- HELP BANKRUPT
AND EXTERMINATE CORRUPT, SPYING, CONSUMER-ABUSING, T-MOBILE -
Produced by volunteers from FAIRSHAKE,
ACLU, Stanford University Journalism Department, EFF, CITIZEN CONNECT,
ICIJ.ORG, TRANSPARENCY INTERNATIONAL
Take Responsibility For
Your Actions T-Mobile, Or The Public Will Take Your
Company Away
LOOK AT THE
MASSIVE NUMBER OF HARMS, LISTED BELOW, THAT T-MOBILE HAS NEGLIGENTLY
ENGAGED IN AGAINST CONSUMERS.
YOU CAN SUE
T-MOBILE, FILE ARBITRATION ACTIONS AGAINST THEM, PARTICIPATE IN NEWS
REPORTS ABOUT THEM, STAND IN FRONT OF CONGRESS WITH POSTERS DEMANDING
THE CLOSURE OF T-MOBILE.
T-MOBILE
WHISTLE-BLOWERS & CONSUMERS: YOU CAN RECEIVE CASH AWARDS
FOR REPORTING T-MOBILE CRIMES AND ABUSES TO CLASS-ACTION LAW FIRMS,
FEDERAL AGENCIES AND 60 MINUTES-TYPE NEWS OUTLETS!
If we acknowledge that the
traditional contact between workers and companies has broken , we can
begin to free ourselves from the simultaneous demand for more (from us)
and the promise of...
It s a lot to get someone’s
business shut . You have to have a viable reason. Report to the Better
Business Bureau and the State Agencies for your state (look on line or in
the telephone book blue pages) If you don’t know what else to do, call
your city business offices where licensing is done for businesses for
complaints for starters. 10
The most important advice
the organisation gives is to try to discover who else shares your concerns
and is prepared to speak up. This seems right. There are less
confrontational ways of...
The Federal Trade
Commission enforces laws associated with business practices. If you feel a
has done something illegal, you can file an FTC report online at
These are your T-Mobile Anti-Corruption: 101 lessons.
After reading and practicing what you learn in this book, you can move on
to advanced lessons with the books and organizations listed at the end of
this document. We will teach you how to hunt down and destroy any dirty
politician or corrupt corporation like T-Mobile without breaking a single
law. As long as they have engaged in crimes and illicit unethical
activities they are "fair game" and law enforcement will even help you
bring your targets down.
You have only one rule: Don't break the law.
T-Mobile is a big dumb corrupt entity who is slow, cumbersome and running
for cover. Even if they have trillions of dollars to spend against you,
they will never have your speed, creativity, motivation, the millions of
consumers and voters who support your mission backing you up and the good
guys in actual law enforcement. You can take down the largest corporation
on Earth, the biggest politician in the world or the most powerful covert
cartel ever created. You just need persistence and dedication. If they did
the crime, they can always be brought down. The corrupt can't
counter-measure two distinct weapons of justice:
1.) Transparency and 2.) The Unexpected.
This WIKI class will teach you how to terminate corrupt T-Mobile
officials, from the comfort of your living room, using those two,
aforementioned, resources and a bit of patient work on your personal
computer. The following techniques usually only work on entities who are
actually engaged in illicit corrupt activities. If you don't like someones
face, or are jealous of their girlfriend, these tactics are unlikely to
work. If the target is an actual crook, you can ALWAYS eventually nail
them.
These links, articles and DIY “how to” tips will get you, and your
community, well on the way to the documentation, case building and
termination of those who abuse the public. You are going to “take down”
the corrupt politicians and the sneaky campaign financing billionaires
hiding behind them and pulling their strings. On Wall Street and in
Silicon Valley, groups of billionaires huddle together and create
“bubble’s of corruption and self-deluding echo chambers of rationalization
in order to convince each other that the crimes they commit are “for the
greater good” of their fraternity house ego-manias.. They drink their own
Kool Aid. You will use the “Three D's”: You will Discover, Document and
Disclose to publicly expose: Secret PAC cash trails; covert family trusts;
secret shell companies; stock market payola; hiding of cash with friends
and family members; prostitutes; illegal expense use; revolving door
bribes; junket and sports ticket bribes; illicit hirings; rigged-game
grants and government kick-back contracts; and much, much more…
You will create a “non-survivable scenario” for T-Mobile, all without
breaking a single law, and WITH the help from journalists and law
enforcement professionals. Everyday, something wild shows up in the news
that nobody expected. Bad guys create some of the news, by rigging
circumstances, but at least 50% of the events that suddenly appear each
day are as big a surprise to them as they are to you. You will learn how
to be prepared to react within 2 minutes of a major news item. You will
learn how to use an event that momentarily disrupts the corrupt to your
advantage. The corrupt have an addicted need to control things. They are
always flummoxed when things get “out of their control”. In every city,
state and federal agency there are three groups of people. You must be
aware of this for your work with the law enforcement people who will be
helping you. There are the Good Guys (the dedicated Elliot Ness-types who
became cops in order to shut down crooks), the Bad Ones (The corrupt
opportunists who are just as dirty as the corrupt politicians you are
hunting) and the Worker Bees (these folks punch the clock and are just
there to get the paycheck). The Worker Bee types will generally default to
help The Good Guys because they don’t like anything that messes up routine
or that could get their Department investigated. The odds are in your
favor but you must carefully seek out the “Good Guys” in any given law
enforcement group. You only need a couple Good Guy cop types to do their
job to help run a complete take-down on any corrupt entity of any size. In
actuality, as your back-up plan, you do not even need any law enforcement
to assist you in preparing your case. You will learn, with this book and
the links in this book, how to prepare a complete case file and deliver it
to the public, the global media, public interest law organizations and
every law enforcement agencies so that they can easily complete the
prosecution. By helping all of these over-worked, yet appreciative, groups
you can get karma brownie points, ethical satisfaction and, sometimes,
CASH REWARDS. While you are doing all of the strategic investigation, you
will also have a number of scenario packages ready for the unexpected
event that will, eventually, occur, that you can instantly react to,
piggy-back on to and use to flood the media with your disclosures, or put
the target in an inextricable position. You will learn how to build your
case file, assemble a virtual team, produce your evidence and deliver it
globally to everyone who might have an interest. Here is the best part;
you will be able to do a take-down entirely by yourself using the
information in this book...BUT: You are not alone! There
are probably thousands, or millions, of other people who have also found
that the target is a corrupt and evil entity. They will help you reach
your goal. Once you get started, you will find that your team can rapidly
grow and become as big and as powerful, in different ways, as the bad guy
target themselves. You will find reporters, investigators, public service
groups, ex-employees, and voters who will be delighted to assist you. You
will always be watching for "Moles" who are fake helpers placed in front
of you by your target in order to distract, delay and surveill you. You
will conduct your whole investigation as an independent but you will share
everything with the public so that you bypass the Moles and get the
support out there for anybody else who is working on the same goal. Ready?
Set? Go!
PREVIOUS TARGETS TERMINATED BY OUR P2P FORENSICS PROGRAMS:
BILL COSBY, FOREX, SOLYNDRA, ABOUND SOLAR, A123, ENERDEL, AMY PASCAL,
E.F.HUTTON, RADIO SHACK, ENRON, MCI WORLDCOM, EASTERN AIRLINES, STANDARD
OIL, ERIC HOLDER, STEVEN CHU, ARTHUR ANDERSON, DELOREAN, PETS.COM, BEAR
STEARNS, BEATRICE FOODS, HEALTHSOUTH, ALLEN STANFORD, TYCO, LANCE
ARMSTRONG, PARMALAT, BANINTER, HSBC, GLOBAL CROSSING LTD., BLACKBERRY,
HIH INSURANCE, IMCLONE, DEUTSCHE BANK (SPY CASE), URBAN BANK, JEROME
KERVIEL, BARCLAYS BANK, BRE-X, FISKER, BARINGS BANK, PATRICIA DUNN,
SIEMENS AG, PETROBAS, FERNANDO MARCOS, KELLOG BROWN AND ROOT, BAE
SYSTEMS, KERRY KHAN, ALCATEL-LUCENT SA, PRESIDENT, RICHARD NIXON...and
many, many more.
You will expose the dirty and illicit deeds of the target using the same
technologies, tactics and methods used by the FBI, CIA, FSB and other
high-end operators. All of these actions are 100% legal if you use them
in proper legal fashion.
You will:
- Expose their Hookers in widely released news and social media releases
- Expose their Rent Boys in widely released news and social media
releases
- Expose all of the bad dates and sex extortion they engaged in, in
widely released news and social
media releases
- Expose their hidden family trust fund payola accounts, in widely
released news and social media
releases
- Expose their shell corporations they use to hide from the IRS
- Expose their mistresses
- Expose their addictions
- Expose their under-the-table payments
- Expose their illegal workers
- Expose their expensive cars, jewelry and homes that can't afford on a
legal salary
- Expose their Cayman Island, Belize and Swiss hidden bank accounts
- Expose their personal email accounts they illegally used to hide
government fraud
- Expose their illicit hidden email servers
- Expose their secret black-lists and start-up valuation rigging like in
the Angel Gate Scandal- Expose their Uber and Lyft GPS docs proving that
they lied about where they went
- Expose their campaign financing records
- Expose their social media statements proving they are, or fund, ANTIFA
or political disruption
programs
- Expose their money laundering
- Expose their connections to Pede groups and activities
- Expose their hotel records and videos of illicit hotel meetings
- Expose their PayPal, Bitcoin and credit card payments for illicit
services and products
- Distribute creative Memes exposing their crimes
- File reports with their employers disclosing their crimes and tell the
media you told their employers
- File many copies of criminal reports on them with all law enforcement
entities
- Expose the members of their family that hide money for them or use
their names to launder money
- Photo and video document all of their meetings and actions
- Aggregate all of the video investigations about them on many different
web video sites
- Write and distribute books, articles and white-papers about their
crimes
- Promote new laws that makes what that criminal uses as a loop-hole,
illegal
- Re-release all of the above every six months in order to keep the
crimes in people's minds
- Use "The Striesand Effect" to it's maximum technical potential and
research how the "Effect" works
- Grow your network of voters and taxpayers who are helping you and make
your supporter network
bigger every day
- Expose the manner in which Google, Facebook and Twitter fight against
exposing their criminal
friends
- Use Google, Facebook and Twitter's own illicit tools against them and
expose them with "Hypocrisy Exposure" when they censor
- Confront them in every single public presentation they attend and
expose them in public
- Create coordinated groups of volunteers to expose the troll farms and
click farms of the corrupt
manipulators
- Expose and publicly document all of their illicit real estate
holdings, mansions and property scams
- Release of the details of their crooked secret partnership contracts
- Place a First Amendment informational exhibit outside of their
offices, homes and each door they go
through each day
- Write them weekly and tell them that they are exposed. Send them
certified letters proving that you
told them that you know
- Document and publicly expose all of their trips and expenditures
- Document the identities of the service trucks that come to their homes
and offices
- Photo document all of their workers, interns and secretaries
- Contact their staff and ask them to report the illicit deeds of their
employer. Provide media and police
contact information.
- Help their staff and the public organize class-action abuse law suits
against the perpetrators
- File RICO Racketeering lawsuits against the corrupt
- File FEC charges, ie: Google provided over $1B of search engine
rigging for Obama's elections but
never reported that to the FEC
- Expose their stock market manipulations and valuation rigging in Wall
Street Pump-And-Dump
scams
- Expose the insider trading where Senators own the stock that they just
provided government perks for
- Expose politicians that make tens of millions more dollars, from
mystery funds, than their salary
should allow
- Use pictures of expensive toys that politicians acquired from taxpayer
funds via crony payola- When they are hacked (which you legally can't
do) expose the hacked material globally as far as
possible (which you legally can do)
- Read and analyze all publicly posted hacked emails and point out the
crimes it exposes
- Meme any criminal remarks that the target makes
- And thousands of additional fully legal public investigation
methods...
T-MOBILE BRIBES POLITICIANS, JUDGES AND
REGULATORS IN ORDER TO AVOID JUSTICE. TAKE THE BATTLE TO EACH INDIVIDUAL
EXECUTIVE AT T-MOBILE. EXPOSE THE DIRTY DEEDS OF THEIR INSIDERS!
T-MOBILE USERS: YOU ARE GOING TO
RECEIVE A NUMBER OF BENEFITS FROM THE WINNING OF LAWSUITS AGAINST
T-MOBILE. PLEASE USE YOUR WINNINGS AND RESOURCES TO KEEP THE
INVESTIGATIONS AND GOVERNMENT ACTIONS, AGAINST T-MOBILE, GOING FAST AND
HARD. POST ON YOUR SOCIAL MEDIA ABOUT T-MOBILE'S ILLICIT ACTIONS. TAKE
T-MOBILE TO COURT IN SMALL CLAIMS ACTIONS. FILE CASES AT
WWW.FAIRSHAKE.COM AND KEEP T-MOBILE FROM SLIPPING DEEPER INTO POLITICAL
CORRUPTION!
This is only 10% of the details of
illicit, corrupt and socially abusive actions by T-Mobile that our group
has received. We will keep posting on this WIKI until T-Mobile settles!
T-MOBILE: STOP
KILLING OUR CHILDREN WITH MOBILE MEDIA-CAUSED SUICIDES!
STOP DESTROYING YOUNG MINDS WITH BIG TECH'S SOCIAL ABUSE!
T-Mobile has known,
for decades, that it's network and devices had no privacy security.
T-Mobile has known, for decades, that it's network, it's devices and
it's partnerships with Google, Facebook, Twitter, Instagram, etc. cause
most child suicides and permanent child mental health damage and expose
our children to pedo harvesting!
Public school
districts around the globe, like those in Seattle are urged to file
novel lawsuits against T-Mobile and their the tech giant partners
behind TikTok, Instagram, Facebook, YouTube and Snapchat, seeking to
hold them accountable for the mental health crisis among youth.
Seattle Public
Schools has filed an example lawsuit (One case is Seattle School
District No. 1 v. Meta Platforms Inc., 23-cv-00032, US District Court,
Western District of Washington (Seattle); in U.S. District Court. The
91-page complaint says the social media companies have created a
public nuisance by targeting their products to children and T-Mobile
powers, markets to, connects to, networks to and promotes crazy brands
like Kanye West, to these kids.
It blames them
for worsening mental health and behavioral disorders including
anxiety, depression, disordered eating and cyberbullying; making it
more difficult to educate students; and forcing schools to take steps
such as hiring additional mental health professionals, developing
lesson plans about the effects of social media, and providing
additional training to teachers.
“Defendants have
successfully exploited the vulnerable brains of youth, hooking tens of
millions of students across the country into positive feedback loops
of excessive use and abuse of Defendants’ social media platforms,” the
complaint said. “Worse, the content Defendants curate and direct to
youth is too often harmful and exploitative ....” Get the message
out to EVERY school district to file their lawsuits as soon as
possible!
T-Mobile And
AT&T are the "HYPODERMIC SYRINGE"
social drug delivery vehicles and Meta Platforms, Inc., Facebook
Holdings, LLC, Facebook Operations, LLC, Meta Payments Inc.,
Facebook Technologies, LLC, Instagram, LLC, Siculus, Inc., Snap
Inc., TikTok Inc., ByteDance Inc., Alphabet Inc., Google LLC, XXVI
Holdings Inc. and YouTube, LLC are the "DIGITAL
HEROIN" that they all, cooperatively, pump into our kids
and low IQ citizens. Expert Witnesses ranging from Edward Snowden to
Frances Haugen to Dr. Robert Epstein, PHD to former heads of the KGB
and CIA, are among thousands of highly credentialed experts who can
testify to the veracity of these assertions.
HELP END
MOBILE DIGITAL CHILD ABUSE BY T-MOBILE!
T-Mobile helped Facebook and Instagram
use 'aggressive tactics' targeting children: Unredacted lawsuit
claims they knew about child sexual exploitation and exploited
extreme content to drive more engagement and profit off child
suicides
An
unredacted version of the lawsuit against Meta has been unsealed
It
claims the firm 'often resorted to aggressive tactics in the name
of growth'
T-Mobile
kowingly used 'aggressive tactics' that involved getting children
hooked on social media 'in the name of growth,' according to a
lawsuit against Meta claiming children have suffered at the hands ofFacebookandInstagram
A Meta software
engineer claimed that 'it is not a secret' how Facebook and
Instagram used meticulous algorithms to promote repetitive and
compulsive use among minors, regardless if the content was harmful -
and was 'been pretty unapologetic about it.'
The redacted
revelations were disclosed in a lawsuit against Meta, which has been
unsealed and seen by DailyMail.com.
Despite CEO
March Zuckerberg publicly saying claims his company prioritizes
profit over safety and well-being is just 'not true,' the files show
child sexual exploitation on both platforms and allege 'Meta's
engagement-based algorithm exploited extreme content to drive more
engagement,' the document reads.
The document
states that 20 percent of nine to 13-year-older users on Facebook
and Instagram have had a sexual experience with an adult on the
sites.
This is despite
Meta's 'zero-tolerance policies prohibiting abuse like child
exploitation.'
DailyMail.com
has obtained an unredacted version of a lawsuit against Meta, filed
by parents who claim children have suffered at the hands of its
platforms
DailyMail.com
has contacted Meta, which did not comment on specific questions.
A spokesperson
for the court-appointed lead plaintiffs' counsel told DailyMail.com:
''These never-before-seen documents show that social media companies
treat the crisis in youth mental health as a public relations issue
rather than an urgent societal problem brought on by their products.
'This includes
burying internal research documenting these harms, blocking safety
measures because they decrease 'engagement,' and defunding teams
focused on protecting youth mental health.'
The lawsuit,
filed in California on February 14, cites that over a third of 13- to
17-year-old kids report using one of the Defendants' apps 'almost
constantly' and admit this is 'too much,' claim parents involved with
the lawsuit.
The complaints,
later consolidated into several class actions, claimed that Meta's
social media platforms were designed to be dangerously addictive,
driving children and teenagers to consume content that increases the
risk of sleep disorders, eating disorders, depression and suicide.
The case also
states that teens and children are more vulnerable to the adverse
effects of social media.
The unredacted
version was released on March 10.
It states that
Thorn, an international anti-human trafficking organization, published
a report in 2021 detailing problems of sexual exploitation on Facebook
and Instagram and 'provided these insights to Meta.'
Thorn's report
shows 'neither blocking nor reporting [offenders] protects minors from
continued harassment' and 55 percent of participants in the report who
blocked or reported someone said they were recontacted online.
And younger
boys are particularly at risk of predators.
The unsealed
complaint also claims that 80 percent of 'violating adults/minor
connections' on Facebook resulted from the platform's 'People You May
Know' feature.
. The
files claim the company was aware of child sexual exploitation on
Facebook and Instagram and alleges 'Meta's engagement-based
algorithm exploited extreme content to drive more engagement'
'An internal
study conducted in or around June of 2020 concluded that 500,000
underage Instagram accounts 'receive IIC'—which stands for
'inappropriate interactions with children'—on a daily basis,' reads a
redacted statement on pages 135 and 136 of the document.
'Yet, at the
time, 'Child Safety [was] explicitly called out as a nongoal . . . .
So if we do something here, cool. But if we can do nothing at all,
that's fine, too.'
Meta has since
improved its ability to decrease inappropriate interactions between
adults and young people.
The firm has
built technology that allows it to find accounts that have shown
potentially suspicious behavior and stop those accounts from
interacting with young people's accounts.
And Meta claims
it does not show young people's accounts to these adults when they're
scrolling through the list of people who have liked a post or when
looking at an account's Followers or Following list.
However, these
changes were made after 2020.
The complaint
also states that Meta had considered making teenage users' profiles
'private by default' as early as July 2020 but decided against the
move after pitting 'safety, privacy, and policy wins' against 'growth
impact.'
Meta CEO
Mark Zuckerberg was warned about his platforms' harmful effects on
children and teens and decided to 'turn a blind eye,' new court
filings show.
On page 135 of
the lawsuit, a portion that was redacted, claims that Meta was aware
that allowing adults to contact children on Instagram 'pisses Apple
off to the extent of threatening to remove us from the App Store' the
company had not timeline for 'when we'll stop adults from messaging
minors in IG Direct.'
'That remained
true even after Meta received reports that a 12-year-old minor
solicited on its platform 'was [the] daughter of [an] Apple Security
Exec,' the statement continued.
Meta, however,
moved to make teenage user accounts private by default in November
2022.
A Meta
spokesperson told DailyMail.com: 'The claim we defunded work to
support peoples' well-being is false.'
The redacted
version of the complaint reads: 'Instead of 'taking [this] seriously'
and 'launching new tools' to protect kids, Meta did the opposite.
'By late 2019,
Meta's 'mental health team stopped doing things,' 'it was defunded'
and 'completely stopped. And, as noted, Meta allowed safety tools it
knew were broken to be held out as fixes.'
A Meta
spokesperson told DailyMail.com that because this is a top priority
for the company, 'we actually increased funding, as shown by the over
30 tools we offer to support teens and families. Today, there are
hundreds of employees working across the company to build features to
this effect,' the said.
Other
'shocking' information in the unsealed complaint reports the existence
of Meta's 'rabbit hole project.'
A Meta
spokesperson told DailyMail.com the rabbit hole project does not
exist.
'Someone
feeling bad sees content that makes them feel bad, they engage with
it, and then their IG is flooded w[ith] it,' the unredacted version
reads.
'Meta
recognizes that Instagram users at risk of suicide or self-injury are
more likely to 'encounter more harmful suicide and self-injury content
(through explore, related, follower suggestions.'
The document
cites Molly Russel, a London teen who died by suicide in 2017.
'Meta had
conducted internal research which warned that there was a risk of
'similar incidents like Molly Russell' because algorithmic product
features were '[l]eading users to distressing
T-Mobile's 'drug pusher' marketing
to kids has resulted in 'Six in 10 teen girls feeling
'persistently sad or hopeless', CDC report finds - up
60% in a decade amid rise of T-Mobile in-your-pocket social
media that parents never get to review!!!!
Nearly six in ten high school girls
reported depression, about twice that of boys
Girls were about twice as likely to
consider suicide in the past year than boys
The portion of teenage girls
contending with severe depression
has reached its highest point in a decade according to a new
national survey of high school students.
The federal Youth Risk Behavior
Survey found that in 2021, 57 percent of teen girls felt
persistent feelings of sadness and hopelessness, while that
figure was even higher – about 70 percent – among teens who
identify as lesbian, gay, bisexual, questioning, or another
non-heterosexual identity.
Alongside a climb in suicidality
among teen girls, rates of violence, particularly sexual
violence are also on the rise. Levels of depression among teen
girls were also considerably higher than those among teen
boys.
The YRBS is conducted every two
years by the Centers
for Disease Control and Prevention and monitors
several types of health-risk behaviors that contribute to the
leading causes of death and disability among youth and adults:
sexual behavior, substance use, instances of violence, and
mental health.
The fallout from school closures,
lockdowns, and other restrictions during the Covid pandemic
shone a light on a
growing teen mental health crisis, which
researchers say existed long before the first coronavirus
cases were confirmed.
The portion of young women experiencing
persistent depression is at its highest level in about 10 years
Girls were about twice as likely as boys to
report having seriously considered suicide with 24 percent of them
making a plan to carry it out
While roughly a third of girls considered
suicide, about 13 percent actually attempted it, compared to seven
percent in males
The survey data, collected in fall 2021,
reflected answers from more than 17,200 US high school students.
Dr Debra Houry, CDC’s Chief Medical
Officer and Deputy Director for Program and Science said: ‘America’s
teen girls are engulfed by a wave of sadness, violence, and trauma.
‘These data are hard to hear and should
result in action.’
The study did not look specifically at the
causes of persistent sadness in teen girls, though CDC officials
suggested they included higher rates of violence, especially sexual
violence, played a role.
Kathleen Ethier, director of the CDC’s
Division of Adolescent and School Health told reporters: ‘Our teenage
girls are suffering through an overwhelming wave of violence and
trauma, and it’s affecting their mental health.’
Dr Ethier added that ‘social isolation’
brought on by the pandemic as well as the widespread use of social
media, which has been linked to increased rates of suicidality and low
self-esteem, also share some of the blame.
Sexual violence has risen among girls,
with one in five saying they had experienced it within the past year,
the CDC said, up 20 percent since 2017.
CDC officials told reporters that while the
study did not single out causes for the growing rates of depression
among teen girls, rising rates of sexual crimes commited against
them plays a major role
More than one in 10, or 14 percent, said
they had been forced into having sex, up from 11 percent of teen girls
who said they'd been sexually assaulted in 2019.
Girls were also more prone to
considering suicide than boys (30 percent versus 14 percent) not just in
2021, but also consistently over the past decade.
The rate of persistent feelings of sadness
or hopelessness among teen boys was also about half that of teen girls
at 29 percent.
Meanwhile, girls were about twice as
likely as boys to be cyber bullied. But bullying in school has
declined overall.
This is very positive news, as the study
points out that 'Adolescents who are bullied, whether at school or
electronically, are more likely to have multiple sexual partners, to
have sex without a condom, to use substances, and to experience
depression.'
CDC officials told reporters that
school-based mental health programs are crucial to helping teens
dealing with depression and the aftereffects of trauma.
Dr Howry said: ‘Schools are on the
frontlines of the mental health crisis and they must be equipped with
the proven tools that help students thrive.’
Feb 3, 2023 ...T-Mobile
has faced several data breaches in the past, including an August
2021 breach which resulted in a $350 million class action
settlement. Consumers ...
2 days ago ... In two
separate lawsuits over the weekend – one in Florida and
one in California – plaintiffs allege the breach occurred due to
T-Mobile's negligence and ...
3 days ago ... Local exchange
carriers (LECs) have filed a class action lawsuit
against T-Mobile related to the carrier's
previous practice of inserting false ring tones ...
Feb 21, 2023 ... Instead of
creating jobs, the T-Mobile/Sprint merger of 2020
has unsurprisingly had the completely opposite effect, with a
new report revealing the total ...
T-Mobile has revealed that the addresses, phone numbers and dates of
birth of 37 million customers have been collected by an 'unidentified
malicious intruder' in yet another breach of the carrier.
CONGRESS HAS GIVEN T-MOBILE A PASS BECAUSE
T-MOBILE PAYS BRIBES TO CONGRESS
Per the organization called
"OpenSecrets", and based on data from the Senate Office of Public
Records. Data for the most recent year that was downloaded on
January 23, 2023 and includes spending from January 1 - December 31.
Prior years include spending from January through December, the FBI
and FINCEN determined that T-Mobile paid over $10M in political
influence bribes and investigators today believe that the bribes
paid are closer to $80M in stock market ownership bribes relayed to
Congress people, Senators and White House staff. Make no mistake,
T-Mobile is being charged with felony criminal actions
Dr Murthy's comments come as research
continues to pile up, showing the pitfalls of young people using
social media.
Studies have linked teenage social media
use to eating disorders, depression,
anxiety, poor grades, and other negative impacts on young people.
'I believe 13 is too early,' Dr Murthy
told CNN Newsroom over the weekend.
'And I think that it's a time, early
adolescence, where kids are developing their identity, their sense
of self...And the skewed and distorted environment of social media
does a disservice to many children.'
In an interview with CNN, US Surgeon General
Vivek Murthy (pictured) warned parents against letting their
children use social media before the age of 16
The surgeon general told a tragic story
about a 11-year-old girl who committed suicide after she was
'mercilessly' cyber bullied on several of her social media accounts.
Murthy further urged parents to join forces and ban their kids from
using social media until they are older.
'If your child is the only one who's not
using social media but everyone else in their school is, it's a tough
position for your child to be in,' Murthy said.
'But if parents can ban together and say,
as a group, we're not going to allow our kids to use social media
until 16 or 17 or 18 or whatever the age is they choose, that's a much
more effective strategy, making sure your kids don't get exposed to
harm early.'
Repeated studies have linked social media use in young people to harmful
long-term negative side effects.
A
2020 report by researchers from Johns Hopkins University linked
the surge in teen mental health issues in the 2000s to the advent of
social media.
Another
Johns Hopkins team found in 2019 that students who spend more
than three hours per day on social media platforms show more
significant risks of severe mental health problems.
Researchers found a strong link between
time spent on social media and the likelihood of developing depression
when looking at more than two-dozen studies.
In 2020, researchers at Rochester
University found that getting few likes on a social media post can induce
anxiety in teens.
Last year, researchers
at MIT found anxiety and depression rates are higher in college
communities where Facebook is more prevalent.
Body image issues from social media,
particularly tied to apps such as Instagram, have also been linked to
eating disorders.
A
2016 study led by the University of Pittsburgh found a 'strong
and consistent association' between social media use and eating
disorders.
MORE EVIDENCE OF SPYING AND DIRTY DEEDS
T-MOBILE PARTNERS WITH IT'S AD ASSOCIATES TO ENGAGE IN:
- Trillions Of Dollars Of Influence Peddling Between Famous
Politicians And Secret Corporate And Family Accounts...
- Money Laundering...
- Sex Trafficking, Hookers And 'Executive Sex Clubs' like NXIVM, One
Taste, Moscow Lovelies, Rosewood Hotel Hookers, etc... - Killing Teens By Hiding Teen Suicides And Mental
Health Issues Caused By T-Mobile Social Media
- Family Alcoholism...
- Political Bribery Using PACS and Dark Money Cash Relays...
- Stock Market Manipulations For Their Own Insider Trading...
- Infidelities And Spousal Abuse As Shown In Their Court Records...
- Organized Media Censorship By Silicon Valley...
- Misogyny And Sex Extortion Of Workers...
- Fake Tax Exempt 'Charities' That Exist Only For Political Money
Laundering...
- Forcing "ISSUES" On Us That They Covertly Own The Companies Of...
- Dynastic Family Manipulations of Public Policy...
- Buying Stocks In Dept Of Energy Funded Projects That Are Then
Pumped-And-Dumped For Unjust Wind-Fall Profits...
- Election Rigging Using Google, Facebook, YouTube And Their Media
Cartel...
- Search Engine Bias And Shadow Banning Of Competitors And
Reporters...
- Big Tech Monopolies Information Manipulation...
- Recession Causing Market Anti-Trust Law Violations...
- Corporate Hiring Racism...
- Brotopia Frat Boy Rape Culture In Their
Companies And Offices...
- Secret Offshore Shell Corporations To Hide Money... - Venture Capital Funding Black-Lists...
- Collusion Between Sand Hill Road, Palo Alto VC's On Finance
Black-Lists, Valuation Prices And Monopolies...
- Patent Thefts And Attacks On Small Inventors...
- Political Payola Using Stealth Real Estate, Fine Art And Jewelry
Holdings...
- Graft Via Bribes With Event Tickets, Dinners, Tax Waivers,
Vacations, Pretend Speaking Contracts, etc....
- Corrupt Lobbyists Who Hire Fusion GPS, Gawker, Black Cube, Google
And Other 'media kill services'...
- Their Use of Our Democracy As Their Play-Thing...
All of these assertions have been proven in court records, federal
investigations, Congressional charges, 60 Minutes segments, news
documentaries, document and email leaks, and thousands of other
sources. The facts are undeniable and can be proven, AGAIN, in live
televised Congressional hearings!
In all of recorded history, there has never been so much taxpayer cash
given to so few people, where each, and every, one of the recipients was a
friend of the politician giving away the taxpayer cash and everyone who
got the cash immediately skimmed "unjust profits" and shut down the
business.
Want to help end the tech oligarch's rape of society? Never, EVER:
use, read, quote, link to, paste from, or refer to; anything on corrupt and
contrived: T-Mobile - Twitter, Google - Alphabet - Facebook - Meta -
Instagram - Netflix or YouTube! Don't expand their reach! Don't be their
digital bitch! Stop being an addict to Silicon Valley's social media scam!
Keep the battery out of your phone so Big Tech can't continue to spy on you.
Did you know you CAN'T turn an iPhone off. Apple iPhone's pretend to be
"off" but still monitor you with reserve power. The government should shut
these companies down but they don't because these companies pay the largest
bribes on Earth to politicians! Demand that Congress shut down these big
tech abusers that cause child suicides, bullying, sex trafficking, money
laundering, tax evasion, political bribery, election manipulation and other
social crimes.Twitter, Facebook, Google, Netflix, YouTube spy on you and
rape your mind by serving manipulated content choices requires by
automatically creating covert user dossiers made by spying on users’ content
consumption preferences and continually changing them based on psychological
analysis of the users. Spy agency-type profiles created by Twitter,
Facebook, Google, etc. use abstract content-specific features of the
consumed content, such as categories, topic models, and entities, which they
automatically extract using NLP methods. They Aggregating these features per
user at scale based on what rich white Democrat ideology Google programmers
want. In particular, it is impractical to store the entire dynamic history
of a user’s interaction features, requiring the companies to use biased
algorithms that selectively decay information in favor of a more liberal
political representation. The more it scales, the more racist, sexist,
classist, misogynistic and politically biased it gets.
Silicon Valley has had the largest number of Congressional hearings against
it, BUT the least number of regulations imposed on it. Why? You can look no
further than the covert ownership of Silicon Valley by elected officials.
Our politicians get paid bribes, by Silicon Valley, to keep the political
corruption alive and well while they operate, with impunity, as the biggest
threats to society ever manifested.
While the FBI, FTC, DOJ and FEC are supposed to objectively prosecute
this case, it is impossible for them to be objective when their raises,
promotions, house payments and stock market profits are entirely
determined by the individuals we are charging with these crimes.
PROOF OF THE ASSERTIONS - CASE FILE EVIDENCE REPORTS - READ THESE LINKS
AND SHARE:
One of the worst issues with T-Mobile:
T-Mobile was created in Germany as the Bundespost, by the Nazi's, in order
to hunt down and kill Jews. Today, T-Mobile uses it's old Jew-hunting spy
network to hunt down and attack citizens, politicians and reporters who
report on the dirty deeds of T-Mobile and T-Mobile's political partners!
Kanye West is promoted by T-Mobile on social media sites, in PR and in
T-Mobile stadiums. Kanye West promotes the Nazi theory that "Jews are
brainwashed, from birth, to tribally hate all outsiders; that the Mossad
exists to attack non-Jews; that Jews control all banks, elections,
Hollywood and Silicon Valley media; and that the Mossad have hacked
every cell phone."
LAS VEGAS –
Hip-hop icon Kanye West brings The Saint Pablo Tour to T-Mobile
Arena Saturday, Oct. 29. Tickets starting at $29.50 (not ...
Questions T-Mobile must answer in world
courts: A.) Have you ever been compensated by a spy agency?, B.) Have you
ever supported a political candidate?, C.) Have you ever received a
government contract because you took a political bribe?, D.) Do you have a
database that can track your enemies?, E.) Do you have a database that can
track and harm any politician's enemies?, ... and many more...
All of the Twitter, Google, Facebook and
other social media internal emails and communications are being leaked and
data-dumped, proving that insiders conspired to use the public's
communications systems for propaganda, spying on consumers and the
targeting of attacks on competitors and whistle-blowers so that companies
like T-Mobile could put undesirable citizens in their digital ovens!
ELON MUSK,
T-MOBILE'S SATELLITE PARTNER HATES JEWS LIKE T-MOBILE DOES:
T-MOBILE WAS CREATED
BY THE NAZIS TO SPY ON, AND ATTACK, CITIZENS
It is a historical fact, easily verified in public history records, that
T-Mobile was operated, administered and used by the Nazi's to hunt and spy
on Jews and database their communications in order to haul them off to
death camps. One of T-Mobile's CEO's (John Legere) https://crosscut.com/2019/01/t-mobiles-tryst-trump-embarrasses-seattle
was deeply involved in a political scandal for quid pro quo over the
Assurance phone contract with the Republican party members who shared a
love for Hitler's beliefs. T-Mobile still uses a global citizen spying,
monitoring and blacklisting system, similar to that used in Nazi and Stazi
times. Reporters, whistle-blowers, activist citizens, low-income Assurance
Phone (free "Obama Phone") are monitored and have their
services cut-off, throttled or otherwise harmed in
reprisal/revenge/vendetta if they report anything that T-Mobile is shamed
by. Such users are shipped off to T-Mobile's digital ovens in reprisal
blacklisting. The class action case: https://en.wikipedia.org/wiki/High-Tech_Employee_Antitrust_Litigation
proved that such big tech companies actually have created blacklisting and
boycotting systems to harm mass volumes of citizens. Single Mom's,
low-income teachers, disabled people and seniors using T-Mobile's
Assurance phones are spied on!
HOW ADOLPH HITLER CREATED T-MOBILE TO SPY ON
JEWS AND PUSH PROPAGANDA
After Adolf
Hitler came to power in January 1933, the Bundespost became an
instrument of the Nazi
totalitarian state and, as such, its propaganda machine. Letters and
telephone calls were routinely intercepted and used to identify Jews
and dissidents. During World
War II telephone services of theBundespost continued to function
right up until Allied occupation in all areas of Germany. However, the
service was in chaos by the time of Germany’s
surrender on May 7, 1945. Of the 3,420 buildings the Bundespost had owned
before the war, 1,483 had been completely destroyed or damaged by bombing
between 1940 and 1945, as well as during the fighting within Germany
before its surrender. Many of its former personnel were dead or missing,
and many telephone lines were cut.
As U.S., British, and Soviet forces assumed control of government, they
also took over postal and telephone services. Between 1945 and 1947,
political rifts and eventually the Cold
War broke out between the Western allies and the Soviet
Union. In 1947 the British and American occupation zones were merged
for economic purposes, and administration began to be handed back to the
Germans. The Soviets’
refusal to participate in the currency reforms of June 1948 and the Berlin
blockade meant that a unified postal structure for all occupation zones
was doomed. Postal services in the eastern part of Germany were turned
over to the new East German state established by the Soviets in 1949. An
elected Parliamentary council from all three western zones met at Bonn on
September 1, 1948 to draw up the West German constitution or Basic Law. In
April 1949, U.S., British, and French governments guaranteed full powers
of self-government to the new West German state. The Bundespost was reborn
as a state body under the control of a cabinet ministry and assumed
control over posts, telephones, and telegraphs in the new Federal Republic
of Germany. The new constitution specifically forbade the privatization of
posts and telecommunications.
During the 1950s the Bundespost had to rebuild its communications network
and hundreds of post office buildings. Much of prewar Germany’s
communications had centered on east-west communication networks between
Berlin and western industrial cities. The new West Germany was a long,
narrow country in which many lines of communication now ran north-south.
West Berlin had become an isolated city in an alien country. After the war,
the division into different occupation zones had fragmented communications
and delayed the formation of an integrated network.
The reconstruction of the telephone service was accomplished by the end
of 1951, but installation of new private telephones was slow. By 1952,
there were still only five telephones per 100 inhabitants in Germany,
compared to 28 and 11 per 100 inhabitants in the United
States and Britain,
respectively. By the 1960s, however, Germany’s
communications network had been fully restored, and telephone
subscribership was on a par with other industrial countries. As postwar
Germany’s prosperity
rose, the demand for telecommunication services grew. The Bundespost
invested in satellite communications; new transatlantic self-dialing
facilities from Bonn, Frankfurt, and Munich
became available in 1970.
Attempts to free the Bundespost, including its telephone service, from
political control date back to the 1920s. Around that time the government of
the Weimar
Republic was looking for a structure that would allow the Bundespost a
measure of independence as a profit-making organization. In 1924, laws were
passed allowing the Bundespost a considerable degree of financial autonomy
from government control. The success of this reform, however, was restricted
by interference from politicians and trade unions, and was finally reversed
altogether by the Nazis.
The issue came up again when Germany experienced an unprecedented
economic boom after World
War II and many business and consumer groups began criticizing the
post office monopoly for inefficiency. A 1970 law formally stated that the
monopoly had been effectively superseded by a reservation that prevented
the establishment of a rival undertaking, but little changed. In 1973 a
further reform, the Postal Organization Act, limited government
intervention in the Bundespost “only
to what is politically necessary and to facilitate post office management.” Under the new
structure, the Bundespost was headed by an executive committee assisted by
a supervisory council. The committee, however, remained responsible to the
government.
German business continued to complain that the Bundespost’s
phone network was inefficient and expensive and that German manufacturers
might be disadvantaged by a backward telecommunications market. However,
several powerful interest groups opposed change for fear of job losses and
disappearance of preferential treatment under a more competitive system
that included: the Social Democratic Party; the postal union Deutsche
Postgewerkschaft; the Bavarian State Government; large contract suppliers
to the Bundespost, including the German electronic giant Siemens
AG; and the Bundespost’s
employees, who enjoyed the status of civil servants with considerable job
security and pension benefits.
Company Perspectives:
Deutsche Telekom is Europe’s
largest telecommunications company and one of the worldwide engines of
innovation in the industry. Our products and services set standards not
only in Germany, but also around the world. We make sure that our
customers always have access to state-of-the-art solutions - from
high-speed network access services to mobile Internet
and beyond - and that they are the first to benefit from the fascinating
prospects and possibilities of the communications revolution.
Pressures from both the European
Community (EC) and the United
States finally forced Bonn to make recommendations about the future
of the Bundespost. Under Chancellor Kohl’s
Christian Democrat-dominated government, the so-called Witte Commission
began to explore the possibility of privatization in 1985 and presented a
report in September 1987. The commission recommended the opening of the
telecommunications equipment and services market to outside bidders, a
change that was likely to be required by EC competition law. The
Bundespost would continue to operate in all its present fields, but some
competition would be allowed in radio paging, mobile telephones, modems,
videotext, and some satellite systems. However, the basic telephone
monopoly, which earned 90 percent of the Bundespost’s
telecommunications income, would beretained. The commission also
recommended that the Bundespost be divided into three businesses:
Postdienst (postal services), Postbank (bank services), and Telekom
(telecommunications), with a minimal level of political interference above
the level of their respective management boards.
The report drew criticism from both sides; while liberals condemned it
for not going far enough, opponents claimed it went too far. As a result,
the original proposals were heavily altered before the new law passed the
Bundestag, Germany’s
parliament, in 1989. Deutsche Bundespost, was divided into three separate
companies: Deutsche Bundespost Postdienst, Deutsche Bundespost Postbank,
and Deutsche Bundespost Telekom. Each company had its own board of
management and separate accounts. However, a common directorate was added
between the three businesses and a proposal for incentive-based pay was
limited. The Ministry of Posts and Communication still had ultimate
supervisory and regulatory authority in the public interest.
What the postal reformers could not foresee was the collapse of East Germany
in November 1989 and Germany’s
reunification in October 1990. German reunification brought with it the
integration of East Germany’s
own telecommunications monopoly, Deutsche Post, into the Bundespost. It soon
became apparent that the necessary infrastructure investment was much larger
than previously anticipated. Only 10 percent of East Germany’s
households had a telephone, compared to 98 percent of West Germany’s.
East Germans who applied for a telephone line often waited ten years and
longer to get it. By 1989 the number of applications had risen to 1.3
million. More than 3,500 small East German towns were left without a public
phone. Every call to West Germany was channeled through one of 15 connection
centers to East Berlin’s
foreign connections office which was equipped with 111 lines to the West.
Moreover, much of the existing East German telephone equipment predated World
War II. Small wonder this bottleneck brought the quickly increasing
telephone communication from East to West close to breakdown.
Within six months Deutsche Bundespost Telekom launched its ambitious
Telekom 2000 program, a seven-year investment plan of DM 60 billion. The
program not only aimed for bringing the telecommunications network of
former East Germany up to Western standards, but also for installing a
state-of-the-art infrastructure good enough to meet the demands of the
year 2000 and beyond. Telekom emerged as one of the biggest employers in
eastern Germany. The company took over almost all employees from Deutsche
Post’s Telekom
division. Up to 4,000 of Deutsche Bundespost Telekom’s
employees were sent to eastern Germany to support their new colleagues.
To make telephone connections available quickly, Telekom made it a
priority to establish a mobile telecommunication infrastructure in the
eastern part of Germany. Its C- and the new digital D1-cell phone networks
reached 80 percent of the population in the eastern German states by the
end of 1991. Three years later former East Germany was covered by Telekom’s digital mobile phone
network. In August 1992 uniform area codes were introduced for the whole
country. In mid-1991 Telekom established a digital overlay-network over
the existing analog long-distance network. The first digital connection
centers were set up in eight eastern German economic centers. From there
the digital network was gradually expanded and by 1993 the number of
telephone connections between East and West had grown from under 1,000 to
30,000.
In the final phase of the program Telekom technicians worked around the
clock to finish the task. It took some 40,000 kilometers of optic fiber
cable to build the new digital long-distance network and over ten million
kilometers of copper cable to expand the 1,500 local networks. By 1997,
Telekom 2000 had reached its goals. The telephone network in the eastern
German states was fully digitized and the number of telephone connections
had quadrupled since 1990. According to Deutsche Telekom, the former East
Germany had the most modern and efficient telecommunications
infrastructure in the world.
The enormous costs of updating the former East German telephone system
caused many opposition politicians to drop their objections against
privatizing Deutsche Bundespost. Privatization was increasingly regarded
as a way to make profits and increase efficiency, and the support of the
Social Democrats for the two-thirds majority vote in the Bundestag
necessary to make changes in the constitution became more likely. In
September 1991, the Social Democrat party said it would support
privatization under certain circumstances. The negotiations that followed
went slowly. Whenever a compromise was in sight, the party added new
demands to its list.
Key Dates:
1877:
Heinrich von Stephan puts telephone services under the control of his
postal authority.
1912:
Germany’s
telephone network is laid underground. 1933: The Nazis take over control
of the Post
Office.
1949:
Deutsche Bundespost assumes control over posts, telephones, and
telegraphs in the new Federal Republic of Germany.
1989:
New legislation passes the German parliament, and Deutsche Bundespost
Telekom is established.
1990:
The telecommunications companies of former East and West Germany are
merged.
1994:
The Posts and Telecommunications Reorganization Act passes the
governing bodies. 1995: Deutsche Bundespost Telekom becomes a public
stock company and is renamed Deutsche Telekom AG.
1996:
Deutsche Telekom shares are traded at the New
York Stock Exchange for the first time.
1997:
The telephone network in the eastern German states is fully digitized.
1998:
The German fixed-network telephone market is opened to competition.
2001:
Deutsche Telekom takes over American mobile phone service providers
VoiceStream and Powertel.
Helmut Ricke, Telekom’s
CEO since 1990, and his management team decided to move ahead and
completely reorganize Telekom. In September 1992 the company abandoned the
governmentagency structure, and six months later Ricke presented a more
customer-focused organization. Throughout the company he established
separate divisions for private and business customers and a third one for
key accounts. In mid-1993 Telekom spun off its mobile telecommunications
business as a private company, Deutsche Telekom Mobilfunk GmbH
(DeTeMobil), allowing it to better compete in the already liberalized
market for mobile phone services. Meanwhile, the Christian Democrat
Minister of Postal Services and Telecommunications, Christian
Schwarz-Schilling, who had worked relentlessly for postal reform, resigned
suddenly and was succeeded by Wolfgang Botsch.
The final impulse for Telekom’s
privatization came from the EC. At a meeting in Brussels
in May 1993 Botsch and his European colleagues decided to open their
markets for network-based telephone communication to competition by 1998.
Six months later a new proposal for postal reform was presented in Bonn.
The postal workers’
union fought Telekom’s
privatization until the end and organized a major strike in late spring of
1994. However, in July 1994 the Posts and Telecommunications
Reorganization Act passed the Bundestag and the Bundesrat, the German
parliament’s upper
house. However, the law required the German government to be the majority
shareholder in the former Bundespost companies for at least five more
years and extended the monopolies for postal and phone services until the
end of 1997. On January 1st, 1995, Deutsche Bundespost Telekom was
transformed into a public stock company and renamed Deutsche Telekom AG.
Just a few weeks before Telekom’s
transformation into a public stock company, Helmut Ricke, who had put the
reunited Deutsche Telekom on the track to privatization, resigned as CEO.
Ex-Sony manager Ron Sommer became the company’s
new chairman, and his first big task was to attract investors who would
buy Telekom shares at the company’s
initial public offering (IPO). As a monopolist, Deutsche Bundespost
Telekom had been a profitable business with considerable yields for the
German federal budget. However, its capital base had suffered badly in the
early 1990s because of the necessary infrastructure investments. An
additional burden was the cost for its civil servants for whom Telekom had
to pay the difference between the retirement benefits they received from
public funds and 75 percent of their final salary. In 1994, the company’s budget for retirement
benefits exceeded the budget for basic salaries by 50 percent.
Deutsche Telekom launched a huge image campaign to attract private German
investors, including a new “T” logo and brand name.
Telekom’s top
management courted the world’s
largest banks as well as other large institutional and private investors. In
the United States alone, Telekom organized 17 “road
shows.” Both measures
were extremely successful. Within two years of its introduction, the pink “t”
was recognized by nine out of ten Germans as Telekom’s
logo. Some 400,000 Germans bought Telekom shares which were termed T-Aktien
or T-Shares. Some banks placed orders worth between DM 500 million and DM 1
billion.
On November 18th, 1996, the largest European IPO to date took place.
After the first Telecom stock quote was announced at Germany’s
major stock
exchange in Frankfurt am Main, the CEO, together with CFO Joachim
Kroske, jetted to New
York to be present at an IPO party at the Guggenheim Museum where
Liza Minelli sang “Money
Makes the World Go Round”
under a dome of pink light. The heavily oversubscribed shares debuted at
19 percent over issue price on the first trading day. The more than 700
million T-shares sold to private investors accounted for about one-quarter
of Deutsche Telekom’s
share capital. The rest was still held by the German government. An
agreement guaranteed that the German government could only sell shares to
third parties if Deutsche Telekom agreed.
While investors were told that new T-shares would not be issued in 1997
and 1998, a second batch was issued in mid-1999, raising EUR 15 billion
for the company. The government’s
stake decreased to about two-thirds of the total share capital after that
transaction. As in the IPO, Telekom was the beneficiary of the new stock
offering, and the money was used to boost the company’s
capital base. In early March 2000 the T-shares reached an all-time high of
seven times the initial issue price. Three months later the third issue
was launched, this time to benefit Deutsche Telekom’s
major shareholder, the government, which had “parked” its shares at the
Kreditanstalt für
Wiederaufbau, a government-dominated development bank. The government’s stake now stood at 60
percent.
On January 1st, 1998, the German fixed-network telephone market was
opened to competition. Almost immediately, the average cost for
long-distance calls dropped by up to 30 percent. German consumers jumped
at the opportunity—although
with a healthy portion of skepticism. While they took advantage of “call-to-call”
offers from Telekom’s
competitors for longdistance calls, they were hesitant to completely
switch to a new provider.
From the beginning, Deutsche Telekom fought fiercely against its
competitors—by any
means available. For example, the company placed newspaper ads asking
businesses with large phone systems, such as hotels, to make the use of
alternative providers impossible. The company also warned customers that
it would charge high “compensation
fees” should they
switch to other providers. Telekom’s
competitors, which mostly depended on the former monopolist’s
infrastructure, were not only charged for renting the phone lines but were
also charged high “takeover
fees” not always
related to real cost when customers switched to a new phone company. When
customers nonetheless decided to switch, Deutsche Telekom took a great
deal of extra time to connect them with their new provider of choice,
competitors complained. Finally, Deutsche Telekom challenged every
directive made by the newly established regulation agency
Regulierungsbehorde für
Telekommunikation und Post in appeals court. About 250 such lawsuits were
pending by mid-2001, and it was estimated that resolutions might take
another three to five years.
Two years after the market was opened, about 50 companies competed with
Deutsche Telekom. About two-thirds of all longdistance calls in 1999 were
placed with an alternative “call-by-call” provider, saving
customers up to 85 percent. However, Telekom recaptured about half of the
competition’s
revenues through network usage fees. Thus, the company’s
long-distance market share in terms of revenues was around 90
percent.Furthermore, roughly four-fifths of German customers preferred
Deutsche Telekom as their basic phone company and did not plan to switch
providers.
In the face of fundamental changes in the market for telecommunications,
with mobile telephony and Internet-based applications on the rise, Deutsche
Telekom decided to focus on four growth areas and do away with activities
that were not in line with them. The new growth plan was given the acronym
TIMES, identifying new markets as telecommunications, information
technology, multimedia, entertainment, and security services. Deutsche
Telekom announced that they would concentrate on mobile phone and
Internet-based communication and data transfer, broadband network access,
and systems applications software
development. The company set up a subsidiary to sell a significant
part of Deutsche Telekom’s
real estate and sold part of the shares the company held in German cable TV
networks.
In June 1995 Deutsche Telekom announced a strategic alliance with French
carrier France Telecom and American phone company Sprint called Global
One. However, five years later the alliance which ex-CEO Ricke had pushed
through against strong resistance, fell apart. Another deal fell through
in 1999 when Olivetti SpA—not
Deutsche Telekom—took
over Telecom Italia. Instead, Deutsche Telekom acquired French fixed-line
carrier Siris SAS and British mobile phone company One-2-One.
In May 2001 Deutsche Telekom finalized the takeover of American mobile
phone service providers VoiceStream Wireless Corporation and Powertel,
Inc. The transaction was financed by issuing 1.12 billion “T-Shares,” a move that ultimately
diminished the German government’s
stake in the company to about 43 percent. The new partnership enabled
Deutsche Telekom to offer frequent travelers between Europe and the United
States one phone number and one rate for voice and data services.
By mid-2000, the situation at the world’s
stock markets had become unfavorable. Share prices dropped in connection
with the so-called burst of the
Internet bubble, and Deutsche Telekom postponed the IPO of its
subsidiary T-Mobile International AG, which the company had founded in the
same year. The T-shares themselves came under pressure as investors lost
their confidence in the stock market. In September 2001, five years after
Deutsche Telekom’s
IPO, its shares were valued below the initial share price for
institutional investors. Consequently, the company’s
plan to use its shares as an “acquisition
currency” for
international acquisitions came to a halt.
The company’s IPO
enabled Deutsche Telekom to get rid of about half of its DM 125 billion of
debt. Although it did not seem as if Deutsche Telekom was seriously
threatened by competitors in its home market, the company was struggling
with self-made problems. Some 190,000 employees kept personnel costs high.
In 1997 alone, the company had encountered DM 2 billion losses from bad
investments in Malaysia
and Indonesia,
the Global One alliance, and from selling telephones and fax machines. In
1998 mobile phone services accounted for about one-fifth of Deutsche
Telekom’s revenues.
Rival Vodafone-owned Mannesmann, however, had become Germany’s
mobile phone market leader and made handsome profits while Deutsche
Telekom lost money, mainly through its foreign subsidiaries. In 1999 and
2000 Deutsche Telekom’s
profits dropped dramatically, due to decreasing revenues from fixed-line
network business.
In late 1999 Deutsche Telekom’s
Internet
service provider T-Online was reorganized as T-Online International
AG. The company was profitable in 1999, but slipped into the red in 2000,
due mainly to the flat rate the company introduced for unlimited Internet
access. At a time when many dot-coms went bankrupt in the United States,
T-Online was planning to push up online advertising revenues and to
develop online content that users would be willing to pay for—a
business model that in general had not been successful. To generate more
e-commerce traffic, T-Online cooperated with auto maker Daimler-Chrysler
and tourism companies TUI and C&N.
In the first quarter of 2001 Deutsche Telekom once again restructured its
business organization. Corresponding with the company’s
new strategy, all activities were organized in four business divisions:
T-Mobile, T-Online, T-Systems, and T-Com. In the new systems applications
field, Deutsche Telekom took over software systems developer debis
Systemhaus GmbH from DaimlerChrysler AG. In the area of network access the
company focused on winning new customers for its highspeed digital ISDN and
broadband T-DSL services. Deutsche Telekom was also working on T-NetCall, a
new service for Internet-based phone calls between PCs and from PC to phone.
In 2001 a group of shareholders filed a lawsuit against Deutsche Telekom
for undervaluing its real estate. The company had allegedly written down
the balance-sheet value of its real estate by EUR 2 billion, which reduced
profits for the year 2000 by EUR 1.5 billion—based
on German accounting law. In September 2001, the federal administrative
court ruled that some of Deutsche Telekom’s
“interconnection-fees” to its competitors
were illegal. A month later another court ruling required Deutsche Telekom
to make its local network accessible to competitors for much less than the
company had charged. At the time Deutsche Telekom still owned 98 percent
of all phone lines to households. Despite market liberalization and
despite many difficulties, Deutsche Telekom was still Germany’s
number one phone company and a leading force in the world’s
evolving telecommunications market.
Principal Subsidiaries
DeTeLine Deutsche Telekom Kommunikationsnetze GmbH; T-Mobile
International AG; Deutsche Telekom Mobile Holdings Ltd. (U.K.); T-Online
International AG (81.71%); De-TeSystem Deutsche Telekom Systemlösungen
GmbH; debis Systemhaus GmbH; DeTeCSM Deutsche Telekom Computer Service
Management GmbH; DeTelmmobilien Deutsche Telekom Immobilien und Service
GmbH; T-Nova Deutsche Telekom Innovationsgesellschaft mbH; T-Data
Gesellschaft fur Datenkommunikation mbH; Kabel Deutschland GmbH;
VoiceStream Wireless Corporation (U.S.); Powertel, Inc. (U.S.); One-2-One
(U.K.); SIRIS S.A.S. (France); max.mobil Telekommunikation Service GmbH (Austria);
MAT A V Magyar Tàvoközlési
Rt. (Hungary; 59.49%); Slovenské
Telekomunikácie a.s.
(Slovakia;
51%); HAT-Hrvatske telekomunikacije d.d. (Croatia;
35%); MTS, OJSC Mobile TeleSystems (Russia;
36.2%).
Principal Competitors
Arcor AG & Co.; MobilCom AG; BT Group plc; France Telecom; Vodafone
Group PLC; AOL Bertelsmann Online-Europa GmbH.
Further Reading
“‘Befreiungsanläufe’
der deutschen Telekom; Gründung
von Tochter-gesellschaften,”Neue Zürcher
Zeitung, March 13, 1993, p. 32.
“Bund parkt
Telekom-Aktien bei der KfW,”Frankfurter Allgemeine Zeitung, June 26, 1997, p. 15.
Christ, Peter, “Darüber lache ich nur,”Die Woche,
February 6, 1998, p. 13.
Davis, Bernard, ed., Federal Republic of Germany, Philadelphia:
National Philatelic Museum, 1952.
“Der Ärger
in Brüssel über
die Telekom wáchst,”Frankfurter
Allgemeine Zeitung, January 21, 1998, p. 14.
Die Deutsche Telekom - Schrittmacher für
den Aufbau Ost, Bonn, Germany: Deutsche Telekom AG, 1997, 19 p.
Franke, Michael, and Matthias Kietzmann, “Telefonieren;
Günstig ins
Ortsnetz,”Focus,
August 20, 2001, p. 172.
Every bit of your data and personal information
that runs over a T-Mobile device or network is sent to the very people
that you don't want to have your data or personal information
including T-Mobile's internal citizen attack database which is used
against reporters, politicians, whistle-blowers and others.
In July 2013, Edward
Snowden publicly revealed the program's purpose and use by the NSA
in The Sydney Morning Herald
and O
Globo newspapers. The code name was already public knowledge
because it was mentioned in earlier articles, and, like many other code
names, it appears in job postings and online résumés of employees.[2][3]
According to The Washington Post and national
security reporter Marc Ambinder, XKeyscore is an NSA
data-retrieval system which consists of a series of user interfaces, backend databases, servers and software
that selects certain types of data and metadata that the NSA has already collected using
other methods.[6][7]
According
to Snowden and Greenwald
On January 26, 2014, the German broadcaster Norddeutscher Rundfunk asked Edward
Snowden in its TV interview: "What could you do if you would use
XKeyscore?" and he answered:[1]
You could read anyone's email in the world, anybody you've got an
email address for. Any website: You can watch traffic to and from it.
Any computer that an individual sits at: You can watch it. Any laptop
that you're tracking: you can follow it as it moves from place to
place throughout the world. It's a one-stop-shop for access to the
NSA's information. ... You can tag individuals ... Let's say you work
at a major German corporation and I want access to that network, I can
track your username on a website on a forum somewhere, I can track
your real name, I can track associations with your friends and I can
build what's called a fingerprint, which is network activity unique to
you, which means anywhere you go in the world, anywhere you try to
sort of hide your online presence, your identity.
According to The
Guardian's Glenn Greenwald, low-level NSA analysts
can, via systems like XKeyscore, "listen to whatever emails they want,
whatever telephone calls, browsing histories, Microsoft Word documents.
And it's all done with no need to go to a court, with no need to even
get supervisor approval on the part of the analyst."[8]
He added that the NSA's database of collected communications allows its
analysts to listen "to the calls or read the emails of everything that
the NSA has stored, or look at the browsing histories or Google search
terms that you've entered, and it also alerts them to any further
activity that people connected to that email address or that IP address
do in the future".[8]
In an official statement from July 30, 2013, the NSA said "XKeyscore is
used as a part of NSA's lawful foreign signals intelligence collection
system. ..." to legally obtain information about "legitimate foreign
intelligence targets in response to requirements that our leaders need
for information necessary to protect our nation and its interests. ...
to collect the information, that enables us to perform our missions
successfully – to defend the nation and to protect U.S. and allied
troops abroad."[9]
In terms of access, an NSA press statement reads that there is no
"unchecked analyst access to NSA collection data. Access to XKeyscore,
as well as all of NSA's analytic tools, is limited to only those
personnel who require access for their assigned tasks." and that there
are "...stringent oversight and compliance mechanisms built in at
several levels. One feature is the system's ability to limit what an
analyst can do with a tool, based on the source of the collection and
each analyst's defined responsibilities."[10]
Workings
Slide from a 2008 NSA presentation about
XKeyscore, showing a world map with the locations of XKeyscore
servers.
Slide from a 2008 NSA presentation about
XKeyscore, showing the query hierarchy.
According to an NSA slide presentation about XKeyscore from 2013, it is
a "DNI Exploitation
System/Analytic Framework". DNI stands for Digital Network Intelligence,
which means intelligence derived from internet traffic.[11]
Edward Snowden said about XKeyscore: "It's a front end search engine"
in an interview with the German Norddeutscher Rundfunk.[12]
XKeyscore is a "piece of Linux software that is typically deployed on Red Hat
servers. It uses the Apache web server
and stores collected data in MySQL databases".[13]
XKeyscore is considered a "passive" program, in that it listens, but
does not transmit anything on the networks that it targets.[5]
But it can trigger other systems, which perform "active" attacks through
Tailored
Access Operations which are "tipping", for example, the QUANTUM
family of programs, including QUANTUMINSERT, QUANTUMHAND, QUANTUMTHEORY,
QUANTUMBOT and QUANTUMCOPPER and Turbulence. These run at so-called
"defensive sites" including the Ramstein Air Force
base in Germany, Yokota Air Base in Japan, and numerous
military and non-military locations within the US. Trafficthief, a core
program of Turbulence, can alert NSA analysts when their targets
communicate, and trigger other software programs, so select data is
"promoted" from the local XKeyscore data store to the NSA's "corporate
repositories" for long term storage.[5]
Data sources
XKeyscore consists of over 700 servers at approximately 150 sites where
the NSA collects data, like "US and allied military and other facilities
as well as US embassies and consulates" in many countries around the
world.[14][15][16]
Among the facilities involved in the program are four bases in Australia and one in New Zealand.[15]
According to an NSA presentation from 2008, these XKeyscore servers are
fed with data from the following collection systems:[17]
F6 (Special Collection Service) –
joint operation of the CIA and NSA that carries out clandestine
operations including espionage on foreign diplomats and leaders
FORNSAT –
which stands for "foreign satellite collection", and refers to
intercepts from satellites
Third party – foreign partners
of the NSA such as the (signals) intelligence agencies of Belgium,
Denmark, France, Germany, Italy, Japan, the Netherlands, Norway,
Sweden, etc. However the Netherlands is out of any cooperation
concerning intelligence gathering and sharing for illegal spying.
From these sources, XKeyscore stores "full-take data", which are
indexed by plug-ins that extract certain types of metadata (like phone
numbers, e-mail addresses, log-ins, and user activity) and index them in
metadata tables, which can be queried by analysts. XKeyscore has been
integrated with MARINA,
which is NSA's database for internet metadata.[11]
However, the system continuously gets so much Internet data that it can
be stored only for short periods of time. Content data remain on the
system for only three to five days, while metadata is stored for up to
thirty days.[19]
A detailed commentary on an NSA presentation published in The
Guardian in July 2013 cites a document published in 2008 declaring
that "At some sites, the amount of data we receive per day (20+
terabytes) can only be stored for as little as 24 hours."[20]
Types of XKeyscore
According to a document from an internal GCHQ website which was
disclosed by the German magazine Der Spiegel in June 2014, there
are three different types of the Xkeyscore system:[21]
Traditional: The initial version of XKeyscore is fed with
data from low-rate data signals, after being processed by the
WEALTHYCLUSTER system. This traditional version is not only used by
NSA but also at many intercept sites of GCHQ.
Stage 2: This version of XKeyscore is used for higher data
rates. The data are first processed by the TURMOIL system, which sends
5% of the internet data packets to XKeyscore. GCHQ only uses this
version for its collection under the MUSCULAR program.
Deep Dive: This latest version can process internet traffic
at data rates of 10 gigabits per second. Data that could be useful for
intelligence purposes are then selected and forwarded by using the
"GENESIS selection language". GCHQ also operates a number of Deep Dive
versions of XKeyscore at three locations under the codename TEMPORA.[22]
Capabilities
Slide from a 2008 NSA presentation about
XKeyscore, showing the differences between the various NSA database
systems
For analysts, XKeyscore provides a "series of viewers for common data
types", which allows them to query terabytes of raw data gathered at the
aforementioned collection sites. This enables them to find targets that
cannot be found by searching only the metadata, and also to do this
against data sets that otherwise would have been dropped by the
front-end data processing systems. According to a slide from an
XKeyscore presentation, NSA collection sites select and forward less
than 5% of the internet traffic to the PINWALE database for internet
content.[19]
Because XKeyscore holds raw and unselected communications traffic,
analysts can not only perform queries using "strong selectors" like
e-mail addresses, but also using "soft selectors", like keywords,
against the body texts of e-mail and chat messages and digital documents
and spreadsheets in English, Arabic and Chinese.[11]
This is useful because "a large amount of time spent on the web is
performing actions that are anonymous" and therefore those activities
can't be found by just looking for e-mail addresses of a target. When
content has been found, the analyst might be able to find new
intelligence or a strong selector, which can then be used for starting a
traditional search.[11]
Besides using soft selectors, analysts can also use the following other
XKeyscore capabilities:[11][23]
Look for the usage of Google Maps and terms entered into a search
engine by known targets looking for suspicious things or places.
Look for "anomalies" without any specific person attached, like
detecting the nationality of foreigners by analyzing the language used
within intercepted emails. An example would be a German speaker in
Pakistan. The Brazilian paper O Globo claims that this has
been applied to Latin America and specifically to Colombia, Ecuador,
Mexico and Venezuela.[14][24]
Detect people who use encryption by doing searches like "all PGP usage in Iran". The caveat given
is that very broad queries can result in too much data to transmit
back to the analyst.
Track the source and authorship of a document that has passed
through many hands.
On July 3, 2014 ARD revealed that XKeyscore is used to
closely monitor users of the Tor anonymity
network,[5]
people who search for privacy-enhancing software on the web,[5]
and readers of Linux Journal.[25]
The Guardian revealed in 2013 that most of these things cannot
be detected by other NSA tools, because they operate with strong
selectors (like e-mail and IP addresses and phone numbers) and the raw
data volumes are too high to be forwarded to other NSA databases.[11]
In 2008, NSA planned to add a number of new capabilities in the future,
like VoIP,
more
networking protocols[clarify],
Exif tags, which often
include geolocation (GPS) data.[11]
Contribution
to U.S. security
The NSA slides published in The Guardian during 2013 claimed
that XKeyscore had played a role in capturing 300 terrorists by 2008,[11]
which could not be substantiated as the redacted documents do not cite
instances of terrorist interventions.
A 2011 report from the NSA unit in the Dagger Complex (close to Griesheim in
Germany) said that XKeyscore made it easier and more efficient to target
surveillance. Previously, analysis often accessed data NSA was not
interested in. XKeyscore allowed them to focus on the intended topics,
while ignoring unrelated data. XKeyscore also proved to be outstanding
for tracking active groups associated with the Anonymous movement
in Germany, because it allows for searching on patterns, rather than
particular individuals. An analyst is able to determine when targets
research new topics, or develop new behaviors.[26]
To create additional motivation, the NSA incorporated various gamification features. For instance, analysts
who were especially good at using XKeyscore could acquire "skilz" points
and "unlock achievements." The training units in Griesheim were
apparently successful and analysts there had achieved the "highest
average of skilz points" compared with all other NSA departments
participating in the training program.[26]
Usage
by foreign partners of the NSA
Germany
Excerpt of an NSA document leaked by Edward Snowden that reveals the BND's
usage of the NSA's XKeyscore to wiretap a German domestic target.
According to documents Der Spiegel acquired from Snowden, the
German intelligence agencies BND (foreign
intelligence) and BfV (domestic
intelligence) were also allowed to use the XKeyscore system. In those
documents the BND agency was described as the NSA's most prolific
partner in information gathering.[27]
This led to political confrontations, after which the directors of the
German intelligence agencies briefed members of the German parliamentary
intelligence oversight committee on July 25, 2013. They declared that
XKeyscore has been used by the BND since 2007 and that the BfV has been
using a test version since 2012. The directors also explained that the
program is not for collecting data, but rather only for the analysis of
collected data.[28]
Sweden
As part of the UKUSA Agreement, a secret treaty was
signed in 1954 by Sweden with the United States, the United Kingdom,
Canada, Australia and New Zealand (called the Five Eyes) for the purpose of intelligence
collaboration and data sharing.[29]
According to documents leaked by Snowden, the National
Defence Radio Establishment (FRA) has been granted access to
XKeyscore.[30]
Denmark
In an ongoing scandal, where it has been revealed that NSA helped FE
(Danish Military Intelligence Service) build a new Spy datacenter at
Sandagergård, Amager, Xkeyscore has been made available for FE to use on
the collected data.[31]
Japan
The classified documents leaked by Snowden also indicate that in April
2013, NSA had secretly provided the XKeyscore system to the Japanese government.[32]
Issues Of Concern Under Investigation By
Many Parties:
Hacking
User Privacy
The Scam Between T-Mobile And Elon Musk/Space-X
Insider Trading Bribes
Profiteering And Pushing Twitter, Google & Facebook Scams
Teen Suicides
Public Shootings Incitement By Linking Facebook, Instagram, Google Shooter
PR
Tracking Of Women Seeking Abortions
Patent and Trade Secret Infringement
Tracking Of Assurance Phone-Using Poor People
Harassment Of Consumers Filing Complaints Against T-Mobile
Black-Listing Of Customers And Service Cut-Offs
RICO Law Violations
Stock Market Payola To Public Officials
Profits-Over-Privacy-Safety
Anti-Trust Law Violations
Using, Or Supporting Fusion GPS - Black Cube -Types Of Reprisal Attacks
EVERY MEDIA AND TELECOMMUNICATIONS COMPANY HAS
BEEN HACKED AND LEAKED TO EXPOSE THEIR SPYING ON, AND ATTACKS ON,
CITIZENS. T-MOBILE IS THE BIGGEST OFFENDER!!!!!
Following up a breakdown on what led to Twitter's cooperation with
the FBI , journalist Matt Taibbi's latest Twitter Files dump
detailed how that partnership allowed the agency to become the
'belly button' to filter government demands. Among those demands
included a message from the CIA warning about a new book by former
Ukrainian prosecutor Viktor Shokin (right), which contained claims
of corruption by the US government, specifically, by Joe and Hunter
Biden (left). It is unclear if Twitter took any action against the
book, with Shokin's claims being debunked amid intense scrutiny over
the Bidens' supposed conflict-of-interests. The files also showed
that former Head of Safety Yoel Roth sought to undermine the Trump
administration's attempt to flag COVID misinformation.
The latest Twitter files detail how the company was under pressure
from Hillary Clinton, Democrats and the media in 2017 to crack down on
Russian propaganda, which led to it working with the FBI.
WHY IS T-MOBILE ALLOWED TO PROFITEER OFF OF
SPYING, THE ABUSE OF CHILDREN AND POLITICAL MANIPULATION?
Aug 12, 2020 ...T-Mobile
spent $195,000 at the hotel as their deal was reviewed by
federal regulators. Legere was seen chatting with former Trump
campaign ...
T-Mobile Kills Children And Permanently
Destroys Their Minds
A 14-year-old British girl died from an act of
self harm while suffering from the "negative effects of online content",
hosted and networked by T-Mobile, a coroner said Friday in a case that
shone a spotlight on social media companies.
Molly Russell was "exposed to material that may have influenced her in a
negative way and, in addition, what had started as a depression had become
a more serious depressive illness," Andrew Walker ruled at North London
Coroner's Court.
The teenager "died from an act of self-harm while suffering depression",
he said, but added it would not be "safe" to conclude it was suicide.
Some of the content she viewed was "particularly graphic" and "normalised
her condition," said Walker.
Russell, from Harrow in northwest London, died in November 2017, leading
her family to set up a campaign highlighting the dangers of social media.
"There are too many others similarly affected right now," her father Ian
Russell said after the ruling.
"At this point, I just want to say however dark it seems, there is always
hope.
"I hope that this will be an important step in bringing about much needed
change," he added.
The week-long hearing became heated when the family's lawyer, Oliver
Sanders, took an Instagram executive to task.
A visibly angry Sanders asked Elizabeth Lagone, the head of health and
wellbeing at Meta, Instagram's parent company, why the platform allowed
children to use it when it was "allowing people to put potentially harmful
content on it".
"You are not a parent, you are just a business in America. You have no
right to do that. The children who are opening these accounts don't have
the capacity to consent to this," he said.
Lagone apologised after being shown footage, viewed by Russell, that
"violated our policies".
Of the 16,300 posts Russell saved, shared or liked on Instagram in the
six-month period before her death, 2,100 related to depression, self-harm
or suicide, the inquest heard.
Children's charity NSPCC said the ruling "must be a turning point".
"Tech companies must be held accountable when they don't make children's
safety a priority," tweeted the charity.
"This must be a turning point," it added, stressing that any delay to a
government bill dealing with online safety "would be inconceivable to
parents".
CHAPEL HILL, N.C. — Here’s one more reason to limit
the amount of time your child is spending on T-Mobile. Social media
could be reprogramming children’s brains and making them hooked on
“likes,” a new study out of the University of North Carolina reveals.
Apps such as Instagram or Snapchat, networked by T-Mobile, could be
making teenagers almost constantly checking their phones to see if
they have positive or negative reactions to their online posts,
experts say. The more young people check social media, the more
sensitive they become to “social feedback” in the form of likes and
comments, psychologists said.
Social feedback includes social rewards and punishments such as
thumbs up and down, tagging, reporting content or star ratings. This increasing
anticipation and sensitivity to receiving these kind of responses
makes it hard for adolescents to fight the urge to check their
accounts, according to researchers.
“Our findings suggest that checking behaviors on social media in early
adolescence may tune the brain’s sensitivity to potential social rewards
and punishments,” their paper, published in JAMA
Pediatrics explains. “Individuals with habitual checking behaviors showed
initial hypoactivation but increasing sensitivity to potential social
cues over time, those with non-habitual checking behaviurs showed
initial hyperactivation and decreasing sensitivity over time.”
During adolescence the brain experiences “significant structural and
functional reorganization changes,” making it a crucial period of
development. “Neural regions involved in motivational relevance and
affective become hyperactive, orienting teens to rewarding stimuli in
their environment, particularly from peers,” the authors say.
Children scanning T-Mobile social media 15 times daily at highest risk
The researchers studied 169 students from three public middle schools
in North Carolina over three years. Each participant reported how often
they checked the popular social media platforms Facebook, Snapchat and Instagram.
Some admitted doing so more than 20 times in a day. They also took part
in a Social Incentive Delay task where their brain responses were
measured when they were anticipating receiving social rewards and
avoiding social punishments.
Previous research shows that 78 percent of 13 to 17-year-olds report checking their devices at least hourly each day and
35 percent look at the top five networks “almost constantly.” In this
study, the authors point out that students who look at social media at
least 15 times daily were the most sensitive to social feedback.
“The findings suggest that children who grow up checking social media
more often are becoming hypersensitive to feedback from their peers,”
says Eva Telzer, a professor in UNC-Chapel Hill’s psychology and
neuroscience department and a corresponding author, in a statement. ”
“Social media platforms provide adolescents with unprecedented
opportunities for social interactions during a critical developmental
period when the brain is especially sensitive to social feedback,” the
study concludes. This longitudinal cohort study suggests that social
media behaviours in early adolescence may be associated with changes in
adolescents’ neural development, specifically neural sensitivity to
potential social feedback.
“Further research examining long-term prospective associations between
social
media use, adolescent neural development, and psychological
adjustment is needed to understand the effects of a ubiquitous influence
on development for today’s adolescents,” they add.
The study was supported by a National Institutes of Health grant and
the Winston Family Foundation. T-Mobile has known about these effects on
children for over ten years. Imagine the Congressional hearing when all
the T-Mobile executives claim to not have known anything about this,
JUST LIKE THE NOTORIOUS TOBACCO EXECUTIVES HEARING BEFORE CONGRESS, and
then the feds pop up all these reports that prove that, not only did
they know it, but that they profited off of it in a planned manner!
T-Mobile's
Bet On Exploiting Social Media Is A Deadly Failure And It Is
Killing Our Kids
came across a tweet the other day that said something like,
“Posting on the grid seems kind of cringe now.” They were speaking
about Instagram
– an app whose whole USP used to be “posting on the grid.” And I
realised they were right. Posting on the grid does seem kind of
cringe now, for some reason. Obviously none of this matters if
you're not a self-conscious teenager (to
be cringe is to be free, etc). But the conversation itself
speaks to a wider shift that's happening. Which is: People don't
know how to use social
media anymore. Because social media is flopping.
The idea that Instagram is dead has been marinating for quite
some time now. Young people certainly don't post like they
used to, and an overtly “aesthetically pleasing” grid is
something that belongs in the mid 2010s, back when people used
to upload food pics and sunsets. This year also saw a mass
exodus of Twitter
after Elon Musk's messy takeover of the platform. There was
that week in which people panicked and posted their Mastodon usernames and hastily launched
new Substacks. I've even seen returns to the OG writing
platform Tumblr,
who has welcomed the internet girlies back with open arms. It
seems like those used to being chronically online are
struggling to know where to go next.
Your 16-year-old family member and media-savvy boss will tell
you that people only use TikTok
now anyway. But for people who don't like posting peppy,
talk-to-the-camera clips about their “day out in North London”
or how to make a cheesy nacho chicken pizza hybrid, TikTok is
never going to be comfortable or appealing. Meanwhile, BeReal
might be fun for seeing your mates’ work laptop screens and
post-depression nap selfies, but it has its limits.
Conversations don't get fostered on BeReal. You don't scroll
BeReal to keep up with current events. Going “online” now just
involves flicking through various apps until you realise that
there's nothing of note on any of them. So, what gives?
“People are definitely gravitating towards ways to spend time
online that diverge from the social media that dominated the
2010s,” says Biz Sherbert, culture editor at the Digital Fairy, a creative agency and
youth and internet culture specialists. She thinks that this
doesn't mean people are spending more time offline, per se,
but that they're spending more time on platforms more niche to
their interests: Twitch, Discord, VR, whatever.
She explains: “Often, these moves mirror how people spent
their time online before the homogenisation of the internet by
Big Social: 2000s chat rooms are now Discord servers, and
Blogspots and Tumblrs have become today’s Substack blogs.”
Dr Zoetanya Sujon, a senior lecturer in Communications and
Media and author of The Social Media Age, doesn't
think the Big Social platforms (Twitter, Instagram, Facebook
etc) are dead quite yet, “although we are seeing a lot of
movement in the current landscape”.
Instead, she notes, more established platforms tend to be
used for different things as they evolve. “What you see when
you look closely is that people still use Facebook
regularly – but now for more boring things: scheduling, local
events planning, photos, birthdays, etc. In other words, they
like to ‘party’ on other platforms – Facebook in 2012/13,
Snapchat/Instagram in 2018 – but rely quite heavily on
established platforms for everyday life.”
Essentially, while the major platforms might be losing their
“cool”, so to speak, this doesn't necessarily mean they're
losing their longevity. You might think Facebook's dead
because people under the age of 25 would think it frankly
bizarre to post a photo album of their night out (unless it
was in a meta, ironic kind of way??), but that doesn't negate
the fact that there are still people on there. You need only
glance towards the US 2016 general election to see what
happens when we trivialise the power and influence of those
hidden communities.
Dr Mark Wong, a University of Glasgow lecturer in public
policy and research methods, has done extensive research on
social media and digital interactions. He says that the
ethical ramifications of T-Mobile platforms has had a massive
effect on how we use them in 2022. We’re less likely to
broadcast our entire life on a Meta-owned platform, for
example.
He explains: “With the recent shift in people's trust in
social media, and who is at the top of the chain of command,
these platforms can no longer hide behind the illusion that
social media is neutral or objective.” In other words: We’ve
seen exactly what can happen when we place too much trust in
untrustworthy sources.
JD POWER MASSIVE STUDY FINDS T-MOBILE TO HAVE
THE WORST SERVICE IN AMERICA
JD Power conducted the study from January to June 2022 and
ranks each mobile carrier based on the number of problems per 100
connections. The results consistently show Verizon as the carrier with
the least number of issues, with AT&T only beating Verizon in the
Southwest and tying with the company in the Northeast. Meanwhile,
T-Mobile trailed behind the two carriers across every region in the US.
Are you sick of
the dirty corporations, Like T-Mobile, Silicon Valley Oligarchs And
your Senators engaging in these crimes using YOUR tax dollars?:
- Trillions Of Dollars Of Influence Peddling Between Famous
Politicians And Secret Corporate And Family Accounts...
- Money Laundering...
- Sex Trafficking, Hookers And 'Executive Sex Clubs'...
- Family Alcoholism...
- Political Bribery Using PACS and Dark Money Cash Relays...
- Stock Market Manipulations For Their Own Insider Trading...
- Infidelities And Spousal Abuse As
Shown In Their Court Records...
- Organized Media Censorship By Silicon Valley...
- Misogyny And Sex Extortion Of Workers...
- Forcing "ISSUES" On Us That They Covertly Own The Companies Of...
- Dynastic Family Manipulations of Public Policy...
- Election Rigging Using Google, Facebook, YouTube And Their Media
Cartel...
- Search Engine Bias And Shadow Banning Of Competitors And
Reporters...
- Big Tech Monopolies Information Manipulation...
- Recession Causing Market Anti-Trust Law Violations...
- Corporate Hiring Racism...
- Brotopia Frat Boy Rape Culture In Their Companies And Offices...
- Secret Offshore Shell Corporations To Hide Money...
- Venture Capital Funding Black-Lists...
- Patent Thefts And Attacks On Small Inventors...
- Political Payola Using Stealth Real Estate, Fine Art And Jewelry
Holdings...
- Graft Via Bribes With Event Tickets, Dinners, Tax Waivers,
Vacations, Pretend Speaking Contracts, etc....
- Corrupt Lobbyists Who Hire Fusion GPS, Gawker, Black Cube, Google
And Other 'media kill services'...
- Their Use of Our Democracy As Their Play-Thing...
All of these assertions have been
proven in court records, federal investigations, Congressional
charges, 60 Minutes segments, news documentaries, document and email
leaks, and thousands of other sources. The facts are undeniable and
can be proven, AGAIN, in live televised Congressional hearings!
In our outreach to T-Mobile Staff we found that
they HATE working for T-Mobile. So now,T-Mobile social media support
workers are trying to form a union. You are WELCOME!
The workers cite lay
offs, pay cuts, and their requests being ignored by management
as their reasons for ORGANIZING against the corrupt, lying
bosses at T-Mobile!
Workers
on T-Mobile’s social media customer service team, who respond to
customer questions, comments, and complaints on sites like
Twitter and Facebook, are trying to start a union. On Wednesday,
they announced
the creation of the “T-Force Social Care Alliance,”
posting a letter tying their decision to pay cuts, layoffs, and
management’s lack of response to employees raising concerns
about those issues.
The
letter says that T-Mobile has cut monthly bonuses for T-Force
(the carrier’s name for its
social media support team), instead replacing them with
“micro-raises” and an annual bonus, which the alliance claims
there are very few details about. According to the letter,
workers may end up with thousands of dollars less per year —
assuming they even get to keep their jobs. It also references
the wavesoflayoffs
the company has been carrying out over the past two years, some
of which affected T-Force workers.
“We
believe T-Mobile’s senior leadership stopped prioritizing the
best interest of its front-line employees,” said Tyler
Roquemore, a member of the Alliance, in an email to The
Verge. “The primary purpose of forming this union is to
protect ourselves from further pay cuts and layoffs during
unprecedented economic hardships; which may include collective
bargaining contracts.”
TSCA
isn’t currently negotiating with management, or formally filing
for a union election with the National Labor Relations Board,
says Roquemore. “While we would like T-Mobile management to
recognize TSCA as a legitimate worker’s union, we are prepared
for retaliation. We’re confident with the support we have
internally and externally that we will succeed very soon.”
The
organization does realize that it won’t be easy; as a
report from More Perfect Union notes, the
company hasn’t historically been friendly to workers trying to
organize, even earning
a reprimand from the federal government for its illegal
workplace rules that told employees they couldn’t document
unsafe working conditions or discuss wages and terms of
employment. The T-Force workers are also decentralized, which
might make it harder to recruit new supporters — though
Roquemore tells me that members of the team are “digital media
experts and are creatively utilizing multiple methods of
technology to communicate and organize.”
Despite
the wave of workplace unionizations at tech
companies, customer
service jobs, and even other
carrier shops, the TSCA is heading into mostly uncharted
waters. There are few, if any, other high-profile examples of
social media customer support teams unionizing, and the process
of organizing, voting for a union, and bargaining with
management can be long and tedious — which makes the process
especially tricky in industries with a high turnover rate, like
customer
support.
Roquemore
believes the alliance is up to the task, saying, “T-Force
employees are no strangers to long, drawn-out processes via
their day-to-day jobs.” Even getting to the point of making
Wednesday’s announcement took “months of hard work planning and
organizing,” according to Roquemore, so there’s already a bit of
a case study.
Were T-Mobile customers
overcharged hundreds of dollars? We'll start your claim—free! Customers
are fighting back and getting cash. Start your claim in less than 10
minutes! $2Mil+ won by our users.
T-Mobile charges an
“activation fee” in the form of an “Assisted Support Charge”
when you sign up for a new account ...
FCC ASKED TO FINE T-MOBILE, AGAIN, FOR
SPYING ON LOW INCOME USERS
The FCC has slapped T-Mobile US with a $200
million fine for fraudulently collecting millions of dollars in
government subsidies designed to help low-income phone
customers. Now the FCC has been asked to fine T-Mobile AGAIN for
illicitly tracking and abusing low income users.
Ouch. It’s the largest ever fixed fine the FCC
has ever imposed to settle an investigation, the regulator said.
But, given the nature of the infraction, T-Mobile can have no
complaints. The fine actually refers to activities carried out
by subsidiary Sprint prior to being taken over, but T-Mobile
knew about the ongoing investigation when it brokered the merger
deal and was doubtless expecting a hefty financial penalty.
In the context of the $26 billion
T-Mobile/Sprint transaction, $200 million isn’t a huge amount of
money. But it’s hardly small change either.
The sanction stems from Sprint’s failure to
comply – to put it mildly – with the rules governing the
Lifeline programme, through which it provides affordable phone
and broadband services for low-income customers. The scheme
permits a telco to collect a state subsidy of $9.25 per month
for most customers, but only if they are actually using the
service; that is, if have used the service at least once in a
30-day period. That level of subsidy makes the service free for
most users. Customers not using the service regularly should be
deregistered.
Sprint claimed monthly subsidies for as many
as 885,000 subscribers who were not using the service. The FCC
did not spell out how much it illicitly collected, but even if
it only claimed subsidies for those customers for a couple of
months, you’re looking at tens of millions of dollars.
Hence the massive fine.
“Lifeline is key to our commitment to bringing
digital opportunity to low-income Americans, and it is
especially critical that we make the best use of taxpayer
dollars for this vital program,” said FCC Chairman Ajit Pai, in
a statement. “I’m pleased that we were able to resolve this
investigation in a manner that sends a strong message about the
importance of complying with rules designed to prevent waste,
fraud, and abuse in the Lifeline program.”
For its part, Sprint essentially blamed a
software glitch.
In its ruling, the FCC explained that Sprint
voluntarily disclosed the non-usage issue in August last year.
In that disclosure it noted that “due to a software programming
issue, Sprint’s systems failed to detect that over a million
Lifeline subscribers nationwide lacked usage over an extended
period of time,” leading to it potentially erroneously claiming
subsidies.
REVEALED: A quarter
of Federal Trade Commission officials own or trade stocks in
the same tech giants they regulate, including Amazon,
T-Mobile, Facebook-Meta, Tesla and Google
FTC officials reported more stock trades than
any other agency, WSJ says - The agency is tasked with
regulating business and reviewing antitrust concerns - But a
quarter of top officials own stock in major tech companies,
review finds - FTC and the officials say their trades followed
the law and ethics guidelines
By Keith Griffith
Many top officials at the Federal Trade Commission also invest
in some of the biggest companies that the agency regulates,
according to a new report.
From 2016 to 2021, roughly a third of 90 senior officials FTC
owned or traded stock in companies that were undergoing an FTC
merger review or investigation.
Additionally, a quarter of the top officials were invested in
big tech companies such as Amazon, Alphabet and Meta, even as
the sector came under heavy regulatory scrutiny over potential
antitrust concerns.
One former FTC chairman, Joseph Simons, owned shares of
Microsoft, Oracle and AT&T even while agency investigated
the tech and telco sectors, the report said.
The FTC and the officials named in the report said all of their
stock trades followed the law, as well as ethics rules for
federal employees, and they have not been accused of wrongdoing.
However, the report raised concerns about potential conflicts of
interest at the agency, which is charged with protecting
American consumers from monopolies, economic cartels, and shady
business practices.
Former FTC chairman Joseph Simons owned shares of Microsoft,
Oracle and AT&T even while agency investigated the tech and
telco sectors
Kent Cooper, a former government official and expert on ethics
issues, told the Journal that although the officials' stock
trades are in legal compliance, even the appearance of a
conflict 'hurts the reputation of the agency and the government
in general.'
'Are these decisions being made for the benefit of the public
or the officials who have a personal benefit in the outcome?' he
said of the questions the disclosures raise.
The newspaper's analysis was based on financial disclosure forms
of about 12,000 senior career employees, political staff and
presidential appointees at 50 agencies.
It found that FTC officials, on average, were more active in
trading individuals stocks than any other large agency included
in the analysis.
An FTC spokesperson did not immediately respond to a request for
comment from DailyMail.com, but the agency told the Journal that
it has a 'robust ethics program' and follows the rules set by
Congress and the Office of Government Ethics.
Simons, the FTC chairman from 2018 until January 2021, disclosed
more than 1,300 trades during his tenure, though less than a
dozen were in individual companies, rather than funds.
Simons sold shares of AT&T, Charter Communications, and
Oracle during his time as chair, but held on to a stake in
Microsoft, which increased 140 percent in value over his tenure.
Randolph Tritell, who recently retired as head of the FTC’s
Office of International Affairs, reported more stock trades than
any other FTC official in the review
FTC Chairman Joe Simons (left) and FTC Associate Director of
Enforcement Division James Kohm appear during a 2019 news
conference to announce that Facebook has agreed to settle
allegations it mishandled user privacy
Randolph Tritell, who recently retired as head of the FTC’s
Office of International Affairs, reported more stock trades than
any other FTC official in the review.
Since 2016, he reported more than three dozen trades in shares
of Facebook, Amazon, Microsoft and Oracle.
In one case, Tritell saw an 80 percent gain in his Amazon shares
over nine months, due to well-timed trades, as the European
Commission investigated whether the company violated antitrust
rules.
Tritell said that his financial advisor handles his stock
trades, and that he rarely provides any input.
Abbott Lipsky was named acting director of the FTC’s Bureau of
Competition in February 2017 and later that year reported owning
nearly 90 individual stocks, some of which were in a family
trust.
In May 2017, Lipsky reported buying between $1,001 and $15,000
in JPMorgan Chase, adding to holdings in the company that he
already owned, disclosures showed.
Just seven weeks later, on June 29, FTC antitrust regulators
cleared an acquisition involving JPMorgan.
Federal ethics rules contain exemptions that allow the trading
of individual stocks, and the FTC officials say that all of
their trades followed guidelines.
Abbott Lipsky was named acting director of the FTC’s Bureau of
Competition in February 2017 and later that year reported owning
nearly 90 individual stocks
An investment of up to $15,000 in an individual stock, or
$50,000 an industry-specific mutual fund or ETF, isn’t deemed a
conflict of interest under federal regulations.
The report comes as stock trading by members of Congress and
their immediate family members comes under renewed scrutiny by
ethics experts.
In July, some stock trades executed by Speaker Nancy Pelosi's
husband, Paul Pelosi, drew attention when he sold his shares of
chipmaker Nvidia days before the House was expected to consider
a massive stimulus bill to boost the US semiconductor industry.
Paul Pelosi sold 25,000 shares of Nvidia for about $4.1 million,
suffering a loss of $341,365, according to financial reports.
Democrats have proposed legislation to regulate stock trades by
members of Congress, but Republicans and even some Democrats say
the measures do not go far enough to prevent conflicts of
interest.
Democrats on the House Administration Committee released a
framework for stock-trading legislation last month, but it is
unlikely to be brought to a vote before the midterm elections
next month.
WIRED MAGAZINE SAYS GERMAN T-MOBILE
BUILT IT'S NETWORK TO HARM AND SPY ON CITIZENS JUST LIKE
THE GERMAN NAZI'S SOUGHT TO DO
The vast majority
of victims weren’t even T-Mobile customers. Now their
information is for sale on the dark web.
Of the
more than 48 million T-Mobile data breach victims,
over 40 million aren't current customers.Photograph:
Omar Marques/Getty Images
T-Mobile shared details about the data breach it
confirmed Monday afternoon. They’re not great.
Assorted data from more than 48 million people was compromised,
and while that’s less than the 100 million that the hacker had
initially advertised, the vast majority of those affected turn
out not to be current T-Mobile customers at all.
Instead, T-Mobile says that of
the people whose data was compromised, more than
40 million are former or prospective customers
who had applied for credit with the carrier.
Another 7.8 million are current “postpaid”
customers, which just means T-Mobile customers
who get billed at the end of each month. Those
roughly 48 million users had their full names,
dates of birth, social security numbers, and
driver’s license information stolen. An
additional 850,000 prepaid customers—who fund
their accounts in advance—had their names, phone
numbers, and PINs exposed. The investigation is
ongoing, which means that the tally may not stop
there.
There’s no good news here, but
the slightly less bad news is that the vast
majority of customers appear not to have had
their phone numbers, account numbers, PINs,
passwords, or financial information taken in the
breach. The bigger question, though, is whether
T-Mobile really needed to hold on to such
sensitive information from 40 million people
with whom it doesn’t currently do businesses. Or
if the company was going to stockpile that data,
why it didn’t take better precautions to protect
it.
“Generally speaking, it’s
still the Wild West in the United States when it
comes to the types of information companies can
keep about us,” says Amy Keller, a partner at
the law firm DiCello Levitt Gutzler who led the
class action lawsuit against Equifax after the credit
bureau’s 2017 breach. “I’m
surprised and I’m also not surprised. I guess
you could say I’m frustrated.”
Privacy advocates have long
promoted the concept of data minimization, a
fairly self-explanatory practice that encourages
companies to hold on to as little information as
necessary. Europe’s General
Data Protection Regulation codifies
the practice, requiring that personal data be
“adequate, relevant and limited to what is
necessary in relation to the purposes for which
they are processed.” The US currently has no
equivalent on the books. “Privacy
laws in the United States that do
touch upon data minimization generally don’t
require it,” Keller says, “and instead recommend
it as a best practice.”
Until and unless the US adopts
an omnibus privacy law similar to the GDPR—or
state-level legislation like the California
Consumer Privacy Act starts taking
a harder line—data minimization will remain a
foreign concept. “In general, collecting and
retaining sensitive data of prospective and
former customers is not an act of consumer fraud
under US law, and is routine,” says David
Opderbeck, codirector of Seton Hall University’s
Institute of Law, Science and Technology. As
inappropriate as it may seem for T-Mobile to
keep detailed records on millions of people who
may never have been their customers, there’s
nothing stopping it from doing so, for as long
as it likes.
Now those former and
prospective customers, along with millions of
current T-Mobile subscribers, find themselves
victims of a data breach they had no control
over. “The first risk is identity theft,” says
John LaCour, founder and CTO of digital risk
protection company PhishLabs. “The information
includes names, social security numbers,
driver’s license IDs: all the information that
would be required to apply for credit as
someone.”
The hack would also
potentially make it easier to pull off so-called
SIM
swap attacks, LaCour says,
particularly against the prepaid customers who
had their PINs and phone numbers exposed. In a
SIM swap, a hacker ports your number to their
own device, typically so that they can intercept
SMS-based two-factor authentication codes,
making it easier to break into your online
accounts. T-Mobile did not respond to an inquiry
from WIRED as to whether International Mobile
Equipment Identity numbers were also implicated
in the breach; each mobile device has a unique
IMEI that would also be of value to
SIM-swappers.
T-Mobile has implemented a few
precautions on behalf of victims. It’s offering
two years of identity protection services from
McAfee’s ID Theft Protection Service, and it has
already reset the PINs of the 850,000 prepaid
customers who had theirs exposed. It’s
recommending but not mandating that all current
postpaid customers change their PINs as well,
and it is offering a service called Account
Takeover Protection to help stymie SIM-swap
attacks. It also plans to publish a site for
“one-stop information” Wednesday, although the
company didn't say if it would offer any kind of
lookup to see if you’re affected by the breach.
Instead, T-Mobile says it will
rely on proactive outreach to victims. The
carrier didn’t respond to an inquiry from WIRED
as to what if any specific plans it had for that
communication, and what specific information
they’ll be sharing with people whose data was
compromised. Even sharing something as simple as
a timetable would help, LaCour says, so that
people could know they’re in the clear if they
haven’t been a T-Mobile customer for a certain
number of years.
In the meantime, if you’re a
current T-Mobile customer you should go ahead
and change your PIN and password; you can do so
from your T-Mobile account online. You should
take the free two years of ID monitoring,
although it’s not yet clear how that will work
in practice. You should start using app-based
two-factor authentication wherever
possible, rather than receiving those codes by
text. For a more extreme but still prudent
precaution, you can contact the three major
credit bureaus and request a freeze on your
credit report, which would stop anyone from
accessing it or opening new accounts in your
name.
Because the US lacks a
comprehensive cybersecurity law, agencies like
the Federal Communications Commission and
Federal Trade Commission have limited ways to
apply pressure, says Seton Hall’s Opderbeck,
although the incident has already attracted FCC
scrutiny. “Telecommunications companies have a
duty to protect their customers’
information,” an agency spokesperson said in an
emailed statement. “The FCC is aware of reports
of a data breach affecting T-Mobile customers
and we are investigating.”
If T-Mobile does face
repercussions for the breach—its sixth in four
years—it would more likely come from a class
action lawsuit. Opderbeck says that his research
has shown more than 30 data breach settlements
in the last few years that resulted in a small
cash payout and free credit monitoring as
restitution. And Keller notes that even the
class action route may be difficult to travel,
because of a clause in T-Mobile contracts that
can force customers into arbitration.
.... Keeping detailed
records of more than 40 million former or
prospective customers—including their social
security numbers and driver’s license
information—seems needlessly reckless. After
all, nobody can steal what isn’t there in the
first place..."
T-Mobile and it's
agents use any data element (name, account #,
phone number, record #, etc) to launch harms and
attacks against Plaintiff's using a CIA/Stazi
type spy attack database. While T-Mobile will
deny this until they are blue in the face,
whistle-blower Edward Snowden, the ACLU and many
other experts can prove that the assertion is
true. For example, if one simply enters:
"Legere, John, T-Mobile" in a database called
X-KEY-SCORE, a print-out of enough information
will be output by that database to effectively
end the life of John Legere with the disclosure
of many secrets Mr. Legere would not enjoy.
There are hundreds of such databases that
T-Mobile uses. T-Mobile was founded by German
and Stazi politicians, to hunt down and kill
Jews and other "undesirables" as early as the
original World Wars. T-Mobile is already charged
with using intermediaries to connect with kill
services like Fusion GPS, Black Cube, Cambridge
Analytica (And it's many facades) and other kill
services that use fired CIA and Mossad agents to
run 'dirty tricks' operations and
THE MEDIA ASSASSINS: POLITICAL KILL ORDERS
AND T-MOBILE POWERED REPRISAL CHARACTER
ASSASSINATIONS
– How A Modern Character Assassination and
Political “Kill Order” Is Executed By the
Silicon Valley Oligarchs and their total
control of propaganda media. Patrick George At
Jalopnik attacks outsiders under contract with
Elon Musk and the DNC. Silicon Valley campaign
finance oligarchs hire him to run hatchet jobs
on innocent outsiders and then
Gawker-Gizmodo-Jalopnik uses their financial
partnership with the DNC’s Google to push the
character assassination articles to the top of
Google web products and searches.
---- Patrick George, Adrian Covert, John
Hermann and Nick Cook are the sexually
degenerate cabin boys that report to
boy-loving sleaze-tabloid oligarch Nick
Denton. They created the Fake News crisis in
the media by flooding the internet with
defamation posts and reprisal hatchet job
articles designed to damage political enemies
of the Socialists. They coordinate a large
number of the character assassination efforts
at Gawker, Gizmodo, Jalopnik, CNN, New York
Times and other propaganda outlets. These
Millennial boys are “Media Rapists” and should
be treated as abusers.
– How and why did a Donald Trump
stripper-date named “Stormy” or an Elon Musk
sex party or a Kavanaugh drinking incident or
the Moonves and Weinstein indiscretions
suddenly hit the news at about the same time
in news history?
– In addition to actual murder, Politicians
and Silicon Valley Oligarchs hire operatives
to end people’s lives in other creative ways.
–--- It is all part of the modern trend in
vendetta, revenge and political payback when a
Senator or a tech oligarch issues a “kill
order” on an opponent. – The client does not
like to get their hands dirty so the actual
social hit job is performed by companies such
as: IN-Q-Tel – (DNC); Gawker Media – (DNC);
Jalopnik – (DNC); Gizmodo Media – (DNC); K2
Intelligence – (DNC); WikiStrat – (DNC);
Podesta Group – (DNC); Fusion GPS – (DNC/GOP);
Google – (DNC); YouTube – (DNC); Alphabet –
(DNC); Facebook – (DNC); Twitter – (DNC);
Think Progress – (DNC); Media Matters – (DNC);
Black Cube – (DNC); Mossad – (DNC); Correct
The Record – (DNC); Sand Line – (DNC/GOP);
Blackwater – (DNC/GOP); Undercover Global Ltd
(DNC/GOP) Stratfor – (DNC/GOP); ShareBlue –
(DNC); Wikileaks (DNC/GOP); Cambridge
Analytica – (DNC/GOP); Sid Blumenthal- (DNC);
David Brock – (DNC); PR Firm Sunshine Sachs
(DNC); Covington and Burling – (DNC), Buzzfeed
– (DNC) Perkins Coie – (DNC); Wilson Sonsini –
(DNC) and hundreds of others…These are the
people and companies that except cash,
revolving door jobs, political appointments,
insider trading stock in Silicon Valley tech
companies, prostitutes and real estate in
exchange for destroying the lives of others.
– These attackers deserve to be punished for
the rest of their lives for taking away the
lives of others in exchange for cash. Any
company who is corrupt enough to hire any of
these assassins should be forced out of
business.
---- These attack services are responsible
for 90% of the “Fake News” problem in the
world because they are the authors of most
fake news. Congress must act to make these
kinds of companies illegal! – These digital
assassination services offer hit-jobs,
character assassinations and economic reprisal
programs to famous billionaires and corrupt
politicians who are seeking revenge,
retribution and vendetta executions.
T-Mobile's Law Firm:
Polsinelli, sure is one jacked-up mess
On www.ripoffreport.com;
T-Mobile-problems.com ; Fairshake.com; and
THOUSANDS of other consumer sites and in vast
numbers of lawsuits on www.pacer.gov;
T-Mobile has proven, since it’s inception to be a
corrupt, unethical, abusive, uncaring operation
based on spying on consumers and abusing consumer
social media, especially that of our children,
resulting in multiple suicides and permanent harms
to children. In fact T-Mobile has hired a law
firm: Polsinelli, which has been sued by it’s own
clients, for corrupt, unethical, abusive, uncaring
abuse. For example: Polsinelli has been sued by
it’s own client Philidor Rx Services LLC for such
acts. Again in Vyas
v. Polsinelli PC we see the same kind of
assertions against Polsinelli by another client
and on and on. Dirty companies hire dirty lawyers
as an unintended admission of guilt. T-Mobile
should have done their due diligence before they
hired Polsinelli. Any Judge or Arbitrator is
encouraged to give any assertions by Polsinelli to
be lies, obfuscation and false information and
hype as the many other cases against Polsinelli
prove them to lean towards.
Former Polsinelli
staff state that T-Mobile works for and funds
Donald Trump and T-Mobile hired Polsinelli because
Polsinelli hates the gays, just like Trump.
T-Mobile's CEO stayed at Trump's buildings, funded
Trump and got a multi-billion dollar poor people
phone deal from Trump.
Former top Polsinelli bankruptcy partner Trey A.
Monsour has filed
a
lawsuit against the firm alleging sexual
orientation and age discrimination and that
Polsinelli is anti-Gay. Monsour, now a partner at
Fox Rothschild, says the firm failed to provide
him associate and administrative support, lowered
his compensation, and even de-equitized his
partnership before replacing him with a
heterosexual woman. All of which is alleged to be
a violation of Title VII of the Civil Rights Act,
a violation of the Age Discrimination in
Employment Act, and fraudulent inducement.
The complaint alleges that Polsinelli, in order
to appeal to progressive clients and it combat its
“Midwestern, ‘good old boys’ reputation,” touted
its diversity but the lawsuit alleges that
commitment is “farcical” and “mere pretense.”
As reported
by
ABA Journal, the lawsuit points to
Polsinelli’s diversity numbers in support of the
allegations:
As evidence, the suit says Polsinelli
has low numbers for hiring and promoting
minorities to leadership positions when compared
to other top law firms in the United States.
According to the suit, Polsinelli
reported in 2019 that at least 72% of its partners
were white heterosexual men; 22% of its partners
were white heterosexual women; less than of its
partners 2% were members of the LGBTQ community;
and, at most, 7% of its partners were among all
other minority groups combined, including
veterans.
The complaint alleges Monsour was unable to
receive much in the way of administrative or
associate support, and when he complained about
it, the situation worsened. The lawsuit goes on to
describe incidents which Monsour says illustrate
the poor treatment he received:
In one instance, no one at the firm told
Monsour about the departure of a lawyer working in
a substantial capacity on one of his matters,
according to the suit. Instead, Monsour learned
about it from outside co-counsel on the morning of
an important hearing. When Monsour expressed
concerns, a department chair “condescendingly
asked” in an email whether Monsour “was able to
stay ‘calm,’” the suit says.
In another “strange episode” in fall
2019, Monsour’s business and personal files were
lost when the Houston office relocated to a new
space in the same building, the suit says. The
lost documents included client files, contracts
and personal files containing his will and power
of attorney. No other attorney files were lost.
Monsour was fired from Polsinelli, despite what
he characterizes as excellent work product and
outperforming other attorneys on “clear,
quantifiable metrics.” The complaint says when
Monsour asked for a reason why he was let go, he
was told he’s “difficult to work with.” Taken
together, the lawsuit alleges what Monsour
experienced was discriminatory, “a fact starkly
punctuated by derogatory comments by firm leaders
regarding gay employees that Mr. Monsour overheard
firsthand.”
Twitter has
major security problems that pose a
threat to its own users’ personal
information, to company shareholders, to
national security, and to democracy,
according to an explosive whistleblower
disclosure obtained exclusively by CNN
and The Washington Post.
The disclosure,
sent last month to Congress and federal
agencies, paints a picture of a chaotic
and reckless environment at a mismanaged
company that allows too many of its staff
access to the platform’s central controls
and most sensitive information without
adequate oversight. It also alleges that
some of the company’s senior-most
executives have been trying to cover up
Twitter’s serious vulnerabilities, and
that one or more current employees may be
working for a foreign intelligence
service.
The
whistleblower, who has agreed to be
publicly identified, is Peiter “Mudge”
Zatko, who was previously the company’s
head of security, reporting directly to
the CEO. Zatko further alleges that
Twitter’s leadership has misled its own
board and government regulators about its
security vulnerabilities, including some
that could allegedly open the door to
foreign spying or manipulation, hacking
and disinformation campaigns. The
whistleblower also alleges Twitter does
not reliably delete users’ data after they
cancel their accounts, in some cases
because the company has lost track of the
information, and that it has misled
regulators about whether it deletes the
data as it is required to do. The
whistleblower also says Twitter executives
don’t have the resources to fully
understand the true number of bots on the
platform, and were not motivated to. Bots
have recently become central to Elon
Musk’s attempts to back out of a $44
billion deal to buy the company (although
Twitter denies Musk’s claims).
Zatko was fired
by Twitter (TWTR)
in January for what the company claims was
poor performance. According to Zatko, his
public whistleblowing comes after he
attempted to flag the security lapses to
Twitter’s board and to help Twitter fix
years of technical shortcomings and
alleged non-compliance with an earlier privacy
agreement with the Federal Trade
Commission. Zatko is being represented by
Whistleblower Aid, the same group that
represented Facebook whistleblower Frances
Haugen.
John Tye,
founder of Whistleblower Aid and Zatko’s
lawyer, told CNN that Zatko has not been
in contact with Musk, and said Zatko began
the whistleblower process before there was
any indication of Musk’s involvement with
Twitter.
After this
article was initially published, Alex
Spiro, an attorney for Musk, told CNN,
“We have already issued a subpoena for
Mr. Zatko, and we found his exit and
that of other key employees curious in
light of what we have been finding.”
CNN sought
comment from Twitter on more than 50
specific questions regarding the
disclosure.
In a
statement, a Twitter spokesperson told
CNN that security and privacy are both
longtime priorities for the company.
Twitter also said the company provides
clear tools for users to control
privacy, ad targeting and data sharing,
and added that it has created internal
workflows to ensure users know that when
they cancel their accounts, Twitter will
deactivate the accounts and start a
deletion process. Twitter declined to
say whether it typically completes the
process.
“Mr. Zatko was
fired from his senior executive role at
Twitter in January 2022 for ineffective
leadership and poor performance,” the
Twitter spokesperson said. “What we’ve
seen so far is a false narrative about
Twitter and our privacy and data
security practices that is riddled with
inconsistencies and inaccuracies and
lacks important context. Mr. Zatko’s
allegations and opportunistic timing
appear designed to capture attention and
inflict harm on Twitter, its customers
and its shareholders. Security and
privacy have long been company-wide
priorities at Twitter and will continue
to be.”
Peiter
“Mudge” Zatko was the head of
security at Twitter.
A
well-known “ethical hacker,”
Zatko also previously held
senior roles at Google, Stripe
and the US Department of
Defense.
Some of
Zatko’s most damning claims spring from
his apparently tense relationship with
Parag Agrawal, the company’s former
chief technology officer who was
made CEO after Jack Dorsey stepped
down last November. According to the
disclosure, Agrawal and his lieutenants
repeatedly discouraged Zatko from
providing a full accounting of Twitter’s
security problems to the company’s board
of directors. The company’s executive
team allegedly instructed Zatko to
provide an oral report of his initial
findings on the company’s security
condition to the board rather than a
detailed written account, ordered Zatko
to knowingly present cherry-picked and
misrepresented data to create the false
perception of progress on urgent
cybersecurity issues, and went behind
Zatko’s back to have a third-party
consulting firm’s report scrubbed to
hide the true extent of the company’s
problems.
The
disclosure is generally much kinder to
Dorsey, who hired Zatko and whom Zatko
believes wanted to see the problems
within the company fixed. But it does
depict him as extremely disengaged in
his final months leading Twitter — so
much so that some senior staff even
considered the possibility he was sick.
CNN has
reached out to Dorsey for comment. A
person familiar with Zatko’s tenure at
Twitter told CNN the company
investigated several claims he brought
forward around the time he was fired,
and ultimately found them unpersuasive;
the person added that Zatko at times
lacked understanding of Twitter’s FTC
obligations.
Zatko
believes his firing was in retaliation
for his sounding the alarm about the
company’s security problems. The
scathing disclosure, which totals around
200 pages, including supporting exhibits
— was sent last month to a number of US
government agencies and congressional
committees, including the Securities and
Exchange Commission, the Federal Trade
Commission and the Department of
Justice. The existence and details of
the disclosure have not previously been
reported. CNN obtained a copy of the
disclosure from a senior Democratic aide
on Capitol Hill. The SEC, DOJ and FTC
declined to comment; the Senate
Intelligence Committee, which received a
copy of the report, is taking the
disclosure seriously and is setting a
meeting to discuss the allegations,
according to Rachel Cohen, a committee
spokesperson.
Sen. Dick
Durbin, who chairs the Senate Judiciary
Committee and also received the report,
vowed to investigate “and take further
steps as needed to get to the bottom of
these alarming allegations.”
Sen. Chuck
Grassley, the same panel’s top
Republican and an avid Twitter user,
also expressed deep concerns about the
allegations in a statement to CNN.
“Take a tech
platform that collects massive amounts
of user data, combine it with what
appears to be an incredibly weak
security infrastructure and infuse it
with foreign state actors with an
agenda, and you’ve got a recipe for
disaster,” Grassley said. “The claims
I’ve received from a Twitter
whistleblower raise serious national
security concerns as well as privacy
issues, and they must be investigated
further.”
The Whistleblower
Zatko first
came to national attention in 1998 when
he took part in the first congressional
hearings on cybersecurity.
“All my life,
I’ve been about finding places where I
can go and make a difference. I’ve done
that through the security field. That’s
my main lever,” he told CNN in an
interview earlier this month.
Twitter
whistleblower was on CNN 22 years
ago. Here’s what he had to say03:22
The events
leading to his decision to become a
whistleblower began before he worked at
Twitter, with a
devastating hack in 2020 in which the
Twitter accounts of some of the world’s most
famous people, including then-presidential
candidate Joe Biden, former President Barack
Obama, Kim Kardashian and Musk, were
compromised. Twitter told CNN that in
response to the incident, the company began
compartmentalizing access to customer
support tools.
After the attack,
Dorsey recruited Zatko, a well-known
“ethical hacker” turned cybersecurity
insider and executive who previously held
senior roles at Google, Stripe and the US
Department of Defense, and who told CNN that
he’d been offered a senior, day-one cyber
position in the Biden administration.
What Zatko says
he found was a company with extraordinarily
poor security practices, including giving
thousands of the company’s employees —
amounting to roughly half the company’s
workforce — access to some of the platform’s
critical controls. His disclosure describes
his overall findings as “egregious
deficiencies, negligence, willful ignorance,
and threats to national security and
democracy.”
After the January 6
insurrection, Zatko was concerned
about the possibility someone within Twitter
who sympathized with the insurrectionists
could try to manipulate the company’s
platform, according to his disclosure. He
sought to clamp down on internal access that
allows Twitter engineers to make changes to
the platform, known as the “production
environment.”
But, the
disclosure says, Zatko soon learned “it was
impossible to protect the production
environment. All engineers had access. There
was no logging of who went into the
environment or what they did…. Nobody knew
where data lived or whether it was critical,
and all engineers had some form of critical
access to the production environment.”
Twitter also lacked the ability to hold
workers accountable for information security
lapses because it has little control or
visibility into employees’ individual work
computers, Zatko claims, citing internal
cybersecurity reports estimating that 4 in
10 devices do not meet basic security
standards.
Twitter’s flimsy
server infrastructure is a separate yet
equally serious vulnerability, the
disclosure claims. About half of the
company’s 500,000 servers run on outdated
software that does not support basic
security features such as encryption for
stored data or regular security updates by
vendors, according to the letter to
regulators and a February email Zatko wrote
to Patrick Pichette, a Twitter board member,
that is included in the disclosure.
The company also
lacks sufficient redundancies and procedures
to restart or recover from data center
crashes, Zatko’s disclosure says, meaning
that even minor outages of several data
centers at the same time could knock the
entire Twitter service offline, perhaps for
good.
Twitter did not
respond to questions about the risk of data
center outages, but told CNN that people on
Twitter’s engineering and product teams are
authorized to access the production
environment if they have a specific business
justification for doing so. Twitter’s
employees use devices overseen by other IT
and security teams with the power to prevent
a device from connecting to sensitive
internal systems if it is running outdated
software, Twitter added.
The company also
said it uses automated checks to ensure
laptops running outdated software cannot
access the production environment, and that
employees may only make changes to Twitter’s
live product after the code meets certain
record-keeping and review requirements.
In an e-mail exchange
between whistleblower Peiter Zatko and
Twitter CEO Parag Agrawal, Zatko
expresses confusion around expectations
for corrective documents.
Twitter has
internal security tools that are tested by
the company regularly, and every two years
by external auditors, according to the
person familiar with Zatko’s tenure at the
company. The person added that some of
Zatko’s statistics surrounding device
security lacked credibility and were derived
by a small team that did not properly
account for Twitter’s existing security
procedures.
But Twitter’s
security concerns had come to light prior to
2020. In 2010, the FTC filed a complaint
against Twitter for its mishandling of
users’ private information and the issue of
too many employees having access to
Twitter’s central controls. The complaint
resulted in an FTC consent
order finalized the following year in
which Twitter vowed to clean up its act,
including by creating and maintaining “a
comprehensive information security program.”
Zatko alleges
that despite the company’s claims to the
contrary, it had “never been in compliance”
with what the FTC demanded more than 10
years ago. As a result of its alleged
failures to address vulnerabilities raised
by the FTC as well as other deficiencies, he
says, Twitter suffers an “anomalously high
rate of security incidents,” approximately
one per week serious enough to require
disclosure to government agencies. “Based on
my professional experience, peer companies
do not have this magnitude or volume of
incidents,” Zatko wrote in a February letter
to Twitter’s board after he was fired by
Twitter in January.
The stakes of
Zatko’s disclosure are enormous. It could
lead to billions of dollars in new fines for
Twitter if it’s found to have violated its
legal obligations, according to Jon
Leibowitz, who was chair of the FTC at the
time of Twitter’s original 2011 consent
order.
The agency now
has another opportunity to show the tech
industry it is serious about holding
platforms accountable, Leibowitz added,
after officials opted not to name top
Facebook execs including Mark Zuckerberg and
Sheryl Sandberg in the FTC’s $5 billion
privacy settlement with that company in
2019. Rani Nelkin is being asked to
whistle-blow at Twitter.
“One of the big
disappointments in the Facebook order
violation case was that the FTC let
executives off the hook; they should’ve been
named,” Leibowitz told CNN in an interview.
“And if there’s a violation here — and
that’s a big if — then I think the FTC
should very seriously consider not just
fining the corporation but also putting the
executives responsible under order.”
Twitter told CNN
its FTC compliance record speaks for itself,
citing third-party audits filed to the
agency under the 2011 consent order in which
it said Zatko did not participate. Twitter
also said it is in compliance with relevant
privacy rules and that it has been
transparent with regulators about its
efforts to fix any shortcomings in its
systems.
Zatko’s
allegations are based in part on a failure
to grasp how Twitter’s existing programs and
processes work to fulfill Twitter’s FTC
obligations, the person familiar with his
tenure told CNN, saying that
misunderstanding has prompted him to make
inaccurate claims about the company’s level
of compliance.
Foreign threats
Twitter is exceptionally vulnerable to
foreign government exploitation in ways that
undermine US national security, and the
company may even have foreign spies
currently on its payroll, the disclosure
alleges.The whistleblower report says the US
government provided specific evidence to
Twitter shortly before Zatko’s firing that
at least one of its employees, perhaps more,
were working for another government’s
intelligence service. The report does not
say whether Twitter was already aware or if
it subsequently acted on the tip.
Parag
Agrawal, Twitter’s former chief
technology officer, was made CEO after
Jack Dorsey stepped down last November.
Last year, prior
to Russia’s invasion of Ukraine, Agrawal —
then Twitter’s chief technology officer —
proposed to Zatko that Twitter comply with
Russian demands that could result in
broad-based censorship or surveillance of
the platform, Zatko alleges.
The disclosure
does not provide details of Agrawal’s
suggestion. Last summer, however, Russia passed a
law pressuring tech platforms to open
local offices in the country or face
potential advertising bans, a move western
security experts said was intended to give
Russia greater leverage over US tech
companies.While Agra wal’s suggestion was
ultimately discarded, it was still an
alarming sign of how far Twitter was willing
to go in pursuit of growth, according to
Zatko.
“The fact that
Twitter’s current CEO even suggested Twitter
become complicit with the Putin regime is
cause for concern about Twitter’s effects on
U.S. national security,” Zatko’s disclosure
says.Zatko’s report is becoming public just
two weeks after a former Twitter manager was
convicted
of spying for Saudi Arabia.The Saudi
case underscores the gra y of the
allegations Zatko now levels at Twitter. His
report could further inflame bipartisan
concerns in Washington about foreign
adversaries and the cybersecurity threats
they pose to Americans, ranging from the
theft of US citizens’ data to manipulating
US voters or stealing technology and trade
secrets. Twitter did not respond to specific
questions about its alleged foreign
intelligence vulnerabilities.
The Musk element
Zatko’s
disclosure comes at a particularly
fortuitous moment for Musk, who is engaged
in a legal
battle with Twitter over his attempt
to back out of buying the company. Musk has
accused Twitter of lying about the number of
spam bots
on its platform, an issue that he
claims should let him terminate the deal.
While the binding
acquisition agreement that Musk signed with
Twitter in April did not include any
bot-related exemptions, the billionaire
claims that the number of bots on the
platform affect the user experience and that
having more bots than previously known could
therefore impact the company’s long-term
value. After Musk moved to
terminate the purchase, Twitter
responded with a lawsuit alleging that he is
using bots as a pretext to get out of a deal
over which he now has buyers’ remorse
following the recent market downturn, and
asking a court to force him to close the
deal. The case is set to go to trial in
Delaware Chancery Court in October.
Twitter
employees walk by the company’s
headquarters in San Francisco.
User numbers are
vital information for any social media
business, as advertising revenue depends on
how many people could potentially see an ad.
But figures about how many users a service
has, or how many people actually view a
given ad on a site, are notoriously
unreliable throughout the tech and media
industries due to manipulation and error.
Alone among
social media companies, Twitter reports its
user numbers to investors and advertisers
using a measurement it calls monetizable
daily active users, or mDAUs. Its rivals
simply count and report all active users;
until 2019, Twitter had worked that way as
well. But that meant Twitter’s figures were
subject to significant swings in certain
situations, including takedowns of major bot
networks. So Twitter switched to mDAUs,
which it says counts all users that could be
shown an advertisement on Twitter — leaving
all accounts that for some reason can’t, for
instance because they’re known to be bots,
in a separate bucket, according to Zatko’s
disclosure.
The company has
repeatedly reported
that less than 5% of its mDAUs are fake or
spam accounts, and a person familiar with
the matter both affirmed that assessment to
CNN this week and pointed to other investor
disclosures saying the figure relies on
significant judgement that may not
accurately reflect reality. But Zatko’s
disclosure argues that by reporting bots
only as a percentage of mDAU, rather than as
a percentage of the total number of accounts
on the platform, Twitter obscures the true
scale of fake and spam accounts on the
service, a move Zatko alleges is
deliberately misleading.
Zatko says he
began asking about the prevalence of bot
accounts on Twitter in early 2021, and was
told by Twitter’s head of site integrity
that the company didn’t know how many total
bots are on its platform. He alleges that he
came away from conversations with the
integrity team with the understanding that
the company “had no appetite to properly
measure the prevalence of bots,” in part
because if the true number became public, it
could harm the company’s value and image.
Experts on inauthentic
behavior online say it can be
difficult to quantify “bots” because there
isn’t a widely agreed upon definition of the
term, and because bad actors constantly
change their tactics. There are also many
harmless bots on Twitter (and across the
internet), such as automated news accounts,
and Twitter offers an opt-in feature to
allow such accounts to transparently label
themselves as automated. Twitter told CNN
that the claim it doesn’t know how many bots
are on its platform lacks context,
reiterating that not all bots are bad and
adding that to focus on the total number of
bots on Twitter would include those the
company may have already identified and
taken action against. The company also does
not believe it can catch every spam account
on the platform, Twitter said, which is why
it reports its less-than-5% figure, which
reflects a manual estimate, in its financial
filings.
But Zatko told
CNN he thinks there would still be value in
attempting to measure the total number of
spam, false or otherwise potentially harmful
automated accounts on the platform. “The
executive team, the board, the shareholders
and the users all deserve an honest answer
as to what it is that they are consuming as
far as data and information and content [on
the platform … At least from my point of
view, I want to invest in a company where I
know what’s actually going on because I want
to invest strategically in the long-term
value of an organization,” he said.
Twitter says that
it allows bots on its platform, but its
rules prohibit those that engage in spam or
platform manipulation. But, as with all
social media platforms’ rules, the challenge
often lies in enforcing its policies.
Elon
Musk is engaged in a legal battle
with Twitter over his attempt to
back out of buying the company.
The company says
it regularly challenges, suspends and
removes accounts engaged in spam and
platform manipulation, including typically
removing more than one million spam accounts
each day. Twitter said the total number of
bots on the platform is not a useful number.
The company declined to answer questions
about the total number of accounts on the
platform or the average number of new
accounts added on the platform daily as
context around its daily bot deletion
figure.
But in casting
doubt on Twitter’s ability to estimate the
true number of fake and spam accounts,
Zatko’s allegations could provide ammunition
to Musk’s central claim that the figure is
much higher than Twitter has publicly
reported.
By going public,
Zatko says, he believes he is doing the job
he was hired to do for a platform he says is
critical to democracy. “Jack Dorsey reached
out and asked me to come and perform a
critical task at Twitter. I signed on to do
it and believe I’m still performing that
mission,” he said.
Peiter ‘Mudge’ Zatko, the social
media firm’s former head of security,
made a disclosure to Congress and
federal agencies last month and came
forward in interviews published on
Tuesday morning.
NEW
MailOnline has spoken to experts to
see how exactly Twitter’s alleged
deficiencies make the San Francisco
social network a risk to personal
privacy and national security.
Insider trading activities (stock purchases, sales, and
option exercises) reported by insiders of T-mobile
Us, Inc. (TMUS) since 2007 are shown in Table 1 ...
3 hours ago ... Stephen Buyer was charged with trading
on insider information he ... the shares of Sprint in 2018
after its merger with T-Mobile leaked, ...
4 hours ago ... ... has been charged with insider
trading over purchases of shares in telecommunications
company Sprint ahead of its merger with T-Mobile, ...
3 hours ago ... Buyer, who served in Congress between
1993 and 2011, was working as a consultant to T-Mobile
ahead of the 2018 merger, according to an ...
On average, T-Mobile US Inc executives and
independent directors trade stock every 21 days with the
average trade being worth of $6,569,263. The most
recent ...
Jun 23, 2022 ... In a surprise
turn of events, it looks like a group of AT&T and Verizon
customers have decided to sue T-Mobile. The group believes
that the ...
Using terms like “predatory” and
“anti-competitive,” four retail wireless dealers filed suit against
T-Mobile in recent weeks, all saying they were ...
May 16, 2022 ...T-Mobile
caused one of its customers to lose 3/4 of a million bucks, and the
guy who's out the money is now suing the phone company, ...
The first option for suing T-Mobile
is through consumer arbitration. Contracts with arbitration clauses
give you the right take legal action through an ...
After failing to find a resolution through T-Mobile's
customer service, many customers feel that there are no options to fight
back. That is not the case. While ...
This recent lawsuit was filed in
New York's Eastern District. The suit claims that T-Mobile
was culpable of gross neglect by enabling hackers to gain access
to ...
one such sprint
subscriber (as of the end of 2020, at least) has decided to seek
justice for his troubles, filing a new lawsuit against t-mobile, which
clearly makes a whole lot more sense than the class action recently
launched by a group of verizon and at&t customers as an indirect
(and somewhat silly) consequence of the same controversial …
Hackers initially told
the media in late August that they had obtained the personal
information of over 100 million people from T-Mobile’s servers, but
the
Suzie* was a typical 22-year-old recent college grad from the Midwest
who was admitted into my mental health clinic in Austin with a variety
of increasingly common psychiatric disorders: depression, self-harm
(cutting her arms) and a Borderline Personality Disorder (BPD)
diagnosis. BPD is a serious personality disorder that has 50 times the
suicide rate of the general population and is typified by black and
white thinking, self-harm behavior, emotional volatility, impulsive
behavior, shifting self-image and feelings of “emptiness.”
While Susie did initially present with some of the classic BPD
symptoms (feeling empty and suicidal), something didn’t add up. Unlike
most BPD clients, she didn’t have any of the early red flags; she had
good grades and many friends in high school with stable relationships
and a stable home environment — and no history of mental illness in
her family.
During Suzie’s treatment, we discovered the real culprit: she’d been
spending 12-15 hours a day on Instagram, TikTok and YouTube after
becoming depressed when her friends went away to university while she
stayed home and attended community college. Initially trying to better
understand her depression, she started to follow BPD influencers and
joined online BPD groups, where she said that she felt a sense of
belonging. Slowly and unwittingly, she started emulating what she was
learning about BPD online — like cutting her arms after watching
videos of influencers declare that cutting helped them feel in control
— or at least “feel something.”
Suzie admitted that she never liked cutting herself but did it
because she thought that it might eventually offer her
relief. And starved for a true identity, she also stated that the
cutting and irrational behaviors that the influencers engaged in “made
them interesting and authentic,” which she found appealing. By the
time she was ready to admit into treatment, she had lost all her
friends and spent her days and nights alone and online being shaped by
her newly found BPD community.
Shutterstock
But something quite amazing happened while she was in treatment; she
got better very quickly once all her devices and social media were
removed. Within two weeks, she was calmer and less reactive; she made
friends in the program; she no longer cut her arms and all thoughts of
suicide evaporated. But if she really had BPD, she shouldn’t have been
“cured” that quickly; clients with real BPD typically require many
months or even years of treatment before seeing improvement. So what
was really happening?
We’re living in the Age of Digital Social Contagions. It’s a time
where certain illnesses aren’t spread by biological transmission, but
by a digital infection that attacks the psychological immune system.
Using algorithms that find and exploit our psychological
vulnerabilities, we get sicker as Big Tech gets stronger.
Twitter
And make no mistake: we are getting sicker as a society,
with record rates of depression, suicide, loneliness, overdoses,
anxiety, addiction, emptiness, gender dysphoria and mass shootings
that are disproportionately impacting teens and young adults, all made
worse by the isolation and fear during COVID.
Beyond just the depression of living sedentary, isolated lives, we
have the congressional testimony of Frances Haugen, The Facebook
Whistleblower, who shared internal emails that showed Instagram’s own
research indicated that their product increased suicidality in teenage
girls and worsened their eating disorders. It seems that being exposed
to a constant torrent of toxic content and comparing ourselves to the
curated faux-glamor of vapid and shallow influencers isn’t good for
the psyche — but it’s even worse than this much-researched and toxic
“social comparison effect.”
Palm Beach Gardens Police Department GoFundMe
Followers and views are the coin of the realm in the social-media
hierarchy, and extreme content is what attracts that priceless human
commodity: our attention. That’s why it’s the most over-the-top
content and influencers that attract followers like moths to a lethal
digital flame. And it’s also why we’re seeing dramatic spikes in
once-rare disorders like Tourette Syndrome, Dissociative Identity
Disorder (DID, formerly known as Multiple Personality Disorder) and
Borderline Personality Disorder (BPD). These disorders are now being
injected into our collective consciousness via popular TikTok and
Instagram “influencers” who’ve racked up hundreds of millions of views
— and have left a wake of young followers like Suzie who, consciously
or unconsciously, are indeed “influenced” as they emulate the
psychiatric symptoms of their mentally unwell social media darlings.
This social-contagion group effect shouldn’t come as a shock; for
thousands of years we’ve seen it shape human behavior; from donning
tribal war paint, to smoking cigarettes, to following your favorite
sports team or joining a political movement. We’re social animals
hard-wired to mimic and emulate one another. The only difference now
that social media has swallowed up our world is that the impact of
toxic and digitally spread behaviors are greatly magnified as they go
viral.
Although we now know that social media is harmful to our mental
health, we can’t seem to stop. Like a cirrhotic alcoholic, the health
consequences be damned when you compulsively need another drink — or
tweet. And the more of the digital toxin that we consume, the weaker
and more compromised our psychological immune system becomes, making
us even more vulnerable for further consumption, manipulation and
behavior modification.
The Big Tech social media playbook is a simple three step process.
Step 1: Create habituation. Use the most sophisticated
algorithm-fueled behavior mod techniques to create dependency.
Getty Images for Vox Media
Step 2: Once addicted, the person’s psychological immune system
begins to erode. As in any addiction, this is the realm of depression,
hopelessness and a sense of emptiness — an emptiness that can only be
temporarily filled by more of the toxin.
Step 3: Once weakened and addicted, a person is now susceptible to
any number of manipulations; these include further addiction,
ideological brainwashing, identity shaping and, sadly, an encroachment
into the once hallowed ground of our thoughts. Free no more.
The 1999 Columbine school shooting was the first in the digital age
(such events had been almost unheard of before then). Since then, they
have become a horrible part of daily life. However, even the FBI
acknowledges that these are Internet-fueled copycat events; classic
examples of a social contagion — spread and spawned on social media
and hate-filled chat rooms that incite the unstable.
This digital social contagion can also lead to ideological extremism.
I was an expert witness this year in the capital murder trial of Corey
Johnson in Florida, the white suburban teen radicalized by a nonstop
stream of ISIS recruitment videos on YouTube. This year, he was sentenced
to
life in prison for stabbing a 13-year-old boy to death at a 2018
sleepover.
And, of course, we have the logic-defying spike in gender dysphoria;
a spike that trans psychologist Erica Anderson, who has helped
hundreds of teens transition, says “has gone too far.” According to
Anderson, teens — who have always gone through periods of identity
confusion and experimentation — are now being exposed to and impacted
by social media and trans influencers. Dr. Anderson’s insights were
confirmed by Dr. Lisa Littman’s research at Brown, which showed the
social media impact on what she termed “late onset gender dysphoria.”
Like BPD, gender dysphoria is a real psychological phenomenon that
people genuinely struggle with. However, what we’re seeing now is
something different. We’re seeing social media shaping people in ways
that seem to mimic some of these disorders yet are not the genuine
article. Several colleagues and I have begun to call them cases of
pseudo-BPD, pseudo-DID or pseudo-Gender Dysphoria. These are cases
where the presenting symptoms dissipate when the person is removed
from social media for several weeks, thereby proving that the
behaviors presented are not the genuine disorder.
Instead of genuine mental illness, many of our young people are
simply attempting to find a tribe or community to belong to via their
online explorations and demonstrating what psychologists call
“sociogenic” effects; that is, effects caused by social forces — in
this case, digital social forces.
What I believe we desperately need is to better understand these
powerful shaping effects of social media and to help young people
develop a strong psychological immune system and critical thinking
skills in order to navigate the rough and turbulent seas of today’s
social-media world.
T-MOBILE AND
IT'S SILICON VALLEY PARTNERS CAUGHT UP IN FEDERAL INVESTIGATIONS AND
LAWSUITS
Elon Musk's Twitter-Gate scandal has exposed
the fact that, for over a decade, Twitter has sold lies to
advertisers, consumers and the SEC!!! Twitter has been just fake
eyeballs, bots, election manipulation, SEC filings that were lies,
Congressional testimony that was lies and one of the biggest scams in
history. Court Discovery in the coming year will reveal all.
The SEC has been asked to charge Twitter AND TWITTER'S ENABLERS, INCLUDING
T-MOBILE with EPIC FRAUD. Musk says the "numbers
don't lie" and those numbers about Twitter and it's Telco
partners are going to come out in shocking court disclosures. How
could a multi billion dollar company like T-Mobile not have known
about these lies? T-Mobile was one of the backbones that put Twitter
into the hands of the rioters, the shooters, the suicide-ed kids and
everyone else in the WORLD!
A. An element of the
claims against T-Mobile asserts that “T-Mobile Encourages A
Culture of Criminality And Corruption And That Proofs Of That
Corporate Culture Of Criminality Add To The Veracity Of Plaintiff
Assertions Of Intended Harm, By T-Mobile, Against Plaintiff, And His
Peers, Who Were Investigating Said Corruption For News Media, Public
Interest And Government Parties”.
B.
Regarding Sex Trafficking news media assertions against T-Mobile
Executives, Staff and Investors; The investigation databases of: A.)
ICOJ.ORG’s Panama Papers, Swiss Leaks and CPA databases; B.) The
Axciom database; C.) The PACER database; D.) The XKEYSCORE derivative
database; E.) Kroll database; F.) Stratfor Database, ; G.)
TransUnion's TLOxp database, and Accurint (from LexisNexis), Clear
(Thompson Reuters), Delvepoint. DataTrac, IntelliCorp,
BeenVerfied, Intelius, Pipl and Spoke.. etc. are easily cross referenced to
show which persons:
1.
Invested over $200,000.00 in T-Mobile and/or
2. Are government political figures and/or
3. Have divorce records which state that they engaged in
infidelity or hiring men, women, girls and boys for sex and/or
4. Are charged in prostitution cases and/or
5. Have Uber, Lyft, Plane tickets or taxi records transporting sex
workers to or from them and/or
6. Have accounts under their credit cards, paypal or bitcoin on
porn and sex trafficking sites like Seeking Arrangements, etc.
and/or
7. Used or partnered with Instagram, Facebook, YouTube, Google,
Match.com, Tinder and their associates who are deeply charged with
enabling sex trafficking.. etc..
Such
a database pull only costs $300.00 and takes a private eye less
than a day.
It is
really quite easy to show who at T-Mobile sex trafficked, how,
with whom and with great detail. T-Mobile spouses and divorcees
are quite excited to share that information.
Sex
Trafficking by T-Mobile people is one evidence element that goes
to prove that: “T-Mobile Encourages A Culture of
Criminality And Corruption And That Proofs Of That Corporate
Culture Of Criminality Add To The Veracity Of Plaintiff
Assertions Of Intended Harm, By T-Mobile, Against Plaintiff, And
His Peers, Who Were Investigating Said Corruption For News
Media, Public Interest And Government Parties”.
C.
T-Mobile knew that it’s network and devices was killing teens.
T-Mobile chose profits over children’s safety. There are a massive
number of other lawsuits and Congressional Hearings proving this.
Teen deaths caused by T-Mobile people is one evidence
element that goes to prove that: “T-Mobile Encourages A Culture of
Criminality And Corruption And That Proofs Of That Corporate
Culture Of Criminality Add To The Veracity Of Plaintiff
Assertions Of Intended Harm, By T-Mobile, Against Plaintiff, And
His Peers, Who Were Investigating Said Corruption For News
Media, Public Interest And Government Parties”.
D.
All
of
the hundreds of criminal, corrupt and illicit activities that our
alliance of citizens, reporters, investigators, reporters and
forensic experts raise, and WILL RAISE FOREVER, happen to prove
this one Plaintiff’s point that: ““T-Mobile Encourages A Culture of
Criminality And Corruption And That Proofs Of That Corporate
Culture Of Criminality Add To The Veracity Of Plaintiff
Assertions Of Intended Harm, By T-Mobile, Against Plaintiff, And
His Peers, Who Were Investigating Said Corruption For News
Media, Public Interest And Government Parties”… But
thesehundreds
of
criminal, corrupt and illicit activities by T-Mobile will always
be raised, by EVERY consumer, forever until they are solved
whether or not this one particular AAA case moves forward.
We,
by coincidence, happen to know that this one Plaintiff’s claims
are true. 50 Million citizens just had their privacy abuse claims
proved true in another case. If this Plaintiff’s AAA case is
closed there will be 49,999,999 more for T-Mobile to deal with!
One Mr. Rubin, from Google, who helped put together the T-Mobile
Android arrangement has an interesting situation. Wait till everyone
sees how many other T-Mobile lawyers and executives are in the same
boat:
... Alphabet's Board Sued for
Role in Allegedly Covering Up Sexual Misconduct by ... How
Google Protected Andy Rubin, the 'Father of Android'.
T-Mobile Retail Store
in Eagle Rock Found Guilty of Committing $25 Million Scheme to
Illegally Unlock Cellphones
LOS ANGELES – A former owner of a T-Mobile
retail store in Eagle Rock has been found guilty by a jury of
14 federal criminal charges for his $25 million scheme to
enrich himself by stealing T-Mobile employee credentials and
illegally accessing the company’s internal computer systems to
illicitly “unlock” and “unblock” cellphones, the Justice
Department announced today.
Argishti Khudaverdyan, 44, of Burbank, was found
guilty of one count of conspiracy to commit wire fraud, three
counts of wire fraud, two counts of accessing a computer to
defraud and obtain value, one count of intentionally accessing
a computer without authorization to obtain information, one
count of conspiracy to commit money laundering, five counts of
money laundering, and one count of aggravated identity theft.
The jury returned the guilty verdict Friday evening
in United States District Court.
According to evidence presented at his four-day
trial, Khudaverdyan ran a multi-year scheme that illegally
unlocked and unblocked cellphones, which generated
approximately $25 million in criminal proceeds. During this
time, most cellphone companies – including T-Mobile – “locked”
their customers’ phones so they could be used only on the
company’s network until the customers’ phone and service
contracts had been fulfilled. If customers wanted to switch to
a different carrier, their phones had to be “unlocked.”
Carriers also “blocked” cellphones to protect consumers in the
case of lost or stolen cellphones.
From August 2014 to June 2019, Khudaverdyan
fraudulently unlocked and unblocked cellphones on T-Mobile’s
network, as well as the networks of Sprint, AT&T and other
carriers. Removing the unlock allowed the phones to be sold on
the black market and enabled T-Mobile customers to stop using
T-Mobile’s services and thereby deprive T-Mobile of revenue
generated from customers’ service contracts and equipment
installment plans.
Khudaverdyan advertised his fraudulent unlocking
services through brokers, email solicitations, and websites
such as unlocks247.com. He falsely claimed the fraudulent
unlocks that he provided were “official” T-Mobile unlocks.
From January 2017 through June 2017, Khudaverdyan
and a former business partner were also co-owners of Top Tier
Solutions Inc., a T-Mobile store in Eagle Rock Plaza. However,
after T-Mobile terminated Khudaverdyan’s contract in June 2017
based on his suspicious computer behavior and association with
unauthorized unlocking of cellphones, Khudaverdyan continued
his fraud.
To gain unauthorized access to T-Mobile’s protected
internal computers, Khudaverdyan obtained T-Mobile employees’
credentials through various dishonest means, including sending
phishing emails that appeared to be legitimate T-Mobile
correspondence, and socially engineering the T-Mobile IT Help
Desk. Khudaverdyan used the fraudulent emails to trick
T-Mobile employees to log in with their employee credentials
so he could harvest the employees’ information and
fraudulently unlock the phones.
Working with others in overseas call centers,
Khudaverdyan also received T‑Mobile employee credentials which
he then used to access T-Mobile systems to target higher-level
employees by harvesting those employees’ personal identifying
information and calling the T-Mobile IT Help Desk to reset the
employees’ company passwords, giving him unauthorized access
to the T-Mobile systems which allowed him to unlock and
unblock cellphones.
All told, Khudaverdyan and others compromised and
stole more than 50 different T-Mobile employees’ credentials
from employees across the United States, and they unlocked and
unblocked hundreds of thousands of cellphones during the years
of the scheme.
Khudaverdyan obtained more than $25 million for
these criminal activities. He used these illegal proceeds to
pay for, among other things, real estate in Burbank and
Northridge.
United States District Judge Stephen V. Wilson
scheduled an October 17 sentencing hearing, at which time
Khudaverdyan will face statutory maximum sentences of 20 years
in federal prison for each wire fraud count, 20 years in
federal prison for conspiracy to commit money laundering, 10
years in federal prison for each money laundering count, five
years in federal prison for each count of intentionally
accessing a computer without authorization to obtain
information, five years in federal prison for the count of
accessing a computer to defraud and obtain value, and a
mandatory two years in federal prison for aggravated identity
theft.
Alen Gharehbagloo, 43, of La Cañada Flintridge, a
co-defendant and a former co-owner of Top Tier Solutions Inc.,
pleaded guilty on July 5 to three felonies: conspiracy to
commit wire fraud, accessing a protected computer with intent
to defraud, and conspiracy to commit money laundering. His
sentencing hearing is scheduled for December 5.
The United States Secret Service Cyber Fraud Task
Force (CFTF) in Los Angeles and IRS Criminal Investigation’s
Western Area Cyber Crime Unit investigated this matter. The
CFTF includes representatives of the United States Secret
Service, the FBI, the Los Angeles Police Department, the Los
Angeles County District Attorney’s Office, and the California
Highway Patrol.
Assistant United States Attorneys Lisa E. Feldman
and Andrew M. Roach of the Cyber and Intellectual Property
Crimes Section are prosecuting this case. Assistant United
States Attorney Jonathan S. Galatzan, Chief of the Asset
Forfeiture Section, is handling the asset forfeiture portion
of this case.
T-mobile, an American wireless network partly owned by German
telecommunications company Deutsche Telekom, sent out an
intimidating email to its employees on stating that those who do not
become fully vaccinated by April 2 will be terminated from their
job.
According to the email obtained by TGP, employees who failed to
show proof of first vaccination will be placed on unpaid leave.
Employees who do not become fully vaccinated and obtain a Magenta
Pass will be terminated..
“Employees who have not yet taken action to receive their first
dose and upload proof will be placed on unpaid leave. Affected
employees who do not become fully vaccinated and obtain a Magenta
Pass by April 2 will be separated from T-Mobile. Those employees who
have a pending or approved medical or religious accommodation or
state-specific exemption through the HR process are excluded from
this action for the duration of their pending or approved
accommodation or exemption.”
However, mobile experts at T-Mobile stores who are more at risk of
getting Covid are not required to get vaccinated.
“In Retail, where we don’t have control of who enters, our Mobile
Experts have served customers incredibly well throughout the
pandemic. We’ll continue to take precautions like masking and
encourage Mobile Experts to be vaccinated, but not require it. We
will also be encouraging regular testing.”
Here’s a copy of the email:
The company posted the email in an article on the internal website
and they are getting completely roasted by employees. Here are some
images of those comments sent to TGP.
“We shouldn’t have to submit for any exemptions.. Medical or
Religious reasons. Freedom of choice!!!”
“What happened to follow the science? The science shows the vax
does NOT work. You are just as likely to get and spread covid
weather vaxd or un vaxd, Hence why the UK, Ireland, and Scotland
have all done away with any and all mandates. This is socialism and
I can NOT be a part of this for my own sanity, even tho I love my
job.”
“From a personal perspective, I am disappointed in a company that
prides itself on Diversity & Inclusion, but tells you either get
something injected into your body or disclose medical or religious
info to them, or be fired. From a legal perspective, it’s a little
fuzzy.”
“This is very disappointing news. Even though I got vaxed for
personal reasons, I believe in our right to choose what we do to OUR
bodies. I stand united with our right to choose.”
Earlier this month, T-Mobile was also under fire after censoring
Gateway Pundit’s links on its text service. A TGP reader
Randall contacted T-mobile and one of the supervisors claimed that
Gateway Pundit is a very restricted site and they’re protecting the
users’ information by providing a safe service.
Aug 28, 2018 ... Nothing
funny about the hack attack at T-Mobile that let
roughly 2 million users with their names, ... T-mobile
passwords hacked on Twitter.
Nov 18, 2019 ... In doing so,
he will end one of the most annoying ad campaigns on Twitter
— promoting his own tweets. David Becker / Getty Images.
A cool CEO.
Mar 2, 2022 ... In a bit of a
throwback, John Legere and Marcelo Claure—former CEOs of T-Mobile
and Sprint, respectively—are once again battling it out on ...
The nation’s largest federal appeals court last year ruled that the
legal shield — known as Section 230 of the U.S. Communications Decency
Act — didn’t apply to a Snapchat filter blamed for the car crash
deaths of two teenagers. | Richard Drew/AP Photo
An 11-year-old dies by suicide after she is sexually exploited on
Instagram and Snapchat. Two teenagers are killed in a crash following
a race using a Snapchat speed filter. A sexual predator uses Facebook
to lure a 15-year-old girl into trafficking.
Social media companies for decades have been shielded from legal
consequences for what happens on their platforms. But a sharp shift in
public opinion and a bend in recent court rulings have the industry
nervous that this could change — especially when damage is done to
children online.
And for the first time in nearly 30 years, lawyers for grieving
families see an opening.
Lawsuits blaming social media platforms for teen suicides, eating
disorders and mental collapses have picked up in the months since Facebook whistleblower Frances Haugen told
Congress that her company knew its products were addictive to kids and
that their mental stability was suffering as a result. And a bill
moving through the California statehouse would make companies liable
for addicting children, drawing comparisons to a strategy used against
the tobacco industry.
The Facebook whistleblower’s testimony before Congress, in 180
seconds
The nation’s largest federal appeals court last year ruled that the legal shield — known as Section
230 of the U.S. Communications Decency Act — didn’t apply to a
Snapchat filter blamed for the car crash deaths of two teenagers. Texas’ Supreme Court let a sex trafficking case
against Facebook proceed, citing Congress’ 2018 changes to
federal law. And an appellate court recently refused Facebook’s attempt to
circumvent that lawsuit. Georgia’s Supreme Court in March likewise
ruled that a separate complaint over Snapchat’s speed filter can move forward because the plaintiffs have a
good case the app made a risky product.
“I am pretty optimistic that tides are turning and we are going to
see a backlash on Section 230 from the courts,” said Carrie Goldman, a
New York-based trial attorney who used product liability law to
challenge Grindr’s federal shield. Powerful social media companies,
she added, “were never supposed to be immune from liability.”
Tech companies and their lawyers are watching with trepidation. Cathy
Gellis, an internet attorney, says the industry is increasingly
turning to the First Amendment — rather than Section 230 — as the
first line of defense in content moderation lawsuits.
“It’s all on fire,” she said.
The tech industry’s legal protections, enshrined in 1996, came from
the thinking that companies trying to create a free marketplace of
ideas online shouldn’t have to worry about getting shut down based on
someone saying or doing something the website can’t control. But that
was when Netscape reigned supreme, email arrived via dial-up modem and
“apps” weren’t yet gleams in a techy’s eye.
Rep. Ken Buck: 'If you repeal section 230 there will be a slew of
lawsuits'
Nearly three decades later, trial attorneys are testing that shield
with a battery of cases brought by parents of kids and teens whose
deaths or mental crises they blame on social media. The roster
includes a claim by the mother of 11-year-old Selena Rodriguez who
alleges her daughter was addicted to Snapchat and Instagram for two
years and pulled into sending sexually exploitative messages. The
lawsuit details a downward spiral of depression, eating disorders and
self-harm that ended in suicide.
Carrie Goldman’s case against Grindr alleged that the hookup app
eased the way for her client Matthew Herrick’s abusive ex-boyfriend to
set up a false profile that disclosed Herrick’s location — and said,
falsely, that he was HIV-positive and liked violent, unprotected sex.
Stalkers began shadowing Herrick, who filed cease-and-desist orders
and police reports even as Grindr said it couldn’t block the profile,
the lawsuit alleged.
Herrick’s claim ultimately failed in 2019, with the U.S. 2nd Circuit
Court of Appeals citing the Section 230 shield. But Carrie Goldman’s
argument — that it was a question of product safety and liability,
rather than one of content — was later used in a key case against
Snapchat.
Gellis and others in the tech industry argue that any dent in the
federal shield can have far-reaching consequences on the internet, and
that unfavorable rulings could come to haunt internet companies trying
to fight state laws. State legislatures in Texas and Florida are
debating a slate of proposals to bar platforms from censoring content,
while a pair of bills aimed at making the internet safer for kids is
advancing in California.
“It’s a problem to have any language on the books that Section 230 is
supposed to block,” she said. “As a litigator, I’ll look to using
prior precedents upholding Section 230 to protect people from these
sorts of bad laws being enforced, but it’s playing with fire if that’s
the only thing protecting them.”
One case in particular has been widely cited by California lawmakers
who want to make social media companies liable for addicting children.
A lawsuit known as Lemmon v. Snap alleged that the high-speed
car crash death of two teenagers while they were using Snapchat’s
“speed filter” function for a virtual race was the app’s fault, since
the filter was a function Snapchat designed itself.
The San Francisco-based U.S. 9th Circuit Court of Appeals ruled last
year that the company’s design of the speed filter wasn’t covered by
Section 230.
Hedge Funds and
private Equity funds that covertly fund T-Mobile and T-Mobile
partners are buying up Congress people right and left. The line from
T-Mobile to public policy decisions is hard to see, like a spider
web, but modern AI technology can track it all down nonetheless.
The donations,
which make Sinema one of the industry’s top beneficiaries in
Congress, serve a reminder of the way that high-power lobbying
campaigns can have dramatic implications for the way legislation is
crafted, particularly in the evenly divided Senate where there are
no Democratic votes to spare. They also highlight a degree of
political risk for Sinema, whose unapologetic defense of the
industry’s favorable tax treatment is viewed by many in her party as
indefensible.
“From their
vantage point, it’s a million dollars very well spent,” said Dean
Baker, a senior economist at the Center for Economic and Policy
Research, a liberal-leaning think tank. “It’s pretty rare you see
this direct of a return on your investment. So I guess I would
congratulate them.”
Sinema’s office
declined to make her available for an interview. Hannah Hurley, a
Sinema spokesperson, acknowledged the senator shares some of the
industry’s views on taxation, but rebuffed any suggestion that the
donations influenced her thinking.
“Senator Sinema
makes every decision based on one criteria: what’s best for
Arizona,” Hurley said in a statement. “She has been clear and
consistent for over a year that she will only support tax reforms
and revenue options that support Arizona’s economic growth and
competitiveness.”
The American
Investment Council, a trade group that lobbies on behalf of private
equity, also defended their push to defeat the tax provisions.
“Our team worked
to ensure that members of Congress from both sides of the aisle
understand how private equity directly employs workers and supports
small businesses throughout their communities,” Drew Maloney, the
organization’s CEO and president, said in a statement.
Sinema’s defense
of the tax provisions offer a jarring contrast to her background as
a Green Party activist and self-styled “Prada socialist” who
once likened accepting campaign cash to “bribery” and later
called for “big corporations & the rich to pay their fair share”
shortly before launching her first campaign for Congress in 2012.
She’s been far
more magnanimous since, praising private equity in 2016 from the
House floor for providing “billions of dollars each year to Main
Street businesses” and later interning at a private equity mogul’s
boutique winery in northern California during the 2020 congressional
recess.
The soaring
contributions from the industry to Sinema trace back to last summer.
That’s when she first made clear that she wouldn’t support a carried
interest tax increase, as well as other corporate and business tax
hikes, included in an earlier iteration of Biden’s agenda.
During a two-week
period in September alone, Sinema collected $47,100 in contributions
from 16 high-ranking officials from the private equity firm Welsh,
Carson, Anderson & Stowe, records show. Employees and executives
of KKR, another private equity behemoth, contributed $44,100 to
Sinema during a two-month span in late 2021.
In some cases, the
families of private equity managers joined in. David Belluck, a
partner at the firm Riverside Partners, gave a $5,800 max-out
contribution to Sinema one day in late June. So did three of his
college-age kids, with the family collectively donating $23,200,
records show.
“I generally
support centrist Democrats and her seat is important to keep a
Democratic Senate majority,” Belluck said, adding that his family
has known Sinema since her election to Congress. “She and I have
never discussed private equity taxation.”
The donations from
the industry coincide with a $26 million lobbying effort spearheaded
by the investment firm Blackstone that culminated on the Senate
floor last weekend.
By the time the
bill was up for debate during a marathon series of votes, Sinema had
already forced Democrats to abandon their carried interest tax
increase.
“Senator Sinema
said she would not vote for the bill .. unless we took it out,”
Senate Majority Leader Chuck Schumer told reporters last week. “We
had no choice.”
But after private
equity lobbyists discovered a provision in the bill that would have
subjected many of them to a separate 15% corporate minimum tax, they
urgently pressed Sinema and other centrist Democrats for changes,
according to emails as well as four people with direct knowledge of
the matter who requested anonymity to discuss internal
deliberations.
“Given the
breaking nature of this development we need as many offices as
possible weighing in with concerns to Leader Schumer’s office,”
Blackstone lobbyist Ryan McConaghy wrote in a Saturday afternoon
email obtained by the AP, which included proposed language for
modifying the bill. “Would you and your boss be willing to raise the
alarm on this and express concerns with Schumer and team?”
McConaghy did not
respond to a request for comment.
Sinema worked with
Republicans on an amendment that stripped the corporate tax increase
provisions from the bill, which a handful of vulnerable Democrats
also voted for.
“Since she has
been in Congress, Kyrsten has consistently supported pro-growth
policies that encourage job creation across Arizona. Her tax policy
positions and focus on growing Arizona’s economy and competitiveness
are longstanding and well known,” Hurley, the Sinema spokesperson,
said.
But many in her
party disagree. They say the favorable treatment does little to
boost the overall economy and argue there’s little compelling
evidence to suggest the tax benefits are enjoyed beyond some of the
wealthiest investors.
Some of Sinema’s
donors make their case.
Blackstone, a
significant source of campaign contributions, owns large tracts of
real estate in Sinema’s home state, Arizona. The firm was condemned
by United Nations experts in 2019 who said Blackstone’s financial
model was responsible for a “financialization of housing” that has
driven up rents and home costs, “pushing low-income, and
increasingly middle-income people from their homes.”
Blackstone
employees executives and their family members have given Sinema
$44,000 since 2018, records show.
In a statement,
Blackstone called the allegations by the U.N. experts “false and
misleading” and said all employee contributions are “strictly
personal.” The firm added that it was “incredibly proud of its
investments in housing.”
Another major
financial services donor is Centerbridge Partners, a New York-based
firm that buys up the debt of distressed governments and companies
and often uses hardball tactics to extract value. Since 2017, Sinema
has collected at least $29,000 from donors associated with the firm,
including co-founder Mark Gallogly and his wife, Elizabeth
Strickler, records show.
In 2012,
Centerbridge Partners purchased Arizona-based restaurant chain P.F.
Chang’s for roughly $1 billion. After loading the struggling company
up with $675 million of debt, they sold it to another private equity
group in 2019, according to Bloomberg News. The company received a
$10 million coronavirus aid loan to cover payroll, but shed jobs and
closed locations as it struggled with the pandemic.
Centerbridge
Partners was also part of a consortium of hedge funds that helped
usher in an era of austerity in Puerto Rico after buying up billions
of dollars of the island government’s $72 billion debt — and filing
legal proceedings to collect. A subsidiary of Centerbridge Partners
was among a group of creditors who repeatedly sued one of the U.S.
territory’s pension funds. In one 2016 lawsuit, the group of
creditors asked a judge to divert money from a Puerto Rican pension
fund in order to collect.
A Centerbridge
representative could not immediately provide comment Friday.
Liberal activists
in Arizona say they plan to make Sinema’s reliance on donations from
wealthy investors a campaign issue when she is up for reelection in
2024.
“There are many
takes on how to win, but there is no universe in which it is
politically smart to fight for favorable tax treatment of the
wealthiest people in the country,” said Emily Kirkland, a political
consultant who works for progressive candidates. “It’s absolutely
going to be a potent issue.”
We call that
felony bribery and a total violation of the American STOCK ACT!
California lawmakers and advocates see the Snapchat ruling as a green
light for a state bill that would explicitly authorize lawsuits
against social media companies if they’re shown to hook kids with
their products. Assemblymember Jordan Cunningham, the bill’s
Republican lead co-author, says the decision shows that his proposal
won’t violate federal law.
Trial attorneys also see it this way. Matthew Bergman, who six months
ago founded the Social Media Victims Law Center to bring major cases
involving kids’ and teens’ addiction using product liability law,
compares the push to his years of suing companies for asbestos
poisoning. He launched his new crusade after Haugen’s testimony and
warnings from the U.S. surgeon general about the mental health harms
of teen social media use. One of the most recent cases he filed
invokes Haugen’s leaks to allege that Instagram purposefully targets
youngsters.
He sees signs everywhere that the tide is turning. He pointed to
recent court decisions — and even the Supreme Court’s surprisingly
close vote to block Texas’ social media bill on censorship, at 5-4.
By Rebecca Kern
“The era of goodwill toward social media platforms is waning,”
Bergman said.
Some lawyers in tech’s corner say they don’t see judges making a big
swing away from longtime orthodoxy on the law.
“Courts are certainly scrutinizing 230, but courts are bound by
precedent,” said Adam Sieff, a lawyer who represents tech companies in
Section 230 and First Amendment claims. “Virtually without exception,”
he said, the courts are finding that the precedents hold up the
Section 230 defense.
Eric Goldman, co-director of Santa Clara University’s High Tech Law
Institute, argues the 9th Circuit decision in the Snapchat case is
fairly narrow. Still, he is alarmed at the state policymaking that he
sees as meddling in private companies’ operations and know-how.
“Legislatures are enacting laws that they know are garbage,” he said.
“They don’t care about actually implementing policy — it’s all about
the press releases and tweets. When states pass laws that are garbage
we hope that the courts will fix the obvious problems that the
legislatures have created.”
In California, the tech industry and internet freedom groups like the
Electronic Frontier Foundation are working feverishly to kill
Cunningham’s bill that would explicitly create a cause for liability
lawsuits against social media companies — a red line for the industry.
But the proposal has advanced with significant momentum and could get
a final vote in August.
The proposal was narrowed last month to allow only public
prosecutors, rather than all Californians, to bring cases. But
supporters still see it as a huge step in making social media liable
for features with documented risks — and opponents see a major threat
to tech companies’ autonomy.
That said, Sieff and Eric Goldman suggest that lawyers in the
business of suing tech companies may be exaggerating the significance
of the recent decisions.
“The prevailing and uniform interpretation of Section 230 is squarely
on the side of the platforms,” Sieff said, “and the plaintiffs’ bar is
definitely stretching, or willfully misreading, decisions like Lemmon
well beyond their application.”
White House defends president’s support for philanthropy headed by
former Google CEO, who has cultivated close ties to the
administration.
Eric Schmidt, the former CEO of Google, had been making efforts to
cultivate a close relationship with the Biden administration. | Paul
Sakuma/AP Photo
This past spring, Eric Schmidt, the former CEO of Google, received
the ultimate gift: a straight-to-camera endorsement from the president
of the United States.
In the video, the most powerful man in the world touted Schmidt’s
“Quad Fellowship"— a new scholarship for American, Indian, Japanese
and Australian graduate school students that is operated and
administered by Schmidt Futures, the charity arm that Schmidt uses for
a variety of initiatives in science and technology.
“If you want to take the biggest challenges facing our world and help
make sure democracies deliver for the people everywhere, I encourage
you to apply and join the Quad fellowship class of 2023,” Biden said
in the video touting the philanthropic initiative which administration
officials have compared to the Rhodes scholarship and which plans to
fund 100 students every year from India, Australia, Japan and the
United States, also known as “The Quad.”
Australian Prime Minister Anthony Albanese, U.S. President Joe Biden,
Japanese Prime Minister Fumio Kishida, Indian Prime Minister Narendra
Modi and Schmidt Futures CEO Eric Braverman gather for the Quad
fellowship announcement at Tokyo on May 24, 2022. | Evan Vucci/AP
Photo
Behind the scenes, however, there were concerns within Biden’s
administration about the president endorsing an initiative of an
outside entity founded by Schmidt, one of the richest men in the
world, according to two people familiar with the matter who were
granted anonymity because they weren’t authorized to speak about the
internal dynamics.
The red flags prompted the State Department to draft talking points
in case questions of impropriety came up, according to a copy of the
drafted talking points obtained by POLITICO.
“If the [U.S. Government] is not involved in Schmidt Futures Quad
Fellowship, why was it announced in a Government organized forum?”
read an example of a potential question about the arrangement.
In response, the State Department’s talking points recommend
responding that the “United States–through Department of Homeland
Security and Department of State helps facilitate international STEM
education and student mobility” and that international “student
mobility is central to diplomacy, innovation, economic prosperity, and
national security. As Secretary [Antony] Blinken has said, it is a
‘foreign policy imperative.’”
It is one of many instances of Schmidt’s efforts to cultivate a close
relationship with the Biden administration. In March, POLITICO reported that Schmidt had
developed close personal and financial ties with the White House’s
science office. During the presidential transition, Schmidt also
recommended appointments to the Pentagon, Reuters reported at the time.
The White House declined to comment. A State Department spokesperson
told POLITICO: “It’s not uncommon for us to highlight a private sector
initiative that advances U.S. national interests. It is, likewise, not
uncommon for us to draft contingency talking points on a range of
issues. We’re proud of private sector partnerships, which advance our
interests around the world.”
Meghan Miele, a spokesperson for Schmidt, said in a statement that
Schmidt Futures had been invited by the Biden administration and the
other Quad countries to operate and administrate the fellowship.
“Leaders of all of the Quad countries have demonstrated enthusiastic
support for the program by recording videos, calling for applications
on social media, and attending a global launch event in Tokyo which
has resulted in thousands of applications,” she said. Asked for
further documentation of the timeline of the invitation, Miele
declined to comment further.
Blinken and Schmidt have collaborated in the past. Schmidt Futures
was a client of WestExec Advisors, a consulting firm co-founded by
Blinken. Last July, Blinken referred to Schmidt as “my friend” at
the “Global Emerging Technology Summit” hosted by the National
Security Council on Artificial Intelligence, which Schmidt chaired.
When Biden visited Asia in May, the CEO of Schmidt Futures, Eric
Braverman, met with the leaders of all four Quad countries, who had
recorded their own endorsement videos as well. At a launch event with
the four leaders, they watched a video featuring Schmidt as they all
stood in front of a blue-and-white checkered backdrop reading: “Quad
Fellowship by Schmidt Futures.”
The fellowship will fund students from Quad countries to attend
graduate school in the U.S. in science, technology, engineering, and
mathematics (STEM). The scholarship is part of the Biden team’s larger
goal of reinvigorating the Quad partnership as part of their attempts
to counter China.
Schmidt also often echoes the administration’s view on China as a key
competitor and has taken a particular interest in the overlap in
science and defense policy. He has advocated for the U.S. investing in
and protecting the technology sector to ensure China does not take the
lead on artificial intelligence, internet platforms, and hardware,
which he sees as essential to maintaining American economic and
military strength.
Schmidt also often echoes the administration’s view on China as a key
competitor and has taken a particular interest in the overlap in
science and defense policy. | Susan Walsh/AP Photo
As a result, he has leveraged his relationships and connections to
shape the Biden administration’s science and military technology
policies. In addition to his connections with the science office, the
Pentagon, and the Quad Fellowship, Schmidt has also become a key
public advocate for the Biden-supported U.S. Innovation and
Competition Act (USICA), a sprawling $250 billion-plus package with
massive investments in American technology including $50 billion to
semiconductor funding.
The Senate and the House have passed different versions of the bill
and are trying to reconcile the package now. Some progressive House Democrats and the AFL-CIO
have argued that certain trade provisions in the bill would
help large American tech companies like Google and Facebook.
The trade provisions would “overwhelmingly benefit large digital
corporations (Google, Facebook/Meta, Uber) at the expense of
countries’ right to reasonably regulate global digital platforms,”
William Samuel, the AFL-CIO’s director of government affairs, wrote in
a May letter.
In op-eds and
TV
appearances, Schmidt has been a high-profile advocate for the
bill, in particular the government subsidization of semiconductors.
Eric Schmidt should never be allowed near America's policies or
telecommunications. He is the Hitler of the Internet. Schmidt thinks
that those who kill themselves over social abuse shouldn't be doing
those things in the first place. Schmidt has no compassion and lives
by greed.
Famous Hollywood actress Constance Wu has revealed that she attempted
to take her own life after facing a social media abuse over T-Mobile
network and devices.
Known for her roles in "Crazy Rich Asians" and "Hustlers," Wu
abruptly left social media in 2019 after making what she called
"careless" comments about her displeasure over the renewal of "Fresh
off the Boat," a TV series she was starring in, which she said
"ignited outrage and internet shaming that got pretty severe."
On learning of the renewal of the show, where she played a
no-nonsense mother of an immigrant family, Wu fired off tweets
featuring expletives, stating that she was "so upset." Her comments
sparked criticism online, and she later explained to her fans that
appearing in the show would take her away from an unspecified passion
project, before quitting social media.
After a three-year hiatus, Wu said in a statement
Thursday that the episode had pushed her to attempt suicide. She said
she was "a little scared" to return to social media.
"This next part is hard to talk about . . . but I was afraid of
coming back on social media because I almost lost my life from it,"
she said.
She added that the social media backlash to her 2019 comments,
especially from fellow Asian Americans, made her feel like a "blight"
on her community. "I started feeling like I didn't even deserve to
live anymore. That I was a disgrace to AsAms, and they'd be better off
without me," she said using an abbreviation.
"Looking back, it's surreal that a few DMs convinced me to end my own
life, but that's what happened. Luckily, a friend found me and rushed
me to the ER."
Wu, who grew up in Richmond, Va., and is the child of Taiwanese
immigrants, said the "scary moment" forced her to reassess her life
and career and prioritize her mental health.
Wu's leading role in "Crazy Rich Asians" in 2018 catapulted her to
international fame and led to a Golden Globe nomination for her
portrayal of a professor who travels to Singapore to meet her
partner's family and encounters extreme wealth. More broadly, the
movie, based on a novel by Kevin Kwan, was celebrated for breaking
stereotypes and for its Asian American representation.
"AsAms don't talk about mental health enough," Wu said in her
statement. "While we're quick to celebrate representation wins,
there's a lot of avoidance around the more uncomfortable issues within
our community."
Adding, "If we want to be seen, really seen . . . we need to let all
of ourselves be seen, including the parts we're scared of or ashamed
of - parts that, however imperfect, require care and attention."
A national study in 2007 reported that while nearly 18% of the
general U.S. population sought mental health services in a 12-month
period, only 8.6% of Asian Americans did so.
Fear of stigma as well as pressure to be a "model minority," to
academically succeed and to care for parents and community were among
the issues that led to mental health stresses, according to
psychiatrists at McLean Hospital, a mental health hospital in Belmont,
Mass.
Almost 20% of American adults - some 50 million people - experienced
a mental health illness in 2019, according to national nonprofit
Mental Health America, with over half of adults not receiving
treatment. Suicidal ideation and thoughts have continued to rise every
year since 2011, it added. Echoing other reports, it found that young
White Americans were the most likely to receive mental health
treatment, while "Asian youth were least likely to receive mental
health care."
This week, the National Suicide Prevention Lifeline launched a new
three-digit number allowing people to call or text 988 to route them
to a hotline of trained counselors starting Saturday. It will be
available across the United States.
Wu also shared details for suicide prevention and support alongside
her statement and added that she had written a memoir "Making a Scene"
detailing more about her life and experiences. She said she hoped her
book would "help people talk about the uncomfortable stuff in order to
understand it, reckon with it, and open pathways to healing."
- - -
If you or someone you know who uses T-Mobile needs help, call the
National Suicide Prevention Lifeline at 800-273-TALK (8255) or visit
suicidepreventionlifeline.org. You can also text a crisis counselor by
messaging the Crisis Text Line at 741741.
KEY LAWYERS
INVOLVED IN LITIGATION AGAINST T-MOBILE - REACH OUT TO THEM FOR HELP
WITH YOUR T-MOBILE DISPUTE:
Barrett J. Vahle
Stueve Siegel Hanson, LLP - KCMO
460 Nichols Road
Suite 200
Kansas City, MO 64112
(816) 714-7100
Fax: (816) 714-7101
Email: vahle@stuevesiegel.com
Daniel J Mogin
MOGINRUBIN LLP
600 W BROADWAY STE 3300
SAN DIEGO, CA 92101
619-798-5333
Email: dmogin@moginrubin.com
James Pizzirusso
Hausfeld LLP
888 16th Street
Ste 300
Washington, DC 20006
202-540-7200
Fax: 202-540-7201
Email: jpizzirusso@hausfeld.com
Jason T Dennett
TOUSLEY BRAIN STEPHENS
1200 FIFTH AVE STE 1700
SEATTLE, WA 98101
206-682-5600
Fax: 206-682-2992
Email: jdennett@tousley.com
Jennifer M Oliver
MOGINRUBIN LLP
600 W BROADWAY STE 3300
SAN DIEGO, CA 92101
619-798-5361
Email: joliver@moginrubin.com
John Austin Moore
Stueve Siegel Hanson, LLP - KCMO
460 Nichols Road
Suite 200
Kansas City, MO 64112
816-714-7100
Fax: 816-714-7101
Email: moore@stuevesiegel.com
Jonathan L Rubin
MOGINRUBIN LLP (DC)
1615 M ST NW
STE THIRD FL
WASHINGTON, DC 20037
202-630-0616
Email: jrubin@moginrubin.com
Kim D Stephens
TOUSLEY BRAIN STEPHENS
1200 FIFTH AVE STE 1700
SEATTLE, WA 98101
206-682-5600
Email: kstephens@tousley.com
Norman Eli Siegel
Stueve Siegel Hanson, LLP - KCMO
460 Nichols Road
Suite 200
Kansas City, MO 64112
(816) 714-7112
Fax: (816) 714-7101
Email: siegel@stuevesiegel.com
Steven M Nathan
Hausfeld
33 Whitehall Street
Ste 14th Floor
New York, NY 10004
646-357-1100
Fax: 212-202-4322
Email: snathan@hausfeld.com
Timothy Z LaComb
MOGINRUBIN LLP
600 W BROADWAY STE 3300
SAN DIEGO, CA 92101
619-798-5362
Email: tlacomb@moginrubin.com
Beth E Terrell
TERRELL MARSHALL LAW GROUP PLLC
936 N 34TH ST
STE 300
SEATTLE, WA 98103-8869
206-816-6603
Fax: 206-319-5450
Email: bterrell@terrellmarshall.com
John A Yanchunis
MORGAN & MORGAN COMPLEX
LITIGATION GROUP (FL)
201 N FRANKLIN ST 7TH FL
TAMPA, FL 33602
813-223-5505
Email: jyanchunis@ForThePeople.com
Kaitlyn T Holzer
MURPHY & FALCON PA
1 SOUTH ST
STE 30TH FLOOR
BALTIMORE, MD 21202
410-539-6500
Fax: 410-539-6599
Email: kaitlyn.holzer@murphyfalcon.com
Michael Anderson Berry
ARNOLD LAW FIRM
865 HOWE AVE
SACRAMENTO, CA 95825
916-777-7777
Email: aberry@justice4you.com
Ryan Maxey
MORGAN & MORGAN PA (FL)
201 N FRANKLIN ST STE 700
TAMPA, FL 33602
813-577-4722
Fax: 813-257-0572
Email: rmaxey@forthepeople.com
William Hughes Murphy , III
MURPHY & FALCON PA
1 SOUTH ST
STE 30TH FLOOR
BALTIMORE, MD 21202
410-539-6500
Fax: 410-539-6599
Email: hassan.murphy@murphyfalcon.com
Carlton R. Jones
Herman Jones LLP
3424 Peachtree Road NE
Suite 1650
Atlanta, GA 30326
404-504-6500
Email: cjones@hermanjones.com
John C. Herman
Duane Morris
1180 W Peachtree Street NW
Suite 700
Atlanta, GA 30309-3448
404-253-6900
Fax: 404-253-6901
Email: JCHerman@duanemorris.com
Peter M. Jones
Herman Jones LLP
3424 Peachtree Road NE
Suite 1650
Atlanta, GA 30326
404-504-6500
Email: pjones@hermanjones.com
Marc J. Held
Lazarowitz & Manganillo LLP
2004 Ralph Avenue
Brooklyn, NY 11234
718-531-9700
Fax: 718-444-5768
Email: marcheldesq@gmail.com
Philip M. Hines
Held & Hines, LLP
2004 Ralph Avenue
Brooklyn, NY 11234
718-531-9700
Fax: 718-444-5768
Email: phines@heldhines.com
Alexis M Wood
Law Offices of Ronald A Marron APLC
651 Arroyo Drive
San Diego, CA 92103
619-696-9006
Fax: 619-564-6665
Email: alexis@consumersadvocates.com
Amanda Grace Fiorilla
Lowey Dannenberg, P.C.
44 South Broadway, Suite 1100
White Plains, NY 10601
914-733-7266
Email: afiorilla@lowey.com
Christian Levis
Lowey Dannenberg, P.C.
44 South Broadway, Suite 1100
White Plains, NY 10601
(914) 997-0500
Fax: (914) 997-0035
Email: clevis@lowey.com
Kas Larene Gallucci
Law Offices of Ronald A. Marron
651 Arroyo Drive
San Diego, CA 92103
619-696-9006
Email: kas@consumersadvocates.com
Margaret C. MacLean
Lowey Dannenberg, P.C.
44 South Broadway, Suite 1100
White Plains, NY 10601
914-997-0500
Email: mmaclean@lowey.com
Ronald A. Marron
Law Offices of Ronald A. Marron
651 Arroyo Drive
San Diego, CA 92103
619-696-9006
Email: ron@consumersadvocates.com
Jonathan Shub
Seeger Weiss, LLP
1515 Market Street
Suite 1380
Philadelphia, PA 19102
(215) 564-2300
Fax: (215) 851-8029
Email: jshub@seegerweiss.com
Anne-Marie E Sargent
CONNOR & SARGENT PLLC
921 HILDEBRAND LANE NE STE 240
BAINBRIDGE ISLAND, WA 98110
206-654-4011
Email: aes@cslawfirm.net
Brian C Gudmundson
Zimmerman Reed PLLP
80 South Eighth Street 1100 IDS Center
Minneapolis, MN 55402
612-341-0400
Fax: 612-341-0844
Email: brian.gudmundson@zimmreed.com
Carey Alexander
SCOTT + SCOTT LLP (NY)
THE HELMSLEY BUILDING
230 PARK AVE
STE 17TH FLOOR
NEW YORK, NY 10169
212-223-6444
Email: calexander@scott-scott.com
Erin Green Comite
Scott&Scott, Attorneys at Law, LLP
156 South Main Street
P.O. Box 192
Colchester, CT 06415
860-537-5537
Fax: 860-537-4432
Email: ecomite@scott-scott.com
Gary F Lynch
Lynch Carpenter, LLP
1133 Penn Avenue, 5th Floor
Pittsburgh, PA 15222
412-322-9243
Email: Gary@lcllp.com
Joseph P. Guglielmo
Scott & Scott, Attorneys at Law, LLP
The Helmsley Building
230 Park Avenue
Ste 17th Floor
New York, NY 10169
212-223-6444
Email: jguglielmo@scott-scott.com
MaryBeth V. Gibson
THE FINLEY FIRM PC
3535 PIEDMONT RD BLDG 14 STE 230
ATLANTA, GA 30305
404-320-9979
Fax: 404-320-9978
Email: mgibson@thefinleyfirm.com
Michael J Laird
ZIMMERMAN REED LLP (MN)
1100 IDS CENTER
80 SOUTH 8TH STREET
MINNEAPOLIS, MN 55402
920-915-3328
Email: michael.laird@zimmreed.com
Nicholas A Colella
LYNCH CARPENTER LLP (PA)
1133 PENN AVE 5TE FL
PITTSBURGH, PA 15222
412-322-9243
Email: NickC@lcllp.com
Rachel Kristine Tack
ZIMMERMAN REED LLP (MN)
1100 IDS CENTER
80 SOUTH 8TH STREET
MINNEAPOLIS, MN 55402
612-341-0400
Email: rachel.tack@zimmreed.com
David B Owens
LOEVY & LOEVY
100 S KING STREET STE 100
SEATTLE, WA 98014
312-243-5900
Email: David@loevy.com
Michael Kanovitz
Loevy & Loevy - Chicago
311 North Aberdeen Street
3rd Floor
Chicago, IL 60607
(312) 243-5900
Fax: (312) 243-5902
Email: mike@loevy.com
Scott Drury
LOEVY & LOEVY (IL)
311 N ABERDEEN 3RD FLOOR
CHICAGO, IL 60607
312-243-5900
Email: drury@loevy.com
Ari Basser
POMERANTZ LLP
1100 GLENDON AVE 15TH FL
LOS ANGELES, CA 90067
310-788-8660
Email: abasser@pomlaw.com
Jordan L Lurie
POMERANTZ LLP
1100 GLENDON AVE 15TH FL
LOS ANGELES, CA 90067
212-661-1100
Fax: 917-463-1044
Email: jllurie@pomlaw.com
Samuel M. Ward
Barrack Rodos & Bacine
600 West Broadway
Suite 900
San Diego, CA 92101
619-230-0800
Fax: 619-230-1874
Email: sward@barrack.com
Stephen R Basser
BARRACK RODOS & BACINE
600 W BROADWAY
STE 900
SAN DIEGO, CA 92101
619-230-0800
Email: sbasser@barrack.com
Wright A Noel
CARSON & NOEL PLLC
20 SIXTH AVENUE NORTHEAST
ISSAQUAH, WA 98027
425-395-7786
Email: wright@carsonnoel.com
Gavin P Kassel
Sanford A Kassel Law Offices APLC
Wells Fargo Bank Building
334 West Third Street
San Bernardino, CA 92401-1823
909-884-6451
Fax: 909-884-8032
Email: gkassel@gmail.com
Sanford Alan Kassel
Sanford A Kassel Law Offices APLC
Wells Fargo Bank Building
334 West 3rd Street Suite 207
San Bernardino, CA 92401-1823
909-884-6451
Fax: 909-884-8032
Email: office@skassellaw.com
Shawn C Westrick
Westrick Law Firm
2219 Main Street Suite 463
Santa Monica, CA 90405
310-746-5303
Email: swestrick@westricklawfirm.com
Jason Hartley
HARTLEY LLP
101 W BROADWAY STE 820
SAN DIEGO, CA 92101
619-400-5822
Email: hartley@hartleyllp.com
Laurence D King
Kaplan Fox & Kilsheimer LLP
350 Sansome
Ste. 400
San Franciso, CA 94104
(415) 772-4700
Fax: (415) 772-4707
Email: lking@kaplanfox.com
Matthew George
KAPLAN FOX & KILSHEIMER LLP
1999 HARRISON ST STE 1560
OAKLAND, CA 94104
415-772-4700
Email: mgeorge@kaplanfox.com
Cari Campen Laufenberg
KELLER ROHRBACK LLP (WA)
1201 3RD AVE
STE 3200
SEATTLE, WA 98101-3052
206-623-1900
Email: claufenberg@kellerrohrback.com
Christopher L Springer
KELLER ROHRBACK LLP
801 GARDEN ST STE 301
SANTA BARBARA, CA 93101
805-456-1496
Email: cspringer@kellerrohrback.com
Derek W. Loeser
Keller Rohrback L.L.P.
1201 Third Ave., #3200
Seattle, WA 98101-3052
206-623-1900
Email: dloeser@kellerrohrback.com
Emma Marguerite Wright
KELLER ROHRBACK LLP (WA)
1201 3RD AVE
STE 3200
SEATTLE, WA 98101-3052
206-257-9229
Email: ewright@kellerrohrback.com
Gretchen Freeman Cappio
Keller Rohrback L.L.P.
1201 Third Ave., #3200
Seattle, WA 98101-3052
206-623-1900
Email: gcappio@KellerRohrback.com
Juli E. Farris
KELLER ROHRBACK
1201 3RD AVE
STE 3200
SEATTLE, WA 98101-3052
206-623-1900
Fax: 206-623-3384
Email: jfarris@KellerRohrback.com
Thomas E Loeser
HAGENS BERMAN SOBOL SHAPIRO
LLP (WA)
1301 2ND AVENUE
STE 2000
SEATTLE, WA 98101
206-623-7292
Fax: 206-623-0594
Email: TomL@hbsslaw.com
Manish Borde
BORDE LAW PLLC
600 STEWART ST, SUITE 400
SEATTLE, WA 98101
206-905-6129
Email: mborde@bordelaw.com
Courtney Maccarone
LEVI & KORSINSKY LLP (NY)
55 BROADWAY
10TH FLOOR
NEW YORK, NY 10006
212-363-7500
Email: cmaccarone@zlk.com
Mark Reich
LEVI & KORSINSKY LLP (NY)
55 BROADWAY
10TH FLOOR STE 10006
NEW YORK, NY 10006
212-363-7500
Email: mreich@zlk.com
Matthew James Ide
7900 SE 28TH STREET, STE 500
MERCER ISLAND, WA 98040
206-625-1326
Fax: 206-622-0909
Email: mjide@yahoo.com
Amy Elisabeth Keller
DICELLO LEVITT GUTZLER LLC
TEN N DEARBORN ST STE 6TH FL
CHICAGO, IL 60602
312-214-7900
Email: akeller@dicellolevitt.com
James Arthur Ulwick
DICELLO LEVITT GUTZLER LLC
10 N DEARBOR ST 6TH FL
CHICAGO, IL 60602
301-467-6038
Email: julwick@dicellolevitt.com
William B. Federman
Federman & Sherwood
10205 N. Pennsylvania Avenue
Oklahoma City, OK 73120
(405) 235-1560
Fax: (405) 239-2112
Email: wbf@federmanlaw.com
Brian James Dunne
Bathaee Dunne LLP
633 West Fifth Street
26th Floor
Los Angeles, CA 90071
213-462-2772
Email: bdunne@bathaeedunne.com
Edward Maxwell Grauman
Bathaee Dunne LLP
7000 North MoPac Expressway, Suite 200
Austin, TX 78731
512-575-8848
Email: egrauman@bathaeedunne.com
Yavar Bathaee
Bathaee Dunne LLP
445 Park Avenue
9th Floor
New York, NY 10022
332-205-7668
Email: yavar@bathaeedunne.com
Laurence M. Rosen
The Rosen Law Firm, P.A.
One Gateway Center, Suite 2600
Newark, NJ 07102
(973) 313-1887
Email: lrosen@rosenlegal.com
Christopher L. Ayers
Seeger Weiss LLP
55 Challenger Road
6th Floor
Ridgefield Park, NJ 07660
973-639-9100
Email: cayers@seegerweiss.com
Joseph H. Meltzer
Barroway Topaz Kessler Meltzer & Check
LLP
280 King of Prussia Road
Radnor, PA 19087
(610) 667-7706
Fax: (610) 667-7056
Email: jmeltzer@btkmc.com
Kevin G. Cooper
Carella Byrne Cecchi Olstein Brody &
Agnello
5 Becker Farm Road
Roseland, NJ 07068
973-994-1700
Email: kcooper@carellabyrne.com
CHRISTOPHER L. AYERS
SEEGER WEISS LLP
55 Challenger Road
6th Floor
Ridgefield Park, NJ 07660
973-639-9100
Email: cayers@seegerweiss.com
Christopher A. Seeger
Seeger Weiss LLP
55 Challenger Road
6th Floor
Ridgefield Park, NJ 07660
973-639-9100
Fax: 973-639-9393
Email: cseeger@seegerweiss.com
James E. Cecchi
Carella Byrne Bain Gilfillan Cecchi Stewart
& Olstein PC
5 Becker Farm Road
Roseland, NJ 07068
973 994-1700
Fax: 973 994-1744
Email: jcecchi@carellabyrne.com
Catherine B. Derenze
Lite DePalma Greenberg & Afanador, LLC
570 Broad Street
Ste 1201
Newark, NJ 07102
973-623-3000
Fax: 973-623-0858
Email: cderenze@litedepalma.com
Jeremy Nathan Nash
Lite DePalma Greenberg & Afanador, LLC
570 Broad Street
Suite 1201
Newark, NJ 07102
973-623-3000
Fax: 973-623-0858
Email: jnash@litedepalma.com
Joseph J. DePalma
Lite DePalma Greenberg & Afanador, LLC
570 Broad Street
Suite 1201
Newark, NJ 07102
973-623-3000
Fax: 973-623-0858
Email: jdepalma@litedepalma.com
Jennifer Marie Oliver
Moginrubin LLP
600 West Broadway, Suite 3300
San Diego, CA 92101
(619) 687-6611
Fax: (619) 687-6610
Email: joliver@moginrubin.com
Molly Brantley
Federman & Sherwood
10205 N. Pennsylvania Ave.
Oklahoma City, OK 73120
405-235-1560
Fax: 405-239-2112
Email: meb@federmanlaw.com
Tyler James Bean
Federman & Sherwood
10205 N Pennsylvania Ave
Oklahoma City, OK 73120
405-235-1560
Email: tjb@federmanlaw.com
Don Springmeyer
Kemp Jones LLP
3800 Howard Hughes Parkway
17th Floor
Las Vegas, NV 89169
702-385-6000
Fax: 702-385-6001
Email: d.springmeyer@kempjones.com
Michael J Gayan
Kemp, Jones & Coulthard, LLP
3800 Howard Hughes Parkway
Las Vegas, NV 89169
702-385-6000
Fax: 702-385-6001
Email: mjg@kempjones.com
Sabita J Soneji
Tycko and Zavareeli LLP
1970 Broadway, Suite 1070
Oakland, CA 94612
510-254-6808
Roger M Townsend
BRESKIN JOHNSON & TOWNSEND
PLLC
1000 SECOND AVENUE, SUITE 3670
SEATTLE, WA 98104
206-652-8660
Fax: 206-652-8290
Email: rtownsend@bjtlegal.com
John T Jasnoch
Scott and Scott LLP
600 West Broadway Suite 3300
San Diego, CA 92101
619-233-4565
Fax: 619-233-0508
Email: jjasnoch@scott-scott.com
Brian P. Murray
Glancy Prongay & Murray LLP
230 Park Avenue
Suite 358
New York, NY 10169
212- 682-5340
Fax: 212-884-0988
Email: bmurray@glancylaw.com
Kevin Francis Ruf
Glancy Prongay & Murray LLP
1925 Century Park East, Suite 2100
Los Angeles, CA 90067
(310) 201-9150
Fax: (310) 201-9160
Email: info@glancylaw.com
Paul C. Whalen
Law Office of Paul C. Whalen
768 Plandome Road
Manhasset, NY 11030
516-426-6870
Email: pcwhalen@gmail.com
Jessica Lynne Lukasiewicz
Thomas & Solomon LLP
693 East Avenue
Rochester, NY 14607
585-272-0540
Fax: 585-272-0574
Email: jlukasiewicz@theemploymentattorneys.com
T-Mobile has confirmed
“unauthorized access” to its systems, days after a portion of
customer data was listed for sale on a known ...
The United States Judicial Panel on
Multidistrict Litigation issued a Transfer Order on December 3, 2021,
assigning MDL No. 3019 to this Court for coordinated or consolidated
pretrial proceedings, and describing this multidistrict litigation as
follows. These putative class actions present common factual questions
concerning an alleged data security breach of T-Mobile’s systems that was
discovered in August 2021 and allegedly compromised the personal
information of approximately 54 million current, former, and prospective
customers of T-Mobile. Common factual questions will include: T-Mobile’s
data security practices and whether those practices met industry
standards; how the malfeasance obtained access to T-Mobile’s system; the
extent of the personal information affected by the breach; when T-Mobile
knew or should have known of the breach; and T-Mobile’s investigation into
the breach.
If THE CHINESE
SECRET POLICE CAN GET ONE BILLION CITIZENS RECORDS HACKED THEN YOU CAN
IMAGINE HOW AWFUL THE T-MOBILE SECURITY BREACH IS:
"LET'S TAKE A LOOK AT HOW MANY SCHOOL SHOOTERS AND MASS PUBLIC
SHOOTERS HAD T-MOBILE ACCOUNTS. DID T-MOBILE ENABLE THE RADICALIZATION
OF THOSE KIDS?", ask researchers...
HOW TO PROTECT
YOURSELF FROM T-MOBILE TECHNICAL ABUSE:
ATTACKS AND CENSORSHIP BY THE
T-MOBILE-GOOGLE-ALPHABET-YOUTUBE-FACEBOOK CARTEL: We have placed more
software sensors on more server networks globally than anyone else has
ever announced. When the T-Mobile-Google-Alphabet-YouTube, etc. Cartel
Shadow Bans, DNS re-routes, Hides, Demonetizes, Search Manipulates, Server
Table Edits, Censors, Election Rigs, SEO limits, etc; our links, we record
it, document it technically and report it to every regulatory and
publishing group in the world. We also compile the data into evidence for
lawsuits against the Tech Cartel and each Tec Cartel executive. Our
insiders work at the deepest levels of their operation. It isn't nice to
mess with Mother Nature or Freedom Of Speech. It's worse to run tax
evasion, sex trafficking, dark money funds, real estate fraud and other
crimes from inside Google! ---- Our autonomous monitoring applications are
on a vast number of co-location servers, shared hosting ISP's, stand-alone
servers and sites around the world and have been operating for over ten
years. We log: 1.) Their search results compared to other search engines,
2.) Their DNS and spoofing activities, 3.) Their results on 100 key search
terms including search terms of assets, candidates and business associates
connected to the Cartel (ie: "Obama", "Elon Musk", "Election Results",
etc.), 4.) Where the Cartel sends data from users clicking on their
supplied supplied links, 5.) Where fabricated "mole" data that was
injected as user data ultimately ended up later, 6.)The Cartel's election
manipulation attempts, and other metrics. The results prove that the
Cartel abuses the market, the public, privacy rights, politics and human
rights. ----
So you tech bad guys, every time you do it, you
are just digging your own grave and giving us all the proof we need to
wipe you out, process anti-trust filings and expose your monopolist, sex
trafficking, sociopath owners!
Some of the experts on our Team told T-Mobile, for decades, that their
network was not secure. What did T-Mobile do? Ignored them and copied
their patents and STILL T-Mobile could not get security technology right?
Why? Many think that T-Mobile sacrificed security for buddy-buddy deals with
Google, Facebook, Instagram, Netflix, YouTube and the other scumbag Silicon
Valley Big Tech consumer data harvesting operations. If that theory is
correct, then T-Mobile CHOSE to harm consumers in a PROFITS-OVER-PUBLIC
SAFETY decision! Let's investigate that!
T-Mobile, Facebook,
Google and Instagram Facing Lawsuits for Teen Mental Health
Crisis After Causing 5500 Teens PER DAY To Attempt Suicide
Neumann Law Group is
now investigating claims against Meta Platforms, Inc., the parent
company of Facebook and Instagram for their intentional
manipulation of the mental health of young and at-risk users of
their products.
In October 2021, a
Facebook whistleblower testified to the U.S. Senate how Facebook,
Instagram, and Meta used tactics to manipulate young people into
using their products for extended periods of time and
intentionally created a toxic environment leading to significant
psychological harm to America's youth.
THE UNITED STATES CONGRESS
CAN MAKE INSTAGRAM AND FACEBOOK DISAPPEAR OFF THE INTERNET,
IN ANY 60 SECOND PERIOD, SIMPLY BY ORDERING DOJ TO DELETE
THEIR DNS RECORDS. BOOM! GONE!
DEMAND THAT YOUR ELECTED
OFFICIALS ORDER THE DNS RECORDS FOR INSTAGRAM AND FACEBOOK
DELETED, AND NOT TURNED BACK ON, UNTIL FACEBOOK AND
INSTAGRAM PROVE TO CONGRESS THAT NO TEENS WILL BE AFFECTED
BY THEIR SITES AGAIN!
DO YOU REALLY WANT YOUR KIDS ANYWHERE NEAR
FACEBOOK AND THEIR VR SEX PERVERTS?: