Please email me at:
Or use the form below.
[contact-form 1 “Contact form 1”]
The no-pants guide to spending, saving, and thriving in the real world.
Today is the 33rd anniversary of the death of Elvis, so I’m bringing you the “Elvis is Dead” edition of the Carnival of Personal Finance.
What can the King teach us about finance? The immediate lesson is, of course, to not let success destroy you or your life. Always remember what is important.
“Adversity is sometimes hard upon a man; but for one man who can stand prosperity, there are a hundred that will stand adversity.” -Elvis Presley
Before we get into the carnival, please take a moment to subscribe, either by rss or by email. If you are on twitter, please follow me at @LiveRealNow.
“When I was a child, ladies and gentlemen, I was a dreamer. I read comic books, and I was the hero of the comic book. I saw movies, and I was the hero in the movie. So every dream I ever dreamed has come true a hundred times…I learned very early in life that: ‘Without a song, the day would never end; without a song, a man ain’t got a friend; without a song, the road would never bend – without a song.’ So I keep singing a song. Goodnight. Thank you.”
-From his acceptance speech for the 1970 Ten Outstanding Young Men of the Nation Award. Given at a ceremony on January 16, 1971
Craig Ford from Money Help For Christians presents How to Buy Cars With Cash. This is great advice. My car will be paid off in the next few months and I will be doing exactly this.
FMF from Free Money Finance presents Are Tattoos at Work Really That Acceptable? Do tattoos limit your career? I reference this graphic when thinking about a tattoo.
Pop from Pop Economics presents Getting a raise: The negotiation. It’s always best to raise your top line as high as possible. Bringing in more money is far more effective that simply reducing your expenses.
Over the next few weeks, I will be going over my budget in detail.
The first section is income, but that’s straightforward. A line for each income source, bi-weekly, monthly and annual totals. Simple.
Before we start, a word on the organization. There are five columns:
The first section I am actually going to address is discretionary spending.
Initially, we used a “virtual envelope” system. We had a spreadsheet and every time something was spent in this category, we entered the amount and stopped when the category was spent. Didn’t work. We are going on a pure, cash-only system as of the first of the year. No money, no spendy.
Last night, a friend called me up and asked me to accompany him to the police station. The police had knocked on his door, waking up his girlfriend while he was out. When he called, they wouldn’t tell him why they wanted to talk to him. Was it an ex trying to make his life difficult or one of his employees getting investigated?
This friend has had a number of interactions with the police, but never learned how to deal with them. Before we left, I gave him a crash course in “stay out of jail”.
During an investigation, you are a suspect. They are looking for a conviction. There may be a “good cop” trying to “help you out”, but he is trying to put you in jail. “Protect and Serve” doesn’t mean you. In general, it means society as a whole. During an investigation, they are serving the interests of the prosecutor.
Generally, they are going to look at you–as the target of their investigation–as the enemy. This is normal. They spend all of their time dealing with scumbags and s***heads. Naturally, they start to assume that everyone who isn’t a cop will fall into one of those categories.
Don’t get pissed when they act rude, ignore you, or anything else. It isn’t a lack of professionalism, it’s just a different profession. They are using interrogation techniques that have been proven successful. Ignore it and focus on Lesson 2.
It will feel wrong to disobey the authority you’ve been taught your entire life to obey. You’re not. You are standing by your rights. Nobody cares about your future more than you do. Certainly not the guy investigating you.
The second a police interaction starts to look like they are investigating you, demand your lawyer, then see Lesson 4. When you demand an attorney, they stop asking you questions. You can take it back and start talking, so again, see Lesson 4. It’s your attorney’s job to talk to the police and, if necessary, the media. It’s your job to talk to your attorney.
You don’t need an attorney ahead of time. Criminal defense attorneys are used to getting calls at 3AM. It’s part of their job. If you have a low enough income as defined by whatever jurisdiction you are being investigated in, you can get a public defender. That’s better than nothing, but I’d prefer to hire a professional shark, even if it means mortgaging my future. Prison is a big gamble.
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
“Officer, I do not consent to any search and I would like to speak to my attorney.” Remember this. Memorize it.
They need probable cause, a warrant, or permission to search your stuff. Never agree to it. Don’t stop them if they search anyway, but never, ever agree to a search. If the search is done improperly, your lawyer(see Lesson 2) will get the results of that searched thrown out.
It isn’t possible to get into more trouble for standing by your rights. There is no crime on the books anywhere in the US called “Refused Consent to Search”. Your day will not go worse because you defended your Constitutional rights.
I know a few defense attorneys. According to them, most of the people in jail either committed a crime in front of a bunch of witnesses, or they talked their way into jail. Shut up. You’ll want to either justify or defend yourself depending on the circumstances. Don’t. Shut up. It may be one of the hardest things you ever do, but keep your mouth closed. The only thing worse than talking is lying. Don’t lie, just keep quiet.
There is nothing you are going to say that will make your interrogator invite you home for Christmas. He isn’t your friend, you won’t meet his parents, you aren’t going to his birthday party. There is absolutely no win in talking to him. Shut up. The answer to every question is “Lawyer.” If the only thing you say babble is “Lawyerlawyerlawyerlawyerlawyerlawyer”, you’re probably not going to do too badly.
In your car, the dynamic changes a bit, but the principles don’t. When a cop pulls you over, don’t argue. You can’t win an argument with a cop on the side of the road. Be nice, be polite, and as soon as possible, pull into a parking lot and take as many notes about the encounter as you can. If you are planning to fight whatever he pulled you over for, don’t give him any reason to remember you or spin his official report to make you look bad. Again, shut up. Catching a theme?
If you are being investigated by the police, your future–or some part of it–is on the line. While you are gambling with your criminal record and your freedom, don’t forget that you are an amateur in this arena. The police, the prosecutor, and your attorney are the professionals and the stakes can be huge. Keep your mouth shut, call your attorney, and thank me later.
Skip to the bottom if you’re familiar with PRISM and don’t want to hear any political talk and rampant violations of our Constitutional rights, but still want to protect your privacy.
For those of you who haven’t been paying attention, the PRISM program is an NSA program to monitor electronic activity.
Lots of electronic activity.
The companies identified to be working with the NSA in this grand overreach include AOL, Apple, Facebook, Google, Microsoft, PalTalk, Skype, Yahoo! and YouTube. For most people, that is the definition of “the internet”. If you’re doing it online, the NSA is–or could be, at their leisure–watching.
This isn’t a crazy conspiracy theory. This is happening, and the government has admitted it. In fact, when this broke, the executive branch’s response was along the lines of, “Don’t worry, we’ll find the guy who leaked this information.”
On top of that, the government has been demanding phone records from at least Verizon on a daily basis.
In addition, the Justice Department was just busted wiretapping Associated Press phones.
Seriously, if you put this in fiction, nobody would buy it, because it’s ridiculous in the land of the free.
As far as the people who say I’ve got nothing to worry about if I’m not doing anything wrong: shut up. You can speak again when you give me your email passwords, bank records, and let me install a toilet cam in your house. What are you trying to hide?
Seriously, there is such a mess of non-legislative administrative regulations that are considered felonies that the best estimate is that most people commit three felonies a day, without realizing it.
When we live in a system with so many rules that have never been voted on and our legal system refuses to consider legitimate ignorance of the law to be a defense and we have a collection of secret laws that are a felony to disclose or violate, government spying gets far more dangerous.
The Foreign Intelligence Surveillance Act of 1978(FISA) is the law the NSA is using to justify all of these data requests. The law, that we all must obey, is being overseen by a small subcommittee in Congress, and the FISA courts are just a small subset of the judges. The judges are signing warrants allowing the wiretaps and massive surveillance, but that is clearly unconstitutional and, hence, illegal.
The text of the Fourth Amendment to the Constitution, the supreme law of the United States is: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
Any warrant that cannot name a place to be searched is illegal.
Any warrant that cannot describe the person to be monitored is illegal.
Any warrant that is not backed by probable cause is illegal.
Tell me how “I want to watch what everyone is saying on Facebook and seize all of the data” meets any of those criteria.
Bueller?
Wiretapping the AP is a serious violation of the First Amendment, too. “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”
“Congress shall make no law…abridging the freedom of speech, or of the press..and to petition the Government for a redress of grievances.”
Monitoring the press in case somebody breaks a story the government doesn’t want broken is crap.
How can we petition the government for redress of grievances that they call a felony if the company discloses the violation to us? It’s self-serving circular crap.
When you throw the IRS harassing charities working for the “wrong” politics, you start to pine for the good old days of Nixon-level fair play and integrity.
To be fair, FISA got nasty with the Patriot Act, which was an abomination enacted by a different political party. Hey, Washington, next time try to remember that your laws will someday be administered by your political enemies, k? (NSA: I trust you’ll pass the message for me?)
There are four main pieces to discuss, based on the scandalous Constitutional violations reported recently.
1. Social media monitoring. There’s nothing to this. If you post things on Facebook, the government sees it and knows it’s you. Don’t post anything you don’t want broadcast to the police, your grandmother, and your priest.
2. Internet browsing. There is very little that is secure on the internet. The government can subpoena your ISP and get any records they keep. Unless you go anonymous and encrypted. Welcome to TOR. The Onion Router is a system that encrypts your internet traffic and bounces it all over the world. Once you enter TOR, nothing you do can be tracked, until your internet request leave the TOR system. The system is not centrally owned or controlled, so nobody in the system can track what you are doing.
For example, if I use the TOR browser to search Wikipedia, a snoopy NSA goon could tell I’m using it, and they could tell there was a request from the TOR system to Wikipedia, but they can’t tie one request to the other. If I’m dumb and log into Facebook, I lose that anonymous shield.
That’s solid protection from anyone watching your internet traffic.
How do you use it?
Easy. Just install the Tor Bundle. When you want the NSA to stop snooping over your shoulder because you want to do a search on erectile dysfunction, you launch TOR and the TOR browser and search without having to share your embarrassing secrets.
3. Email. Email is easily the least secure means you can communicate. When you send an email, that message is in plain text, and it bounces from server to server until it reaches the recipient. Any of the involved servers can keep a log of the traffic and read your email.
Never, ever, ever, ever put anything incriminating or important in an email. Don’t send credit card numbers, your social security number, or the address of your meth lab.
But what if you want to have a dirty conversation with your spouse without letting the sick voyeurs at the NSA listen to you ask your wife what she’s wearing and how would she like it torn off?
Use PGP. OpenPGP is a free software encryption program that is basically impossible to decrypt. It’s known as public-key encryption, which means that anybody can encrypt a message to you that only you can read.
It’s like magic.
To use PGP, the easy way(for Windows users) is to get Gpg4win. Install that, then open Kleopatra. This will let you generate your encryption key. You do that by:
You now have a set of PGP keys. To get your public key that others can use to send you messages, right-click your certificate and select “Export certificates”. Pick a path to save the certificate, then do so. You can open this file with notepad to get your public key, or you can email the file out. There is no need to worry about security with this file.
You will end up with something that looks like my public key here:
—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v2.0.20 (MingW32)mQENBFGyPPkBCAC8zc5B7srG/ZyRMpokP3KyIMd9GA4n94wT89sP/yWFylbTKXDM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=fHba
—–END PGP PUBLIC KEY BLOCK—–
To get your private key, that you can use with any number of plugins for your email client, right-click on your certificate and select “Export secret keys.”
You can either use PGP as a plugin for your email client, or you can use Kleopatra’s feature “Sign/encrypt files”. To do that, write your message in a file, then select the feature inside Kleopatra. You’ll end up with an encrypted file you can attach to your email that snoopy government man can’t read.
4. Phone calls. This would appear to be harder, since your phone is largely out of your control. There’s nothing practical you do about a landline, except to avoid saying anything sensitive. On your cell phone, you have options, assuming you use a smartphone.
For Android users, it’s free an easy. Install Redphone. If you place a call with Redphone, it checks to see if the caller also uses Redphone. If he does, it places an encrypted call over your data plan to the other phone. Nobody can listen in to an encrypted call. The same company also makes a program for texting.
For iPhone users, you’re stuck with Silent Circle for $10/month, which may be a better option, since there is support for more devices, including Android. It was designed by the guy who designed PGP and handles texting and email, too.
There you are, the whats, whys, and hows of modern, hassle-light, private communications. Doing what we can to foil bad government programs is our patriotic duty.
It’s been a month since I’ve written a post for the budget series, so I’ll be continuing that today. See these posts for the history of this series.
This time, I’ll be reviewing my non-monthly bills. These are the bills that have to be paid, but aren’t due on a monthly basis. Some are annual, some are quarterly.
Reviewing this list, there doesn’t seem to be too much I can cut and accomplish any meaningful savings. Am I missing something?