancialPrivacy &#160; &#160; &#160; Secret Weapon To Protect Medical Privacy Medical information is among the most private personal information. New healthcare laws in the US essentially require doctors to make all of their records electronic and store them in government databases. This poses a serious threat to patient privacy rights. There is one way to find private hospitals where your information will not be entered into US databases and you may even get better health care for much less. Risk to Patient Privacy Rights Having detailed medical information housed in one massive database &#8230; <a href="http://www.lewrockwell.com/2012/04/bill-rounds/do-you-want-your-medical-history-to-be-public/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds63.1.html"> Living Trusts Protect FinancialPrivacy</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p><b>Secret Weapon To Protect Medical Privacy</b></p>
<p>Medical information is among the most private personal information. New <a href="http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/hitechact.pdf">healthcare laws in the US</a> essentially require doctors to make all of their records electronic and store them in government databases. This poses a serious threat to patient privacy rights. There is one way to find private hospitals where your information will not be entered into US databases and you may even get better health care for much less.</p>
<p><b>Risk to Patient Privacy Rights</b></p>
<p>Having detailed medical information housed in one massive database makes it one of the most lucrative targets for hackers. It will not only contain health information (potentially worth its weight in digital gold to the highly ethical pharmaceutical industry), but it will also include demographic information, like race, ethnicity, primary language, and gender. This information is golden to marketers. And that says nothing of its value to identity thieves.</p>
<p>Government databases are well known as <a href="http://www.itworld.com/internet/115242/wikileaks-publishes-top-secret-afghan-war-diary">extremely poorly protected</a>. They aren&#8217;t even capable of protecting classified and top secret material. I hate to think how well they will protect our medical data. It may only be a matter of time before our medical histories are public information.</p>
<p><b>There Is Bound To Be Abuse</b></p>
<div class="lrc-iframe-amazon"></div>
<p>The law permits use of the data for <a href="http://news.cnet.com/8301-13578_3-10161233-38.html">clinical research</a>, even if the subject objects to the use of their data. <a href="http://www.rawstory.com/rs/2010/09/08/cops-access-drug-prescription-records/">North Carolina sheriffs</a> have already asked to browse prescription records to look for potential pain medication abusers. With even more data available, who knows what kinds of crimes they think your medical records might be evidence of.</p>
<p>About 12 million people will have to have access to such a health system, from heart surgeons to grocery store pharmacists. It is inevitable that one of those 12 million will be able to accidentally or purposefully leak massive amounts of data.</p>
<p>And, if the US social services system becomes anything like the UK system, the government will be able to take away people&#8217;s kids for being <a href="http://www.dailymail.co.uk/news/article-2033486/Your-children-fat-again.html">overweight</a> or for a <a href="http://www.dailymail.co.uk/news/article-1245190/Mother-clever-raise-child-baby-removed-social-workers-running-away.html">learning disability</a>. Having all medical records searchable means that many more innocent people with unfortunate genes could be the target of overzealous social workers.</p>
<p><b>Protect Patient Privacy Rights</b></p>
<p>To prevent medical procedures or conditions from showing up in US medical record databases, use offshore medical facilities. Seeking treatment in private hospitals in other countries is often called <a href="http://en.wikipedia.org/wiki/Medical_tourism">medical tourism</a> and can be far more beneficial than just protecting privacy. Many hospitals in places like New Zealand, Thailand, India, Mexico and Costa Rica, cater to wealthy foreigners. In many cases the doctors are trained in the US. They offer as good, or better, health care than any US facilities and they are usually 50% to 90% cheaper, including all travel expenses like airfare and hotel.</p>
<p><b>Risks</b></p>
<div class="lrc-iframe-amazon"></div>
<p>Before seeking medical care abroad, be sure to do extensive research. Although some private hospitals may cater to wealthy travelers, not all hospitals in those countries will be the same. Some will offer substandard care in unhealthy facilities.</p>
<p>Most other countries will not protect patients from medical malpractice, like they do in the US, and pharmaceutical companies may not be liable for injuries from medications like they are in the US. Also, medical information in foreign countries may not be protected as private.</p>
<p><b>Protect Yourself From Risks</b></p>
<p>There are several companies that help arrange offshore medical visits to make sure you select the best facilities and doctors. There are also voluntary organizations that certify medical facilities such as the <a href="http://www.jointcommissioninternational.org/">JCI</a> to promote quality care. A considerable amount of research should be done before seeking medical treatment away from home.</p>
<p><b>Conclusion</b></p>
<p>Seeking medical treatment abroad can help protect patient privacy rights. Information about those visits will not be automatically entered into the US electronic health record database. Additionally, seeking care offshore can be far less expensive, it can be as good, or better than US care, and you may even have access to many treatments, drugs and procedures that are not permitted in the US. Don&#8217;t forget to check out the book <a href="http://www.howtovanish.com/htvbookaddtocart">How To Vanish</a> for more ways to protect your privacy.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/04/bill-rounds/do-you-want-your-medical-history-to-be-public/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A Public or a Private Affair?</title>
		<link>http://www.lewrockwell.com/2012/04/bill-rounds/a-public-or-a-private-affair/</link>
		<comments>http://www.lewrockwell.com/2012/04/bill-rounds/a-public-or-a-private-affair/#comments</comments>
		<pubDate>Mon, 02 Apr 2012 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds63.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: 7 Effective Privacy Techniques for Reducing Risk of Identity Theft &#160; &#160; &#160; We Are All Going To Die!&#8230;Someday When we die the court system will take control of our financial lives and make one of the most private aspects of our lives public. This loss of financial privacy will happen unless we take one simple step to protect ourselves, our assets and our families with a living trust. Probate is the Problem With Financial Privacy When people die they leave behind some stuff (hopefully). Most people have a will, if they have anything at all, &#8230; <a href="http://www.lewrockwell.com/2012/04/bill-rounds/a-public-or-a-private-affair/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds62.1.html"> 7 Effective Privacy Techniques for Reducing Risk of Identity Theft</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p><b>We Are All Going To Die!&#8230;Someday</b></p>
<p>When we die the court system will take control of our financial lives and make one of the most private aspects of our lives <a href="http://livingtrustnetwork.com/estate-planning-center/last-will-and-testament/wills-of-the-rich-and-famous.html">public</a>. This loss of financial privacy will happen unless we take one simple step to protect ourselves, our assets and our families with a living trust.</p>
<p><b>Probate is the Problem With Financial Privacy</b></p>
<p>When people die they leave behind some stuff (hopefully). Most people have a will, if they have anything at all, to determine who gets all of their neat stuff. To administer this process, for people who do or do not have a will, the courts take control of all the assets, make sure all the money goes to the right people, and make your will a part of the public record. This is called <a href="http://en.wikipedia.org/wiki/Probate">probate</a>. Anyone particularly interested in learning what your kids got will be able to find out very easily. Some courts even make the information available online. This is a huge blow to financial privacy.</p>
<div class="lrc-iframe-amazon"></div>
<p><b>Living Trust</b></p>
<p>The only way to avoid having so much of your private financial life displayed for the public is to prepare a <a href="https://nolonow.nolo.com/noe/sample/NNTRUST_sample.pdf">living trust</a>. A living trust allows you to maintain control over your assets while you are alive, avoids the public probate process to distribute assets when you die and maintains your financial privacy.</p>
<p>There are some other great benefits as well. Compared to the cost of administering a living trust, probate is expensive. The cost is based on the value of the assets that the probate court deals with, so the more money you have, the more it will cost you. Probate is also slower.</p>
<p><b>Don&#8217;t Get Hit By A Bus</b></p>
<div class="lrc-iframe-amazon"></div>
<p>What happens in the unfortunate event that you are hit by a bus and turned into a <a href="http://en.wikipedia.org/wiki/List_of_culinary_vegetables">vegetable</a>? Whether or not you have a will, your assets are going to sit around and can&#8217;t be touched. They can&#8217;t be used to pay your medical expenses, they can&#8217;t be used to pay your mortgage, they can&#8217;t be used to pay for the groceries of your stalwart spouse. This can pose a very bad problem when assets exist to pay those costs, but you are incapacitated, covered in bandages and unable to get at those assets.</p>
<p>With a living trust, the unfortunate bus incident will not leave your assets untouchable until you die. The trustee can use the assets to pay for expenses while you are still alive but unable to manage your own affairs. This makes sure that the family members who are diligently at your hospital bed side can pay for the things they need, hopefully balloons and get well cards.</p>
<p><b>Living Trusts Are Common</b></p>
<p>The cost of having a basic living trust prepared is relative to its complexity. If your financial situation is simple, they can be quite inexpensive. If your financial situation is more complex, it will be worth the cost and effort to draft an adequate living trust. Many <a href="http://www.billroundsjd.com/">attorneys</a> are able to prepare them and make sure they are properly funded.</p>
<p><b>Conclusion</b></p>
<p>The legal system still contains several tools that help ordinary individuals protect their financial privacy. Having a living will is one of the great ways to take advantage of that system. Living wills provide a private alternative, to public indignity. Check out the book <a href="http://www.howtovanish.com/htvbookaddtocart">How To Vanish</a> for more legal tools to help protect your privacy.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/04/bill-rounds/a-public-or-a-private-affair/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>7 Ways to Prevent Identity Theft</title>
		<link>http://www.lewrockwell.com/2012/03/bill-rounds/7-ways-to-prevent-identity-theft/</link>
		<comments>http://www.lewrockwell.com/2012/03/bill-rounds/7-ways-to-prevent-identity-theft/#comments</comments>
		<pubDate>Tue, 20 Mar 2012 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds62.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Intelligence Analysis: How Dangerous Is CitizenDataveillance &#160; &#160; &#160; Identity theft occurs more often than anybody would like to admit and effective privacy techniques could prevent much of the damage. Everyone has a mentality of &#8220;it won&#8217;t happen to me&#8221;. Unfortunately, it can and it WILL to those who don&#8217;t follow precautions. And when it comes to identity theft, you can never be TOO cautious. Always go that extra mile to protect your personal information. It can even happen at a corporate level if a consumer database is hacked. For this reason, you should only provide &#8230; <a href="http://www.lewrockwell.com/2012/03/bill-rounds/7-ways-to-prevent-identity-theft/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds60.1.html"> Intelligence Analysis: How Dangerous Is CitizenDataveillance</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p>Identity theft occurs more often than anybody would like to admit and effective <a href="http://www.howtovanish.com/2012/03/7-effective-privacy-techniques-for-reducing-risk-of-identity-theft">privacy techniques</a> could prevent much of the damage. Everyone has a mentality of &#8220;it won&#8217;t happen to me&#8221;. Unfortunately, it can and it WILL to those who don&#8217;t follow precautions.</p>
<p>And when it comes to identity theft, you can never be TOO cautious. Always go that extra mile to protect your personal information. It can even happen at a corporate level if a consumer database is hacked. For this reason, you should only provide your credit card information or social security number to agencies with advanced privacy techniques.</p>
<p>Here are seven privacy techniques and tips on how you can reduce your risk of having your identity stolen:</p>
<p><b>1.</b> Be extremely cautious when asked to provide your social security or personal identification number. Always ask an organization what type of security system they have in place to protect such information from getting out. You never know who will have access to the data when you are not around.</p>
<div class="lrc-iframe-amazon"></div>
<p><b>2.</b> Be wary of emails from &#8220;banks&#8221; or &#8220;companies&#8221; asking you to verify your personal information. Hackers will try to make it seem like an email really is from your bank or a company with which you are affiliated. They will try to tell you that there is something wrong with your account and that you need to click on the link in the email to verify some information. NEVER DO THIS!</p>
<p>If you are unsure whether or not the email is legitimate, call the company, or manually enter the company&#8217;s website URL in your browser. DO NOT login by clicking on the link in the email.</p>
<p><b>3. </b>Don&#8217;t just carelessly toss important papers into the garbage. Some thieves are so desperate that they will actually go through dumpsters in search of personal data. These items include ATM receipts, credit card offers, bank statements, utility bills, and so forth. To prevent them from being stolen, put them through a <a href="http://www.howtovanish.com/PaperShredder">paper shredder</a>. Or better yet, use a <a href="http://www.runtogold.com/get-a-ghost-address/">secure ghost address</a>.</p>
<p><b>4.</b> When paying with a credit or debit card at a restaurant or store, make sure you can actually see the cashier swipe it in the machine. Although they risk getting in a lot of trouble, some employees try to swipe cards into a fraudulent machine that captures the information. While you&#8217;re at it, ask for a receipt. Better avoid merchants like <a href="http://www.howtovanish.com/2011/12/stratfor-failed-to-protect-their-customers-by-not-accepting-bitcoin/">Stratfor who could have protected customer information by accepting BitCoin but did not.</a></p>
<p><b>5.</b> Sometimes thieves will try to demand personal information from you via the phone. Phishing scams aren&#8217;t just limited to the internet. When you receive ANY type of phone call during which the other person wants you to provide them with private information, do not agree to it. They might even try to sound as if they are professionals of some sort.</p>
<div class="lrc-iframe-amazon"></div>
<p>The only time you should consider giving private details over the phone is if you made the call yourself, and you know you got the right number.</p>
<p><b>6.</b> As sad as it sounds, some scammers will try to say they are with charity organizations. They will try to make you feel guilt for not donating. If you&#8217;re unsure about whether or not they are a real charity, tell them to contact you another way. Tell them that if they are serious, then they may send you a pamphlet through the mail, and that you will send your donation in the form of a money order.</p>
<p><b>7.</b> Most identity thefts occur whenever somebody loses their wallet or purse. If you lose any personal information such as your social security card, birth certificate, ID, credit card, debit card, check book, cell phone, etc.., IMMEDIATELY notify the relevant institutions and banks. If any of the information is stolen, notify the police as well.</p>
<p>Hopefully, you now have an idea of what privacy techniques you can implement in order to prevent identity theft. Keep these tips in mind and remember: ALWAYS go that extra mile to protect your personal information by implementing stealth tactics from <a href="http://www.howtovanish.com/products/how-to-vanish-book/">How To Vanish The Book</a> or <a href="http://www.howtovanish.com/bitcoin/index.php#personalprivacyminiguide">The Mini-Guide To Personal Privacy</a>.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/03/bill-rounds/7-ways-to-prevent-identity-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Ministry of Information?</title>
		<link>http://www.lewrockwell.com/2012/03/bill-rounds/the-ministry-of-information/</link>
		<comments>http://www.lewrockwell.com/2012/03/bill-rounds/the-ministry-of-information/#comments</comments>
		<pubDate>Sat, 17 Mar 2012 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds61.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: How To Create an AnonymousWebsite &#160; &#160; &#160; I have been fascinated recently with the Washington Post intelligence analysis by William Arkin and Dana Priest. Both are well known journalists who have covered the military and intelligence communities for many years. Realizing that something had changed after 9/11, they dedicated two years to investigating what the intelligence community had evolved into. They first dug up the location of as many Top Secret facilities, both government and private, as possible. Then took somewhat of a guided tour, gaining access to several high ranking officials inside the Top &#8230; <a href="http://www.lewrockwell.com/2012/03/bill-rounds/the-ministry-of-information/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds60.1.html"> How To Create an AnonymousWebsite</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p>I have been fascinated recently with the <a title="intelligence" href="http://projects.washingtonpost.com/top-secret-america/" target="_blank">Washington Post</a> intelligence analysis by William Arkin and Dana Priest. Both are well known journalists who have covered the military and intelligence communities for many years. Realizing that something had changed after 9/11, they dedicated two years to investigating what the intelligence community had evolved into.</p>
<p>They first dug up the location of as many Top Secret facilities, both government and private, as possible. Then took somewhat of a guided tour, gaining access to several high ranking officials inside the Top Secret intelligence community to explain and clarify what each agency does and how they do it.</p>
<p>What They Discovered</p>
<p>Almost everyone is <a title="intelligence analysis" href="http://www.howtovanish.com/2010/07/intelligence-analysis-how-dangerous-is-citizen-dataveillance" target="_blank">amazed</a> when they see the creatures the government had created not only in size and scope, but in the amount of waste, redundancy, cost and ineffectiveness. There are 45 different government agencies with 1,271 subdivisions, all involved with intelligence. More than 2,000 private companies with government contracts provide some service to Top Secret agencies. In total, there are over 850,000 people nationwide who have Top Secret clearance working on intelligence gathering, analysis, support, implementation, etc. The massive size and scope of the intelligence community is larger than it ever was during the cold war and is directed as much at targets within the US as at targets abroad for the first time. They really have spared no expense. The US intelligence community has effectively become the u201Cfourth branch of government.u201D</p>
<p>The Post is clearly more shocked about the size and inefficiency of the creatures which have been created. I am more concerned with how dangerous these creatures inherently are and how difficult they are to control by their very nature.</p>
<p>The Real Danger Of The Intelligence Community</p>
<p>The Washington Post fails to point out the most dangerous part of this scientific marvel that has been created. The judicial branch cannot act as a check on the intelligence community because judicial review is not required for almost any intelligence operations. Subsequent prosecution for any illegal conduct is nearly impossible because of the Top Secret nature of the evidence. The legislative branch requires no accountability or measures of success to check and balance the intelligence community with funding restrictions. The directors of these agencies, appointed by the executive branch and confirmed by the legislative branch, have admitted that <a title="out of control" href="http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/" target="_blank">the system is beyond their control</a>. Like a more dangerous version of Jurassic Park, these intelligence agencies are vicious creatures which have been animated, have escaped from their cages, and are taking over the park.</p>
<div class="lrc-iframe-amazon"></div>
<p>The intelligence community was so preoccupied with whether or not they could build such a surveillance system, they didn&#8217;t stop to think if they should. The fourth branch of government is the most dangerous branch regardless of whether this surveillance and dataveillance of citizens is justified or not and whether it is effective or not. The sheer power and scope of this system allows unprecedented power over the lives of individuals. Should someone in any of these agencies want to exert control, no matter what the reason, the lack of accountability and lack of supervision makes it possible.</p>
<p>Intelligence Analysis Is Dangerous To Innocent Citizens</p>
<p>This kind of organization, without control or accountability, attracts sociopaths. Even if the intelligence agencies are benevolent in purpose, and even if their function is benevolent for a period of time, they will become infested with voracious velociraptors. Imagine the Corleone family having just one database administrator in their pocket. The inherent goal of anyone gathering this data is to manipulate it, find patterns, and prove those patterns to be correct. These vast collectors of information don&#8217;t want to be fed, they want to hunt.</p>
<p>There will be no way for innocent people to protect themselves from being devoured alive because US law prohibits citizens from protecting much of their important financial and personal data. For example, the census is a mandatory disclosure of information. It is likely possible to <a title="census" href="http://epic.org/privacy/census/" target="_blank">re-identify 87%</a> of the census responders who thought they were anonymous. Where disclosure of data is not required by law, private companies, which are regulated by government entities, are coerced into divulging information about their customers upon request by the government with a national security letter.</p>
<p>Geography Irrelevant For Intelligence Analysis</p>
<p>The Post focuses on whether the intelligence community is too big to be effective, a legitimate concern. They also focus on the geography of the intelligence community. Geography is irrelevant when it comes to dataveillance and data aggregation and analysis. The most important information tracked by these intelligence agencies is digital. Digital info exists simultaneously in as many places as you want it to exist. Your bank accounts and financial accounts are just a bunch of digits in an electronic database. Your identity is just a few characters and numbers in an electronic database. These velociraptors do not need geography to feed on your data and they don&#8217;t need geography to hunt you.</p>
<div class="lrc-iframe-amazon"></div>
<p>How You Can Escape The Park (Sort Of)</p>
<p>Since Top secret America is most concerned with data and information, one of the most effective ways to avoid being devoured by the dinosaurs that have taken control of the park is to control the data and information that is traceable to you with <a title="freenet" href="http://freenetproject.org/" target="_blank">Freenet</a>. Freenet is an open source (that means free) peer to peer network which allows you to post information to the network completely anonymously and acquire information from the network completely anonymously. It will cost anyone, including the intelligence community, millions of dollars per person to link information with identity on Freenet. It will only cost users of Freenet a few minutes in time to anonymize that data.</p>
<p>There are even more robust tools in Freenet which allow you to create a network among only trusted individuals. This creates even more protection against the intrusive eyes of an out of control ministry of information. It is one of the ways that<a title="china" href="http://freenetproject.org/whatis.html" target="_blank"> Chinese</a>, Iranian and other citizens of closed societies are able to communicate ideas and information without retaliation from their most vicious predators. This prevents any tracking of information to you unless a warrant is served to search an individual computer.</p>
<p>Conclusion</p>
<p>The Washington Post has done an excellent job discovering the scope and size of the intelligence community that poses a greater threat to Americans than Hitler, Russia, or Osama ever did. If defeating the threat of Hitler, Russia, or Osama was made easier by using Freenet, would you use it? <a title="surveillance cameras" href="http://www.howtovanish.com/2010/01/avoid-nosy-surveillance-cameras/" target="_blank"> Surveillance of citizens</a> by government, <a title="government privacy requirements" href="http://www.howtovanish.com/2009/12/governmental-privacy-requirements-information-and-business/" target="_blank">surveillance of customers by corporations</a>, <a title="Transactional Database" href="http://www.howtovanish.com/2009/11/transactional-databases-what-me-worry/" target="_blank">private transactional databases</a>, <a title="government data mining" href="http://www.howtovanish.com/2010/01/surveillance-society-negative-aspects-of-government-data-mining/" target="_blank">government transactional databases</a> and other forms of <a title="fool facial recognition" href="http://www.howtovanish.com/2010/05/visual-recognition-technology/" target="_blank">search without a warrant</a> are dangerous to a free society. Also, be sure to check out the new <a title="privacy tools" href="http://www.howtovanish.com/privacy-tools-and-resources/" target="_blank">Privacy Tools and Resources</a> page posted on How To Vanish that contains several intriguing videos about your privacy.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/03/bill-rounds/the-ministry-of-information/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Dissent Without Fear</title>
		<link>http://www.lewrockwell.com/2012/03/bill-rounds/dissent-without-fear/</link>
		<comments>http://www.lewrockwell.com/2012/03/bill-rounds/dissent-without-fear/#comments</comments>
		<pubDate>Wed, 14 Mar 2012 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds60.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Three Steps To Handle aSubpoena&#8230; &#160; &#160; &#160; Free speech is threatened when corrupt forces can pressure the means of distributing speech. Corrupt governments all over the world, or corrupt elements within governments, use the methods at their disposal to silence uncomfortable speech. One of the main methods they use is to threaten the source of speech. Anonymous speech is important, even for more mundane reasons than scathing political criticism. Advocates of medical marijuana, proponents of evolution, gay rights activists, critics of local police, and many others may need the protection of anonymous speech to protect &#8230; <a href="http://www.lewrockwell.com/2012/03/bill-rounds/dissent-without-fear/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds59.1.html"> Three Steps To Handle aSubpoena&#8230;</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p>Free speech is threatened when corrupt forces can pressure the means of distributing speech. Corrupt governments all over the world, or corrupt elements within governments, use the methods at their disposal to silence uncomfortable speech. One of the main methods they use is to <a href="http://www.howtovanish.com/2011/10/create-an-anonymous-website/" target="_blank">threaten the source of speech</a>.</p>
<p><a href="http://opinionator.blogs.nytimes.com/2009/06/08/the-outing-of-publius/" target="_blank">Anonymous speech is important</a>, even for more mundane reasons than scathing political criticism. Advocates of medical marijuana, proponents of evolution, gay rights activists, critics of local police, and many others may need the protection of anonymous speech to protect themselves while they voice their opinion. Efforts to censor online speech are doomed to fail because people will find ways to <a href="http://en.wikipedia.org/wiki/Publius" target="_blank">publish unflattering material</a> online without leaving any trace of identity behind.</p>
<p>To publish a website, there are several points of weakness where identifying information could be gleaned. <a href="http://news.nationalpost.com/2011/02/08/timeline-how-wael-ghonim-became-one-of-the-faces-of-egypts-uprising/" target="_blank">Political activists</a> and <a href="http://en.wikipedia.org/wiki/Julian_Assange" target="_blank">whistleblowers</a> will be able to easily circumvent identity requirements at each one of these points, allowing them to anonymously publish material online with an anonymous website.</p>
<h2>Anonymous Website Domain Name</h2>
<p>A website needs a domain name (one of those .com things) which must be bought and paid for through a domain registry like <a href="http://www.godaddy.com/search/domains.aspx?isc=goaf2101ad" target="_blank">GoDaddy</a>. Most domain registries allow people to protect their identity by using a <a href="https://www.domainsbyproxy.com/Default.aspx" target="_blank">domain registration proxy</a>. Using these proxies is not sufficient to protect identity because identifying information must still be shared with the proxy, which can be pressured to reveal it.</p>
<div class="lrc-iframe-amazon"></div>
<p>To prevent the domain registry from revealing their identity to anyone, <a href="http://en.wikipedia.org/wiki/Ai_Weiwei" target="_blank">political activists</a> will simply enter pseudanonymous information, like <a href="http://en.wikipedia.org/wiki/Federalist_Papers" target="_blank">Publius</a> or <a href="http://en.wikipedia.org/wiki/Silence_Dogood" target="_blank">Silence Dogood</a>. If they are really sneaky they may even enter the information of a competitor to register their domain or use an anonymous domain registrar.</p>
<h2>Anonymous Website Payment</h2>
<p>An important link in the chain is payment for services. Even if a pen name is provided, the person paying for the domain name could easily be tracked down by ruthless government officials by tracking down the source of payment, making an anonymous website less anonymous. To avoid leaving an audit trail back to their own financial accounts, political journalists may pay for their domain name with a money order paid for in <a href="http://www.howtovanish.com/2009/10/the-sweet-sound-of-cash/" target="_blank">cash</a>, use a <a href="http://www.howtovanish.com/PrepaidDebitCards">prepaid credit card</a> (which they paid cash to acquire) or pay with <a href="http://www.howtovanish.com/2009/10/the-sweet-sound-of-cash/" target="_blank">Bitcoins</a>. There are several companies that offer <a href="https://en.bitcoin.it/wiki/Trade#Domain_Name_and_DNS_Hosting" target="_blank">domain name registration for Bitcoins</a>. If they send payment from a Bitcoin address that has not been published anywhere else, it will be hard to trace payments to them.</p>
<h2>Anonymous Email</h2>
<p>Domain registrars need to communicate with owners to provide information, remind them about renewals, and other things. Most of that communication is done by email. Whistleblowers will easily be able to set up an anonymous email address with any <a href="https://login.yahoo.com/config/login_verify2?.intl=us&amp;.src=ym" target="_blank">free email service</a>.</p>
<h2>Anonymous Website Hosting</h2>
<p>Another critical part of maintaining a website is a server to host the website. Most websites are hosted by a web hosting company. As with domain registry, activists will use pseudonyms and anonymous email addresses to create their accounts to host their politically sensitive websites. And, they will pay with cash, <a href="http://www.howtovanish.com/PrepaidDebitCards">prepaid credit cards</a> or <a href="https://en.bitcoin.it/wiki/Trade#Web_Hosting" target="_blank">Bitcoins for the web hosting service</a>.</p>
<div class="lrc-iframe-amazon"></div>
<h2>Anonymous IP Address</h2>
<p>As an extra layer of protection, anytime smart political dissidents connect to the domain registrar, set up or log into their email, connect to their web hosting company, or log into their website to post information, they will use <a href="http://www.howtovanish.com/2009/08/anonymous-web-surfing/" target="_blank">anonymous web surfing techniques</a>. <a href="https://www.torproject.org/" target="_blank">Tor</a> is free and easy, proxy servers are available all over the world. <a href="http://www.howtovanish.com/IdentityCloaker">VPNs, especially those based offshore</a>, will prevent authorities searching through service provider records from discovering the IP address of political activists. These methods are also a way to circumvent government blocked sites, a common practice in places like <a href="http://mashable.com/2009/06/02/china-blocks-twitter-and-almost-everything-else/" target="_blank">China</a>.</p>
<h2>Continuing Threats</h2>
<p>Even if a clever political critic takes all of these measures, they are of course still subject to censorship from corrupt pressure on service providers to cut off service. The domain could be <a href="http://www.dotweekly.com/list-of-government-ice-seized-domain-names/" target="_blank">seized by government officials</a> or the <a href="http://news.cnet.com/8301-1009_3-20073102-83/fbi-seizes-web-hosting-companys-servers/" target="_blank">web host server could be confiscated</a>.The activist themselves would still be protected, and they would be able to republish their information in other locations.</p>
<p>Even in the absence of legal action, a domain registrar, or a web hosting company can always be pressured to take information down. Offshore companies in jurisdictions that are unfriendly to the criticized government may be harder to pressure.</p>
<h2>Conclusion</h2>
<p>Free speech and the ability to dissent is threatened by censorship that results from threats of imprisonment, violence and assassination. Those threats are less effective to prevent people from publishing on the internet when people can easily publish information completely anonymously. For more techniques on protecting anonymity, check out the book <a href="http://www.howtovanish.com/htvbookaddtocart" target="_blank">How To Vanish</a> and the upcoming report for political activists on Anonymous Internet Publishing.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/03/bill-rounds/dissent-without-fear/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>3 Steps To Handling a Subpoena</title>
		<link>http://www.lewrockwell.com/2012/03/bill-rounds/3-steps-to-handling-a-subpoena/</link>
		<comments>http://www.lewrockwell.com/2012/03/bill-rounds/3-steps-to-handling-a-subpoena/#comments</comments>
		<pubDate>Wed, 07 Mar 2012 06:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds59.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Cubans Using Anonymous WebSurfing &#160; &#160; &#160; One of the most invasive legal tools in the US is the subpoena. Its not just several pages of headache inducing legalese. It is a court order, demanding you to comply with whatever expensive command is gracing its pages. It might ask you to reveal more about your business than you would like your competitors to know. It might reveal embarrassing personal information. A subpoena doesn&#8217;t even need to be signed by a judge. A court clerk, prosecutor, or a private attorney can issue a subpoena to gather information. &#8230; <a href="http://www.lewrockwell.com/2012/03/bill-rounds/3-steps-to-handling-a-subpoena/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds58.1.html"> Cubans Using Anonymous WebSurfing</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p>One of the most invasive legal tools in the US is the subpoena. Its not just several pages of headache inducing legalese. It is a court order, demanding you to comply with whatever expensive command is gracing its pages. It might ask you to reveal more about your business than you would like your competitors to know. <a href="http://www.wired.com/threatlevel/2011/03/bittorrent/">It might reveal embarrassing personal information.</a></p>
<p>A subpoena doesn&#8217;t even need to be signed by a judge. A court clerk, prosecutor, or a private attorney can issue a subpoena to gather information.</p>
<p>The worst part is that you don&#8217;t even have to be involved in a criminal or civil case to get served with one. All you need is to have possession of some record that is remotely likely to contain information relevant to a case or investigation. In the law we call those kinds of requests &#8220;fishing expeditions.&#8221;</p>
<p>Not everybody likes fishing, especially the fish. There are ways to protect your privacy and protect the privacy of your customers from an invasive subpoena with a few simple tips.</p>
<p><b>Types of Subpoenas</b></p>
<p>There are 3 basic types of subpoenas. One will ask you only to produce records. Another will ask you to appear in person and testify. The third will ask for both. These tips are geared towards the first, producing records, but may help for the other two as well.</p>
<p>How likely are you to be served with a subpoena? Everyone&#8217;s situation will be different, but when you look at how many lawsuits are filed every year, and think that there are probably a handful of subpoenas issued for each lawsuit, the chances are pretty high that you or your business will get one at some point. Every year, much more information is gathered from subpoenas than from wire taps.</p>
<div class="lrc-iframe-amazon"></div>
<p><b>Who do they send the subpoena to?</b></p>
<p>It can be directed to you, ordering you to produce records that you possess about yourself or about someone else. It can also be issued to someone else to get records they have about you. Sometimes a third party will notify you if your records have been subpoenaed, but many times, you will not have any notice at all.</p>
<p><b>What can they get with a subpoena?</b></p>
<p>Either you or a third party are ordered to produce just about any record that is kept. There is no need for probable cause, all they need is some reasonable belief that there might be evidence in the records requested. Those records include anything like customer orders, invoices, repair reports, subscriber lists, contracts, memos, meeting minutes, and lots of other things.</p>
<p>There are a few things that you don&#8217;t have to produce. Privileged material, like communications with your lawyer, remain private. Also, things like emails, text messages and voice mail require a higher standard for law enforcement and opponents to collect. A subpoena can still get a list of the numbers you dialed, the websites you visited and lots of other information that could lead to more evidence anyways.</p>
<p><b>What do you do if you get a subpoena.</b></p>
<p><b>Step 1.</b></p>
<p>Take the paper and close your door or walk away. Don&#8217;t say anything to the person giving it to you, don&#8217;t invite them in, don&#8217;t read it in front of them, don&#8217;t buy them a beer. Just take it and get to a phone.</p>
<p><b>Step 2.</b></p>
<p>Call your lawyer. You can challenge a subpoena in court before you have to produce anything. If its too broad or burdensome to comply with or if it seeks privileged material, you might be able to limit what you have to produce and you may even be able to quash it completely. You can even challenge a subpoena received by a third party if any of your own records would be disclosed, assuming you know about the subpoena in time to challenge it. A lawyer can also help make sure you limit the documents you produce to the bare essentials. You don&#8217;t want to waste time and money disclosing more than you have to.</p>
<div class="lrc-iframe-amazon"></div>
<p><b>Step 3.</b></p>
<p>Don&#8217;t Ignore it. You could be held in contempt if you do.</p>
<p><b>Prevent Disclosure of Records From a Subpoena</b></p>
<p>Keep as few records as possible. If you don&#8217;t have it, you don&#8217;t have to produce it. The more records you have, the more likely it is that you have something that someone else wants.</p>
<p>Have a clear document retention policy and stick to it. If you are selectively destroying a few records here and there, it might look like you are trying to hide evidence. Never destroy records after a subpoena is issued or even if you think one might have been issued. That is a big no no.</p>
<p><b>Make Fewer Records Yourself</b></p>
<p>Since third parties can be compelled to disclose details about you, and since you may not always know this with enough time to challenge the subpoena, you should limit the records that other companies and individuals have about you.</p>
<p>Be as anonymous as possible to other companies that might be making records with your information. Use proxy servers, <a href="https://www.torproject.org/">Tor</a>, VPNs, <a href="http://www.startpage.com/">Startpage</a>, <a href="http://www.howtovanish.com/Prepaid%20Cell%20Phone">prepaid cell phones</a>, <a href="http://www.howtovanish.com/2009/10/the-sweet-sound-of-cash/">pay for things in cash</a>, and many other techniques from the <a href="http://www.howtovanish.com/htvbookaddtocart">book How to Vanish</a>. This way, even if third party records are disclosed, they do not immediately identify you.</p>
<div class="lrc-iframe-amazon"></div>
<p><b>Retain Less Data</b></p>
<p>Even if you collect some information about customers or yourself, you can eliminate unnecessary data on a regular basis according to your written data retention policy. <a href="http://www.heidi.ie/node/6">Securely delete old files</a>, anonymize marketing data, delete emails, <a href="http://www.dban.org/">wipe old hard drives</a>, <a href="http://www.howtovanish.com/2010/11/how-to-use-dropbox-truecrypt-transfer-files/">use encryption</a> to store and send files, and clear your browsing history. And don&#8217;t forget the old fashioned technique of <a href="http://www.howtovanish.com/PaperShredder">shredding your trash</a>.</p>
<p><b>Use Offshore Companies</b></p>
<p>Records of companies outside of US jurisdiction are harder to reach by simple court processes. Some countries, like Panama, are known for flagrantly disregarding US court orders. If you want to protect your records, use foreign companies. You can get email (like <a href="http://www.howtovanish.com/2010/03/husmail-husmail-login/">Hushmail</a>), VPNs (like <a href="http://www.howtovanish.com/IdentityCloaker">Identity Cloaker</a>), and a lot of other services from foreign countries.</p>
<p><b>Conclusion</b></p>
<p>All of these measures don&#8217;t mean that you will never be served with a subpoena. It means that if you are lucky you can respond with the glorious &#8220;certification of no records. &#8220; But it will still be a win if you can reduce the number of records that you have to produce from millions down to dozens. It is a lot easier, less expensive and will protect more privacy. Check out other ways to reduce the records that you make and keep with the <a href="http://www.howtovanish.com/htvbookaddtocart">book How To Vanish</a>.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/03/bill-rounds/3-steps-to-handling-a-subpoena/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Pre-Vanish Before You Have To</title>
		<link>http://www.lewrockwell.com/2012/03/bill-rounds/pre-vanish-before-you-have-to/</link>
		<comments>http://www.lewrockwell.com/2012/03/bill-rounds/pre-vanish-before-you-have-to/#comments</comments>
		<pubDate>Thu, 01 Mar 2012 06:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds58.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Cryptographic Protocols &#8212; How To Protect Your Wireless Network &#160; &#160; &#160; Taking some measures to pre-vanish can be very helpful to vanish at a later date. This means having in place the tools that you need to vanish long before you actually need to use them. This can be particularly helpful if you will be spending some time in the near future in a repressive regime that does not recognize the basic human rights of freedom of speech, freedom of association, and privacy related rights. Once domiciled inside a controlling regime, it can become more &#8230; <a href="http://www.lewrockwell.com/2012/03/bill-rounds/pre-vanish-before-you-have-to/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds57.1.html"> Cryptographic Protocols &#8212; How To Protect Your Wireless Network</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p>Taking <a href="http://www.howtovanish.com/IdentityCloaker">some measures</a> to pre-vanish can be very helpful to vanish at a later date. This means having in place the tools that you need to vanish long before you actually need to use them. This can be particularly helpful if you will be spending some time in the near future in a repressive regime that does not recognize the basic human rights of freedom of speech, freedom of association, and privacy related rights. Once <a href="http://www.howtovanish.com/taxdomicile">domiciled</a> inside a controlling regime, it can become more difficult to acquire the knowledge and skills needed to live a private life. You may no longer be able to purchase <a href="http://www.howtovanish.com/HTVBook">How To Vanish The Book</a> directly, but it can be done. You may also need to seek other jurisdictions to maintain your <a href="http://www.howtovanish.com/bankprivacyreport1">bank privacy</a>.</p>
<div class="lrc-iframe-amazon"></div>
<p><b>How Cubans Use Anonymous Web Surfing</b></p>
<p>Communist Cuba is a great example of how this is being done. It has a thriving market for goods and services, even though strict regulations prohibit entrepreneurship, because the citizens find ways to exercise their enterprising minds. A site similar to <a href="http://www.craigslist.org/about/sites">Craigslist</a>, called <a href="http://www.revolico.com/">revolico.com</a>, allows Cubans to exchange everything from baseball equipment to their place in line and they love their <a href="http://www.howtovanish.com/2009/09/modern-hawala/">hawaladar</a>. For the good of the people, the site is blocked by the government. But the site thrives nonetheless. How do the Cubans get around the repressive and immoral policies of their overbearing government? They use anonymous web surfing practices.</p>
<div class="lrc-iframe-amazon"></div>
<p><a href="http://www.howtovanish.com/IdentityCloaker">Anonymous web surfing</a> is generally done by using <a href="http://www.howtovanish.com/2009/08/anonymous-web-surfing/">proxy servers</a>. Proxy servers allow the proxy computer, outside of Cuba and not subject to Cuban government regulations, to do the web surfing for the Cubans. The ISP registers that they have visited the proxy server, not the sites visited by the proxy server on their behalf. And, because there are many thousands of servers available at any moment, some of which have never been used before as a proxy, it is far more difficult to restrict access to proxy servers than to individual websites. This way, the web surfing activity of individual Cubans is made anonymous to those who are watching them.</p>
<p>Cubans using anonymous proxy servers for <a href="http://www.howtovanish.com/2009/11/should-i-pay-for-anonymous-web-surfing/">anonymous browsing</a> which don&#8217;t disclose their IP address to the websites that they visit, nor the fact that the proxy server is even surfing for someone else, make it that much harder for a repressive government, like Cuba, to discover which citizens are visiting a site and then prevent them from visiting the site.</p>
<p><b>Conclusion</b></p>
<p>Cuba is not the only example. China, Iran, and many other countries have seen their citizens utilize proxy servers to spread information and ideas. I am sure that governments are not done trying to prevent their citizens from accessing information, sharing information, or associating with others through the internet, but I am also sure that there will always be those who circumvent limitations placed on them through the use of <a href="http://www.howtovanish.com/IdentityCloaker">anonymous web surfing techniques</a>. Some people might want to <a href="http://www.howtovanish.com/Uruguay">seek residency in another country</a> that is more free and allows for more privacy.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/03/bill-rounds/pre-vanish-before-you-have-to/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to Protect Your Wireless Network from Prying Eyes</title>
		<link>http://www.lewrockwell.com/2012/02/bill-rounds/how-to-protect-your-wireless-network-from-prying-eyes/</link>
		<comments>http://www.lewrockwell.com/2012/02/bill-rounds/how-to-protect-your-wireless-network-from-prying-eyes/#comments</comments>
		<pubDate>Wed, 29 Feb 2012 06:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds57.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Chained and Naked &#8212; Loans and Privacy Disclosure Policies &#160; &#160; &#160; We have all done it. If you own a laptop then you have probably done it more than once. We have all been without the Internet for a little while and then decided to use the wireless network unprotected with cryptographic protocols from our neighbor, a business, or a stranger down the street to do a little web surfing. But just because you have done it does not necessarily mean that you want others doing it to you. After all, some of those restaurants &#8230; <a href="http://www.lewrockwell.com/2012/02/bill-rounds/how-to-protect-your-wireless-network-from-prying-eyes/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds56.1.html"> Chained and Naked &#8212; Loans and Privacy Disclosure Policies</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p>We have all done it. If you own a <a href="http://www.howtovanish.com/2010/01/how-to-protect-your-computer/">laptop</a> then you have probably done it more than once. We have all been without the Internet for a little while and then decided to use the wireless network unprotected with cryptographic protocols from our neighbor, a business, or a stranger down the street to do a little web surfing.</p>
<p>But just because you have done it does not necessarily mean that you want others doing it to you. After all, some of those restaurants offered the Wifi access for free to entice you to be their patron while your neighbor may just be being nice. But you may not trust others as much as you trust yourself.</p>
<p>For whatever reason you want to keep all strangers out of your network, just like you want them out of your financial business and may use a <a href="http://www.howtovanish.com/2009/09/modern-hawala/">hawala system</a>, and would help you to <a href="http://www.howtovanish.com/2009/08/avoid-private-investigators/">avoid private investigators</a>. This is how to keep your network secure from any prying eyes that may be around your neighborhood.</p>
<div class="lrc-iframe-amazon"></div>
<p><b>CRYPTOGRAPHIC PROTOCOLS</b></p>
<p><b>First</b>, is to make sure that you pick the right encryption method for your network settings. The instruction manual with your wireless router should provide step by step instructions that are unique to each device.</p>
<p>There are several different cryptographic protocols that are available for someone running a home network. The choices are WPA, WPA II, and WEP. The WPA and WPA II are both the same standard and version II is slight more advanced than the regular version. These are known to be the safest method of network encryption. They will keep your network reasonably safe against people that are trying to penetrate it.</p>
<div class="lrc-iframe-amazon"></div>
<p>If you have older hardware, instead of a new secure <a href="http://www.howtovanish.com/linksysrouter">Linksys router</a>, then you might go with WEP. This is not very secure but it is better than nothing. WEP is an older standard of cryptographic protocols. If it is at all possible then choose another method of encryption. You will be safer in the long run.</p>
<p><b>Second</b>, is to make sure that your login information is very hard to guess. Your network key, as well as your router login information, should be very complicated. If they are easy to guess then this makes all of the other security that you have placed on your wireless network pointless. Do not use a password that is easily identifiable to you. This means do not use your dog, cat, or even children. All these things are something that a neighbor would know. Remember the easier your password is to guess then the less secure your network is.</p>
<p><b>CONCLUSION</b></p>
<p>Encrypting your wireless network with cryptographic protocols will keep unknown and unwanted individuals from using your assets and help you to <a href="http://www.howtovanish.com/2010/01/how-to-protect-your-computer/">protect your computer</a>. These methods will help keep you and your personal information safe and secured. Then you can surf the Internet or setup storage devices, etc. with relative peace of mind knowing that they are not available to anyone who drives by with a laptop. You can further protect your computer by using <a href="http://www.howtovanish.com/IdentityCloaker">anonymous web surfing</a> and other techniques and tools found in the book <a href="http://www.howtovanish.com/HTVBook">How To Vanish</a>.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/02/bill-rounds/how-to-protect-your-wireless-network-from-prying-eyes/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Chained and Naked</title>
		<link>http://www.lewrockwell.com/2012/02/bill-rounds/chained-and-naked/</link>
		<comments>http://www.lewrockwell.com/2012/02/bill-rounds/chained-and-naked/#comments</comments>
		<pubDate>Mon, 20 Feb 2012 06:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds56.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Facebook and Fake Names &#160; &#160; &#160; Loans are always a good way to expose your sensitive information to a host of strangers who are scrutinizing every aspect of your life. There are more likely than not more eyes than those of a pecuniary predator perusing the information you submit to your lender. Although borrowing money often feels like placing the burden of heavy chains around your neck, how much worse would it be to be naked under those chains? I have recently read a Privacy Disclosure Policy used by many lenders, and typical of the &#8230; <a href="http://www.lewrockwell.com/2012/02/bill-rounds/chained-and-naked/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds55.1.html"> Facebook and Fake Names</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p>Loans are always a good way to expose your sensitive information to a host of strangers who are scrutinizing every aspect of your life. There are more likely than not more eyes than those of a pecuniary predator perusing the information you submit to your lender. Although borrowing money often feels like placing the burden of heavy chains around your neck, how much worse would it be to be naked under those chains?</p>
<p>I have recently read a Privacy Disclosure Policy used by many lenders, and typical of the industry in general, which inform their borrowers of what will happen to their personal information once it is gathered by the lender. It is very likely that if you apply for a loan, or if you have applied for a loan, the same or similar language is used to the same effect in your agreement. The document is enlightening as to how much freedom lenders have in disclosing private information to third parties.</p>
<p><b>What Information is Gathered and Shared</b></p>
<p>Don&#8217;t you love the Patriot Act? There is little secret that the Patriot Act has required businesses and individuals to disclose more information than ever before to the government for so-called law enforcement purposes. The information that is required under the Patriot Act is extensive, from all bank account activity to employment records and all credit activity. The list is longer but it is safe to say that it is very extensive. In order to comply with the Patriot Act, banks, lenders and a host of others must gather this information from the individuals with whom they transact.</p>
<p><b>Your Consent is Not Needed</b></p>
<div class="lrc-iframe-amazon"></div>
<p>The disclosure states &#8220;We are required to or we may provide information about you to third parties <b>without your consent</b>, as permitted by law&#8230;&#8221; As broad as this statement is, it is followed by a list stating only examples of entities who may receive the informatio</p>
<p>Although the list is limited to credit agencies and law enforcement, two types of entities that most borrowers would expect to have their information disclosed to, there is no actual limit to what entities may receive this information. What is permitted by law may limit to some degree what information may be shared without consent, but the protection of the law is unreliable since both president Bush and Obama have authorized the use of warrantless wiretapping.</p>
<p><b>How Third Parties Might Acquire The Information</b></p>
<p>The policy also states &#8220;From time to time, we enter into agreements with other companies to provide services to us or make products and services available to you. Under these agreements, the companies may receive information about you&#8230;&#8221; The breadth of this clause places essentially no limits on who may later enter into an agreement with the lender and obtain your information for almost any purpose.</p>
<p>The policy further reads, &#8220;&#8230;we may provide information about you to our service providers&#8230;&#8221; That which is disclosed to service providers is limited to &#8220;that which <b>we</b> deem appropriate&#8221; for them to carry out their functions. This essentially limits what they can disclose to what they want to disclose, but no more. Also, the definition of service provider seems to include everyone from the phone company to auditors and possibly even the janitor.</p>
<p>The lender may also &#8220;provide information about you to our service providers to help us perform marketing services.&#8221; Marketing services and others within the &#8220;corporate family of offices&#8221; may also receive &#8220;all of the categories of information <b>we</b> gather about you.&#8221;</p>
<p>Thus, any related company and, if the lender hires a marketing firm, the marketing firm may now have all of your sensitive information, with no assurances as to how the marketing firm may use the data. Coupled with the sweeping language of the rest of the &#8220;Privacy&#8221; policy, there are few limits to what can be done with your private information once you have given it over to your lender.</p>
<div class="lrc-iframe-amazon"></div>
<p><b>Opt-Out</b></p>
<p>Most people will have to borrow money at some point or another during their lives. There are a very select few who can pay cash for a house and not many more who can get a private loan from their rich uncle which are not subject to the disclosure requirements of other loans. If you do have to get a loan, look for an opt out clause.</p>
<p>Ask your lender where the clause is specifically and make sure that you are taking the proper steps to execute this part of the agreement. An opt out clause is only like putting a band-aid on a gaping wound, but it is better than nothing and will allow you to opt out of the sharing of as much information as possible to third-parties.</p>
<p><b>Conclusion</b></p>
<p>The best case scenario is that you will be bothered with a host of annoying, unsolicited marketing, even if you opt out. The worst case scenario is that your sensitive information will be compromised due to the prolific sharing that may occur after your lender has gathered your information.</p>
<p>The best thing for protecting your privacy is to avoid borrowing money. Easier said than done, I know. Because the majority of people will have to borrow at some point, the next best thing is to at least opt out of unnecessary disclosures. Whenever signing any borrowing agreement, you should seek competent representation to review your specific agreement. Look for similar language in any Privacy Policy related to your loan to try and become aware of the potential risks you face in borrowing.</p>
<p>If you want to create a complete strategy for protecting your privacy, get the book <a href="http://www.howtovanish.com/HTVBook">How to Vanish</a>.</p>
<p>Disclaimer: This is not intended to be legal advice. Always seek the advice of competent legal counsel when reviewing or entering into any agreement or legal relationship.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/02/bill-rounds/chained-and-naked/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A Fertile Ground for Spying Government Trolls</title>
		<link>http://www.lewrockwell.com/2012/02/bill-rounds/a-fertile-ground-for-spying-government-trolls/</link>
		<comments>http://www.lewrockwell.com/2012/02/bill-rounds/a-fertile-ground-for-spying-government-trolls/#comments</comments>
		<pubDate>Mon, 06 Feb 2012 06:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds55.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Are Your Phone Conversations Recorded? &#160; &#160; &#160; What What Happens If You Use A Fake Name On Google+ Or Facebook? People love Facebook. Social networking is just a part of what humans do, so the fact that people use online social networks like Facebook and Google+ is no surprise. They are powerful tools for social change, business opportunities and developing strong relationships with friends and family. But, people are nervous about providing their personal information to social networking sites, and with good reason. Social networking sites sell your information to the highest bidder. They make &#8230; <a href="http://www.lewrockwell.com/2012/02/bill-rounds/a-fertile-ground-for-spying-government-trolls/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds54.1.html"> Are Your Phone Conversations Recorded?</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p><b>What What Happens If You Use A Fake Name On Google+ Or Facebook?</b></p>
<p>People love <a href="http://www.howtovanish.com/2011/08/facebook-and-fake-names/">Facebook</a>. Social networking is just a part of what humans do, so the fact that people use online social networks like Facebook and Google+ is no surprise. They are powerful tools for <a href="http://www.computerworld.com/s/article/9209159/Social_networks_credited_with_role_in_toppling_Egypt_s_Mubarak">social change</a>, business opportunities and developing strong relationships with friends and family.</p>
<p>But, people are nervous about providing their personal information to social networking sites, and with <a href="http://www.howtovanish.com/IDTheftBook">good reason</a>. Social networking sites <a href="http://articles.economictimes.indiatimes.com/2011-04-18/news/29444005_1_facebook-status-updates-privacy-watchdogs">sell your information</a> to the highest bidder. They make billions of dollars from the information that we give them for free. That information allows repressive governments to easily target undesirables, it could damage a career, or just plain <a href="http://youropenbook.org/?q=dump&amp;gender=any">cause</a> <a href="http://abcnews.go.com/Technology/site-exposes-embarrassing-facebook-updates/story?id=10669091">embarrassment</a>.</p>
<p><b>How People Protect Personal Information On Social Networking Sites</b></p>
<p>To harness the power of social networking while protecting personal information, some people use fake information in their profiles. There are lots of reasons people provide fake info. Everything from using a fake birthday or city, to using a fake profile picture or name are used by people who fear stalkers, by Egyptian revolutionaries, and by average people to protect their privacy. Only the most dedicated snoops can glean good information from a false trail.</p>
<div class="lrc-iframe-amazon"></div>
<p>But Facebook&#8217;s terms of use states that:</p>
<p>&#8220;Facebook users provide their real names and information, and we need your help to keep it that way. Here are some commitments you make to us relating to registering and maintaining the security of your account:</p>
<p>1. You will not provide any false personal information on Facebook&#8230;</p>
<p>2. You will not create more than one personal profile.</p>
<p>7. You will keep your contact information accurate and up-to-date.&#8221;</p>
<p>Google+ also states:</p>
<p>&#8220;To help fight spam and prevent fake profiles, use the name your friends, family or co-workers usually call you.&#8221;</p>
<p><b>Risks Of Using Fake Information In Social Networking Profiles</b></p>
<p>What happens to people who violate these terms of use and include fake info in their profiles? Failure to follow these terms of use simply means that the offending account could be shut down if discovered. Facebook doesn&#8217;t sue people for providing fake information and the cops won&#8217;t arrest people for using a drawing of a dog as their profile picture.</p>
<div class="lrc-iframe-amazon"></div>
<p>The likelihood that a social networking site will discover fake information is currently low. Many people use stage names, pen names, <a href="http://en.wikipedia.org/wiki/Pseudonym">pseudonyms</a> and nicknames every day. It is perfectly legal to use those alternate identities in many ways. Those names do not have to be the same as the one on a birth certificate and they can often be far more unique than what is found on a birth certificate. This makes it difficult for sites to tell what information is &#8220;real&#8221; or &#8220;fake,&#8221; as Google+ recently found out.</p>
<p>Don&#8217;t pretend you are someone else, don&#8217;t use another person&#8217;s real information and don&#8217;t commit fraud. That should be easy enough for you to avoid.</p>
<p><b>Are There Alternatives?</b></p>
<p>There are few alternatives to the information diarrhea on Facebook and Google+. <a href="http://blog.joindiaspora.com/what-is-diaspora.html">Diaspora*</a> is a potentially promising alternative but it is a long way from providing the value that Facebook does. Until Diaspora or some other alternative becomes viable, <a href="http://www.howtovanish.com/htvbookaddtocart">be careful the information you use</a> to create your social networking profiles.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/02/bill-rounds/a-fertile-ground-for-spying-government-trolls/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Are Your Phone Conversations Being Recorded?</title>
		<link>http://www.lewrockwell.com/2012/02/bill-rounds/are-your-phone-conversations-being-recorded/</link>
		<comments>http://www.lewrockwell.com/2012/02/bill-rounds/are-your-phone-conversations-being-recorded/#comments</comments>
		<pubDate>Sat, 04 Feb 2012 06:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds54.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Fun With a Decoy Drive &#160; &#160; &#160; Ooh baby, baby it&#8217;s a wired world. Cat Stevens could easily rewrite his lyric for a new era. Recently a couple of politicians have been caught on tape saying something that they thought was private when, in fact, their audio was being recorded. In both situations the recordings were not intended to gather personal information, but they recorded embarrassing stuff none the less. It is equally possible, and for a public figure probable, that there is someone intentionally recording a conversation either in person or on the phone. &#8230; <a href="http://www.lewrockwell.com/2012/02/bill-rounds/are-your-phone-conversations-being-recorded/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds53.1.html"> Fun With a Decoy Drive</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p>Ooh baby, baby it&#8217;s a wired world. <a href="http://www.howtovanish.com/WildWorld">Cat Stevens</a> could easily rewrite his lyric for a new era. Recently a couple of politicians have been caught on tape saying something that they thought was private when, in fact, their audio was being recorded. In both situations the recordings were not intended to gather personal information, but they recorded embarrassing stuff none the less. It is equally possible, and for a public figure probable, that there is someone intentionally recording a conversation either in person or on the phone. What is the law on the subject?</p>
<div class="lrc-iframe-amazon"></div>
<p><b>In-Person Recordings</b></p>
<p>The Supreme Court has determined, as a matter of federal law, that if you reveal something to another person, you risk that that person will tell the world what you have said. This is the justification that is given to allow an informant to wear a wire and even to record the conversation when speaking to a target in person Thus, unless there is a state law that limits the ability to record your conversation with another, your confidante may be secretly recording your conversation for some later use.</p>
<p><b>Telephone Recordings</b></p>
<div class="lrc-iframe-amazon"></div>
<p>By telephone recordings I do not mean wire taps by government officials, I am talking about the person you might be speaking to who is recording your conversation. Federal law requires that only one party to the telephone conversation consent to the recording. Thus, if you consent, you may record the phone conversation with another without any consent, or even knowledge that the phone conversation is being recorded. This approach has been adopted by most of the states as well. There are still a significant number of states that require that both parties to the phone conversation give some kind of consent before they may be recorded. There may even be criminal and civil liability for someone who does record a conversation contrary to state law. The rules and penalties vary, depending on the state, so make sure you know what rights you have in your <a href="http://www.callcorder.com/phone-recording-law-america.htm">own state</a>.</p>
<p><b>Conclusion</b></p>
<p>Privacy is not about everyone becoming a hermit, unless you want that. It is about control over the disclosure of your private life and information in the ways outlined in the book <a href="http://www.howtovanish.com/HTVBook">How To Vanish</a>. I do not recommend avoiding all in-person conversations or telephone conversations just because there is a risk of someone recording it. It is important to be aware of what the consequences of talking to someone in person or by phone might be and then order your affairs appropriately to control the level of risk that you are taking. It is also helpful to understand that when there are laws in place in a certain state against surreptitious recording by one party to a conversation, you may have recourse if there was a recording made without your consent. If you have any question about recording of phone calls, you will want to talk to a <a href="http://www.billroundsjd.com/">lawyer</a>.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/02/bill-rounds/are-your-phone-conversations-being-recorded/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Thwarting the Privacy Predators</title>
		<link>http://www.lewrockwell.com/2012/01/bill-rounds/thwarting-the-privacy-predators/</link>
		<comments>http://www.lewrockwell.com/2012/01/bill-rounds/thwarting-the-privacy-predators/#comments</comments>
		<pubDate>Sat, 28 Jan 2012 06:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds53.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Cloud Security &#160; &#160; &#160; I am not talking about collecting hunting decoys for needy hunters. I am talking about swapping out a sensitive laptop hard drive with a hard drive that has no sensitive information (a decoy drive) to protect your privacy from snoops. Privacy Tactics A great tool for protecting privacy is misdirection. Misdirection can make others believe you have nothing of value, reducing your risk of theft, invasion of privacy, etc. Misdirection can also include using decoys. Privacy predators that find a clever decoy, of no value to you, will be prevented from &#8230; <a href="http://www.lewrockwell.com/2012/01/bill-rounds/thwarting-the-privacy-predators/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds52.1.html"> Cloud Security</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p>I am not talking about collecting hunting decoys for needy hunters. I am talking about swapping out a sensitive laptop hard drive with a hard drive that has no sensitive information (a <a href="http://www.howtovanish.com/2012/01/fun-with-a-decoy-drive/" target="_blank">decoy drive</a>) to protect your privacy from snoops.</p>
<h2>Privacy Tactics</h2>
<p>A great tool for protecting privacy is misdirection. Misdirection can make others believe you have nothing of value, reducing your risk of theft, invasion of privacy, etc. Misdirection can also include using decoys. Privacy predators that find a clever decoy, of no value to you, will be prevented from invading your real privacy and they won&#8217;t even know it.</p>
<p>Misdirection does not mean lying or committing fraud. Such tactics actually reduce your privacy because when a lie or fraud is discovered your affairs will be even <a href="http://www.pinow.com/investigations/fraud-investigations" target="_blank">more closely scrutinized</a>, possibly by law enforcement.</p>
<h2>Misdirection Helps People</h2>
<p>To illustrate the difference between lawful misdirection and fraud, take the case of a celebrity who would like to go out in public without being recognized. A simple misdirection tactic that they might use would be to wear frumpy clothing, <a href="http://www.howtovanish.com/2010/01/avoid-nosy-surveillance-cameras/" target="_blank">a hood and cheap sunglasses</a>. This obscures many of their features so that, hopefully, they can pick up some toilet paper at the store without being <a href="http://www.howtovanish.com/2010/01/bank-privacy-a-fundamental-right/" target="_blank">hassled by hundreds of fans</a>.</p>
<div class="lrc-iframe-amazon"></div>
<p>If that same celebrity were to use a fake ID to carry their disguise even farther, they would potentially be committing a crime.</p>
<p>As an example of effectively using a decoy, I turn to the wisdom of Mel Brooks. The folks in <a href="http://www.amazon.com/gp/product/B0001Z4OXS?ie=UTF8&amp;tag=lewrockwell&amp;linkCode=xm2&amp;camp=1789&amp;creativeASIN=B0001Z4OXS">Blazing Saddles</a> used a decoy town to protect their real town from the ravages of savages. If they were to use a decoy town in some settings, such as when <a href="http://en.wikipedia.org/wiki/Extraterrestrial_real_estate" target="_blank">selling the real estate</a>, they might be committing a massive fraud.</p>
<h2>Using A Decoy Drive With A Laptop</h2>
<p>Us common folk can apply the principles of legal misdirection and decoys with the data on a laptop. Removing the hard drive of your laptop and replacing it with another hard disk is a great way to use misdirection to protect your data privacy.</p>
<p>There may be a million reasons why you would want to use a decoy drive to prevent access to your main laptop hard drive. You might be crossing a border where you and your data will be searched. You are not required to provide encryption keys, assuming you have encrypted your data, to enter the US, but other countries like Great Britain will<a href="http://en.wikipedia.org/wiki/Key_disclosure_law" target="_blank"> require you to disclose those encryption keys</a>. Only by removing a sensitive hard drive before traveling to Great Britain will your sensitive data be protected. Maybe you suspect a <a href="http://en.wikipedia.org/wiki/Keystroke_logging" target="_blank">keylogger</a> has been surreptitiously installed and you want to access an online account without tipping off the snoop. Or, you are just a fan of personal liberty and you want to try out a cool tactic.</p>
<h2>Decoy Drive Steps</h2>
<p>First, make sure you are fine with the consequences of swapping out your hard drive. Some warranties might be voided if you do it yourself.</p>
<div class="lrc-iframe-amazon"></div>
<p>Second, <a href="http://www.howtovanish.com/HardDrive">purchase an appropriate hard drive for your needs</a>.</p>
<p>Third, follow the instructions in your user manual to remove the hard drive. Make sure to remove the battery so you don&#8217;t get zapped.</p>
<p>Finally, install the new hard drive and you are in full decoy mode.</p>
<h2>Advanced Strategy</h2>
<p>If some snoop were to discover your decoy drive, would they believe it was the only hard drive you have? If your decoy drive has no activity on it, a snoop might realize that they have not truly uncovered what they were looking for. Upon realizing you have used a decoy, they may be even more interested in finding out WHY, leading them to investigate you even more than they would have.</p>
<p>Just like deer hunters spray their decoys with scent, you need to do more than make your decoy drive look like it is the real thing. Please do not spray your computer with anything. To make it look like your decoy drive is your main drive, engage in some meaningless activity on your decoy drive regularly. Save some innocuous documents there, save some harmless family photos, do some meaningless web surfing or play solitaire once in a while. This will help you sell your decoy as genuine.</p>
<h2>Conclusion</h2>
<p>Swapping out your sensitive hard drive with a decoy drive at the right times can help protect a lot of your data privacy. Snoops will have to be very sophisticated to recognize what you have done if you are doing a good job selling your misdirection. To learn more about this and other ways to protect your privacy, check out the book <a href="http://www.howtovanish.com/products/how-to-vanish-book/" target="_blank">How To Vanish</a>.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/01/bill-rounds/thwarting-the-privacy-predators/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How Safe Is Cloud File Storage?</title>
		<link>http://www.lewrockwell.com/2012/01/bill-rounds/how-safe-is-cloud-file-storage/</link>
		<comments>http://www.lewrockwell.com/2012/01/bill-rounds/how-safe-is-cloud-file-storage/#comments</comments>
		<pubDate>Thu, 12 Jan 2012 06:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds52.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: How Independent Contractors Make More Money for Everyone &#160; &#160; &#160; Cloud file storage is a great way to get a little bit more privacy. Separating your sensitive files from your physical location gives you flexibility and security. But are you exposing yourself to more risks by trusting your data with another company? For privacy minded people, cloud security can be just as important as convenience. There are lots of cloud storage options, so which one offers the best cloud security? There are three contenders that provide very good options for cloud storage which can also &#8230; <a href="http://www.lewrockwell.com/2012/01/bill-rounds/how-safe-is-cloud-file-storage/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds51.1.html"> How Independent Contractors Make More Money for Everyone</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p><a href="http://www.howtovanish.com/2012/01/cloud-security/" target="_blank">Cloud file storage</a> is a great way to get a little bit more privacy. Separating your sensitive files from your physical location gives you flexibility and security. But are you exposing yourself to more risks by trusting your data with another company?</p>
<p>For privacy minded people, cloud security can be just as important as convenience. There are lots of cloud storage options, so which one offers the best cloud security?</p>
<p>There are three contenders that provide very good options for cloud storage which can also provide the cloud security and privacy needed. <a href="http://www.howtovanish.com/2010/11/how-to-use-dropbox-truecrypt-transfer-files/" target="_blank">Dropbox, which we have discussed before</a>, <a href="http://www.howtovanish.com/SpiderOak">SpiderOak</a> and <a href="http://www.wuala.com/" target="_blank">Wuala</a>. Check out how these three services stack up against each other to decide which, if any, you think is best for you.</p>
<p><b>Dropbox</b></p>
<p><a href="http://www.howtovanish.com/dropbox">Dropbox</a> lets you store, sync, access and share selected data online.</p>
<p>Privacy/Security</p>
<p>Dropbox encrypts the content of your files, however, the file names are readable to Dropbox. Also, they maintain control over your password so there is a possibility that your password, and thus your data, could be compromised by rogue employees, warrantless searches, etc.</p>
<p>For this reason we have urged Dropbox users to encrypt their sensitive files with the <a href="http://www.truecrypt.org/" target="_blank">open source encryption</a> program <a href="http://www.howtovanish.com/2010/10/avoid-attorney-malpractice-use-free-encryption-software/" target="_blank">Truecrypt</a> before putting them in Dropbox. Open source software is the most trustworthy way to prevent surreptitious access to your data and get more cloud security.</p>
<p>Accessibility</p>
<p>Dropbox allows you to access your files, or save new files to your Dropbox folders, from any web accessible computer. You do not have to be using your own computer to access or save new files. This can be very handy for travelers working from internet cafes, people working from a different office computer, or if your own computer is lost or damaged.</p>
<p>Ease of Use</p>
<p>Dropbox is the simplest of these three options to setup and use. The lower default privacy and security settings make it easy to integrate with other services and easier to use in general. It is also extremely easy to customize the cloud security you want by encrypting your own sensitive files with Truecypt and leaving less sensitive files encrypted by Dropbox.</p>
<p>Price</p>
<p>Dropbox, along with SpiderOak and Wuala, offers 2 GB of free storage space. That can be enough storage for a few critical documents, like birth certificate, passport, etc. There are ways to increase storage, including paying about $10 per month for 50 GB or $20 per month for 100 GB.</p>
<p><b>SpiderOak</b></p>
<p><a href="http://www.howtovanish.com/SpiderOak">SpiderOak</a> provides encrypted backup, storage, access and sharing of your files.</p>
<p>Privacy/Security</p>
<p>SpiderOak automatically encrypts all of the files backed up or shared through their service. The encryption is done on your own computer with the SpiderOak software that you download so SpiderOak&#8217;s central servers never have control over your <a href="http://www.howtovanish.com/2011/04/protect-passwords-with-keepass/" target="_blank">password</a>. That way, the SpiderOak employees or other snoops cannot read the files you have uploaded to your account, not even the file names.</p>
<p>SpiderOak software is not open source so there is no way to verify the claim that they do not have surreptitious access and cannot grant surreptitious access to others. It is still advisable to encrypt sensitive documents separately with Truecrypt before backing them up with SpiderOak.</p>
<p>Accessibility</p>
<p>SpiderOak allows you to access backed up files from anywhere, but you cannot upload new files to your SpiderOak account from a remote computer. This may be inconvenient for people who might be working from an internet cafe, etc. This loss in convenience is the price paid for increased cloud security.</p>
<p>Ease of Use</p>
<p>SpiderOak offers more features than Dropbox so it is a bit more complicated to use, although it is still fairly simple. Because of the limitations in accessibility it is harder to integrate with many other applications that you might have.</p>
<p>Price</p>
<p>In addition to the 2 GB of free storage, every 100GB of storage costs $10 per month. That is about half the price of Dropbox.</p>
<h2>Wuala</h2>
<p><a href="http://www.wuala.com/" target="_blank">Wuala</a> is like somewhat of a hybrid between Dropbox and SpiderOak.</p>
<p>Privacy/Security</p>
<p>Wuala encrypts your data automatically before it is uploaded, similar to SpiderOak, although it is based on more open source projects than Dropbox or SpiderOak. It is not completely open source, so the same open source caveat generally applies. Wuala is, however, based in the EU where there are <a href="http://en.wikipedia.org/wiki/Data_Protection_Directive" target="_blank">stronger data protection laws</a> than there are in the US.</p>
<p>Accessibility</p>
<p>Wuala provides a way to access files via the web. This gives you access to your files from an internet cafe or other places, not just from your own computer. It still allows you to encrypt and decrypt your data locally, maintaining the high security while still providing the ease of use.</p>
<p>Ease of Use</p>
<p>Wuala is able to support drag and drop file management, much like Dropbox. This, and other features, make it less complex than SpiderOak, which does not have drag and drop features.</p>
<p>Price</p>
<p>The cost of Wuala is about the same as SpiderOak, which is about half the price of DropBox.</p>
<h2>Conclusion</h2>
<p>These are at least three good solutions for online backup, file sharing and storage which still offer cloud security. Each has different features and capabilities that will appeal to different people. If you want flexibility you can use Dropbox. If you want automatic strong encryption, you can use <a href="http://www.howtovanish.com/SpiderOak">SpiderOak</a>. If you want a bit more of a hybrid, try Wuala. You can combine any one of these with Truecrypt for <a href="http://www.howtovanish.com/products/how-to-vanish-book/" target="_blank">maximum privacy</a> and cloud security.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2012/01/bill-rounds/how-safe-is-cloud-file-storage/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>It&#8217;s Not How Much You Make, It&#8217;s How Much You Keep</title>
		<link>http://www.lewrockwell.com/2011/12/bill-rounds/its-not-how-much-you-make-its-how-much-you-keep/</link>
		<comments>http://www.lewrockwell.com/2011/12/bill-rounds/its-not-how-much-you-make-its-how-much-you-keep/#comments</comments>
		<pubDate>Tue, 27 Dec 2011 06:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds51.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Foreign Drivers License Protects Families &#160; &#160; &#160; Money is one of the biggest ways that we lose privacy. We must report our income and where it comes from for tax purposes. Our banking records are monitored and our identities vigorously identified. Employees and employers must reveal vast amounts of information to state and federal labor regulators and tax collectors. Whenever information is disclosed, even if it is to bureaucrats, there is a huge risk of abuse, accidental disclosure and fraud. Plus, the employee-employer relationship has become a cash cow for governments. Employees and employers are &#8230; <a href="http://www.lewrockwell.com/2011/12/bill-rounds/its-not-how-much-you-make-its-how-much-you-keep/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds50.1.html"> Foreign Drivers License Protects Families</a></p>
<p>    &nbsp;      &nbsp; &nbsp;
<p><a title="hawala transaction" href="http://www.howtovanish.com/2009/09/modern-hawala/" target="_blank">Money</a> is one of the biggest ways that we lose privacy. We must report our income and where it comes from for tax purposes. Our <a title="3 better privacy secrets" href="http://www.howtovanish.com/2010/11/3-better-privacy-secrets-banks-dont-want-you-to-know/" target="_blank">banking records are monitored</a> and our identities vigorously identified. <a title="Independent Contractors" href="http://www.howtovanish.com/2011/04/how-independent-contractors-make-more-money-for-everyone" target="_blank">Employees and employers</a> must reveal vast amounts of information to state and federal labor regulators and tax collectors.</p>
<p>Whenever information is disclosed, even if it is to bureaucrats, there is a huge risk of abuse, <a title="remove personal informatino from the internet" href="http://www.howtovanish.com/2011/02/remove-personal-information-from-the-internet/" target="_blank">accidental disclosure</a> and <a title="fraudulent identification documents" href="http://www.howtovanish.com/2009/06/fraudulent-identification-documents/" target="_blank">fraud</a>. Plus, the employee-employer relationship has become a cash cow for governments. Employees and employers are low hanging fruit for taxes, fees and regulations because they are <a title="transactional databases" href="http://www.howtovanish.com/?s=transactional+databases" target="_blank">easy to monitor</a>, record, control and collect from. Both employers and employees must share a piece of their economic pie with state and federal government officials, increasing the costs to businesses and lowering the benefit received by employees. Governments impose these costs and regulations to take care of employees and employers, whether they want to be taken care of or not.</p>
<p>There is a way for both workers and businesses to free themselves of many of these burdens, reduce costs, keep more money and <a title="sue tsa agent" href="http://www.howtovanish.com/2010/12/do-you-need-to-sue-a-tsa-agent/" target="_blank">protect their privacy</a>. Becoming an independent contractor instead of being an employee, or hiring independent contractors instead of employees, does all of that and reduces the amount of regulation that must be complied with, reduces legal risks, and can reduce taxes for both. This means there are more resources to share between workers and firms.</p>
<h2>Employees Suffer</h2>
<p>Even though most of government regulation claims to protect employees, it has had the opposite effect. The marketplace changes much faster than government regulation. Government regulation is designed for a business world that existed 50 years ago. There is no way that regulation by a slow moving, democratic government that has to make weekend deals just to keep from being shut down can keep pace with a 21st century information age economy.</p>
<p>Healthcare has been designed around a system where employees work at the same company for most of their life. Today, the average worker will change jobs many times in their lifetime. Minimum wage and overtime pay was formulated when there was no competition from overseas labor. Even the way that companies account for and fund their benefits and <a href="http://www.economist.com/node/11529345" target="_blank">pensions </a>makes them extremely expensive for employees with diminishing value. One of the worst parts of all is that employees have little control over the taxes they pay.</p>
<h2>Employees Have Little Control Over Their Own Life</h2>
<div class="lrc-iframe-amazon"></div>
<p>There is no doubt that some of these protections benefited employees overall at one time. Some may even be helpful today. But an employee has no choice whether they want to participate in these systems, even if they could get the same benefits elsewhere for less. Employees have no control over their economic life.</p>
<p>Control over your own economic life is valuable, not only in terms of mental health and a feeling of self worth and independence, but also economically. Something as simple as being able to control more of the taxes you pay can have a dramatic impact on your financial well being.</p>
<h2>How A Worker Can Pay $0 In Federal Income Taxes</h2>
<p>The <a href="http://online.wsj.com/article/SB10001424052748704530204576235090332473366.html" target="_blank">Wall Street Journal recently did a case study</a> showing how an independent contractor can earn $150,000 in gross earnings in a year, take a few very common tax deductions, and have a federal income tax liability of $0.</p>
<p>Here&#8217;s how it breaks down:</p>
<ul>
<li> $150,000 income as a self employed independent contractor. </li>
<li> $7,000 business start up expenses ($10,00 max first year, $5,000 in subsequent years) </li>
<li> $10,000 legitimate business expenses </li>
<li> $9,500 Medicare and Social Security tax (half of $19,000 paid) </li>
<li> $43,100 401k contribution (you deduct both employee and employer portion) </li>
<li> $10,000 IRA contribution ($5,00 for you, $5,000 for a spouse) </li>
<li> $10,000 state and local taxes (estimated) </li>
<li> $10,000 mortgage interest </li>
<li> $10,000 health insurance premiums </li>
<li> $6,150 Health Savings account </li>
<li> $2,500 interest on student loan </li>
<li> $4,000 kid&#8217;s college tuition </li>
<li> $1,500 tax credits (buy hybrid vehicle, install solar panels, etc.) </li>
<li> $200 Lifetime Earning Credits (community college class) = tax liability of $0 on $150,000 income. </li>
</ul>
<h2>Independent Contractors Pay Less Taxes Than Employees</h2>
<p>This entire strategy is premised on a very important issue. To take advantage of these <a href="http://www.howtovanish.com/completetax">huge tax benefits</a> you cannot be a regular employee. You can take advantage of every one of these <a href="http://www.howtovanish.com/ContractorTaxDeductions">tax benefits</a> as an independent contractor. A regular employee would pay taxes on close to the full amount of that $150,000 of income.</p>
<h2>Employers Pay Extremely High Labor Costs</h2>
<div class="lrc-iframe-amazon"></div>
<p>Employees cost their employers a lot more than their hourly wage. Unemployment tax, ERISA, and Medicare costs alone are 15% of the total salary paid to employees. Employers also pay an average of <a href="http://www.reuters.com/article/2010/09/27/us-usa-healthcare-costs-idUSTRE68Q3N520100927" target="_blank">$7,500 per employee</a> in health insurance every year, something required when the firm has 50 or more employees.</p>
<h2>High Administrative Costs And Risks For Employers</h2>
<p>On top of these direct costs, there are numerous other regulations that must be complied with, even if it does not make economic sense. Employers are required to give family leave under certain circumstances, have detailed <a href="http://www.employmentlawwatch.com/2009/01/articles/employment-us/discrimination-1/president-obama-signs-ledbetter-fair-pay-act-placing-new-burdens-on-employers/" target="_blank">record keeping requirements</a>, and many other things that raise the cost of having employees and decrease profitability, without actually paying workers more.</p>
<p>Employers are also exposed to lots of litigation risk. Whether it is an employee discrimination suit, failing to comply with regulation, harassment, overtime, even a conscientious employer can find themselves in an expensive, often frivolous, lawsuit. A lot of these costs and regulations are preventing businesses from hiring employees.</p>
<h2>Independent Contractors Reduce Labor Costs And Increase Productivity</h2>
<p>Businesses can still get the work done that they need to get done without incurring these huge costs by hiring independent contractors instead of employees. Independent contractors are also easier to train, more productive and provide a lot of flexibility in changing economic times.</p>
<h2>IRS Scrutiny</h2>
<p>These economic benefits have attracted a lot of workers and firms to try independent contractors instead of employees, but beware. The IRS and the Department of Labor have <a href="http://www.abajournal.com/magazine/article/irs_gets_class_conscious_switching_to_independent_contractors_draws_scrutin/" target="_blank">begun cracking down</a> on those who do it wrong. Doing it wrong could mean having to pay back taxes and interest owed, or even paying penalties or overtime.</p>
<h2>Follow The IRS 20 Factor Test</h2>
<p>There is a way to do it right. The IRS has a <a href="http://www.medlawplus.com/legalforms/instruct/revrul87-41.htm" target="_blank">20-factor test</a> that they use to determine if the worker is an employee or an independent contractor. This list is very fact specific and the weight given to every factor will depend on what other factors may reveal.</p>
<div class="lrc-iframe-amazon"></div>
<h2>Independent Contractor Should Control Their Own Work</h2>
<p>One of the most important things to consider is the amount of control that the firm has over the worker. An independent contractor will have control over their schedule and how they perform the work. The firm will control what they want the outcome or finished product to be. Suggestions are permitted but they must be suggestions. This is becoming much easier with the ability to work remotely over the internet.</p>
<h2>Independent Contractor Can Do Work For Others At The Same Time</h2>
<p>Another important factor is that the independent contractor is free to do work for others as well. This can be a critical factor that the IRS or Department of Labor look at. It is much better if the independent contractor is doing jobs for other clients, or at least advertising in places like Craigslist for other clients.</p>
<h2>Independent Contracting Is A Win-Win</h2>
<p>Independent contractors allow workers and firms to share more money between themselves. The government is entitled to much less of the money that flows from firms to independent contractors than employers and employees. Businesses become more profitable, individuals keep more money and everyone increases their privacy. Independent contractors can also have more control over their <a title="tax domicile" href="http://www.howtovanish.com/products/tax-domicile-report/" target="_blank">tax domicile</a>, a more advanced but much more powerful tax saving strategy.</p>
<h2>Conclusion</h2>
<p>This is only scratching the surface of how to properly take advantage of this powerful strategy. <a title="secrets of independent contractors" href="http://www.howtovanish.com/products/secrets-of-independent-contractors/" target="_blank">Secrets of Independent Contractors, from HowToVanish.com</a> is a simple and complete guide to help businesses and workers properly structure their relationship so they can take advantage of the huge tax savings.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2011/12/bill-rounds/its-not-how-much-you-make-its-how-much-you-keep/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How To Use a Foreign Driver&#8217;s License</title>
		<link>http://www.lewrockwell.com/2011/12/bill-rounds/how-to-use-a-foreign-drivers-license/</link>
		<comments>http://www.lewrockwell.com/2011/12/bill-rounds/how-to-use-a-foreign-drivers-license/#comments</comments>
		<pubDate>Tue, 20 Dec 2011 06:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds50.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Facebook and Privacy: How Private Is Your Profile? Your home address is one of the most sensitive pieces of information you have. You don&#8217;t want uninvited visitors bothering you and your family at home. Even though lots of businesses want to get a hold of your home address for marketing purposes, there are a lot of ways to prevent revealing your home address without paying that extra $1 for your Cheerios. Using a P.O. box or other ghost address will usually cut it when you need to share your home address without disclosing where you and &#8230; <a href="http://www.lewrockwell.com/2011/12/bill-rounds/how-to-use-a-foreign-drivers-license/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds49.1.html"> Facebook and Privacy: How Private Is Your Profile?</a></p>
<p>Your <a href="http://www.howtovanish.com/2011/05/foreign-drivers-license-protects-families">home address</a> is one of the most sensitive pieces of information you have. You don&#8217;t want <a href="http://www.howtovanish.com/2010/04/keep-address-private/">uninvited visitors</a> bothering you and your family at home. Even though lots of businesses want to get a hold of your home address for marketing purposes, there are a lot of ways to prevent revealing your home address without paying that extra $1 for your Cheerios. Using a P.O. box or other <a href="http://www.runtogold.com/get-a-ghost-address/">ghost address</a> will usually cut it when you need to share your home address without disclosing where you and your family actually hang out.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2011/12/bill-rounds/how-to-use-a-foreign-drivers-license/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Facebook and Privacy</title>
		<link>http://www.lewrockwell.com/2011/11/bill-rounds/facebook-and-privacy/</link>
		<comments>http://www.lewrockwell.com/2011/11/bill-rounds/facebook-and-privacy/#comments</comments>
		<pubDate>Mon, 28 Nov 2011 06:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds49.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Create an Anonymous Website Recently a Canadian woman was cut off from her insurance benefits because her Facebook profile was used by her insurance company to gather evidence on her claim. Facebook can be a good networking tool and a good way to keep in touch with old friends, not to mention a great Halloween costume, but the proper precautions should always be taken to prevent unnecessary privacy disclosures.]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds48.1.html"> Create an Anonymous Website</a></p>
<p>Recently a <a href="http://www.google.com/hostednews/ap/article/ALeqM5jFtDqzgsIdaIVcOoXZFR7pAlLmJQD9C4D3300">Canadian woman</a> was cut off from her insurance benefits because her <a href="http://www.facebook.com/people/Nathalie-Blanchard/517585757">Facebook profile</a> was used by her insurance company to gather evidence on her claim. <a href="http://www.facebook.com/">Facebook</a> can be a good networking tool and a good way to keep in touch with old friends, not to mention a great Halloween costume, but the proper precautions should always be taken to prevent unnecessary privacy disclosures.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2011/11/bill-rounds/facebook-and-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How To Create an Anonymous Website</title>
		<link>http://www.lewrockwell.com/2011/10/bill-rounds/how-to-create-an-anonymous-website/</link>
		<comments>http://www.lewrockwell.com/2011/10/bill-rounds/how-to-create-an-anonymous-website/#comments</comments>
		<pubDate>Thu, 13 Oct 2011 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds48.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Occupy Wall Street Protester Privacy Free speech is threatened when corrupt forces can pressure the means of distributing speech. Corrupt governments all over the world, or corrupt elements within governments, use the methods at their disposal to silence uncomfortable speech. One of the main methods they use is to threaten the source of speech. Anonymous speech is important, even for more mundane reasons than scathing political criticism. Advocates of medical marijuana, proponents of evolution, gay rights activists, critics of local police, and many others may need the protection of anonymous speech to protect themselves while they &#8230; <a href="http://www.lewrockwell.com/2011/10/bill-rounds/how-to-create-an-anonymous-website/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds47.1.html"> Occupy Wall Street Protester Privacy</a></p>
<p>Free speech is threatened when corrupt forces can pressure the means of distributing speech. Corrupt governments all over the world, or corrupt elements within governments, use the methods at their disposal to silence uncomfortable speech. One of the main methods they use is to <a href="http://www.howtovanish.com/2011/10/create-an-anonymous-website/" target="_blank">threaten the source of speech</a>.</p>
<p><a href="http://opinionator.blogs.nytimes.com/2009/06/08/the-outing-of-publius/" target="_blank">Anonymous speech is important</a>, even for more mundane reasons than scathing political criticism. Advocates of medical marijuana, proponents of evolution, gay rights activists, critics of local police, and many others may need the protection of anonymous speech to protect themselves while they voice their opinion. Efforts to censor online speech are doomed to fail because people will find ways to <a href="http://en.wikipedia.org/wiki/Publius" target="_blank">publish unflattering material</a> online without leaving any trace of identity behind.</p>
<p>To publish a website, there are several points of weakness where identifying information could be gleaned. <a href="http://news.nationalpost.com/2011/02/08/timeline-how-wael-ghonim-became-one-of-the-faces-of-egypts-uprising/" target="_blank">Political activists</a> and <a href="http://en.wikipedia.org/wiki/Julian_Assange" target="_blank">whistleblowers</a> will be able to easily circumvent identity requirements at each one of these points, allowing them to anonymously publish material online with an anonymous website.</p>
<h2>Anonymous Website Domain Name</h2>
<p>A website needs a domain name (one of those .com things) which must be bought and paid for through a domain registry like <a href="http://www.godaddy.com/search/domains.aspx?isc=goaf2101ad" target="_blank">GoDaddy</a>. Most domain registries allow people to protect their identity by using a <a href="https://www.domainsbyproxy.com/Default.aspx" target="_blank">domain registration proxy</a>. Using these proxies is not sufficient to protect identity because identifying information must still be shared with the proxy, which can be pressured to reveal it.</p>
<div class="lrc-iframe-amazon"></div>
<p>To prevent the domain registry from revealing their identity to anyone, <a href="http://en.wikipedia.org/wiki/Ai_Weiwei" target="_blank">political activists</a> will simply enter pseudanonymous information, like <a href="http://en.wikipedia.org/wiki/Federalist_Papers" target="_blank">Publius</a> or <a href="http://en.wikipedia.org/wiki/Silence_Dogood" target="_blank">Silence Dogood</a>. If they are really sneaky they may even enter the information of a competitor to register their domain or use an anonymous domain registrar.</p>
<h2>Anonymous Website Payment</h2>
<p>An important link in the chain is payment for services. Even if a pen name is provided, the person paying for the domain name could easily be tracked down by ruthless government officials by tracking down the source of payment, making an anonymous website less anonymous. To avoid leaving an audit trail back to their own financial accounts, political journalists may pay for their domain name with a money order paid for in <a href="http://www.howtovanish.com/2009/10/the-sweet-sound-of-cash/" target="_blank">cash</a>, use a <a href="http://www.howtovanish.com/PrepaidDebitCards">prepaid credit card</a> (which they paid cash to acquire) or pay with <a href="http://www.howtovanish.com/2009/10/the-sweet-sound-of-cash/" target="_blank">Bitcoins</a>. There are several companies that offer <a href="https://en.bitcoin.it/wiki/Trade#Domain_Name_and_DNS_Hosting" target="_blank">domain name registration for Bitcoins</a>. If they send payment from a Bitcoin address that has not been published anywhere else, it will be hard to trace payments to them.</p>
<h2>Anonymous Email</h2>
<p>Domain registrars need to communicate with owners to provide information, remind them about renewals, and other things. Most of that communication is done by email. Whistleblowers will easily be able to set up an anonymous email address with any <a href="https://login.yahoo.com/config/login_verify2?.intl=us&amp;.src=ym" target="_blank">free email service</a>.</p>
<h2>Anonymous Website Hosting</h2>
<p>Another critical part of maintaining a website is a server to host the website. Most websites are hosted by a web hosting company. As with domain registry, activists will use pseudonyms and anonymous email addresses to create their accounts to host their politically sensitive websites. And, they will pay with cash, <a href="http://www.howtovanish.com/PrepaidDebitCards">prepaid credit cards</a> or <a href="https://en.bitcoin.it/wiki/Trade#Web_Hosting" target="_blank">Bitcoins for the web hosting service</a>.</p>
<div class="lrc-iframe-amazon"></div>
<h2>Anonymous IP Address</h2>
<p>As an extra layer of protection, anytime smart political dissidents connect to the domain registrar, set up or log into their email, connect to their web hosting company, or log into their website to post information, they will use <a href="http://www.howtovanish.com/2009/08/anonymous-web-surfing/" target="_blank">anonymous web surfing techniques</a>. <a href="https://www.torproject.org/" target="_blank">Tor</a> is free and easy, proxy servers are available all over the world. <a href="http://www.howtovanish.com/IdentityCloaker">VPNs, especially those based offshore</a>, will prevent authorities searching through service provider records from discovering the IP address of political activists. These methods are also a way to circumvent government blocked sites, a common practice in places like <a href="http://mashable.com/2009/06/02/china-blocks-twitter-and-almost-everything-else/" target="_blank">China</a>.</p>
<h2>Continuing Threats</h2>
<p>Even if a clever political critic takes all of these measures, they are of course still subject to censorship from corrupt pressure on service providers to cut off service. The domain could be <a href="http://www.dotweekly.com/list-of-government-ice-seized-domain-names/" target="_blank">seized by government officials</a> or the <a href="http://news.cnet.com/8301-1009_3-20073102-83/fbi-seizes-web-hosting-companys-servers/" target="_blank">web host server could be confiscated</a>.The activist themselves would still be protected, and they would be able to republish their information in other locations.</p>
<p>Even in the absence of legal action, a domain registrar, or a web hosting company can always be pressured to take information down. Offshore companies in jurisdictions that are unfriendly to the criticized government may be harder to pressure.</p>
<h2>Conclusion</h2>
<p>Free speech and the ability to dissent is threatened by censorship that results from threats of imprisonment, violence and assassination. Those threats are less effective to prevent people from publishing on the internet when people can easily publish information completely anonymously. For more techniques on protecting anonymity, check out the book <a href="http://www.howtovanish.com/htvbookaddtocart" target="_blank">How To Vanish</a> and the upcoming report for political activists on Anonymous Internet Publishing.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2011/10/bill-rounds/how-to-create-an-anonymous-website/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Key to Peaceful Protest Is Privacy</title>
		<link>http://www.lewrockwell.com/2011/10/bill-rounds/the-key-to-peaceful-protest-is-privacy/</link>
		<comments>http://www.lewrockwell.com/2011/10/bill-rounds/the-key-to-peaceful-protest-is-privacy/#comments</comments>
		<pubDate>Fri, 07 Oct 2011 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds47.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Patient Privacy Rights and PrivateHospitals It isn&#8217;t hard to see why the Occupy Wall Street movement got started. Outrage over massive fraud committed by huge companies, combined with a government that protects them from prosecution, then takes money from innocent taxpayers and gives it to those same fraudster institutions is hard to contain. The goals of the Occupy Wall Street movement are not clear at this early stage, and they may never be clearly defined. Certainly there will be some demands that are a step in the wrong direction, but there may be some demands that &#8230; <a href="http://www.lewrockwell.com/2011/10/bill-rounds/the-key-to-peaceful-protest-is-privacy/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds46.1.html"> Patient Privacy Rights and PrivateHospitals</a></p>
<p>It isn&#8217;t hard to see why the <a href="http://occupywallst.org/" target="_blank">Occupy Wall Street</a> movement got started. Outrage over massive fraud committed by huge companies, combined with a government that protects them from prosecution, then takes money from innocent taxpayers and gives it to those same fraudster institutions is hard to contain.</p>
<p>The goals of the <a href="http://www.howtovanish.com/2011/10/occupy-wall-street-protester-privacy" target="_blank">Occupy Wall Street</a> movement are not clear at this early stage, and they may never be clearly defined. Certainly there will be some demands that are a step in the wrong direction, but there may be some demands that would be a positive change. So far, the movement is peaceful. No matter what they are protesting, peaceful protest is not always safe. The Occupy Wall Street protesters, Tea Party protesters, and any other peaceful protesters around the world, can use a few simple tactics to protect themselves and be more successful.</p>
<h2>Peaceful Occupy Wall Street Protests Upsets Powerful People</h2>
<p>Like all who oppose the ruling class, Occupy Wall Street protesters face serious danger to their finances, freedom, and even physical safety. Unjust imprisonment, unfounded criminal charges, potentially unwarranted fines and financial control are all possible tactics of a justice system loyal to financial crooks.</p>
<h2>Occupy Wall Street Needs Strategy</h2>
<div class="lrc-iframe-amazon"></div>
<p>While some protesters welcome the opportunity for political martyrdom, <a href="http://www.ctv.ca/CTVNews/TopStories/20110926/keystone-xl-pipeline-protest-ottawa-110926" target="_blank">offering themselves up to be arrested</a>, others would rather take a more strategic approach to promoting massive change. For those looking for an effective strategy, a very powerful tactic includes protecting the identity of protesters. Anonymity can be an effective tool to protect many protesters from unjust pressure.</p>
<h2>Why Privacy Is Important To Protect Peaceful Occupy Wall Street Demonstrators</h2>
<p>There are several elements that show why privacy is key to protect peaceful demonstrators.</p>
<h2>Police Funded By Target Of Protest</h2>
<p>First, JP Morgan, one of the main subjects of protester outrage, has <a href="http://www.jpmorganchase.com/corporate/Home/article/ny-13.htm" target="_blank">donated millions of dollars to the NYPD</a>. This donation will help provide better surveillance software for the NYPD to use, presumably on Occupy Wall Street demonstrators. It is no small stretch to think that police, as benefactors of such largesse, might be more inclined to protect their wealthy patron rather than the public. Thus, the Occupy Wall Street protesters may be subject to unjust actions by police.</p>
<h2>Electronic Surveillance Is More Cost Effective Crowd Control</h2>
<p>Second, the brute force being used to police the protesters is <a href="http://www.metro.us/newyork/local/article/983990--occupy-wall-street-police-paying-protest-s-price" target="_blank">costing millions of dollars</a>. With the expectation that the protests will grow in size, the financial cost to police will become enormous, even if funded by Wall Street bankers. Electronic surveillance is much more effective and efficient to protect the Wall Street bankers from the Occupy Wall Street protesters. The donation of JP Morgan and simple economics will push the police to use alternative tactics, such as electronic surveillance and control of cell phones, bank accounts, credit cards, and more, to control Occupy Wall Street.</p>
<div class="lrc-iframe-amazon"></div>
<h2>Police Already Brutalizing Protesters</h2>
<p>Third, the police have already begun using unjust tactics to injure or arrest innocent people. After corralling a small peaceful assembly of people on a public sidewalk, <a href="http://www.guardian.co.uk/world/2011/sep/27/occupy-wall-street-anthony-bologna" target="_blank">officers used pepper spray</a> on them without any justification. In another incident, <a href="http://www.huffingtonpost.com/2011/09/30/occupy-wall-street-protests-new-york_n_989221.html" target="_blank">police guided protesters from a pedestrian area</a> (where protesters could legally be) to lanes of vehicle traffic (where protesters supposedly could not legally be) and arrested them en masse.</p>
<h2>Types Of Electronic Surveillance</h2>
<p>What kind of electronic surveillance might law enforcement conduct?</p>
<h2>Cell Phone Surveillance</h2>
<p>Law enforcement can get many <a href="http://www.thedailybeast.com/newsweek/2010/02/18/the-snitch-in-your-pocket.html" target="_blank">cell phone records without a warrant</a>. They can either ask the phone company for the records, claiming it is part of a criminal investigation, or they can <a href="http://online.wsj.com/article/SB10001424053111904194604576583112723197574.html" target="_blank">hijack cell phone service and collect the information themselves</a>. This could reveal the identities of many of the people who have cell phones at the Occupy Wall Street demonstrations. Those individuals could then be singled out for other types of selective enforcement of laws.</p>
<h2>Facial Recognition</h2>
<p>Police might use visual surveillance and facial recognition to identify individuals in the crowd. Police could then prompt protesters to J-walk, litter, smoke a cigarette within 20 feet of a doorway, or commit some other action that is captured by surveillance cameras and citations issued by mail. Citations are annoying enough, but failure to pay them could lead to more serious jail time, bigger fines, and other financial problems.</p>
<div class="lrc-iframe-amazon"></div>
<p>This kind of crowd surveillance has been used before. In <a href="http://www.google.com/url?sa=t&amp;source=web&amp;cd=20&amp;ved=0CFwQFjAJOAo&amp;url=http%3A%2F%2Fwww.truststc.org%2Fconferences%2F07%2FTechnologyAndPrivacyBerkeley%2FPrivacyAcadreadings.pdf&amp;rct=j&amp;q=cu%20boulder%20marijuana%20facial%20recognition&amp;ei=Nz6NTvnaD6r6sQKp-6CDAQ&amp;usg=AFQjCNEYqosUGK9r1zbE7G7rJ1ZNhLHvDw&amp;cad=rja" target="_blank">Colorado in 2006</a>, protesters gathered in the hundreds to voice their support for relaxed marijuana rules. Cameras scanned the crowd, later police offered $50 to identify individuals in the photos, and issued citations for trespassing, among other things. 5 years later, facial recognition technology may make it much easier for police to identify numerous Occupy Wall Street demonstrators.</p>
<h2>Financial Blockade</h2>
<p>Protesters that are identified by visual or electronic surveillance could be made known to the various financial institutions that people depend on. Protesters could see their Visa, Master Card, bank accounts or Paypal accounts frozen, payments refused, or services denied. Those organizations accepting donations for the Occupy Wall Street movement could also see a similar financial blockade.</p>
<p>These kinds of financial blockades have been used before. <a href="http://www.forbes.com/sites/andygreenberg/2010/12/07/visa-mastercard-move-to-choke-wikileaks/" target="_blank">Visa and Mastercard stopped processing donations to Wikileaks and Paypal froze their account</a>, causing serious financial trouble for the activist website.<a href="http://www.wired.com/threatlevel/2011/02/paypal-manning-freeze/" target="_blank"> Paypal is notorious for freezing accounts</a> for arbitrary reasons.</p>
<h2>To Prevent The Crippling Effects Of Surveillance, Protect Privacy</h2>
<p>To prevent potentially crippling pressure, protesters in any movement can follow a few simple tactics.</p>
<h2>Stop Cell Phone Surveillance</h2>
<div class="lrc-iframe-amazon"></div>
<p>To stop cell <a href="http://www.howtovanish.com/2011/06/cell-phone-security/" target="_blank">phone surveillance</a>, buy a <a href="http://www.howtovanish.com/2011/03/block-caller-id-prevent-reverse-phone-lookup-and-keep-your-phone-number-private/" target="_blank">pre paid cell</a> phone with <a href="http://www.howtovanish.com/2009/10/the-sweet-sound-of-cash/" target="_blank">cash</a> and use that to communicate while at the protests. Otherwise, remove the battery of your cell phone or leave it at home. There will be no way for law enforcement to surreptitiously collect the data from your phone if you do.</p>
<h2>Prevent Facial Recognition Software</h2>
<p>To <a href="http://www.howtovanish.com/2010/01/avoid-nosy-surveillance-cameras/" target="_blank">stop visual surveillance</a>, wear a hoodie, hat and sunglasses to the protest. In places where masks and <a href="http://www.howtovanish.com/2010/05/visual-recognition-technology/" target="_blank">face paint</a> are not illegal, they can also be used to prevent facial recognition. This may not apply in New York where there are <a href="http://law.onecle.com/new-york/penal/PEN0240.35_240.35.html" target="_blank">laws making wearing a mask</a> or face paint illegal.</p>
<h2>Use Cash, Gold, Silver and Bitcoin</h2>
<p>To prevent financial blockades, people can use cash, <a href="http://www.howtovanish.com/2011/05/can-you-be-prosecuted-for-using-gold-or-silver-liberty-dollar-part-iii/" target="_blank">gold and silver to trade in person</a>. Be careful using gold and silver as a medium of exchange. The capital gains tax on gold and silver is very high (28%) so using it may actually cause you to owe taxes that will go to bailing out the very banks that are being protested. For anonymous online transfers, <a href="http://www.weusecoins.com/" target="_blank">Bitcoin</a> may be a viable option. It not only protects the identity of users, but <a href="http://wikileaks.org/Donate.html" target="_blank">Wikileaks uses it to accept donations in spite of the financial blockade of the formal banking system</a>.</p>
<h2>Conclusion</h2>
<p>Protecting privacy protects peaceful protesters of any cause. Smart strategy is needed to prevent financial blockades, unjust police action and other tools that could be used to cripple protest movements. Using these privacy tactics and others in the book <a href="http://www.howtovanish.com/htvbookaddtocart" target="_blank">How To Vanish</a> can help peaceful people avoid unjust actions from law enforcement around the country and around the world.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2011/10/bill-rounds/the-key-to-peaceful-protest-is-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Only Way To Keep Your Medical Records Private</title>
		<link>http://www.lewrockwell.com/2011/10/bill-rounds/the-only-way-to-keep-your-medical-records-private/</link>
		<comments>http://www.lewrockwell.com/2011/10/bill-rounds/the-only-way-to-keep-your-medical-records-private/#comments</comments>
		<pubDate>Wed, 05 Oct 2011 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds46.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Living Trusts Protect FinancialPrivacy Secret Weapon To Protect Medical Privacy Medical information is among the most private personal information. New healthcare laws in the US essentially require doctors to make all of their records electronic and store them in government databases. This poses a serious threat to patient privacy rights. There is one way to find private hospitals where your information will not be entered into US databases and you may even get better health care for much less. Risk to Patient Privacy Rights Having detailed medical information housed in one massive database makes it one &#8230; <a href="http://www.lewrockwell.com/2011/10/bill-rounds/the-only-way-to-keep-your-medical-records-private/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds45.1.html"> Living Trusts Protect FinancialPrivacy</a></p>
<p><b>Secret Weapon To Protect Medical Privacy</b></p>
<p>Medical information is among the most private personal information. New <a href="http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/hitechact.pdf">healthcare laws in the US</a> essentially require doctors to make all of their records electronic and store them in government databases. This poses a serious threat to patient privacy rights. There is one way to find private hospitals where your information will not be entered into US databases and you may even get better health care for much less.</p>
<p><b>Risk to Patient Privacy Rights</b></p>
<p>Having detailed medical information housed in one massive database makes it one of the most lucrative targets for hackers. It will not only contain health information (potentially worth its weight in digital gold to the highly ethical pharmaceutical industry), but it will also include demographic information, like race, ethnicity, primary language, and gender. This information is golden to marketers. And that says nothing of its value to identity thieves.</p>
<p>Government databases are well known as <a href="http://www.itworld.com/internet/115242/wikileaks-publishes-top-secret-afghan-war-diary">extremely poorly protected</a>. They aren&#8217;t even capable of protecting classified and top secret material. I hate to think how well they will protect our medical data. It may only be a matter of time before our medical histories are public information.</p>
<p><b>There Is Bound To Be Abuse</b></p>
<div class="lrc-iframe-amazon"></div>
<p>The law permits use of the data for <a href="http://news.cnet.com/8301-13578_3-10161233-38.html">clinical research</a>, even if the subject objects to the use of their data. <a href="http://www.rawstory.com/rs/2010/09/08/cops-access-drug-prescription-records/">North Carolina sheriffs</a> have already asked to browse prescription records to look for potential pain medication abusers. With even more data available, who knows what kinds of crimes they think your medical records might be evidence of.</p>
<p>About 12 million people will have to have access to such a health system, from heart surgeons to grocery store pharmacists. It is inevitable that one of those 12 million will be able to accidentally or purposefully leak massive amounts of data.</p>
<p>And, if the US social services system becomes anything like the UK system, the government will be able to take away people&#8217;s kids for being <a href="http://www.dailymail.co.uk/news/article-2033486/Your-children-fat-again.html">overweight</a> or for a<a href="http://www.dailymail.co.uk/news/article-1245190/Mother-clever-raise-child-baby-removed-social-workers-running-away.html"> learning disability</a>. Having all medical records searchable means that many more innocent people with unfortunate genes could be the target of overzealous social workers.</p>
<p><b>Protect Patient Privacy Rights</b></p>
<p>To prevent medical procedures or conditions from showing up in US medical record databases, use offshore medical facilities. Seeking treatment in private hospitals in other countries is often called <a href="http://en.wikipedia.org/wiki/Medical_tourism">medical tourism</a> and can be far more beneficial than just protecting privacy. Many hospitals in places like New Zealand, Thailand, India, Mexico and Costa Rica, cater to wealthy foreigners. In many cases the doctors are trained in the US. They offer as good, or better, health care than any US facilities and they are usually 50% to 90% cheaper, including all travel expenses like airfare and hotel.</p>
<p><b>Risks</b></p>
<p>Before seeking medical care abroad, be sure to do extensive research. Although some private hospitals may cater to wealthy travelers, not all hospitals in those countries will be the same. Some will offer substandard care in unhealthy facilities.</p>
<div class="lrc-iframe-amazon"></div>
<p>Most other countries will not protect patients from medical malpractice, like they do in the US, and pharmaceutical companies may not be liable for injuries from medications like they are in the US. Also, medical information in foreign countries may not be protected as private.</p>
<p><b>Protect Yourself From Risks</b></p>
<p>There are several companies that help arrange offshore medical visits to make sure you select the best facilities and doctors. There are also voluntary organizations that certify medical facilities such as the <a href="http://www.jointcommissioninternational.org/">JCI</a> to promote quality care. A considerable amount of research should be done before seeking medical treatment away from home.</p>
<p><b>Conclusion</b></p>
<p>Seeking medical treatment abroad can help protect patient privacy rights. Information about those visits will not be automatically entered into the US electronic health record database. Additionally, seeking care offshore can be far less expensive, it can be as good, or better than US care, and you may even have access to many treatments, drugs and procedures that are not permitted in the US. Don&#8217;t forget to check out the book <a href="http://www.howtovanish.com/htvbookaddtocart">How To Vanish</a> for more ways to protect your privacy.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2011/10/bill-rounds/the-only-way-to-keep-your-medical-records-private/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>When You Shuffle Off</title>
		<link>http://www.lewrockwell.com/2011/09/bill-rounds/when-you-shuffle-off/</link>
		<comments>http://www.lewrockwell.com/2011/09/bill-rounds/when-you-shuffle-off/#comments</comments>
		<pubDate>Mon, 19 Sep 2011 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds45.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Ignore The Police! We Are All Going To Die!&#8230;Someday When we die the court system will take control of our financial lives and make one of the most private aspects of our lives public. This loss of financial privacy will happen unless we take one simple step to protect ourselves, our assets and our families with a living trust. Probate is the Problem With Financial Privacy When people die they leave behind some stuff (hopefully). Most people have a will, if they have anything at all, to determine who gets all of their neat stuff. To &#8230; <a href="http://www.lewrockwell.com/2011/09/bill-rounds/when-you-shuffle-off/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds44.1.html"> Ignore The Police!</a></p>
<p><b>We Are All Going To Die!&#8230;Someday</b></p>
<p>When we die the court system will take control of our financial lives and make one of the most private aspects of our lives <a href="http://livingtrustnetwork.com/estate-planning-center/last-will-and-testament/wills-of-the-rich-and-famous.html">public</a>. This loss of financial privacy will happen unless we take one simple step to protect ourselves, our assets and our families with a living trust.</p>
<p><b>Probate is the Problem With Financial Privacy</b></p>
<p>When people die they leave behind some stuff (hopefully). Most people have a will, if they have anything at all, to determine who gets all of their neat stuff. To administer this process, for people who do or do not have a will, the courts take control of all the assets, make sure all the money goes to the right people, and make your will a part of the public record. This is called <a href="http://en.wikipedia.org/wiki/Probate">probate</a>. Anyone particularly interested in learning what your kids got will be able to find out very easily. Some courts even make the information available online. This is a huge blow to financial privacy.</p>
<div class="lrc-iframe-amazon"></div>
<p><b>Living Trust</b></p>
<p>The only way to avoid having so much of your private financial life displayed for the public is to prepare a <a href="https://nolonow.nolo.com/noe/sample/NNTRUST_sample.pdf">living trust</a>. A living trust allows you to maintain control over your assets while you are alive, avoids the public probate process to distribute assets when you die and maintains your financial privacy.</p>
<p>There are some other great benefits as well. Compared to the cost of administering a living trust, probate is expensive. The cost is based on the value of the assets that the probate court deals with, so the more money you have, the more it will cost you. Probate is also slower.</p>
<p><b>Don&#8217;t Get Hit By A Bus</b></p>
<div class="lrc-iframe-amazon"></div>
<p>What happens in the unfortunate event that you are hit by a bus and turned into a <a href="http://en.wikipedia.org/wiki/List_of_culinary_vegetables">vegetable</a>? Whether or not you have a will, your assets are going to sit around and can&#8217;t be touched. They can&#8217;t be used to pay your medical expenses, they can&#8217;t be used to pay your mortgage, they can&#8217;t be used to pay for the groceries of your stalwart spouse. This can pose a very bad problem when assets exist to pay those costs, but you are incapacitated, covered in bandages and unable to get at those assets.</p>
<p>With a living trust, the unfortunate bus incident will not leave your assets untouchable until you die. The trustee can use the assets to pay for expenses while you are still alive but unable to manage your own affairs. This makes sure that the family members who are diligently at your hospital bed side can pay for the things they need, hopefully balloons and get well cards.</p>
<p><b>Living Trusts Are Common</b></p>
<p>The cost of having a basic living trust prepared is relative to its complexity. If your financial situation is simple, they can be quite inexpensive. If your financial situation is more complex, it will be worth the cost and effort to draft an adequate living trust. Many <a href="http://www.billroundsjd.com/">attorneys</a> are able to prepare them and make sure they are properly funded.</p>
<p><b>Conclusion</b></p>
<p>The legal system still contains several tools that help ordinary individuals protect their financial privacy. Having a living will is one of the great ways to take advantage of that system. Living wills provide a private alternative, to public indignity. Check out the book <a href="http://www.howtovanish.com/htvbookaddtocart">How To Vanish</a> for more legal tools to help protect your privacy.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2011/09/bill-rounds/when-you-shuffle-off/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ignore the Cops</title>
		<link>http://www.lewrockwell.com/2011/09/bill-rounds/ignore-the-cops/</link>
		<comments>http://www.lewrockwell.com/2011/09/bill-rounds/ignore-the-cops/#comments</comments>
		<pubDate>Thu, 01 Sep 2011 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds44.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Foreign Drivers License ProtectsFamilies For the past few months, police departments have been using a new iris scanning device to identify people they encounter. Many more police departments will begin using this device soon. The scanner can be held up to the eye of any person and almost instantly identify them more accurately than a fingerprint. Police have imposed restrictions on themselves to prevent misuse of iris scanners. Like a chubby kid guarding a Happy Meal, indulgence is more likely than restraint. Currently, iris scanners are limited to checking the person scanned against a national database &#8230; <a href="http://www.lewrockwell.com/2011/09/bill-rounds/ignore-the-cops/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds43.1.html"> Foreign Drivers License ProtectsFamilies</a></p>
<p>For the past few months, police departments have been using a new<a href="http://www.bi2technologies.com/" target="_blank"> iris scanning device</a> to identify people they encounter. Many more police departments will begin using this device soon. The scanner can be held up to the eye of any person and almost<a href="http://www.howtovanish.com/2011/08/ignore-the-police/" target="_blank"> instantly identify</a> them more accurately than a fingerprint. Police have imposed restrictions on themselves to prevent misuse of iris scanners. Like a chubby kid guarding a Happy Meal, indulgence is more likely than restraint.</p>
<p>Currently, iris scanners are limited to checking the person scanned against a national database of iris scans. This database presumably only contains criminals, children and individuals who may need assistance, like alzheimers patients. The devices are not supposed to be able to capture and store new entries. These self-imposed limitations may only be temporary.</p>
<h2>Warrantless Iris Scans Are Probably Unconstitutional</h2>
<p>Although not yet tested, there are some potentially strong constitutional challenges to many iris scans that are likely to occur. If you have a reasonable expectation of privacy in some information or item, the police need a warrant to conduct a search. (<a href="http://www.law.cornell.edu/supct/html/historics/USSC_CR_0389_0347_ZO.html" target="_blank">Katz v. United States</a>) There is no reasonable expectation of privacy for things that are in the plain view of the public. (<a href="http://scholar.google.com/scholar_case?case=9458625535110498158&amp;hl=en&amp;as_sdt=2&amp;as_vis=1&amp;oi=scholarr" target="_blank">Texas v. Brown</a>) Technologies that enhance the senses to be able to see what is in plain view, like common binoculars, can be used by police without a warrant. (<a href="http://scholar.google.com/scholar_case?case=2807189437219807369&amp;hl=en&amp;as_sdt=2&amp;as_vis=1&amp;oi=scholarr" target="_blank">Dow Chemical v. United States</a>) Something that is not visible to the naked eye is not in plain view. (<a href="http://scholar.google.com/scholar_case?case=13894501388713609672&amp;hl=en&amp;as_sdt=2&amp;as_vis=1&amp;oi=scholarr" target="_blank">California v. Ciraolo</a>; <a href="http://www.law.cornell.edu/supct/html/99-8508.ZO.html" target="_blank">Kyllo v. United States</a>; <a href="http://jweinsteinlaw.com/pdfs/People%20v_%20Arno%20%281979%29%2090%20CA3d%20505.htm" target="_blank">People v. Arno</a>) Police may also conduct a search that would otherwise require a warrant if they get consent. <a href="http://scholar.google.com/scholar_case?case=4378189236447054894&amp;hl=en&amp;as_sdt=2&amp;as_vis=1&amp;oi=scholarr" target="_blank">(Schneckloth v. Bustamonte</a>).</p>
<div class="lrc-iframe-amazon"></div>
<p>An image of your iris and the detail of your iris is apparently very important information. Many people might reasonably expect to have a right to privacy in that intimate part of their body. Although the iris is held out to the public, the very intimate details, so much detail that the iris becomes a unique identifier, is not held out to the public because nobody can see that with the naked eye. A very powerful technology that can see more than the naked eye, even upon very close inspection, is required. Thus, such a search will likely be unconstitutional without a warrant.</p>
<div class="lrc-iframe-amazon"></div>
<h2>Do Not Consent To An Iris Scan</h2>
<p>If you agree to have your iris scanned for identification purposes, you give up any chance you had of fighting the constitutionality of a warrantless iris scan. Simply stating that you do not consent to having an iris scan taken should be sufficient.</p>
<h2>Don&#8217;t Let Them Scan Your Face Either</h2>
<p>These same devices are also capable of scanning faces for identification purposes. Preventing these scans is a bit more complicated because your face, and the ability to recognize you from your face, is most definitely held out to the public in plain view. To prevent face scanning requires knowing at what point in a police encounter the face scan is taking place. Knowing this will help you to know if you must submit or if you are free to leave.</p>
<h2>Ignore The Police: &#8220;Free To Leave&#8221; Encounters</h2>
<div class="lrc-iframe-amazon"></div>
<p>Police may stop people on the street in what is known as a &#8220;consensual&#8221; encounter for no reason at all. Police could potentially ask you for a face (or iris) scan during this &#8220;consensual&#8221; encounter. If you reasonably think you are free to leave you can ignore everything the police are saying and just walk away. (<a href="http://scholar.google.com/scholar_case?case=14806767433216666666&amp;hl=en&amp;as_sdt=2&amp;as_vis=1&amp;oi=scholarr" target="_blank">Florida v. Royer</a>; <a href="http://scholar.google.com/scholar_case?case=16978852357758067713&amp;hl=en&amp;as_sdt=2&amp;as_vis=1&amp;oi=scholarr" target="_blank">Michigan v. Chesternut</a>). If you aren&#8217;t sure, or you just want to be polite, one of the best things you can say is &#8220;am I free to leave or am I being detained?&#8221; Stopping the encounter as soon as possible before a scan of your face can be required is the best way to prevent a facial scan. If you aren&#8217;t free to go, you are being detained.</p>
<h2>Detention</h2>
<div class="lrc-iframe-amazon"></div>
<p>To detain you, the police need reasonable suspicion based on articulable facts that you are, have been, or will be committing a crime. (<a href="http://www.law.cornell.edu/supct/html/historics/USSC_CR_0392_0001_ZO.html" target="_blank">Terry v. Ohio</a>) If a reasonable person thinks that they aren&#8217;t free to go, they are being detained. (<a href="http://supreme.justia.com/us/446/544/case.html" target="_blank">United States v. Mendenhall</a>). Here is where it gets a bit tricky. Some states permit you to remain silent to questions at this point, but many require you to at least provide your name. (<a href="http://law.cornell.edu/supct/html/03-5554.ZO.html" target="_blank">Hiibel v. 6th Judicial District Court of Nevada</a>) If you are in a no name state, you may be able to refuse a facial scan. This will probably make the police pretty mad so it might not be recommended. In states where your name is required, there is probably nothing you can do.</p>
<h2>Arrest</h2>
<p>If the police then have probable cause to believe you committed a crime, they may arrest you. They will take you into the mug shot room where a long line of celebrities have taken their most memorable photos. At this point, there is nothing you can do to keep the police from putting your face in their facial recognition database.</p>
<h2>Conclusion</h2>
<p>Warrantless, unconsensual iris scans are probably unconstitutional. Face scans aren&#8217;t as inherently unconstitutional, but can still be prevented. If you are a law abiding citizen, these, and other tips from <a href="http://www.howtovanish.com/htvbookaddtocart">HowToVanish</a>, can help you protect more of your privacy from one of the worst invasions of privacy that exist, police encounters.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2011/09/bill-rounds/ignore-the-cops/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protect Your Most Private Information</title>
		<link>http://www.lewrockwell.com/2011/05/bill-rounds/protect-your-most-private-information/</link>
		<comments>http://www.lewrockwell.com/2011/05/bill-rounds/protect-your-most-private-information/#comments</comments>
		<pubDate>Mon, 30 May 2011 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds43.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Can You Be Prosecuted for Using GoldorSilver? &#8212; LibertyDollar Your home address is one of the most sensitive pieces of information you have. You don&#8217;t want uninvited visitors bothering you and your family at home. Even though lots of businesses want to get a hold of your home address for marketing purposes, there are a lot of ways to prevent revealing your home address without paying that extra $1 for your Cheerios. Using a P.O. box or other ghost address will usually cut it when you need to share your home address without disclosing where you &#8230; <a href="http://www.lewrockwell.com/2011/05/bill-rounds/protect-your-most-private-information/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds42.1.html"> Can You Be Prosecuted for Using GoldorSilver? &#8212; LibertyDollar</a></p>
<p>Your <a title="foreign drivers license" href="http://www.howtovanish.com/2011/05/foreign-drivers-license-protects-families">home address</a> is one of the most sensitive pieces of information you have. You don&#8217;t want <a title="keep your home address to yourself" href="http://www.howtovanish.com/2010/04/keep-address-private/" target="_blank">uninvited visitors</a> bothering you and your family at home. Even though lots of businesses want to get a hold of your home address for marketing purposes, there are a lot of ways to prevent revealing your home address without paying that extra $1 for your Cheerios. Using a P.O. box or other <a title="ghost address" href="http://www.runtogold.com/get-a-ghost-address/" target="_blank">ghost address</a> will usually cut it when you need to share your home address without disclosing where you and your family actually hang out.</p>
<p>One of the only times that you can&#8217;t use a ghost address is with a drivers license. A drivers license is an absolute necessity for most people and you can&#8217;t get one unless you reveal the place where you and your family lay your heads at night. Usually. There is one way to drive legally in the US without having to give away your most sensitive information. Use a foreign drivers license.</p>
<h2>Revealing Home Address Is Not Safe</h2>
<p>&#8220;But,&#8221; you say, &#8220;not just anyone can go look up DMV records.&#8221; &#8220;What is the harm,&#8221; you proclaim, &#8220;from sharing your home address with the government?&#8221;</p>
<p>Remember the geniuses you had to deal with the last time you were at the DMV? They are the ones protecting the vast amounts of information in their databases. A little bit of social engineering and, voila: data is easily compromised.</p>
<p>Plus, the<a href="http://www.idtheftcenter.org/ITRC%20Breach%20Stats%20Report%202011.pdf" target="_blank"> bigger the stash of data</a>, the bigger the target for identity thieves and hackers. DMV databases are ripe targets because they house so much important data. Yet the public is essentially forced to store their data in DMV databases and take that risk.</p>
<div class="lrc-iframe-amazon"></div>
<h2>Foreign Drivers Licenses Are Legal</h2>
<p>You can drive in any state with a valid drivers license from any other state. You can also drive with a <a href="http://dmv.ca.gov/pubs/vctop/d06/vc12502.htm" target="_blank">valid drivers license from any other country</a>. (Check Out <a href="http://dmv.ca.gov/pubs/vctop/d06/vc12502.htm" target="_blank">California Vehicle Code Section 12502 (a)(1)</a>). International drivers license certificates are not required and are really only suggested if your drivers license is from an obscure country. The other great thing about foreign drivers licenses is that you don&#8217;t have to reveal any information to the US government to get it. You might be able to find another country that requires less information, or stores less of it in vast electronic databases.</p>
<h2>Get A Foreign Drivers License</h2>
<p>Every country will have its own laws, but generally if you have permanent residence you can get a drivers license.</p>
<h2>Avoid Having To Get A Local Drivers License</h2>
<p>Here is where using a foreign drivers license can be tricky, but it is still doable. <a href="http://law.onecle.com/california/vehicle/12505.html" target="_blank">Most states make you get a license after residing there for just a few days or weeks</a>. This doesn&#8217;t apply if you are NOT a resident of the state. If you are a temporary visitor to a state and have your permanent residence somewhere else (like another country) you will not have to get a local license, thereby allowing you to drive without complying with dangerous rules. (Check out <a href="http://law.onecle.com/california/vehicle/12505.html" target="_blank">California Vehicle Code Section 12505(c)</a>).</p>
<p>People with multiple residences in multiple states have dealt with this issue often. Even though they may spend a few months out of the year at their winter home in Phoenix, a few weeks at their cabin in Montana, and the rest of the year at their permanent home in Lake Tahoe, NV, they do not need to get more than one drivers license. They get it in the place that is their permanent home. It is actually illegal to have more than one drivers license at a time. Using a foreign license is a similar concept on an international scale.</p>
<p><b>Show Permanent Residency Where You Want It</b></p>
<p>You are generally considered a resident of the place where you call home, the place where you intend to return. To demonstrate this very subjective standard, you can look at other factors to provide evidence of your permanent residence. Things like your <a href="http://law.onecle.com/california/vehicle/12505.html" target="_blank">voting registration, where your permanent home is, and several other factors</a> could demonstrate adequate residency. (Check out <a href="http://law.onecle.com/california/vehicle/12505.html" target="_blank">California Vehicle Code Section 12505(a)</a>).</p>
<div class="lrc-iframe-amazon"></div>
<h2>Avoid Residency</h2>
<p>Employees are almost always a resident of the place where they have a job. Either make sure you can work remotely, commute to the place where you work, or avoid being a regular employee. Also, avoid paying in-state tuition if you are a student, or if your kids are students.</p>
<p>There are dozens of other facts that could be used to show where your permanent residence is. <a href="http://law.onecle.com/california/vehicle/12505.html" target="_blank"> The more factors</a> that fall in the place where you wish to be a permanent resident, the better. The <a title="state income tax optimization" href="http://www.howtovanish.com/products/tax-domicile-report/" target="_blank">State Income Tax Optimization Guide</a> has a comprehensive strategy for controlling where those factors appear and where they do not.</p>
<h2>Time Is Not Critical</h2>
<p>Many people think that the amount of time you spend somewhere is critical. I often hear the phrase 6 months and 1 day. This may be true in some places, but for the most part it is just a guideline and is not determinative. It can be helpful (or hurtful) but it isn&#8217;t everything. Just because you happen to spend more than 6 months in a particular place does not mean that you are a permanent resident there. If other factors line up heavily in favor of some other location as your permanent residence, the other factors will probably control.</p>
<h2>Conclusion</h2>
<p>Most of these rules are based on the rules of California. Most other places are not as strict. So if you have a valid foreign drivers license and avoid having to get a drivers license in the state where you happen to be driving, you can protect a very <a title="pizza delivery fail" href="http://www.howtovanish.com/2010/08/pizza-delivery-fail/" target="_blank">important piece of information</a>&#8230; where your family actually lives. So go ahead and <a title="family protection plan" href="http://www.howtovanish.com/2010/03/family-protection-plan-a-personal-fourth-amendment/" target="_blank">protect your family</a> from the <a title="transactional databases" href="http://www.howtovanish.com/2009/11/transactional-databases-what-me-worry/" target="_blank">useless and dangerous requirement</a> of disclosing your <a title="address lookup" href="http://www.howtovanish.com/2011/03/address-lookup-versus-your-private-address/" target="_blank">home address</a> in order to drive by getting a foreign drivers license. For more tips on how to protect your important personal information sign up for the email list. For a comprehensive strategy to protect your privacy, check out <a title="How To Vanish Book" href="http://www.howtovanish.com/products/how-to-vanish-book/" target="_blank">How To Vanish</a> the book.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2011/05/bill-rounds/protect-your-most-private-information/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Could You Be Prosecuted for Using Gold and Silver?</title>
		<link>http://www.lewrockwell.com/2011/05/bill-rounds/could-you-be-prosecuted-for-using-gold-and-silver/</link>
		<comments>http://www.lewrockwell.com/2011/05/bill-rounds/could-you-be-prosecuted-for-using-gold-and-silver/#comments</comments>
		<pubDate>Wed, 11 May 2011 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds42.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Avoid Pretexting The Liberty Dollar case has had a huge impact on the world of gold and silver trading, investing, ownership and use. I covered a lot of ground in Part I and Part II, but there is another important aspect of that case that leaves the legal landscape partly shrouded in ominous and threatening clouds. What is the risk of criminal prosecution or criminal conviction to those who make or use gold and silver rounds of u201Coriginal designu201D? Is There A Risk Of Prosecution For Trading With Gold And Silver To answer that, we have &#8230; <a href="http://www.lewrockwell.com/2011/05/bill-rounds/could-you-be-prosecuted-for-using-gold-and-silver/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds41.1.html"> Avoid Pretexting</a></p>
<p>The <a title="Liberty Dollar Part 3" href="http://www.howtovanish.com/2011/05/liberty-dollar-part-iii/ ?" target="_blank">Liberty Dollar case</a> has had a huge impact on the world of gold and silver trading, investing, ownership and use. I covered a lot of ground in <a title="Liberty Dollar and Coin Value" href="http://www.howtovanish.com/2011/03/liberty-dollar-trial-and-coin-values/" target="_blank">Part I</a> and <a title="Prosecutor Anne Tompkins" href="http://www.howtovanish.com/2011/04/liberty-dollar-ii-prosecutor-anne-tompkins-made-false-statement-of-law/" target="_blank">Part II</a>, but there is another important aspect of that case that leaves the legal landscape partly shrouded in <a href="http://www.weather.com/" target="_blank">ominous and threatening clouds</a>. What is the risk of criminal prosecution or criminal conviction to those who make or use gold and silver rounds of u201Coriginal designu201D?</p>
<h2>Is There A Risk Of Prosecution For Trading With Gold And Silver</h2>
<p>To answer that, we have to fully understand the actual law that was broken. We also need to consider the <a href="http://www.youtube.com/watch?v=psTUiQzNoxw" target="_blank">existing law</a> that was not at issue in the Liberty Dollar case, the threats of prosecutors and the effect of potential constitutional challenges to those laws if a prosecution were undertaken.</p>
<h2>Mr. von NotHaus Violated Fraud Based Statutes</h2>
<p>The Liberty Dollar Trial was about fraud, not a private currency system as prosecutor <a href="http://www.justice.gov/usao/ncw/press/nothaus.html" target="_blank">Anne Tomkins falsely implied</a>. The jury was asked to decide if the elements of fraud and conspiracy to commit fraud were met, nothing else. No other legal basis for the prosecution was ever <a href="http://www.howtovanish.com/images/VerdictForm.pdf" target="_blank">presented to the jury</a> and implying that there was another legal basis is mis-stating the facts of the case.</p>
<h2>Critical Facts of The Case</h2>
<p>Liberty Dollar made, sold, and used <a href="http://coins.about.com/od/coinbuyingadvice/qt/libertydollars.htm" target="_blank">rounds</a> that had many similarities to official US government coinage. The rounds were minted with a face value but the FRN value of the silver in the coins was less than this face value. Liberty Dollar encouraged exchanging Liberty Dollars with people who were unaware that the underlying FRN value of the silver was less than the denomination minted on its face. Liberty Dollar profited from this difference in value.</p>
<h2>Key Elements Of Fraud</h2>
<p>To be guilty of fraud, a jury must decide that a person has met all of the elements of that crime. The <a href="http://www.howtovanish.com/images/VerdictForm.pdf" target="_blank">Jury Verdict Form</a> contains all of the elements that this particular jury decided. The critical parts are summarized here.</p>
<h2>Count 1 &#8212; Conspiracy</h2>
<p>I will not get into <a href="http://www.conspiracytheoryjesseventura.com/" target="_blank">Conspiracy</a> because it is not in controversy.</p>
<h2>Count 2 &#8212; Counterfeit Coin (18 USC 485 and 2)</h2>
<p>The core actions that Liberty Dollar must have taken to be guilty of this crime are:</p>
<ol>
<li> To make coins;</li>
<li>That resemble <a href="http://www.usmint.gov/" target="_blank">official US government issued coins</a>;</li>
<li> And use those coins;</li>
<li> With intent to defraud.</li>
</ol>
<p>It is undisputed that Liberty Dollar made and used coins. Their resemblance to official US government issued coins was a question of fact for the jury to decide. As <a href="http://www.howtovanish.com/2011/03/liberty-dollar-trial-and-coin-values/" target="_blank">described in detail previously</a>, there were plenty of facts that could lead a reasonable person to believe that Liberty Dollar rounds resembled official US coins.</p>
<p>The final necessary element was the intent to defraud. I personally don&#8217;t think <a href="http://en.wikipedia.org/wiki/Bernard_von_NotHaus" target="_blank">Mr. Von NotHaus</a> had the intent to defraud, but intent can only be inferred by surrounding facts and circumstances. Clearly there were several facts that could lead a reasonable person to believe that there was intent to defraud. For example, encouragement to make change with <a href="http://www.youtube.com/watch?v=eYGDVUb8MjA" target="_blank">people who did not know that there was a difference between the FRN</a> value of the silver in the round and the face value.</p>
<p>Notice that nothing in this count requires that the coins be of original design.</p>
<h2>Count 3 &#8212; Current Money (18 USC 486)</h2>
<p>The core elements here are:</p>
<ol>
<li> Make and use a <a href="http://www.runtogold.com/how-to-buy-gold-or-silver/" target="_blank">silver coin</a>;</li>
<li> Intended to be used as current money;</li>
<li> Resembling genuine coins of the US OR coins of original design</li>
</ol>
<p>Again it is undisputed that element 1 was met. Their resemblance to US coins has already been established. The intent can only be supposed from surrounding facts. The fact that Liberty Dollar encouraged merchants to make change with unsuspecting people could be the reasonable basis to find intent to use Liberty Dollars as current money.</p>
<p>It&#8217;s important to note the u201CORu201D in Count 3. This means that the statute is violated whether you violate one, the other, or both of these prongs. As I have laid out previously, the u201Cresembling genuine coins of the USu201D prong could easily stand on its own as having been violated. The u201Coriginal designu201D prong is unnecessary for the conviction.</p>
<p>The u201Cresembling genuine coinsu201D prong is essentially a case of <a href="http://en.wikipedia.org/wiki/Fraud" target="_blank">fraud</a>. The Liberty Dollar rounds were presented as something that they were not, to the detriment of unsuspecting individuals. It appears the jury thought the case was about fraud as well. At least one person claiming to be a juror in the case left a comment in the<a href="http://www.howtovanish.com/2011/03/liberty-dollar-trial-and-coin-values/" target="_blank"> original post</a> stating that my previous analysis correctly reflected u201Cwhat went on in court in the <a href="http://www.liberty4free.com/Liberty%20Dollar%20Trial.htm" target="_blank">Liberty Dollar Trial</a>.u201D</p>
<h2>Who Was The Victim?</h2>
<p>Many have claimed that <a href="http://www.baseballssteroidera.com/" target="_blank">there were no victims</a> because the underlying value of the silver would eventually (and in hindsight has) become more valuable than the FRN that people gave up to get Liberty Dollars. Even people who mistakenly accepted Liberty Dollars, they claim, <a href="http://www.google.com/imgres?imgurl=http://www.marketoracle.co.uk/images/2008/Silver_bull_market_18_1_08_image003.gif&amp;imgrefurl=http://www.marketoracle.co.uk/Article3421.html&amp;usg=__vt_AoQXXJQVM5Ck64pYjQjeC0bE=&amp;h=504&amp;w=720&amp;sz=133&amp;hl=en&amp;start=9&amp;zoom=1&amp;tbnid=xS90RSueZz_8yM:&amp;tbnh=123&amp;tbnw=176&amp;ei=Fv7FTeq9Iqe30gHt7_XvBw&amp;prev=/search%3Fq%3Dhistorical%2Bsilver%2Bcharts%2Bprices%26um%3D1%26hl%3Den%26sa%3DN%26biw%3D743%26bih%3D574%26tbm%3Disch0%2C500&amp;um=1&amp;itbs=1&amp;iact=hc&amp;vpx=434&amp;vpy=197&amp;dur=2466&amp;hovh=188&amp;hovw=268&amp;tx=199&amp;ty=116&amp;page=2&amp;ndsp=9&amp;ved=1t:429,r:5,s:9&amp;biw=743&amp;bih=574" target="_blank">would have actually benefited</a>.</p>
<p>This argument defies reason. The FRN price of silver changes. Sometimes it goes up and sometimes it goes down. Although <a href="http://www.runtogold.com/metal-prices/silver-price-and-silver-prices/" target="_blank">I bet money</a> that it will go up over time, it is impossible to predict the future. Nobody knows for sure if or when the price will change, how much it will change, and in which direction.</p>
<p>What must be understood is that to get someone to unknowingly accept Liberty Dollars instead of FRN is to unknowingly accept the risk that silver would appreciate in value instead of the risk that the FRN will decline in value. This is a risk unwitting acceptors of Liberty Dollars did not agree to bear.</p>
<h2><a href="http://en.wikipedia.org/wiki/Parachuting" target="_blank">Risk Has Value</a></h2>
<p>Another problem is that the person who takes the discounted Liberty Dollar could have taken their $10 FRN and bought more silver somewhere else had they been paid in FRN instead of the Liberty Dollar round. Thus if the price of silver rises, they would have been prevented from realizing gains on a larger amount of silver. Thus people who unknowingly accepted Liberty Dollars instead of FRNs unknowingly suffered real or potential losses.</p>
<h2>Tips To Avoid Prosecution For Fraud</h2>
<div class="lrc-iframe-amazon"></div>
<p>So now that it is clear that the elements of fraud were met, what can honest traders do to avoid innocently coming too close to the line of fraud, which I think Mr. Von NotHaus did. Everyone should talk to a lawyer directly for legal advice, but a general principle is to avoid anything that would give the impression of fraud to <a href="http://www.usmint.gov/pressroom/index.cfm?action=press_release&amp;id=710" target="_blank">investigators</a> and clearly include things that would help eliminate the impression of fraud. Avoid making, using or trading rounds, medallions or tokens that in any way resemble official government currency of <a href="http://familyguy.wikia.com/wiki/Petoria" target="_blank">any country</a>.</p>
<h2>Avoid:</h2>
<ul>
<li> Using the $ symbol</li>
<li>Putting the name of a country on it like u201CUSAu201D</li>
<li>Putting any word on it that appears on official currency like u201CLibertyu201D</li>
<li>Using denominations that match the same denominations used in the official government coin</li>
<li>Putting images on them that are similar to images used on official government currency</li>
<li>Offering them as change in FRN transactions</li>
</ul>
<h2>Some things that can be helpful are:</h2>
<ul>
<li>Use fictional characters, like <a href="http://www.disneydollars.net/" target="_blank">Disney Dollars</a> or <a href="http://www.ithacahours.com/" target="_blank">Ithaca Hours</a> do</li>
<li>Display the weight and fineness of the metal rather than a numbered value like $10</li>
<li>Be extremely clear when using them that they are not official US coins</li>
</ul>
<h2>Likelihood Of Prosecution</h2>
<p>There are a handful of private mints, thousands of coin dealers and millions of people that make, use and trade rounds, medallions and tokens. If they follow many of these guidelines they are probably not at risk of prosecution for fraud.</p>
<h2>Prosecution For Fraud Is Legitimate</h2>
<p>Libertarian principles allow the use of force to protect against fraud. Dr. Viera concedes, in <a href="http://www.runtogold.com/2009/07/pieces-of-eight/" target="_blank">Pieces of Eight</a> (pg. 1533) that Congress may have the Constitutional authority to legislate the u201Cresembling genuine coinu201D prong. Since it is clearly shown that people were, or there was an imminent threat of being, defrauded, prosecution under this part of the statute is likely to withstand any philosophical or constitutional challenges.</p>
<h2>Prosecution For u201COriginal Designu201D</h2>
<p><a href="http://www.howtovanish.com/2011/04/liberty-dollar-ii-prosecutor-anne-tompkins-made-false-statement-of-law/" target="_blank">Anne Tompkins</a> inferred that she intended to prosecute people under the u201Coriginal designu201D prong. She was obviously relying on dicta from a few lower court cases as the broad basis of her threat.</p>
<p><a href="http://www.lectlaw.com/def/d047.htm" target="_blank">Dicta is not the law</a>. Dicta is a statement in a court ruling that is usually made by a judge in passing with little to no research or analysis. At best she can hope that dicta maybe, possibly, someday becomes the law. Thus she is threatening to fly us head on into the <a href="http://en.wikipedia.org/wiki/Bermuda_Triangle" target="_blank">brooding storm clouds</a> of untested areas of law.</p>
<h2>What This Threat Of Prosecution Means To Honest People</h2>
<p>There are real implications to this kind of threat. First of all is the cost of legal defense. Even a person who is ultimately found innocent will probably incur legal costs in the tens of thousands of dollars. If there are constitutional challenges, which might require multiple appeals, the cost could easily rise to the hundreds of thousands.</p>
<h2>Overzealous Prosecutors Regularly Disregard The Intent Behind A Law (To Punish Real Criminals) And Target Anyone Who Accidentally Crosses The Line</h2>
<p>While most people find prosecution of people with innocent intent deplorable, <a href="http://www.howtovanish.com/2011/04/liberty-dollar-ii-prosecutor-anne-tompkins-made-false-statement-of-law/" target="_blank">overzealous prosecutors</a> have been known to disregard the reason for a law and use their discretion to prosecute anyone who violates the letter of the law, even if the defendant&#8217;s intent and actions are otherwise completely innocent.</p>
<p>A good example of that is the <a href="http://www.howtovanish.com/2009/10/the-sweet-sound-of-cash/" target="_blank">prosecution of an Ohio woman</a> under anti-drug laws for buying 2 packages of cold medicine in 1 week, one for two separate members of her family who were ill. The uphill evidentiary battle that defendants face makes it easy for prosecutors to convince juries that a defendant should be convicted in these kinds of cases.</p>
<h2>If That Were The Law It Would Be Completely Unworkable</h2>
<p>If this dicta were adopted as law, cautious people would have to avoid making or using anything that could potentially be used to barter because such an item could conceivably be used to compete with official government issued currency. That could include millions of rounds, commemorative medallions, or tokens. That is obviously a ridiculous outcome.</p>
<p>There are a few cases where clearly marked tokens such as <a href="http://www.chuckecheese.com/" target="_blank">Chuck E. Cheese</a> tokens or batting cage tokens are outside of the purview of the u201Coriginal designu201D prong. Hence prosecution of those special purpose tokens is very unlikely.</p>
<p>A case centered around the u201Coriginal designu201D prong would not be about fraud at all. It would be about the right of people to use whatever medium of exchange they choose. Preventing private parties from trading what they want in such a manner is complete tyranny. In Argentina and other places around the world, the people <a href="http://www.theworld.org/2011/01/why-argentines-invest-in-cars/" target="_blank">purchase vehicles as a hedge against inflation</a>. Under Anne Tomkins&#8217; erroneous definition of the law, vehicles would be illegal because they compete with the national currency. Another ridiculous outcome.</p>
<h2>18 USC 486 Is Probably Unconstitutional</h2>
<p>The arguments supporting the unconstitutionality of the u201Coriginal designu201D language are quite strong.</p>
<p>Art. I Section 8, clause 5 of the <a href="http://www.usconstitution.net/const.html" target="_blank">US Constitution</a> states in part:</p>
<p style="padding-left: 30px">u201CThe Congress shall have Power To&#8230; coin Money, regulate the Value thereof, and of foreign Coin.u201D On its face this gives the Congress the power to regulate the value of its own coinage, and that of foreign coins. There is absolutely no mention of the ability of Congress to do anything regarding private coinage.u201D</p>
<p><a href="http://www.usconstitution.net/const.html" target="_blank">Clause 6</a> continues stating:</p>
<p style="padding-left: 30px">[Congress shall have power to...] u201Cprovide for the Punishment of counterfeiting the&#8230; current Coin of the United States.u201D This clearly gives Congress the power to punish counterfeiting the coins that they themselves produce, and probably to punish coins resembling genuine US coins. Again, there is absolutely no mention of private coinage. In fact, the definition of private coinage is that it is not the current coin of the US. Therefore Congress has no authority over private coinage at all and neither does any other branch.</p>
<p>The <a href="http://www.usconstitution.net/const.html" target="_blank">Ninth Amendmen</a>t to the US Constitution states</p>
<p style="padding-left: 30px">u201CThe enumeration in the Constitution of certain rights shall not be construed to deny or disparage others retained by the people.u201D</p>
<div class="lrc-iframe-amazon"></div>
<p>The <a href="http://www.usconstitution.net/const.html" target="_blank">Tenth Amendment</a>:</p>
<p style="padding-left: 30px">u201CThe powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.u201D</p>
<p>Since no Congressional power over private coinage is delegated, or even implied, nor is that power reserved to another branch of government, private coinage must be a power and right reserved to the states or the people under the 9th and/or 10th Amendments.</p>
<p>There are many, many, many, many, many, many examples of private coinage used throughout the US, under these same Constitutional provisions, for centuries. See <a href="http://www.howtovanish.com/GovtDoneToMoney" target="_blank">What Has Government Done To Our Money</a> by<a href="http://en.wikipedia.org/wiki/Murray_Rothbard" target="_blank"> Murray Rothbard</a> for a full discussion and historical examples.</p>
<h2>What Is So Unconstitutional About 18 USC 486?</h2>
<p>18 USC 486 states:</p>
<p>Whoever, except as authorized by law, makes or utters or passes, or attempts to utter or pass, any coins of gold or silver or other metal, or alloys of metals, intended for use as current money, whether in the resemblance of coins of the United States or of foreign countries, or of original design, shall be fined under this title or imprisoned not more than five years, or both. (emphasis added)</p>
<p>The constitutionality of the u201Coriginal designu201D clause is clearly eviscerated by Dr. Viera in Pieces of Eight pg. 1533 (criticizing 18 USC 486):</p>
<p style="padding-left: 30px">u201CThis prohibition [on private coinage] is plainly not grounded in Congress&#8217;s power u201CTo provide for the punishment of counterfeiting the current coin of the Unites Statesu201D because a person&#8230; who makes&#8230; coins&#8230; of original design is not doing anything with relation to the u201Ccurrent coin of the United Statesu201D by definition.u201D</p>
<p>The power to regulate coins of original design is clearly not within Article I Section 8 clauses 5 or 6. It is thus a clear violation of the Ninth and Tenth Amendments to the US Constitution.</p>
<p>Dicta that claim legitimacy of this language shows that judges have clearly failed to consult legislative history, constitutional authority, American history, or case law dealing with it. Thorough research and analysis would likely reveal the error in these statements of unauthoritative opinion.</p>
<h2>The Outcome Of A Constitutional Challenge Is Unknown</h2>
<p>Unfortunately, the current state of monetary law in the United States is nonsensical so it&#8217;s tough to know how persuasive these constitutional arguments would be to an <a href="http://www.youtube.com/user/howtovanish?blend=7&amp;ob=5" target="_blank">uneducated judiciary</a>. Thus a constitutional challenge is not guaranteed to have the logical outcome of invalidating the offensive language of the statute.</p>
<h2>Someone Else Must Be Convicted Before A Constitutional Challenge Can Be Made</h2>
<p>Without getting into some very intricate rules on u201Credressability,u201D it is doubtful that anyone could even challenge the clearly unconstitutional parts of 18 USC 486 until someone is convicted under the relevant part of that section. That is because a person can&#8217;t appeal a decision unless the outcome would change if they win the appeal. (<a href="http://scholar.google.com/scholar_case?case=5272142302925951593&amp;hl=en&amp;as_sdt=2&amp;as_vis=1&amp;oi=scholarr" target="_blank">Allen v. Wright, 468 U.S. 737 (1984)</a>).</p>
<p>Here, Mr. von NotHaus was convicted. His conviction would stand under the fraud prong of the statute alone and does not need the u201Coriginal designu201D prong. Even if the u201Coriginal designu201D language was declared unconstitutional on appeal, it wouldn&#8217;t change the outcome for him. Therefore he is unlikely to be able to challenge its constitutionality.</p>
<h2>Another Legal Guinea Pig Is Needed</h2>
<p>To challenge the constitutionality of the u201Coriginal designu201D prong, another individual will have to be convicted. This time, their conviction must clearly be under the u201Coriginal designu201D prong and not at all under the resemblance prong. This means that the constitutionality of this law will probably remain unresolved for many years.</p>
<h2>Practicality of Enforcement</h2>
<div class="lrc-iframe-amazon"></div>
<p>When innocent people might be wrongly prosecuted because it looks like they are committing a crime when in fact they aren&#8217;t, they must determine how likely it would be for them to be prosecuted for their innocent behavior. Part of this calculation is determining how likely it is that they would be prosecuted based on the practicality of enforcing the law that could mistakenly be used against them.</p>
<h2>Private Mints</h2>
<p>A mint, the company actually making rounds, medallions and tokens, is at the most risk of prosecution. Their operation is probably fairly large, easy to find and hard to move.</p>
<p>Fortunately that risk is still very low, even after the von NotHaus conviction. The <a href="http://www.sunshinemint.com/" target="_blank">Sunshine Mint </a>that produced the Liberty Dollars was not a defendant in the case and there have been no prosecutions of the many other private mints throughout the country. Thus prosecution of private minters under the original design prong is unlikely.</p>
<h2>Individuals</h2>
<p>It would be very difficult and expensive to prosecute individuals for using rounds medallions and tokens in private transactions. It would be incredibly difficult to detect and investigate. Unless people feel they have been defrauded upon accepting them, there is unlikely to be any investigation of individuals for using metal to pay for goods and services.</p>
<p>This is important for the millions of innocent people who will be trading things that are not illegal because they should know the risk of erroneous prosecution. It is extremely low because of these difficulties in detection and investigation of the transactions.</p>
<h2>Risk Of Prosecution For Fraud</h2>
<p>There are millions of rounds, medallions or tokens existing in the US that follow the guidelines mentioned earlier. To prosecute every maker, holder or user of them would be completely outrageous. It would also be practically impossible to prosecute everyone because it is impossible to monitor that many private transactions effectively, even with dictatorial control. Therefore, someone making or bartering with gold or silver who is following these guidelines has very little risk of mistaken prosecution for fraud.</p>
<h2>Conclusion</h2>
<p>Barter with metal has not been ruled by a court of law to be illegal. Barter is constitutional, whether it is for chickens, potatoes, FRN, gold or silver rounds or anything else you want. There is a cloud over the issue of bartering with gold or silver rounds, medallions or tokens because of the generalized and remote possibility of being prosecuted if you do. Bartering with metal is so common and widespread it would insanely expensive to systematically investigate and impractical to enforce such a policy. Thus, the threat is not nearly as great as the threat posed to Liberty Dollar. Plus, the u201Coriginal designu201D language that smacks of dictatorial control is likely to be overturned because it is probably unconstitutional. For more ways to protect your right to private exchange of goods and prevent being mistakenly prosecuted, get the book <a href="http://www.howtovanish.com/products/how-to-vanish-book/" target="_blank">How To Vanish</a> and sign up for the email list.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2011/05/bill-rounds/could-you-be-prosecuted-for-using-gold-and-silver/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Put Another Lock on Your Information Door</title>
		<link>http://www.lewrockwell.com/2011/05/bill-rounds/put-another-lock-on-your-information-door/</link>
		<comments>http://www.lewrockwell.com/2011/05/bill-rounds/put-another-lock-on-your-information-door/#comments</comments>
		<pubDate>Mon, 09 May 2011 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds41.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: How Independent Contractors Make More Money for Everyone Pretexting has nothing to do with your preparations before sending a text message to a friend, although sometimes I wish people would do that. Pretexting is the practice of pretending to be someone else in order to get private personal information about you. The most famous case of pretexting occurred a few years ago when the Hewlett-Packard Chairman hired a firm to investigate HP&#8217;s own directors. The firm used pretexting techniques to do the investigation. Essentially they pretended to be the directors to get access to their phone &#8230; <a href="http://www.lewrockwell.com/2011/05/bill-rounds/put-another-lock-on-your-information-door/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds40.1.html"> How Independent Contractors Make More Money for Everyone</a></p>
<p>Pretexting has nothing to do with your preparations before sending a text message to a friend, although sometimes I wish people would do that. Pretexting is the practice of pretending to be someone else in order to get private personal information about you. The most famous case of pretexting occurred a few years ago when the Hewlett-Packard Chairman hired a firm to investigate HP&#8217;s own directors. The firm used pretexting techniques to do the investigation. Essentially they pretended to be the directors to get access to their phone records. The HP scandal that ensued cost some people their reputation. Your reputation is probably not at risk but your bank account may be.</p>
<p><b>Who Pretexts and How Is Pretexting Done</b></p>
<p>A child may ask their parents the date of their anniversary because they think it might be the code to unlock the laptop computer. An identity thief might call your bank pretending to have lost their checkbook and so need the <a href="http://www.howtovanish.com/bankprivacyreport1">bank account information</a>. Both of these are examples of pretexting. Popular tactics include calling you pretending to be taking a survey or pretending to be your bank or a government institution and then asking for detailed personal information. They then either sell this information or use this information and call your bank or other company pretending to be you because they now have all the public information on you and the private answers you just supplied to them as tools to get past any identification requirements.</p>
<div class="lrc-iframe-amazon"></div>
<p><b>How to Avoid Pretexting</b></p>
<p><a href="http://www.howtovanish.com/LegalServices">Pretexting is illegal</a>, just like home robbery. Even though both are illegal, we cannot rely only on the law alone to protect us from these evils. To protect from robbery we have locks on our doors. Even people who don&#8217;t use locks on their door at night still have them in case there is a threat of robbery. So we must put the <a href="http://www.howtovanish.com/2009/08/personal-information-protection/">lock on our information door</a> and know when and how to use it. There are two things that, if done together, will be the most effective methods to avoid pretexting.</p>
<div class="lrc-iframe-amazon"></div>
<p><b>First</b>, do not use passwords or password backup questions that are public or well known information, like your mother&#8217;s maiden name. You might want to use something like the name of your first pet or the first name of your best friend in fourth grade.</p>
<p><b>Second</b>, never give out private information over the phone or internet unless you initiated the contact. Be very suspicious of anyone asking for information if you do not know them personally, and even then, make sure it is them you are talking to. Other measures include being mindful of your account statements and billing cycles as well as getting a regular updated credit report and looking for irregularities. Get a good <a href="http://www.howtovanish.com/papershredderbook">paper shredder</a> and shred all documents that contain personal information before you throw them away.</p>
<p><b>Third</b>, share the importance of privacy and protecting personal information with friends, family or your <a href="http://www.howtovanish.com/2009/09/modern-hawala/">hawaladar</a>. The more privacy the people surrounding you have, the more privacy you will have. You can email them this and other articles or simply talk to them about good privacy habits.</p>
<p><b>Conclusion</b></p>
<p>Pretexting is a threat to anyone in any position, just ask the directors of HP. Take appropriate measures to avoid being an easy target for pretexting which can be found in the book <a href="http://www.howtovanish.com/HTVBook">How To Vanish</a>.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2011/05/bill-rounds/put-another-lock-on-your-information-door/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>More Money and More Privacy for Everyone</title>
		<link>http://www.lewrockwell.com/2011/04/bill-rounds/more-money-and-more-privacy-for-everyone/</link>
		<comments>http://www.lewrockwell.com/2011/04/bill-rounds/more-money-and-more-privacy-for-everyone/#comments</comments>
		<pubDate>Thu, 28 Apr 2011 05:00:00 +0000</pubDate>
		<dc:creator>Bill Rounds</dc:creator>
		
		<guid isPermaLink="false">http://www.lewrockwell.com/rounds/rounds40.1.html</guid>
		<description><![CDATA[Recently by Bill Rounds: Protect Passwords With KeePass Money is one of the biggest ways that we lose privacy. We must report our income and where it comes from for tax purposes. Our banking records are monitored and our identities vigorously identified. Employees and employers must reveal vast amounts of information to state and federal labor regulators and tax collectors. Whenever information is disclosed, even if it is to bureaucrats, there is a huge risk of abuse, accidental disclosure and fraud. Plus, the employee-employer relationship has become a cash cow for governments. Employees and employers are low hanging fruit for &#8230; <a href="http://www.lewrockwell.com/2011/04/bill-rounds/more-money-and-more-privacy-for-everyone/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Recently by Bill Rounds: <a href="http://archive.lewrockwell.com/rounds/rounds38.1.html"> Protect Passwords With KeePass</a></p>
<p><a title="hawala transaction" href="http://www.howtovanish.com/2009/09/modern-hawala/" target="_blank">Money</a> is one of the biggest ways that we lose privacy. We must report our income and where it comes from for tax purposes. Our <a title="3 better privacy secrets" href="http://www.howtovanish.com/2010/11/3-better-privacy-secrets-banks-dont-want-you-to-know/" target="_blank">banking records are monitored</a> and our identities vigorously identified. <a title="Independent Contractors" href="http://www.howtovanish.com/2011/04/how-independent-contractors-make-more-money-for-everyone" target="_blank">Employees and employers</a> must reveal vast amounts of information to state and federal labor regulators and tax collectors.</p>
<p>Whenever information is disclosed, even if it is to bureaucrats, there is a huge risk of abuse, <a title="remove personal informatino from the internet" href="http://www.howtovanish.com/2011/02/remove-personal-information-from-the-internet/" target="_blank">accidental disclosure</a> and <a title="fraudulent identification documents" href="http://www.howtovanish.com/2009/06/fraudulent-identification-documents/" target="_blank">fraud</a>. Plus, the employee-employer relationship has become a cash cow for governments. Employees and employers are low hanging fruit for taxes, fees and regulations because they are <a title="transactional databases" href="http://www.howtovanish.com/?s=transactional+databases" target="_blank">easy to monitor</a>, record, control and collect from. Both employers and employees must share a piece of their economic pie with state and federal government officials, increasing the costs to businesses and lowering the benefit received by employees. Governments impose these costs and regulations to take care of employees and employers, whether they want to be taken care of or not.</p>
<p>There is a way for both workers and businesses to free themselves of many of these burdens, reduce costs, keep more money and <a title="sue tsa agent" href="http://www.howtovanish.com/2010/12/do-you-need-to-sue-a-tsa-agent/" target="_blank">protect their privacy</a>. Becoming an independent contractor instead of being an employee, or hiring independent contractors instead of employees, does all of that and reduces the amount of regulation that must be complied with, reduces legal risks, and can reduce taxes for both. This means there are more resources to share between workers and firms.</p>
<h2>Employees Suffer</h2>
<p>Even though most of government regulation claims to protect employees, it has had the opposite effect. The marketplace changes much faster than government regulation. Government regulation is designed for a business world that existed 50 years ago. There is no way that regulation by a slow moving, democratic government that has to make weekend deals just to keep from being shut down can keep pace with a 21st century information age economy.</p>
<p>Healthcare has been designed around a system where employees work at the same company for most of their life. Today, the average worker will change jobs many times in their lifetime. Minimum wage and overtime pay was formulated when there was no competition from overseas labor. Even the way that companies account for and fund their benefits and <a href="http://www.economist.com/node/11529345" target="_blank">pensions </a>makes them extremely expensive for employees with diminishing value. One of the worst parts of all is that employees have little control over the taxes they pay.</p>
<h2>Employees Have Little Control Over Their Own Life</h2>
<div class="lrc-iframe-amazon"></div>
<p>There is no doubt that some of these protections benefited employees overall at one time. Some may even be helpful today. But an employee has no choice whether they want to participate in these systems, even if they could get the same benefits elsewhere for less. Employees have no control over their economic life.</p>
<p>Control over your own economic life is valuable, not only in terms of mental health and a feeling of self worth and independence, but also economically. Something as simple as being able to control more of the taxes you pay can have a dramatic impact on your financial well being.</p>
<h2>How A Worker Can Pay $0 In Federal Income Taxes</h2>
<p>The <a href="http://online.wsj.com/article/SB10001424052748704530204576235090332473366.html" target="_blank">Wall Street Journal recently did a case study</a> showing how an independent contractor can earn $150,000 in gross earnings in a year, take a few very common tax deductions, and have a federal income tax liability of $0.</p>
<p>Here&#8217;s how it breaks down:</p>
<p>$150,000 income as a self employed independent contractor.</p>
<p>&nbsp;&nbsp;&#8211;$7,000 business start up expenses ($10,00 max first year, $5,000 in subsequent years)</p>
<p>&nbsp;&nbsp;&#8211;$10,000 legitimate business expenses</p>
<p>&nbsp;&nbsp;&#8211;$9,500 Medicare and Social Security tax (half of $19,000 paid)</p>
<p>&nbsp;&nbsp;&#8211;$43,100 401k contribution (you deduct both employee and employer portion)</p>
<p>&nbsp;&nbsp;&#8211;$10,000 IRA contribution ($5,00 for you, $5,000 for a spouse)</p>
<p>&nbsp;&nbsp;&#8211;$10,000 state and local taxes (estimated)</p>
<p>&nbsp;&nbsp;&#8211;$10,000 mortgage interest</p>
<p>&nbsp;&nbsp;&#8211;$10,000 health insurance premiums</p>
<p>&nbsp;&nbsp;&#8211;$6,150 Health Savings account</p>
<p>&nbsp;&nbsp;&#8211;$2,500 interest on student loan</p>
<p>&nbsp;&nbsp;&#8211;$4,000 kid&#8217;s college tuition</p>
<p>&nbsp;&nbsp;&#8211;$1,500 tax credits (buy hybrid vehicle, install solar panels, etc.)</p>
<p>&nbsp;&nbsp;&#8211;$200 Lifetime Earning Credits (community college class)</p>
<p>= tax liability of $0 on $150,000 income.</p>
<h2>Independent Contractors Pay Less Taxes Than Employees</h2>
<p>This entire strategy is premised on a very important issue. To take advantage of these <a href="http://www.howtovanish.com/completetax">huge tax benefits</a> you cannot be a regular employee. You can take advantage of every one of these <a href="http://www.howtovanish.com/ContractorTaxDeductions">tax benefits</a> as an independent contractor. A regular employee would pay taxes on close to the full amount of that $150,000 of income.</p>
<h2>Employers Pay Extremely High Labor Costs</h2>
<div class="lrc-iframe-amazon"></div>
<p>Employees cost their employers a lot more than their hourly wage. Unemployment tax, ERISA, and Medicare costs alone are 15% of the total salary paid to employees. Employers also pay an average of <a href="http://www.reuters.com/article/2010/09/27/us-usa-healthcare-costs-idUSTRE68Q3N520100927" target="_blank">$7,500 per employee</a> in health insurance every year, something required when the firm has 50 or more employees.</p>
<h2>High Administrative Costs And Risks For Employers</h2>
<p>On top of these direct costs, there are numerous other regulations that must be complied with, even if it does not make economic sense. Employers are required to give family leave under certain circumstances, have detailed <a href="http://www.employmentlawwatch.com/2009/01/articles/employment-us/discrimination-1/president-obama-signs-ledbetter-fair-pay-act-placing-new-burdens-on-employers/" target="_blank">record keeping requirements</a>, and many other things that raise the cost of having employees and decrease profitability, without actually paying workers more.</p>
<p>Employers are also exposed to lots of litigation risk. Whether it is an employee discrimination suit, failing to comply with regulation, harassment, overtime, even a conscientious employer can find themselves in an expensive, often frivolous, lawsuit. A lot of these costs and regulations are preventing businesses from hiring employees.</p>
<h2>Independent Contractors Reduce Labor Costs And Increase Productivity</h2>
<p>Businesses can still get the work done that they need to get done without incurring these huge costs by hiring independent contractors instead of employees. Independent contractors are also easier to train, more productive and provide a lot of flexibility in changing economic times.</p>
<p><b>IRS Scrutiny</b></p>
<p>These economic benefits have attracted a lot of workers and firms to try independent contractors instead of employees, but beware. The IRS and the Department of Labor have <a href="http://www.abajournal.com/magazine/article/irs_gets_class_conscious_switching_to_independent_contractors_draws_scrutin/" target="_blank">begun cracking down</a> on those who do it wrong. Doing it wrong could mean having to pay back taxes and interest owed, or even paying penalties or overtime.</p>
<h2>Follow The IRS 20 Factor Test</h2>
<p>There is a way to do it right. The IRS has a <a href="http://www.medlawplus.com/legalforms/instruct/revrul87-41.htm" target="_blank">20 factor test</a> that they use to determine if the worker is an employee or an independent contractor. This list is very fact specific and the weight given to every factor will depend on what other factors may reveal.</p>
<h2>Independent Contractor Should Control Their Own Work</h2>
<div class="lrc-iframe-amazon"></div>
<p>One of the most important things to consider is the amount of control that the firm has over the worker. An independent contractor will have control over their schedule and how they perform the work. The firm will control what they want the outcome or finished product to be. Suggestions are permitted but they must be suggestions. This is becoming much easier with the ability to work remotely over the internet.</p>
<h2>Independent Contractor Can Do Work For Others At The Same Time</h2>
<p>Another important factor is that the independent contractor is free to do work for others as well. This can be a critical factor that the IRS or Department of Labor look at. It is much better if the independent contractor is doing jobs for other clients, or at least advertising in places like Craigslist for other clients.</p>
<h2>Independent Contracting Is A Win-Win</h2>
<p>Independent contractors allow workers and firms to share more money between themselves. The government is entitled to much less of the money that flows from firms to independent contractors than employers and employees. Businesses become more profitable, individuals keep more money and everyone increases their privacy. Independent contractors can also have more control over their <a title="tax domicile" href="http://www.howtovanish.com/products/tax-domicile-report/" target="_blank">tax domicile</a>, a more advanced but much more powerful tax saving strategy.</p>
<h2>Conclusion</h2>
<p>This is only scratching the surface of how to properly take advantage of this powerful strategy. <a title="secrets of independent contractors" href="http://www.howtovanish.com/products/secrets-of-independent-contractors/" target="_blank">Secrets of Independent Contractors, from HowToVanish.com</a> is a simple and complete guide to help businesses and workers properly structure their relationship so they can take advantage of the huge tax savings.</p>
<p>Reprinted with permission from <a href="http://www.howtovanish.com">How to Vanish.</a></p>
<p>Bill Rounds, J.D. is a California attorney. He holds a degree in Accounting from the University of Utah and a law degree from <a href="http://www.cwsl.edu/">California Western School of Law</a>. He practices civil litigation, domestic and foreign business entity formation and transactions, criminal defense and privacy law. He is a strong advocate of personal and financial freedom and civil liberties.</p>
<p><a href="http://archive.lewrockwell.com/rounds/rounds-arch.html"><b>The Best of Bill Rounds</b></a></p>
]]></content:encoded>
			<wfw:commentRss>http://www.lewrockwell.com/2011/04/bill-rounds/more-money-and-more-privacy-for-everyone/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Page Caching using apc
Database Caching 173/213 queries in 0.732 seconds using apc
Object Caching 2279/2736 objects using apc

 Served from: www.lewrockwell.com @ 2013-10-16 14:01:09 by W3 Total Cache --