HIGHLY POTENT NEWS THAT MIGHT CHANGE YOUR VIEWS

surveillance

PODCAST/VIDEO — Interview 798 – What is Greenwald Covering Up? – BFPRoundtable #02

The Corbett Report
Dec 20, 2013

In this blockbuster no-holds-barred conversation, Sibel Edmonds, Guillermo Jimenez and James Corbett discuss Edmonds’ recent series of articles on Glenn Greenwald and his connection to billionaire Pierre Omidyar. We talk about the NSA/PayPal connection and Greenwald’s refusal to discuss this issue, and Edmonds reveals specific examples of publicly documented cases that Greenwald has been covering up for years.


VIDEO — More Disney Indoctrination: ‘Everything You Do, We’ll Be Spying on You!’

Truthstream Media
Jan 29, 2014

So Disney Jr., the Disney brand aimed at preschoolers, apparently has a cartoon named Special Agent Oso (http://disneyjunior.com/special-agent…) that features a nanny state ladybug drone named Shutterbug which comes complete with a little camera that transmits video up to a satellite that then sends that data in to headquarters for analysis…”She’s always in flight, on the case both day and night.” (The “case,” in this case, is an infraction involving a parent leaving her daughter in a parked car in their driveway without a seat belt on…)

Even die hard Disney fans that hate on us for reporting on them will have a hard time ignoring the obvious big brother propaganda and indoctrination going on in this creepy, creeeepy cartoon.

There’s even a theme song…but we warn you; it’s the stuff Orwell’s nightmares were made of — http://www.youtube.com/watch?v=9hLowm…

Original article up at 21st Century Wire: http://21stcenturywire.com/2014/01/29…

Website: TruthstreamMedia.com
Twitter: @TruthstreamNews
FB: Facebook.com/TruthstreamMedia

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*

­~*~*~*~*~*~*~*~*~*~*~
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.


MUST WATCH DOCUMENTARY — “Trance-Formation” — Trans-Humanism / Genetic Modification of all Life / Nano-Technology / HAARP / Geoengineering

PEREXUSREX
Nov 24, 2012

[HD-version]

OUTSTANDING VIDEO . . .
Genetic Modification of all Life!!! New Documentary Film
Enslavement of the human race
This is part of the Endgame but not all . . .MUST WATCH
The State of our World

‘Trans Formation’ By Max Igan

Geoengineering

Trans-Humanism / Genetic Modification of all Life / Nano-Technology / HAARP / Geoengineering -Film

Chemtrails

The latest film by Max Igan, one of the greatest humans to ever walk this planet. This man deserves his rightful place in the history books, right next to the greatest minds of all time. http://thecrowhouse.com/home.html

Max Igan’s YouTube Channel:
http://www.youtube.com/user/aodscarec…

TO SUPPORT:
http://thecrowhouse.com/home.html [Max Igan's Website]

Category:
Education

Electromagnitism and Chemtrails

Transhumanism is – http://www.wordwebonline.com/search.p…

Tags:
Trans Humanism genetic modification of all life nano technology. HAARP nanotechnology nano transformation trans formation humanism is. Nanoparticles nanotech what is nanotechnology. Future technology transformation


PODCAST/VIDEO– Interview 856 – The Beard World Order roundtable on “Meta-Conspiracy”

The Corbett Report
Apr 9, 2014

via TracesOfReality.com:

Welcome to The Beard World Order: On today’s episode Tom, James, and Guillermo take on “meta-conspiracy” and the “conspiracy to inject conspiracy.”

Do the infiltration and subversion tactics of the NSA and private intelligence contractors present a unique challenge for activists and the alternative media in the 21st century? Are “sockpuppets” and other disinfo exploits any different than the decades old COINTELPRO? What is cognitive infiltration, and how has it already succeeded in invading our minds? Have privacy norms (#aftersex) been irreversibly altered? Is there any hope left for humanity? And why would the Department of Defense be involved in the making of Ernest Goes to Camp?

Your answers to these questions, beards, beards, yeah, and more.

Enjoy.

Contact Guillermo, James, and Tom with questions, comments, and suggestions for future topics to be discussed on the show.

For a High Quality audio download of this episode, click here (right-click, and save-as).

Show Notes:

Beard World Order: Episode 01 – Uncorking Conspiracy

Wired: Why You Should Embrace Surveillance, Not Fight It

Invasion of the Data Snatchers: Big Data and the Internet of Things Means the Surveillance of Everything

Americans say they’re shopping less online. Blame the NSA.

Many say NSA news changed their behavior

How Did Snowden Change Search Behavior? New Research Shows, More Than You Might Think

Beyond Snowden: Don’t Coddle the National Security State; Smash It

Border Patrol Throw Political Bone to Civil Libertarians; Will We Fetch?

TOR Radio: Drug Culture, Bodycams, and Romanticizing the Republic

The Corbett Report: Solutions: Sousveillance (video)

ClandesTime episode 025 – Fun with FOIA

Complete list of DOD-assisted movies

The House’s NSA bill could allow more spying than ever. You call this reform?

The #aftersex selfie is a betrayal of intimacy

Bearded bands and facial hair appreciation clubs: the hairy-faced trend is back

U.S. government sues Philadelphia schools over beard policy

Beard transplants (video)


Australian Security Agencies Target “SyrianGirl” Mimi Al-Laham

by Brandon Turbeville
Activist Post
Jun 12, 2014

Mimi Al-Laham (SyrianGirl)

In the Orwellian world of post 9/11 hysteria and the Global War On Terror, speaking truth is a revolutionary act. Indeed, such is evidenced by the fact that speaking out against terrorism is now enough to cause you to be labeled as a supporter of terrorism. At least, that is, in certain instances.

This is particularly the case with Mimi Al-Laham, (aka SyrianGirl), a young Syrian woman who has been active on YouTube, social media, and her own website in speaking out about the Western-backed destabilization of Syria.

Laham has consistently denounced the death squads operating inside Syria as terrorists and agents of the West as well as identified the so-called rebellion as being nothing more than a Western – organized, funded, and directed campaign against the Syrian government , all documented fact. For more information on this topic, please see my book, The Road To Damascus, The Anglo-American Assault On Syria.

However, her statements against terrorism, beheadings, rapes, slavery, and wholesale slaughter have caused her to be labelled as a potential “extremist” and purveyor of “extremist rhetoric.” For that reason, Australian security agencies have been closely monitoring Laham’s online statements and, presumably, much more than that.

Australian Institute of Criminology’s Shandon Harris-Hogan said that such statements and online behavior should be watched for “signs of an escalation in rhetoric or calls for violence” and that “When it crosses that line, particularly into encouraging, facilitating or preparing for violence, that’s when it’s going to particularly hit the radar of security services.”

[...CONTINUE READING THIS ARTICLE]


NSA Whistleblower: Snowden Never Had Access to the “Juiciest” Intelligence Documents

Global Research
June 9, 2014

Washington’s Blog 7 June 2014

nsa

NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping.

Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:

He says the NSA started spying on President Obama when he was a candidate for Senate:

Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this.

Washington’s Blog called Tice to find out more about what he saw when he was at NSA.

RUSSELL TICE: We now know that NSA was wiretapping [Senator] Frank Church and another Senator.  [That has been confirmed.]

And that got out by accident. All the information the NSA had back then – and probably many other senators and important people too, back in the 70s – they shredded and they destroyed all of that evidence.  As much as they could find, they destroyed it all. By accident, something popped up 40 years later.

And, in fact, they were asked 40 years ago whether NSA had bugged Congress. And, of course, they lied. They lied through their teeth.

NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance

WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent.  [Background here, here and here.]

Does Snowden even have documents which contain the information which you’ve seen?

RUSSELL TICE:  The answer is no.

WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?

RUSSELL TICE: Think of it this way.  Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden?

Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing?

They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA.  They made the reports look like they were Humint (human intelligence) reports.  They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago.  [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.]

Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level.  It’s called “ECI” – Exceptionally Controlled Information  – and it’s called the black program … which I was a specialist in, by the way.

I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations  It’s highly unlikely Mr. Snowden had any access to these.

Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it.  It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System.  The JWICS system is what everybody at NSA has access to.  Mr Snowden had Sys Admin [systems administrator] authority for the JWICS.

And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance].

ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks.

These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them.  [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]

It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency.

When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times –   that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up.

There was no such thing beforehand. It was made up … to try to placate the American people.

The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of.

So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.

Snowden’s Failure To Understand the Most Important Documents

RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG.

The stuff that I saw looked like a bunch of alphanumeric gobbledygook.  Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst.  So he would see something like that, and he wouldn’t know what he’s looking at.

But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there.

I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.

Cheney Was Running the Show

WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive].

Is that right … and if so, how do you know that?

RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington.

WASHINGTON’S BLOG:  It sounds like it wasn’t going through normal routes?  It’s not like Cheney or Addington made formal requests to the NSA … through normal means?

RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.

NSA Is Spying On CONTENT as Well as Metadata

WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata?

RUSSELL TICE: Of course it is. Of course. [Background. But see this.]

NSA Spying On Journalists, Congress, Admirals, Lawyers …

RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such.

I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state.

Or an Admiral and his wife, and his kids and his staffers …

The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else.

These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.

Snowden and Greenwald’s Whistleblowing Was Done In the Right Way

RUSSELL TICE: If Mr. Snowden would have had access to VRK, ECI, SAP, STO (and a few others that I will not mention here), and he released them en masse to the press, I would volunteer to shoot him as a traitor myself.

But this is not what he did.

He gave up JWICS info that he insisted be vetted for sources and methods, and true damage to national security. Mr. Greenwald and company should be congratulated on the restraint that they have shown with the JWICS documentation that they have in hand via Mr. Snowden.

Postscript: When Tice started blowing the whistle on NSA mass surveillance in the early 2000s, the NSA all of a sudden decided that Tice was “crazy”. As Tice told us:

For many years, I was the only NSA whistleblower in public.

And what they did is call me in – 9 months after my routine psychological evaluation – which I passed with flying colors, like every other one I’ve had in my entire career, passed with flying colors.

They called me in for an “emergency” psychological evaluation, and they declared me nuts.

I am a fairly good judge of character, and I found Tice to be humorous, self-deprecating in a healthy and light-hearted way, and consistent on the facts. Tice talked about how he was a pretty darn good football player in junior college, but no star athlete. He talked about how one reporter tried to make him out to be James Bond with leading man looks, and he thought that was ridiculous. We shared some normal “guy talk” about women. Tice has a little anger at the way the NSA tried to whitewash the mass surveillance that he uncovered (wouldn’t you be?), but he wasn’t enraged or over-the-top. Tice is also a patriotic American, not a subversive. Specifically, we spent a long time talking about the importance of the Constitution and the rule of law. In other words, Tice seems “oriented to reality”, completely sane, normal, ethical and bright to me.

And the following facts are more important than my personal impression:

Given the way that the NSA has been repeatedly caught in lies about its surveillance programs – and the way that it has attacked whisteblowers – I believe Tice over the NSA.


PODCAST/VIDEO — Why We Must Oppose Bilderberg

The Corbett Report
May 30, 2014

As the Bilderbergers gather in Denmark to discuss this year’s agenda, James Corbett presents “Why We Must Oppose Bilderberg” to the We The People Anti-Bilderberg Conference taking place in Copenhagen. Learn more about the history, aims, and goals of the Bilderberg Group, why they must be opposed, and how best to do it on this special edition of The Corbett Report podcast.

SHOW NOTES AND MP3: http://www.corbettreport.com/?p=9338

[related videos:


12,000 entries: Google flooded with Europeans’ ‘right to forget’ requests

Blacklisted News
June 1, 2014

Source: RT

Reuters / Francois Lenoir

Reuters / Francois Lenoir

In one day after offering a form for requests to remove links to harmful information about individuals, Google has received 12,000 entries. The search giant will have to process the inflow individually.

The number of requests was given out by a company spokesman in Germany on Saturday, a day after Google revealed its new instrument for people seeking to exercise their new ‘right to be forgotten.’

The form was set up in compliance with a ruling by EU’s highest court, which said individuals can demand that links to material to irrelevant or outdated information about them be removed from search query results.

Germany leads in the number of request, according to Google data, with four out of ten submissions coming from there. Spaniards and Britons are also flocking in numbers to have links to information on them removed.

Coinciding with the launch, Google’s chief executive officer Larry Page warned that the court’s decision may empower dictators.

“It will be used by other governments that aren’t as forward and progressive as Europe to do bad things. Other people are going to pile on, probably… for reasons most Europeans would find negative,” the executive told the Financial Times.

He also claimed that the move would stifle innovation, because small startup companies would not have the resources Google has to address such regulations.

Google’s search results would be changed only according to requests in the EU. But human employees will review all the thousands of requests, rather than software used by the giant, to deal with millions of request to remove links to copyrighted material.

The company said it would in each case weigh the demand for privacy with the public’s right to know, especially when the individual in question is some sort of a public figure.

“When evaluating your request, we will look at whether the results include outdated information about you, as well as whether there’s a public interest in the information—for example, information about financial scams, professional malpractice, criminal convictions, or public conduct of government officials,” comments explaining the form say.

Europeans started sending Google requests to redact links even before the company set up the complaint form, and have sent thousands of them. Unsurprisingly, a large portion of those was connected to criminal records or some other past sins.

According to media reports, among the first requests submitted were those of a man convicted for possession of child pornography, an actor, who had an affair with a teenager, a politician, who misbehaved while in office, and a physician disliking negative reviews.

Other large search engines, Yahoo and Microsoft’s Bing, are also subject to the court’s decision. Yahoo said in a statement it is in the process of developing a solution to comply. Microsoft said it hopes “the courts and data protection authorities will strike the right balance between protecting privacy rights and the freedom of expression.”


The True Purpose of Chemtrails?

AirCrap.org
May 3, 2014

by Zen Gardner – Apr 30, 2014

Star Wars

[An archived article with some very compelling information which may also help explain some of the strange maladies many are experiencing. Watch your thoughts. - Zen]

By Carolyn Williams Palit

Rense.com

We are dealing with Star Wars. It involves the combination of chemtrails for creating an atmosphere that will support electromagnetic waves, ground-based, electromagnetic field oscillators called gyrotrons, and ionospheric heaters. Particulates make directed energy weapons work better. It has to do with “steady state” and particle density for plasma beam propagation.

They spray barium powders and let it photo-ionize from the ultraviolet light of the sun. Then, they make an aluminum-plasma generated by “zapping” the metal cations that are in the spray with either electromagnetics from HAARP, the gyrotron system on the ground [Ground Wave Emergency Network], or space-based lasers. The barium makes the aluminum-plasma more particulate dense. This means they can make a denser plasma than they normally could from just ionizing the atmosphere or the air.

More density [more particles] means that these particles which are colliding into each other will become more charged because there are more of them present to collide. What are they ultimately trying to do up there — is create charged-particle, plasma beam weapons.
Chemtrails are the medium – GWEN pulse radars, the various HAARPs, and space-based lasers are the method, or more simply:

Chemtrails are the medium — directed energy is the method.

Spray and Zap.

This system appears to be in Russia, Canada, the United States, and all of Europe. Exotic weapons can be mobile, stationary, land-based, aerial, or satellite.

It is an offensive and defensive system against EM attacks and missiles. It uses ionospheric particle shells as defense mechanisms [like a bug-zapper shell]* against missiles and EM attacks. That means they spray and then pump up the spray with electromagnetics. When these shells are created using the oscillating, electromagnetic, gyrotron stations, it “excludes” and displaces the background magnetic field. These shells can be layered one above another in a canopy fashion for extra protection from missiles. The chemtrail sprays have various elements in them like carbon which can used to absorb microwaves. Some of these sprays have metal flakes in them that make aerial craft invisible to radar. Spoofer sprays. Sprays like these can be used to create colorful, magnetized plasmas to cloak fighter jets.

There are satellite weapons involved. Activists are using meters and are getting readings of microwaves, x-rays, and some other kind of emission that they are not sure of, maybe a low-intensity laser.

They are also photographing gas plasma generation due to the heating of chemtrails by electromagnetics. The technical names for vertical and horizontal plasma columns are columnar focal lenses and horizontal drift plasma antennas. Various size of gas plasma orbs are associated with this technology. These orbs can be used as transmitters and receivers because they have great, refractory and optical properties. They also are capable of transmitting digital or analog sound. Barium, in fact, is very refractive — more refractive than glass.

What does that mean? Someone or someones are very involved in unconstitutional, domestic spying and the entrained plasma orbs carried on electromagnetic beams can be used for mind control programming. The satellites can be programmed to track and monitor various frequencies on different parts of your body. These electromagnetic beams carrying the gas plasma orbs stick due magnetic polarity and frequency mapping and tracking to people’s eyes, ears, temples, and private parts. A beam with entrained orbs carries pictures in each orb just like the different frames in a movie. It is a particle beam that is also a frequency weapon.

The satellites download holographic mind control movies, pictures, sounds, and sensations to people through this technology. The Air Force has stated in “Air Force 2025? that their goal is to develop virtual and augmented reality mind control. Depending on the how the computer is programmed or depending on the mood or intent of the person interfacing with the technology, you can be probed, bothered, gaslighted, frightened, manipulated, electronically raped, or tortured. It scans your brain frequencies and deciphers your thoughts. The satellites track you by mapping your bioenergetic signature [body biometrics] and constantly scanning an area to find you.

We are the lab rats for this technology and something is very wrong in the military or intelligence branches somewhere. Because developmental projects in government and military are often so compartmentalized, I suppose someone could be using and developing this technology secretly and without authorization. Then again, behavioral and mind control programs were an authorized policy under MKULTRA. Our country has a history of experimenting on its citizens. We are talking about satellite charged-particle frequency weapons attacking a person 24 hours a day. Psychotronic weapons are considered weapons of mass destruction by the U.N.

“HAARPs” can create earthquakes and can also x-ray the earth to find underground military bases, gold, or oil reserves. These ionospheric heaters can also operate as an over-the-horizon or under-the-ocean communications system. This system can control the weather or create disasters. Taken together with the aurora keyhole through-your-roof satellite surveillance system, Echelon electronic computer/phone sweeps, plasma-cloaked DOD Drug War helicopters and stealths, implants, and cameras on the street, it constitutes one, big global and space control grid.

These weapons involve beams. Two beams overlapped will couple into a particle-ion beam that will bounce off of a remote target and send a holographic image back to the satellite for remote spying operations. When you cross two strong beams, you can supposedly* create scalar energies. These energies can be used as untraceable weapons for nuclear size explosions or for defense. These crossed-energies can be used to cause a person’s physical electrical system to fail or with a lower frequency, administer a kind of remote electro-shock. Visualize touching a positive and negative electric cable to each other on top of your head. Scalar energies can be utilized in hand-held military guns and on tanks. They can dud-out electronics or cause large, electrical blackouts. Scalar energies are practically impossible to shield against. You need lead, ceramics, and a deep underground facility to not be affected by these weapons. Or, you need to be up and above the field of battle.

People who are working on these issues hear tones and hums. If you hear persistent tones and static; have body vibrations, burning sensations, “bangs” to the head, neurological damage, or immune system damage; are hearing electronic voices or hearing the sound of a plasma; suffering from pains deep in your organs or constant headaches; or experiencing other anomalous activity then you may be being targeted by directed energy, mind control weapons. These weapons could be on helicopters, jets, stealth fighters, or on satellites. Directed energy beams and electromagnetic waves can be sent to you via hand-held devices or piggy-backed in on cell phone and satellite towers.

Is it possible that someone(s) are very afraid of coming famines and riots due to the ongoing, man-induced failure of the ecological system, and they are saturating the earth with chemtrails for large- scale, gas plasma mind control? Is this the last grasp for the world’s resources? Or, are they just control freaks and money mongers? Someone would like to get to that oil under the melting [due to chemtrail-trapped EM heat] Artic. And, I guess the Third World is not a part of this system. I don’t think that the developed nations are going to let them in on this either.

Any country that joins this NATO system will become mind-controlled and diseased due to the associated, intense, oscillating, electromagnetic fields, electromagnetic soup, and the poisonous, toxic chemtrails. Our DNA will break. We risk the earth’s spin and tilt becoming messed up due to mucking around with the magnetic fields through this military technology. Maybe, it is already messed up.

It constitutes U.S. global domination via NATO and the erosion of civil rights. According to Charlotte Iserbyt and Al Martin, there are ex-KGB and ex-STASI advising our new Office of Total Information Awareness. They are the ones creating our new internal passports [national ID]. And under “The Treaty on Open Skies,” we have overflights by Russian and German military. Who exactly is flying those plasma-cloaked craft that are seen all over this country and mistaken for UFOs by people who do not know about this aerial deception technology? Obviously, we have another “Project Paperclip” in the making. We can add the new thugs to the 2,000 Iraqi brought into country by Daddy Bush who are now living in Nebraska.

The elitist corporate government is going to hold the rest of us hostage with directed energy weapons in space, if the Policy for a New American Century group – PNAC – Bush and cronie think tank has their way, along with directed energy attacks against any country or citizen that they decide they do not like. These weapons can create climate war, weather war, mind war, cyber war, disease war, disaster war, and undetectable war. Taken together they can create economic war.

If this system is not stopped, it will kill billions due to aluminum and barium poisoning. It will kill billions due to crop failures and world-wide famine. It will cause heart attacks, strokes, and cancers. It will cause stillbirths, miscarriages, and infertility. The chemtrail sprays often have fungi, bacteria, viruses, dessicated red blood cells, crystalline substances, carbon, metal cations, lithium, other chemicals, heavy metals, and God knows what – probably smart dust, or nanocrap. Years of biowarfare testing on the American public is no big secret anymore. Spraying germs in the sky where they mutate due to the ultra-violet light — brillant plan, my man. Are we acceptable losses or is this by design?

I know that many of the major players have big investments in pharmaceutical companies, GM seeds [seeds that can grow in an electromagnetic soup], weapons and directed energy development contracts, oil contracts, genetic research, and mind control research. Some of these people have had a familial history of financial and policy support for population control, eugenics, Hitler, Mao, Stalin, Lenin, Marx, Pinochet, Hussein, and various other dictators. Some of the major players were the masterminds of the death squads in Central and South America. They stand to make a big profit on our death and disease. Just take a look at Rumsfield and Tamiflu.

I assume that they know the dangers of this system and that they take care to stay in their shielded, air-filtered offices, homes, bases, and cars. I assume they take chelating substances to remove the barium and aluminum from their bodies and minds. If not, then they really do not understand the far-ranging implications of this destructive system. Congress may not understand just what a terrible weapons system and control grid they are funding.

As I understand it, Tesla towers attached to deep-earth, free-energy taps are to be created over the 10-12 magnetic poles and the GWEN system phased-out. Has this already been done? This should allow total control of the earth through giant, Tesla death ray-guns. This natural, electromagnetic earth was not meant to be an unnatural dynamo to power man’s weapons or his utility companies.

Over-unity systems [Tesla devices]* are as of yet, another unexplored and probably not understood man-made energy. We should be very suspect of free energy. As we can see, the forms of man-made energy that have been created and used in the past have not been good for this planet. Maybe it is time to reconsider the options available to us through the development of crops for fuel, wind, solar, and water power. We need world-wide, different, more holistic, renewable, energy programs.

Is there any good news? Yes. There has been tons of particulate dumping through the spray operations for (15) years over the Americas, Europe, Scandinavia, Eastern Europe, and from what I can find out, over Russia. And, what goes around blows around, right? So, these substances are probably actually global. It sure makes a ton of sense to spray poisonous elements in 24 NATO countries and let the substances be carried around the earth on the jet streams to poison yourself, your enemies, and all neutral and non-combatent countries. Talk about making more enemies.

The water, air, and soil of all of these countries is so saturated with metal cations that these weapons freaks should be able to zap and mind f–k each other quite well now and as often as they wish. Once they have clobbered each other with light-saber beams for a few years and razed and scorched sections of the earth, they may start to realize that this foreign policy will lead to a defective human race and a rotten economy.

MORE>>

+++

ZenGardner.com


VIDEO — No More Net Neutrality? – #NewWorldNextWeek

New World Next Week
Apr 24, 2014

Welcome to http://NewWorldNextWeek.com — the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. This week:

Story #1: Federal Judges Order Obama to Release Memo Justifying Assassination of Americans
http://ur1.ca/h5w06
John Yoo makes the case that the President can torture children if necessary
http://ur1.ca/h5w1b
Life’s Good If You’re a Drone-Loving Criminal Regime: ‘US Drone Strikes Continue With Impunity’
http://ur1.ca/h5w0j
Makers Say Don’t Worry About Privacy as Civilian Drone Industry Takes Off in Sunny Spain
http://ur1.ca/h3von

Story #2: FCC Finally Announces New Rules That Will Kill Net Neutrality
http://ur1.ca/h5w1g
Internet “Fast Lane”? Big Companies May Soon Be Able to Pay to Have Their Websites Load Faster
http://ur1.ca/h5w1m
Corbett Report Episode 262: Pirate Internet
http://ur1.ca/h5w1v
Cronyism At Its Finest, U.S. Government Arguing Against Aereo On Behalf Of Broadcasters Before SCOTUS
http://ur1.ca/h5w1z

Story #3: #MyNYPD Hashtag Attracts Photos of Police Violence, Abuse
http://ur1.ca/h5w22
The Folks Behind #MyNYPD Are Learning a Tough Lesson Right Now
http://ur1.ca/h5w24
General Mills Reverses Legal Terms After Controversy
http://ur1.ca/h5w29
Federal Judge Approves Class Action Case Against Ford, IBM for Helping South African Apartheid
http://ur1.ca/h5w2j
Colorado Crime Rates Down 14.6% Since Legalizing Marijuana
http://ur1.ca/h5w2q
Open Source Comes to Farms With Restriction-Free Seeds
http://ur1.ca/h5w2y
​Vermont Poised to Enact Toughest US GMO-Labeling Law Yet
http://ur1.ca/h5w38

#NewWorldNextWeek Updates:
Researchers Unveil System to Start Storms & Lightning on Command
http://ur1.ca/h5w3f
Controversial Light Bulb Listens to Conversations, Tweets What It Hears
http://ur1.ca/h5w3n
@Pepsico: Why Are You Bulldozing The Rainforest? Why The Blood-Palm Oil?
http://ur1.ca/h5w3z
Capital and ‘Captain America': Media Oligarchs Plan Comic Book Movies Into 2028
http://ur1.ca/h5w4b

Visit http://NewWorldNextWeek.com to get previous episodes in various formats to download, burn and share. And as always, stay up-to-date by subscribing to the #NewWorldNextWeek RSS feed or iTunes feed. Thank you.

Previous Episode: Crowdsourcing Surveillance, Mainstream Conspiracies, No GMO Russia
http://www.corbettreport.com/?p=9063


VIDEO — Silent Circle’s Blackphone unveiled

RT America
Feb 28, 2014

It may look like a typical phone on the outside, but on the inside, it’s a device that runs completely on encrypted technology. Blackphone, released this week at the Mobile World Congress, is a new privacy-focused smartphone developed by privacy communications firm, Silent Circle, and smartphone manufacturer, Geeksphone. RT’s Ameera David takes a deeper look at what this phone has to offer, then talks to Liz Wahl about the groundbreaking technology.

Find RT America in your area: http://rt.com/where-to-watch/
Or watch us online: http://rt.com/on-air/rt-america-air/

Like us on Facebook http://www.facebook.com/RTAmerica
Follow us on Twitter http://twitter.com/RT_America


PODCAST — The Corbett Report | Interview 843 – The Intelligence-Industrial Complex: James Corbett on ClandesTime

The Corbett Report
Mar 24, 2014

James Corbett joins Tom Secker of SpyCulture.com to talk about the privatization of intelligence and the development of the intelligence industrial complex. In this typically wide ranging conversation James began by breaking down the different layers in the existing discussion on this topic. We looked at the history of private intelligence, how 9/11 turned it into a massive industry, Edward Snowden, Anonymous, so called cyberterrorism and much more.

Sources:

NBC – Intelligence contractors on the rise since 9/11

Private Intelligence Firms – short list

Operation AntiSec

ODNI document on US intelligence budget

The EyeOpener- CIA Front Companies

Radiohead – Where I End and You Begin


Canadians File Class Action Lawsuit Against Facebook For Interception Of Private Messages

by Terry Wilson
Canadian Awareness Network
Apr 11, 2014

cio.com

Facebook is facing a class-action lawsuit in Canada over its alleged interception of private message of users of the social network.

The lawsuit in the Ontario Superior Court alleges that URLs (uniform resource locators) in the private messages were “harvested” by Facebook in violation of its users’ privacy, without their knowledge or consent, Rochon Genova, the law firm representing the users, said Wednesday.

Facebook did not disclose to users that their private messages would be intercepted and scanned, and the contents of those messages treated as “likes” for third-party sites through the social plug-in function, according to the law firm.

The complaint is without merit and we will continue to defend ourselves vigorously, a spokeswoman for the social networking company said via email.

The company is already facing similar lawsuits in the U.S. over its alleged interception and scanning of the content of private messages.

Citing research by Swiss information security firm High-Tech Bridge and others, Facebook users Matthew Campbell and Michael Hurley filed in December a suit in the U.S. District Court for the Northern District of California on behalf of all Facebook users in the U.S. who have sent or received private Facebook messages that included a URL in the content of the message.

High-Tech Bridge wrote in August last year that Facebook was one of the Web services it tested that was caught scanning URLs despite such activity remaining undisclosed to the user, according to the complaint.

Facebook mined user data and profited by sharing the data with third parties such as advertisers, marketers, and other data aggregators, despite having made representations that “reflect the promise that only the sender and the recipient or recipients will be privy to the private message’s content, to the exclusion of any other party, including Facebook,” the complaint added.

The lawsuit is proposed to be consolidated with a similar one filed in January in the Northern District of California by another Facebook user David Shadpour. If there was a URL in the private message, Facebook searched the website identified in the URL for purposes such as data mining and user profiling, according to Shadpour’s complaint.
Continue Reading


VIDEO — “Snoopy” Drone That Can Hack Your Smart Phone

by Terry Wilson
Canadian Awareness Network
Apr 11, 2014

A London based company named Sensepoint security researchers have developed a drone called ‘Snoopy’. The drone can hack into a person’s smart phone by “spoofing” a wifi signal.

The best way to protect yourself from hackers and/or government agencies (police use similar handheld devices) who are utilizing this type of software, is to keep wifi on your phone turned off until necessary.


Cows Are Getting Plugged Into The Internet of Things

by Heather Callaghan
Activist Post
Apr 4, 2014

Photo: by hbomb

The Internet of Things envisions a world where all things are “smartened” and connected to the Internet, always broadcasting real-time updates. Usually people think of appliances, which for me always conjures images of The Brave Little Toaster.

Did you ever carry this idea out into living things? Plants, then animals…then humans? Well, technology from the Internet of Things has definitely crept into the world of plants and is now making its way toward animals. Large-scale farms are particularly eager to use new technical applications – anything to help stay ahead of the changing food system and a shuttering economy.

So now plugged into the Internet of Things, we’ve got appliances, electrical meters, industrial equipment, devices for plants, and…cows. Yes, more and more cattle are connecting through their collars which emit real-time updates about their heat cycles.

The special Wi-Fi connected collar is called the Silent Herdsman, originating from Glasgow, Scotland. Not only does it monitor, but also uses artificial intelligence software to determine when Ms. Moo is in heat. There’s a similar product actually called the MooMonitor but requires more interpretation from the farmer.

In recent years a LOT of thought and theories have gone into methods for the most milk production for the farmer’s buck. This could be anything from waterbeds to relieve stress to biotech help with fertilization to the above-mentioned devices which are intended to capture the exact moment a mother cow can get pregnant again after having just birthed a baby calf.

To a large-scale farmer, it is apparently worth it, because one missed cycle means 5 more gallons of milk per day that could have been sold, to the tune of $315 per cycle. All of these cows are artificially inseminated – one failed attempt, during a tiny window of time that farmers believe happens during the night – is a high price.

Battery power is also no longer a concern. The Silent Herdsman lasts for three years and has actually synced the cow’s personal data to the software whenever it enters into the receiving area, be it a designated field or barn.

Source:
http://singularityhub.com/2014/04/03/why-farmers-are-connecting-their-cows-to-the-internet/

Also read:

Recent posts by Heather Callaghan:


Microsoft Windows Enters The Internet of Things Surveillance Matrix

by Kevin Samson
Activist Post
Apr 2, 2014

Following other behemoth tech companies IBM, AT&T and Google, Microsoft has finally come along to state their intentions for promoting The Internet of Things.

Where Google sees adding robotic intelligence to every home, and the IBM/AT&T global partnership is to ensure that no home, appliance, or gadget is left behind, Microsoft’s Windows on Devices aims to offer its proprietary operating system to engage users on an already familiar platform.

Specific details remain sparse, but the video below speculates on a few areas that have come to light. The possible uses that have been offered are tame compared to what we already know are the intentions behind the move toward a Smart World.

In what researcher Julie Beal has dubbed “Uberveillance” she outlines the greater picture in her article from 2012:

Now global surveillance of citizens is announced with pride and accepted without question. This is the age of the ‘Internet of things’ – everything is to be woven into the Web. Companies like IBM are busily creating ‘smartworld’ where the Internet becomes the system of systems, linking all devices, people, and even nature.

Everything we buy from the shops, even our food, will one day incorporate smart tags. This practice is on the increase, facilitating what is known in the industry as ‘asset tracking’, and is being taken up more and more to enable tracking and tracing of documents, equipment, pharmaceuticals, warehouse stock, etc. (Source)

Clearly the potential is such that former CIA director David Petraeus made mention of it, implying that Smart tech will most likely lead to a CIA (and NSA) home invasion:

CIA Director David Petraeus made headlines with a speech given at the summit for In-Q-Tel, the CIA’s venture capital firm. In this talk, Petraeus discussed the emerging “internet of things” and the implications it will have for increased levels of surveillance. Petraeus explained that, because of the rise of gadgets which are connected and controlled by apps, intelligence agencies will no longer need to place spy devices inside your home – you will do it for them.

In conjunction with a recent unveiling of a new low-powered computer chip by ARM, one of the world’s largest chip companies, the fact is virtually every piece of electronic equipment (including appliances) can be controlled via apps and Internet-based systems. It is for this reason that Petraeus stated that the CIA will be able to read these devices via the Internet and even radio waves outside of the home.

Petraeus further stated,

‘Transformational’ is an overused word, but I do believe it properly applies to these technologies.

Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters – all connected to the next-generation Internet using abundant, low-cost, and high-power computing.

He also added, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately heading to quantum computing.”

 (Source)

As the world moves toward connecting real devices to the virtual world of the Internet, the recent U.S. move to relinquish Internet control to a structure of global governance will have even vaster implications. Also consider the fact that major tech companies are working together rather than competing in the Internet of Things space by forming an “Industrial Internet Consortium.” Lastly, we have Facebook pursuing the purchase of a solar drone company to potentially offer planet-wide connectivity.

As if all of that should not be troubling enough, the Windows on Devices website states the following:

Connections are everything

Your Windows device can connect to the cloud to enable interesting new scenarios. Use Azure data services, build a new mashup, analyze your data, connect your devices together, or update your devices remotely. Once your device is in the cloud, the sky’s the limit. (emphasis added).

So beyond the normal government backdoors into your devices, Cloud interaction will be built in as well. In her article “Prepping the cloud for the internet of things” tech writer Barb Darrow leaves no doubt:

As billions more devices get connected to the internet (estimated to be 26 billion by 2020 – Ed.), there will be a huge infrastructure transformation on the backend. Cloud computing will play a major role in how the world takes advantage of that device-driven data explosion. (Source)

This push continues despite the fact that Apple co-founder Steve Wozniak went on record to caution that Cloud Computing is absolutely not secure and is in fact fully compromised.

When the above developments are combined with the stated goals of UN Agenda 21, we are seeing a convergence of disparate areas under a simple single banner of connectivity.

To be sure, having you stay permanently connected in the real and virtual world has very little to do with your coffee mug or pet robot bear.

[VIDEO]

Video transcript with additional research links posted below:

Microsoft Could Bring Windows to Coffee Mugs, Robots
by Adam Falk

A new site suggests Windows might be coming to your coffee mug.

Engadget reports the site, called Windows on Devices, showed up briefly Tuesday – just ahead of Microsoft’s Build 2014 conference.

But it’s since been taken down and now looks like this, which tells us, well, nothing.

Before leaving the web, the site reportedly said Microsoft is “bringing Windows to a whole new class of small devices.”

It even used a smart coffee mug as an example. This suggests Microsoft might embrace the so-called ‘Internet of Things.’

Meaning, it’s going to make our everyday, dumb devices – like kitchen appliances or coffee mugs – smarter by connecting them to the internet.

Reports indicate Microsoft is aiming Windows on Devices at makers. That is, if it’s even happening.

Reports are speculation at this point, and as CNET notes, “The Internet of Things is certainly designed to extend smart technology to ‘dumb’ devices, but a coffee mug or bear? That might be a stretch.”

How about a watch? The Verge says the question is whether Windows on Devices could power things like watches or eyewear, “both of which Microsoft is rumored to be working on.”

We should likely know more about this mysterious site and more as Microsoft Build kicks off Wednesday.

Additional source:
http://www.extremetech.com/extreme/179617-microsoft-finally-gets-into-the-internet-of-things-prepare-for-blue-screening-fridges-mugs

Recently by Kevin Samson:


Samsung Smart Watches and Smartwrist bands Have Heartbeat Sensor, Microphones and Cameras — video included

by Frankie Gotz
Canadian Awareness Network
Feb 25, 2014

Yesterday we released an article on Samsung’s Galaxy S5 smart phone which has it’s basic features such as camera and microphone but has new biometric features on it such as fingerprint and heartbeat sensor.  But it’s not like it monitors the heartbeat of the individual 24/7, it only monitors heartbeat when the individual puts their finger on the home button.

Samsung also released three other technologies with the similar biometric features on it but the only difference is, it monitors heartbeat 24/7 of the individual wearing it and stores it in the phone through a health app.

“The Gear 2 and Gear 2 Neo leaked out a few days ago. They’re similar to the original Gear, but the strap is now replaceable, and as a result they feel a lot less bulky. The Gear 2 Neo lacks a camera, but is otherwise very similar to the Gear 2….In terms of new functionality, you get a heart rate sensor on the back, which is in constant contact with your skin, and regularly feeds data back to built-in mobile health app….(Gear Fit) smartwatch is all about fitness and activity. The heart rate sensor on the back will keep track of your pulse while you exercise, and tell you whether you need to speed up or slow down to maintain the desired rate. The display is a 1.84-inch 432×138 Super AMOLED unit, which can display notifications from your smartphone (via Bluetooth 4.0) — but unlike the Gear 2 and Gear 2 Neo, there’s no microphone on the Fit.”
~ SOURCE

If any of these health apps were tested at appthwack then its very possible it could’ve came from the CIA because appthwack just recently went into partnership with In-Q-Tell (CIA front)  to test In-Q-Tell apps.  Also In-Q-Tell has indirectly funded Samsung in the past. In-Q-Tell mission is to adapt and deliver innovative technology solutions to support the missions of the CIA and broader US Intelligence Community

[related: Smartphone giants want your body]


VIDEO — Smart Tyranny: How to resist the smart grid

Boiling Frogs Video
Feb 25, 2014

Smart technology represents less of a breakthrough in power distribution and more of a revolution in complete, constant, panopticon-like surveillance of everyone. As these smart technologies begin to invade our homes, we are becoming mere nodes in a giant network that we yet but dimly comprehend. Called the “Internet of Things,” the plan is to create a network that will eventually include every single object on the planet. And as the public is finally becoming aware, such networks provide golden opportunities for corporations and governments alike to collect data and spy on the population.

PLEASE SUPPORT BFP: http://ur1.ca/gnpck
TRANSCRIPT AND SOURCES: http://www.corbettreport.com/?p=8781

[related: Major US Utility Firm Blasts Smart Meters As “Irrational” And “Security Risk”]


VIDEO — Secret ‘Minority Report’ Tech In All Post-2010 iPhones

Infowars
Jan 20, 2014

Apple installed secret ‘Minority Report’ tracking technology in all iPhones from 2010 and only just told you about it.

https://twitter.com/PrisonPlanet
http://infowars.com


Minority Report Is Here: Chicago Residents Get Police Visit Based on Pre-Crime Surveillance List

by Nicholas West 
Activist Post
Feb 19, 2014

Chicago’s “Heat List” – image source

As we look around at the Police State being built across the world, combined with enhanced mind control techniques, it is easy to draw direct parallels with books like 1984 and Brave New World. It’s almost as if these books formed a clear blueprint for anyone seeking control over large populations.

With the quickening pace of technological advancement it is no surprise to see “ideas” become reality quicker than ever before. Philip K. Dick explored the concept of pre-crime in his short story “The Minority Report” in 1956, but it wasn’t until Steven Spielberg offered it on the big screen as Minority Report in 2002 that the audience got a true look at a potential day-to-day existence under corporate and government data management and control.

We are now at the point where “Minority Report” is being used as a sound description of current technological applications, even in mainstream news, which means that the future is actually the present. Below you will find 10 signs that we have now entered the world depicted in fiction.

The latest news from Chicago only adds to this list, as police are moving beyond simply possessing the technology and are now putting it into effect.

Chicago’s “Heat List” is an index of approximately 400 people who have been identified by a computer algorithm as being future threats to commit violent crime. Without having actually committed a crime, some of those on the list are beginning to get visits from Chicago police warning them that they are already being watched:

When the Chicago Police Department sent one of its commanders to Robert McDaniel’s home last summer, the 22-year-old high school dropout was surprised. Though he lived in a neighborhood well-known for bloodshed on its streets, he hadn’t committed a crime or interacted with a police officer recently. And he didn’t have a violent criminal record, nor any gun violations. In August, he incredulously told the Chicago Tribune, “I haven’t done nothing that the next kid growing up hadn’t done.” Yet, there stood the female police commander at his front door with a stern message: if you commit any crimes, there will be major consequences. We’re watching you.

Chicago is apparently considering this to be part of “policing in the 21st century.” A report from The Verge explains how Chicago has taken the lead in predictive behavior police tech:

In 2009, the National Institute of Justice (NIJ) made millions of dollars in grants available for any police department with a burgeoning predictive program. Police all over the country applied to tap into those NIJ dollars. The big winner was Chicago; its combination of headline-making homicide rates and already established data- and tech-focused policing made it a perfect fit. The CPD received more than $2 million to test two phases of its experimental program.

Though it took awhile to get started in earnest (staff turnover and internal politics in 2011 and 2012 stalled the project), last year the CPD’s predictive program picked up steam. One man behind that progress was Miles Wernick.

Wernick is the Motorola professor and director of the Medical Imaging Research Center at Illinois Institute of Technology (IIT) in Chicago. He says he’s been doing predictive analysis work since the 1980s, when he worked with the US military to recognize potential targets in the battlefield. From there he proceeded to medical imaging. A lot of his current work focuses on analysing data and brain scans to make automated diagnoses of dementias in elderly patients — not exactly police work.

These paragraphs encapsulate two of the major warnings that the alternative media has been shouting for years: namely that military tech always trickles down into local law enforcement; and, secondly, that Big Data initiatives which are heralded by the establishment as solutions in the computing and medical fields have a range of privacy-killing additional applications that affect people far beyond the initially stated reach.

Also highlighted are the same concerns that are cropping up in the area of NSA spying – association is an assumption of tendency toward eventual guilt. Miles Wernick goes on to say:

“It’s not just shooting somebody, or being shot,” he says. “It has to do with the person’s relationships to other violent people.”

This is in line with what Andrew Papachristos, a Yale sociologist and Chicago native, calls a social networking theory. When it comes to violence, Papachristos recently told Chicago Magazine, “It’s not just about your friends and who you’re hanging out with, it’s actually the structure of these networks that matter.”

So while Wernick acknowledges that sometimes people such as Robert McDaniel — who haven’t been convicted of a violent crime — may find themselves in the wrong social networks, their presence on the list is not random.

A commander of the program stated it even more simply:

 If you end up on that list, there’s a reason you’re there.

This indicates a fundamental shift in the way policing will be done in the future of America. Until now, we have been reporting on this type of technology and have been forced to speculate about its coming implementation. Well, now there is no doubt. And lest anyone believe that this is just an outcropping of Chicago’s notoriously Police State-happy mentality, Police Commander Jonathan Lewin matter-of-factly states the following:

This [program] will become a national best practice. This will inform police departments around the country and around the world on how best to utilize predictive policing to solve problems. This is about saving lives. [emphasis added]

Whether it will actually save lives is debatable. Has the No-Fly List saved lives? Have any of the other of the many lists one can be added to these days actually saved any lives? These lists are secretive and have become nearly impossible to independently verify as to how someone got on the list, if they deserve to be there; and, if not, how to get off the list … or if the lists are effective.

The Verge article linked below highlights the potential racial profiling of such policies – and indeed this has happened in the case of New York’s own low-tech Stop-and-Frisk policy.

So the verdict is out on saving lives. But one thing is for certain: the arrival of the high-tech Police State is certainly not about saving freedom, nor is it about preserving a Constitution designed to protect us from a Minority Report society.

Source:
http://www.theverge.com/2014/2/19/5419854/the-minority-report-this-computer-predicts-crime-but-is-it-racist
____________________________________________________________________________
10 Signs We Live In a “Minority Report” World

Individual pieces of news often get lost or forgotten rather easily in today’s fast-paced news cycle, so let’s look at an aggregate of 10 mainstream news items that offer a comprehensive picture of where we are and where we are likely to be headed both from a government surveillance standpoint, as well as targeted advertising.

1. They’re watching … Japanese electronics company NEC develops ‘Minority Report’ style billboard, The Telegraph, 3/10/2010: “Engineers have developed the billboard, similar to one used in the Tom Cruise blockbuster, that uses built in cameras to instantly identify a shopper’s age and gender as they walk past. The facial-recognition system, called the Next Generation Digital Signage Solution, then offers consumers a product it thinks is suited to their demographic.”

2. Microsoft Kinect Learns to Read Hand Gestures, Minority Report-Style Interface Now Possible, IEEE Spectrum, 3/10/2013:

3. The Long Eye of the Law: So Who’s Ready for a ‘Minority Report’-Style Future? Motherboard, 3/20/2013: On Monday, Japanese tech developers Fujitsu announced they had created . . . a bit of technology that can measure a person’s pulse using a camera or a computer webcam, just by analyzing that person’s face . . .  It’s Minority Report-style technology, to be sure—another in a burgeoning list of tech-driven ways police could prevent crimes before they happen.”

*Also see New York’s Domain Awareness System helped along by Microsoft.

4. Minority Report moves step closer as Lord Sugar launches face recognition adverts, The Telegraph, 7/9/2013: “The media company has launched OptimEyes, which will be used in more than 6,000 of its screens to target over 50m people in the UK, Germany, Poland, Switzerland, UAE, Oman, Kenya, Angola and South Africa. However, the majority of the screens, some 3,561, are in the UK in doctors’ surgeries, hospitals, convenience stores, petrol forecourts, Halifax banks, airports and train stations . . . The product comes less than a week after Sky Deutschland revealed it has developed technology to transfer adverts from train windows directly and silently into commuters’ heads.

5. Brain scans of inmates could lead to ‘Minority Report’ style ability to predict if they will re-offend, The Daily Mail, 7/15/2013: “Groundbreaking new research could allow scientists to predict if prisoners will re-offend – potentially condemning those convicted of serious crimes to a lifetime behind bars . . . It could also be used to the benefit of society in using brain imaging in deciding parole.”

6. Gesture Through News Minority Report-Style With New York Times’ Leap Motion App, Fast Company, 7/18/2013: Rather than having to flick through headlines on a touch-screen device or scroll through articles using a mouse — how antiquated! — the company’s new app allows readers to navigate through stories by motioning their hands in mid-air, with Leap Motion sensors interpreting the signals . . . The New York Times has also suggested it will give the company an opportunity to implement new advertising capabilities ‘that [will] allow brands to connect with readers using motion-controlled ad units.'”

7. Minority Report finally becomes a reality: new hi-tech video wall will let law enforcement agencies sift through data with a wave of their hand, The Daily Mail, 7/23/2013: “The hi-tech computer system behind the film Minority Report – where Tom Cruise speeds through video on a large screen using only hand gestures – is making its way into the real world. American computer experts have revealed the software has become a reality – and they hope to sell it to law enforcement agencies around the world. The interface developed by scientist John Underkoffler has been commercialized by the Los Angeles firm Oblong Industries as a way to sift through massive amounts of video and other data.”

*Also see this report on Big Data and pre-crime software.

8. Control Google Earth with Minority Report-style gestures, via Leap Motion, TNooz, 8/5/2013:

9. Minority Report-style Advertising Coming to NYC, 247Sports, 8/8/2013: “Recycling bins data mine your smartphone when you are in proximity to tailor ads when you walk by the screen and stuff. Already in London, looking to expand to NYC and other World cities soon.”

10. Google Submits Patent For Minority Report Style Eye Tracking Device, Prison Planet, 8/15/2013: “The patent filing describes a “head mounted device”, for example hi-tech glasses, that would have the ability to track eye movement, effectively monitoring reactions to external stimuli, including changes in emotion.” From The Verge: “Google could be betting that advertisers will pay to know whether consumers are actually looking at their billboards, magazine spreads, and online ads.”

From the patent application, which was filed in May 2011:

Pay per gaze advertising need not be limited to on-line advertisements, but rather can be extended to conventional advertisement media including billboards, magazines, newspapers, and other forms of conventional print media. Thus, the gaze tracking system described herein offers a mechanism to track and bill offline advertisements in the manner similar to popular online advertisement schemes.

***********

The ways that we are tracked, traced, and databased are increasing every day. Some of it is arriving without our agreement and is being utilized by private corporations and governments without our explicit approval, as the recent revelations of data spying have exposed. If we have learned one thing it is that information is knowledge and knowledge is power. The power of data collection in the hands of those who wish to exert more control is not likely to halt.  And all indications show that it is not enough to have logged and charted where we have been; the surveillance state wants to know where we are going.

Our Orwellian world is beginning to look nostalgic compared to what is in production. Neuroscientists in 2010 stated that they know you better than you know yourself.  Meanwhile, it is being estimated that computers know to a 93% accuracy where you will be, before you make your first move. The recent major global funding of neuroscience and narrative control indicates that the final target is the human brain and every thought that resides there.

However, we ought to be aware that much of our data is willingly being given via social media and the gadgets we choose to buy. As technology continues to march forward at an exponential rate, we might do well to consider how much of this we are comfortable buying into.  And if we must, should we be seeking ways to subvert the information stream?

Recently From Nicholas West:


Nanobiometrics Will Track You By Smell

by Nicholas West
Activist Post
Feb 8, 2014

image source: Sayo Studios

In a few short years, we already have become accustomed to drone surveillance and an array of biometric ID tracking technology that has formed a pervasive matrix of identification and personal data retention.

As discussed in How Close Are We to a Nano-Based Surveillance State? back in February of 2011, the next phase of ID will be on the nano scale. DARPA and their contractors have been working for quite a while on making you, not just your personal data, the tracking mechanism. Through a matrix of biological sensors and biometrics, the individual is now set to be tracked, traced and databased with greater frequency and much greater ease.

A new announcement from a Spanish engineering firm highlights the direction that is being taken in extracting the most innate personally identifying information possible. We already have iris scans, biometric fingerprinting, facial recognition, voice recognition, payment with vein scans, and proposals for brain scan databases. Now our unique smell is being researched as the ultimate tool for providing one’s ID authentication.

[...CONTINUE READING THIS ARTICLE]


BBC Propaganda: “Why I Want A Microchip Implant”

by Michael Snyder
Activist Post
Feb 12, 2014

Would you like to have an RFID microchip implanted under your skin?  If you are anything like me, you would never allow such a thing to be done. But many others, especially among the younger generations, see things very differently.  RFID microchip implants and other forms of “wearable technology” are increasingly being viewed as “cool”, “trendy” and “cutting edge” by young people that wish to “enhance” themselves. And of course the mainstream media is all in favor of these “technological advancements”.

For example, the BBC just published a piece entitled “Why I Want A Microchip Implant“.  We are told that such implants could solve a whole host of societal problems.  Identity theft and credit card fraud would be nearly eliminated, many other forms of crime would be significantly reduced, children would never go missing and we wouldn’t have to remember a vast array of passwords and PIN numbers like we do now.  We are told that if we just adopted such technology that our lives would be so much better.  But is that really the case?

As our society becomes “digitally integrated”, technologists tell us that it is “inevitable” that wearable technology will become as common as smart phones are today.  And the BBC article that I just mentioned is very eager for that day to arrive…

Ultimately, implanted microchips offer a way to make your physical body machine-readable. Currently, there is no single standard of communicating with the machines that underpin society – from building access panels to ATMs – but an endless diversity of identification systems: magnetic strips, passwords, PIN numbers, security questions, and dongles. All of these are attempts to bridge the divide between your digital and physical identity, and if you forget or lose them, you are suddenly cut off from your bank account, your gym, your ride home, your proof of ID, and more. An implanted chip, by contrast, could act as our universal identity token for navigating the machine-regulated world.

And for some people, that day is already here.  In fact, at some technology conferences people actually line up to get chipped…

This month at the Transhuman Visions conference in San Francisco, Graafstra set up an “implantation station” offering attendees the chance to be chipped at $50 a time. Using a large needle designed for microchipping pets, Graafstra injected a glass-coated RFID tag the size of a rice grain into each volunteer. By the end of the day Graafstra had created 15 new cyborgs.

How creepy is that?

In addition, scientists have now developed batteries that are powered by the human body that could be used to provide a permanent power source for implantable technology.  The following is a brief excerpt from a recent article by Kristan Harris entitled “Scientists Develop Human-Powered Battery For RFID Implantable Chips“…

A group of United States and Chinese researchers have collaborated to created a tiny implantable batteries that feed off of human energy. These thin, flexible mechanical energy harvesters have had been successfully tested on cows. The process uses what is known as conformal piezoelectric energy harvesting and storage from motions of the heart, lung, and diaphragm.

It the future, they say, it could be used to power a range of gadgets. Will it be long until you will charge your I-phone by plugging into your own body?

Of course RFID microchips don’t actually have to be implanted to be useful.  In fact, they are already being used to track schoolchildren all over the United States

Upon arriving in the morning, according to the Associated Press, each student at the CCC-George Miller preschool will don a jersey with a stitched in RFID chip. As the kids go about the business of learning, sensors in the school will record their movements, collecting attendance for both classes and meals. Officials from the school have claimed they’re only recording information they’re required to provide while receiving  federal funds for their Headstart program.

And over in the UK, RFID microchips are being used to track children wherever they go all day long

For those who think the NSA the worst invader of privacy, I invite you to share an afternoon with Aiden and Foster, two 11-year-old boys, as they wrap up a Friday at school. Aiden invites his friend home to hang out and they text their parents, who agree to the plan.

As they ride on the bus Foster’s phone and a sensor on a wristband alert the school and his parents of a deviation from his normal route. The school has been notified that he is heading to Aiden’s house so the police are not called.

As they enter the house, the integrated home network recognizes Aiden and pings an advisory to his parents, both out at work, who receive the messages on phones and tablets.

We are rapidly entering a dystopian future in which it will be “normal” for technology to monitor our movements 24 hours a day.  Most people will probably welcome this change, but it also opens up the door for an oppressive government to someday greatly abuse this technology.

Another type of “wearable technology” that is rapidly gaining acceptance is “smart tattoos”.

Normally, we are accustomed to thinking of tattoos as body art.  But that is about to change.  Just check out this excerpt from a recent Gizmodo article

Everyone from neurologists to biohackers is reinventing the very idea of the tattoo. With the right technology, tattoos can do a lot more than just look beautiful or badass. They can become digital devices as useful and complex as the smartphone that bounces around in your pocket. It sounds wildly futuristic, but the technology already exists.

In fact, a company called MC10 is working on a wide range of “smart tattoos” that will be able to do some pretty wild things

Materials scientist John Rogers is doing some pretty incredible work with flexible electronics that stick to your skin like a temporary tattoo. These so-called “epidural electronics” can do anything from monitoring your body’s vital signs to alerting you when you’re starting to get a sunburn. Rogers and his company MC10 are currently trying to figure out ways to get the electronics to communicate with other devices like smartphones so that they can start building apps.

And Motorola actually has a patent for a tattoo that will take commands from unvocalized words in your throat…

The tattoo they have in mind is actually one that will be emblazoned over your vocal cords to intercept subtle voice commands — perhaps even subvocal commands, or even the fully internal whisperings that fail to pluck the vocal cords when not given full cerebral approval. One might even conclude that they are not just patenting device communications from a patch of smartskin, but communications from your soul.

They are calling it “wearable computing”, and what we are witnessing now is just the tip of the iceberg.

What we will see in the future is probably far beyond anything that any of us could imagine right now. The following is from a recent Computer World article

But imagine a future where anything you might want to know simply appears to you without any action or effort on your part. You could be eating in a restaurant, and Google Glass could, for example, tell you that it’s the spot where your father proposed to your mother. Or that your friend will be late because of traffic, the salmon got bad reviews online, your parking meter will expire in 20 minutes, or the bathroom is through the bar and up the stairs to the right. Imagine that such knowledge could simply appear into your field of vision at the exact moment when you want to know it.

That’s where wearable computing is going.

All of this may sound very “cool” to a lot of people.

But what happens if we are all required to have “electronic identity tattoos” someday?

What happens if an oppressive government uses this technology to watch, track, monitor and control all of us 24 hours a day with this technology?

What happens if you are not able to get a job, have a bank account or buy anything without “proper identification”?

I think that you can see where I am going with this.

Technology is truly a double-edged sword.  It can do great good, but it can also be used for great evil.

So what do you think about all of this?  Please feel free to share your thoughts by posting a comment below…

About the author: Michael T. Snyder is a former Washington D.C. attorney who now publishes The Truth. His new thriller entitled “The Beginning Of The End” is now available on Amazon.com.


VIDEO — CrossTalk: Facebook = Spybook?

RT
Feb 7, 2014

How has Facebook redefined what we call “community”? What role social media played in Arab Spring uprisings? What kind of relationship Facebook should have with government? And, what can we expect in the next decade? CrossTalking with Clive Thompson, Austin Petersen and Ed Krayewski.

Watch all CrossTalk shows here:
http://www.youtube.com/playlist?list=… (Sep 2009 – Feb 2011)
http://www.youtube.com/playlist?list=… (Mar 2011 – Jul 2012)
http://www.youtube.com/playlist?list=… (Jul 2012 – current)

RT LIVE http://rt.com/on-air

Subscribe to RT! http://www.youtube.com/subscription_c…

Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Instagram http://instagram.com/rt
Follow us on Google+ http://plus.google.com/+RT

RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.

——————————————
related PN links:


VIDEO — Sochi Sour Grapes: Western MSM wins gold medal for buzz killing

RT
Feb 8, 2014

In the days, weeks and even months leading up to the Sochi Winter Olympics of 2014, the Western mainstream media have been trying to ruin the excitement by picking apart every tiny – often made-up – flaw they could lay their hands on – from strange toilets to hiking up paranoia over explosives being brought in in tooth paste tubes. RT’s Anastasia Churkina takes a look at the hysteria – READ MORE http://on.rt.com/y1xc94

RT LIVE http://rt.com/on-air

Subscribe to RT! http://www.youtube.com/subscription_c…

Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Instagram http://instagram.com/rt
Follow us on Google+ http://plus.google.com/+RT

RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.

[related: Russian Officials Defend Decrepit Facilities By Citing Surveillance Footage Inside Hotel Showers]


Follow

Get every new post delivered to your Inbox.

Join 821 other followers