June 12, 2013
The US government has been violating the constituion and trampling on the bill of rights since virtually the inception of the country. The history of the US, like the history of every other country, is littered with the corpses of nice-sounding ideals, from false flag frame-ups to lead the nation into war to the persecution and even execution of political dissidents. But the point is that 50 years ago, America wanted to believe it was a nation of ideals, and many people did believe that. So what changed?…
by Dana Gabriel
BE YOUR OWN LEADER
June 17, 2013
Canada’s prime minister recently addressed the CFR, a globalist think tank who have been a driving force behind the push towards deeper North American integration. The U.S. and Canada are now further advancing this agenda through the Beyond the Border agreement. Both countries are increasing bilateral border transportation and infrastructure coordination. This includes a common approach to border management, security and control. They are also integrating an information sharing system that would be used to track everyone crossing the U.S.-Canada border and entering or leaving the continent. Without much fanfare and seemingly little resistance, Canada is being assimilated into a U.S. dominated North American security perimeter.
In May, the Conservative government highlighted the benefits of the U.S.-Canada Beyond the Border action plan which was announced back in 2011. The deal, “focuses on addressing security threats at the earliest point possible and facilitating the lawful movement of people, goods, and services into Canada and the United States, and creates a long-term partnership to improve the management of our shared border.” The goal is to further increase, “security, economic competitiveness and prosperity through numerous measures, including reducing border wait times and improving infrastructure at key crossings to speed up legitimate trade and travel.” The Beyond the Border Executive Steering Committee recently met to discuss the objectives that have already been achieved and the work that still needs to be done. Another important facet of the economic and security perimeter agreement is the Regulatory Cooperation Council action plan. A stakeholder dialogue session is planned for June 20, which will review its implementation progress and will seek further input regarding the next stage of U.S.-Canada regulatory integration.
Last month, the Canada Border Services Agency (CBSA) and the Department of Homeland Security (DHS) released a joint report on the findings of Phase I of the Entry/Exit Information System. The program included collecting and exchanging biographic information at four selected land border ports of entry. In a news release, U.S. Customs and Border Protection (CBP) Acting Commissioner Thomas Winkowski stated that, “The results of Phase I demonstrate the capacity of the United States and Canada to increase information sharing capabilities.” He added, “This kind of cooperation epitomizes the Beyond the Border Action Plan.” The next phase of the entry/exit initiative is set to begin at the end of this month. It will involve exchanging the data collected from third-country nationals and permanent residents of Canada and the U. S. at all common ports of entry. Both countries are further merging databases and are expanding surveillance and intelligence gathering operations. In 2014, they will also start sharing biometric information at the border. This will further advance the creation of a North America security perimeter where all travellers will be tracked and traced in real time.
As part of the commitment made under the Beyond the Border deal, both countries have announced the Border Infrastructure Investment Plan which was, “developed to establish a mutual understanding of recent, ongoing and potential border infrastructure investments. It outlines the approach that Canada and the United States will take to coordinate plans for physical infrastructure upgrades.” In June 2012, Canada reached an agreement with the State of Michigan to build a second bridge between Detroit and Windsor, Ontario. This was followed by a presidential permit issued in April of this year that officially paved the way for construction of the project. A U.S. State Department press release explained that, “Consistent with the bilateral Beyond the Border Initiative, this permit contributes to ensuring that our border infrastructure supports increased competitiveness, job creation, and broad-based prosperity in the United States and Canada.” It went on to say that the new bridge, “will help to meet future capacity requirements in a critical travel corridor, promote cross-border trade and commerce, and advance our vital bilateral relationship with Canada.”
In March, DHS Secretary Janet Napolitano and Canada’s Minister of Public Safety Vic Toews signed a memorandum of understanding which established a truck cargo pre-inspection pilot project. The joint undertaking is another component of the Beyond the Border agreement and would shift inspections and clearances away from the actual border crossing. The first phase, “will test the concept of conducting U.S. CBP primary cargo inspection in Canada, and will be implemented at the Pacific Highway crossing between Surrey, British Columbia and Blaine, Washington.” The second phase, “will further test how pre-inspection could enhance border efficiency and reduce wait times to facilitate legitimate trade and travel, and will be implemented at the Peace Bridge crossing between Fort Erie, Ontario and Buffalo, New York.” The perimeter security deal is laying the foundation for a future U.S.-Canada binational organization that would jointly manage and control the border.
The CBSA is also testing additional technology at the Morses Line, Quebec and Piney, Manitoba ports of entry. Under the remote traveller pilot project, people entering either location after regular hours of service, “will be processed by a border services officer located at a remote processing centre through a two-way audio and one-way video kiosk. Cameras will be installed to provide the officer with the ability to see the traveller and the vehicle.” The program which could later be expanded to other areas , “is part of the Small and Remote Ports of Entry Initiative, one of the deliverables under the Beyond the Border Action Plan.” NAUNEWZ pointed out that, “Although a lot of this technology is already installed and being utilized in limited ways at most of the main Canada-U.S. border crossing points, these smaller border crossings are ideal testing grounds for their ‘no borders’/NAU agenda.”
On May 16, Canadian Prime Minister Stephen Harper participated in question and answer session before the Council on Foreign Relations (CFR). The conversation centered around economic growth, foreign investment and the role of the G20 with regards to global governance. Other issues focused on Canada-U.S. relations. Harper lobbied for approval of the controversial Keystone XL pipeline which would carry oil from western Canada to the Texas gulf coast. He dismissed environmental issues associated with the project and argued that it would be a step towards North American energy independence. The Obama administration is expected to make a final decision on the pipeline sometime this year. Harper also acknowledged the Beyond the Border and the Regulatory Cooperation Council action plans. He blamed sovereignty concerns and the continued negativity surrounding NAFTA as the main obstacles to even deeper continental integration. Prime Minister Harper used his audition in front of the CFR as an opportunity to demonstrate to the U.S. political and corporate elite that he is committed to defending the interests of big business and further pushing plans for a North American Union (NAU).
The Beyond the Border action plan is the most significant step forward in U.S.-Canada cooperation since NAFTA. It provides the framework for future North American integration. When fully implemented, the agreement can be expanded and updated. So far, the agenda has quietly slipped under the radar. By incrementally incorporating various pilot projects and excluding Mexico from the process, it has managed to avoid the controversy of past initiatives. The perimeter security deal is being sold as vital to improving the flow of trade and travel across the border. In order to appease U.S. fears, Canada has made numerous concessions with no guarantees that it will lessen border restrictions. As part of a North American security perimeter, Canada will always be at the mercy of any new U.S. security measures, regardless of the dangers they may pose to privacy and civil liberties.
Related articles by Dana Gabriel:
U.S.-Canada Harmonizing Border Security and Immigration Measures
Taking the U.S.-Canada Partnership to the Next Level
Merging U.S.-Canada Arctic Foreign Policy
The Return of ACTA: U.S. Dictating Canada’s Intellectual Property Laws
Dana Gabriel is an activist and independent researcher. He writes about trade, globalization, sovereignty, security, as well as other issues. Contact: firstname.lastname@example.org Visit his blog at Be Your Own Leader
by Eliot Estep
June 13, 2013
The recent NSA leaks from whistleblower Ed Snowden have publicly confirmed that digital privacy does not exist. The federal government and intelligence agencies have direct server access to the world’s most popular sites and services including Facebook, Google, Microsoft, Apple, and more. This means that all of your data when using these services including Skype, YouTube, etc has been compromised and can be used against you whenever strategically necessary.
Always remember, you are being recorded and monitored regardless of whether you have done anything wrong or not. This includes your emails, Internet activity, searches, banking activity, passwords, etc. Basically everything to build a complete profile about who you are, how you think, how you live, etc. This is very powerful data gathering and the goal of the intelligence agencies is nothing less than Total Information Awareness to be used to control and manage populations.
For these reasons, I have compiled some helpful tips to help you maintain your privacy and integrity when using the Internet. These are by no means comprehensive, but they can be quite useful and give you some semblance of peace when browsing.
If you use Google, Bing, Yahoo, etc. then everything you search is logged to your IP address and is used to build a comprehensive profile about all your online activity. This means that the government literally has the ability to know everything you’ve been interested in, how you type (thus, how you think), and much more. Protect your searches!
2. Consider using an Anonymizer such as Tor to protect your identity. Tor prevents anyone from learning your location, browsing habits, and is an extremely effective tool against network surveillance and traffic analysis. Tor is essentially a network of virtual tunnels run by volunteers that allows your real IP address to remain hidden and undetectable when browsing the Internet. It is used by whistleblowers, hackers, and all those who value anonymity. You can also use it to access sites that your ISP has blocked or banned. Keep in mind, if you use Tor to access personally-identifying sites like Facebook then you pretty much lose your ability to remain anonymous. Learn more about this powerful software and please use it responsibly! To get started quickly, please download the Tor Browser Bundle. Using this software wisely and effectively will likely require changing your browsing habits, so be aware of this.
4. Use a firewall and a secure wireless connection. Protecting your inbound and outbound network traffic is essential. There are many free software options available for this. I cannot guarantee the integrity of these programs, but I personally recommend Little Snitch for Mac users. It appears that Outpost may be a good alternative for Windows. The key is to be able to see what services/sites are trying to send/receive data over your connection. The more stringent your firewall rules are, the better. Keep your computer clean by using some kind of anti-spam/spyware software and minimize your use of highly sketchy sites.
5. Delete your cookies regularly and log out of Facebook when you are not actively using it. Almost every time you visit a site, you download a cookie from that site, which is often used to track and collect data about you, the sites you visit, etc. Therefore, deleting cookies and temporary Internet files from your browser frequently is necessary. I recommend CCleaner as an effective way to do this. Most people leave a Facebook tab open and continue browsing, not realizing that every page that has a “Like” button actively logs and tracks their online activity. Facebook collects all your browsing data and then sells it to third parties, including passing it onto intelligence agencies. Therefore, when you are not actively using Facebook, be sure to log out! Why should they know everything you’re up to online?
6. Cover up or disconnect your webcam when you are not using it. Did you know that your webcam can be secretly activated without you being aware of it? Hackers and intelligence agencies have the ability to do this, so effective countermeasures must be taken here. This can be done WITHOUT the indicator light coming on, so you won’t even know that you are being watched or recorded. This is why I recommend taping over or covering up your webcam when you’re not using it. Why take the risk? Do you really want the government to have the ability to spy on you while you are in your bedroom? The same thing can be done on cellphone cameras/microphones, so be aware of that too. The only way your phone cannot be used to track/record you is if the battery is taken out, which is another reason why many new smartphones come with non-removable batteries these days.
7. Learn to use secure email services like HushMail or encrypted email. Communicating using email is vital and part of our everyday lives. If we use services like Gmail, Hotmail, or Yahoo, those services are not secure and are compromised. Therefore, switching over to a secure service such as Hushmail can be valuable. Or learn how to use Pretty Good Privacy (PGP), which is a way to send encrypted email and files that only a trusted third party can open and view. Essentially, PGP uses public-private key cryptography, where you will give out your public key to trusted recipients. Messages can only be decrypted by using your special private key file (that you keep safe) and the sender’s public key. You can even encrypt files so that only a specific person can open them. Learning to use PGP requires some technical knowledge but can be very useful for those who want to communicate securely and is well worth learning, in my opinion. Please see this tutorial or this video to get started. There are some excellent YouTube videos that can really help out with this.
Be smart about how you communicate online. If you take no precautionary measures, then you should assume that your communications are being recorded and monitored at all times. Do not discuss illegal or secret activities on Facebook or through Skype or Gmail. Ultimately, we should be greatly decreasing our use of these compromised services altogether! Be aware of what you type and consider their ramifications if ever made public. We must exercise great discretion and discernment when it comes to our online activities now. The methods listed above are by no means comprehensive and are just a small way to boost your privacy. If you have other privacy tips, please mention them here in the comments for all to see and benefit from. In the end, it is all up to the user to do their part in maintaining their online integrity. Safe browsing my friends!
Eliot Estep: We are all divine beings of love at our core! I AM a genuine truth-seeker dedicated to living a life of joy, peace, and abundance. I value integrity, freedom, and creative self-expression above all. It is a privilege to be here during this time of great change. Let us prepare. Main areas of research: conspiracies, global affairs, extraterrestrials, spiritual advancement + Sun: ♏ + Moon: ♎ + Ascendant: ♋ + This article first appeared at Collective Evolution.
via March Against Drones – MAD
[facebook page with links to the events]
Are you MAD? If so, march with us at the White House on 9/11 in Washington, DC. If you can’t make it, get MAD wherever you are! To join the event, go to:
End the Lie
June 10, 2013
Madison Ruppert and Sean Anthony discuss the government’s massive surveillance of the American people and how it relates to the Fourth Amendment, the NSA’s PRISM and Boundless Informant programs, whistleblowers and much more.
End the Lie Radio airs from 10:00 PM ET/7:00 PM PM PT every Monday evening at
All material(s) used in this video that are not original or are under copyright are used under Fair Use under the Copyright Act of 1976, 17 U.S.C. § 107.
by Jon Rappoport
June 15, 2013
Well, they’ve solved the riddle. Ed Snowden was able to steal thousands of highly protected NSA documents because…he had a thumb drive.
This is the weapon that breached the inner sanctum of the most sophisticated information agency in the world.
This is the weapon to which the NSA, with all its resources, remains utterly vulnerable. Can’t defeat it.
NSA bans thumb drives, but certain special employees are allowed to use them.
Would Snowden have been in that elite circle? He was an outside contractor who’d been assigned to the NSA, and he was only there for four weeks, on his latest tour, when he did the infamous deed and then departed, never to return.
Far more likely? As I described in my prior article, Snowden was really working for his former employer, the CIA. People at the CIA were able to steal those NSA documents, and they handed them to Snowden. All part of the endless turf war between the CIA, NSA, and other intelligence agencies.
Moving right along, Barbara Honegger, a former analyst at the White House during the Reagan years, makes a crucial point: US intelligence agencies can get around domestic spying laws by allowing other countries to spy on US citizens.
England, for example. This scandal is sitting there ready to explode.
NSA works out a deal whereby British agencies can access electronic communications in the US. Then, the Brits give the tons of data to NSA. Therefore, NSA didn’t directly steal.
“Oh no, we didn’t steal. We allowed other people to steal. Then they gave us what they stole. Of course, we are also, in fact, stealing and spying in the US, 24/7, but that’s another story for another time…”
It’s called redundancy. NSA spies on Americans, the Brits spy on Americans, and NSA stores everything, just to make sure they’ve covered all the bases. Twice.
Taking this one step further, NSA would be spying on British citizens, too. That’s “reciprocity.”
Here’s a fantasy for you. Terrorists all over the world were just shocked into a panic, because Ed Snowden “told them” the NSA has been spying on the Internet.
Therefore, all those emails, photos, and videos the terrorists have been sending to each other online for years? Spied on. Intercepted. Wow. What a revelation.
The terrorists never considered that possibility before. This is what Pentagon, NSA, CIA chiefs, and incensed Congress people would have us believe.
Let’s see. Terrorists just realized the Internet isn’t safe. Jack and the Beanstalk. Two fairy tales. Hold one in each hand. Weigh them. I’d believe Jack and the Beanstalk over the other fantasy, if I had to choose.
Author John Loftus, several years ago, pointed out that there already existed miles of incriminating data on the Muslim Brotherhood in US intelligence-agency files. Yet nothing was being done about it.
In other words, tons of NSA data on innocent Americans were being collected. And the valuable stuff on guilty parties was being ignored. A real laugher.
Imagine the sub voce reaction of the Muslim Brotherhood:
Brotherhood spokesman, Mr. Cash On Delivery, Jr., stated, “We in the Brotherhood have nothing to fear. We’re all proxies. We fight for Western shadow elites. They pay us to destabilize countries to advance a Globalist-controlled planet. Internet spying? Who cares? We’re doing just fine. In fact, there’s a mile of incriminating data on us in NSA computers. Nobody does anything with it. Guess why.”
Then there is China. Snowden’s most recent leak reveals the NSA has been hacking Chinese government computers. Another walloping shocker. Can you even remain standing in the face of this one? Feeling dizzy with surprise? Sit down. Drink a glass of water.
The spy-vs.-spy scenario between China and the US has been playing out for decades. By now, it’s so complicated probably no one on either side understands it fully.
Yes, major thefts of vital info have occurred. But, aware of the ongoing hacking war, China and US have undoubtedly been cooking up whole databases of false and misleading information to be stolen.
It’s basically a jobs program. And Snowden’s revelation about it is about as stunning as sunny weather in Palm Springs.
John Young, at Cryptome, correctly indicates that the overriding issue in the Snowden affair is “architecture.” The actual structure of spying, the whole machine. If Snowden comprehends that, then we’re talking about something worth revealing.
Not just the US machine, but the global apparatus. The interconnected spying system collectively employed by many nations.
Snowden seems to be saying he has this knowledge.
I have doubts. I’d bet against it. I think he’s inventing script.
Still waiting to be uncovered? NSA spying to collect elite financial data, spying on the people who have that data: the major investment banks. NSA scooping up that data to predict, manipulate, and profit from trading markets all over the world.
A trillion-dollar operation.
Snowden worked for Booz Allen, which is owned by the Carlyle Group ($170 billion in assets). Carlyle, the infamous. Their money is making money in 160 investment funds.
A few of Carlyle’s famous front men in its history: George HW Bush, James Baker (US Secretary of State), Frank Carlucci (US Secretary of Defense and CIA Deputy Director), John Major (British Prime Minister), Arthur Levitt (Chairman of the SEC).
Suppose you’re one of the princes in the NSA castle, and Ed Snowden has just gone public with your documents. You’re saying, “Let’s see, this kid worked for Booz Allen, which is owned by the Carlyle Group. We’ve been spying over Carlyle’s shoulder, stealing their proprietary financial data. What are the chances they’re getting a little revenge on us now?”
Yes, you’re thinking about that. You’re looking into it.
Scandals, and how they’re presented to the public through the press, are rarely what they seem.
The players are different, their motives are different, and they’re trading blows in a different arena.
They’re accessing the Matrix and manipulating it at levels invisible to the general public, who are trained by mass media to look in the wrong direction.
The NSA, CIA, and Carlyle would be settling their differences behind the curtain.
Jon Rappoport is the author of two explosive collections, The Matrix Revealed and Exit From the Matrix, Jon was a candidate for a US Congressional seat in the 29th District of California. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free emails at www.nomorefakenews.com
June 14, 2013
[Potent News editor's note: via Pepe Escobar: For those who haven't seen it yet. RT's title is misleading; I meant "start" metaphorically; Obama's Syria decision is a diversion from PRISMgate. At least for 24 hours it worked, bumping Snowden off the headlines.]
CIA whistle blower Edward Snowden has reportedly been stopped from flying to the UK. The man who lifted the lid on America’s secret surveillance activities is being pursued by Washington. For his latest revelation, he told a Hong Kong newspaper that the U.S. repeatedly hacks into Chinese computer networks. For more about the leaks and Snowden’s future we’re now joined live by Pepe Escobar, a roving correspondent for the Asia Times.
Subscribe to RT!
RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 1 billion YouTube views benchmark.
June 8, 2013
In Singapore, up to 2,000 activists lead by local bloggers staged a rally against recently introduced licensing rules for news websites, including breaches of “racial or religious harmony”, which protesters see as an attack on freedom of expression.
A crowd with posters denouncing “internet censorship” gathered on Saturday in Speakers’ Corner at Hong Lim Park to demand the withdrawal of the policy. The peaceful demonstration in the Southeast Asian city-state was organized by a group of bloggers called “Free My Internet.”
The message of the gathering – “the government must trust us, and stop treating us like babies,” said Choo Zheng Xi, the group’s spokesperson. “It is an international embarrassment when governments around the world are working to deregulate the Internet, and Singapore, one of the wealthiest nations per capita, is going in the opposite direction,” the activist told AFP.
Under the rules that came into force in June, news websites must obtain annual licenses if they have over 50,000 unique visitors from Singapore every month and publish at least one weekly article on the island’s news over a period of two months.
[hat tip: Nile Bowie]
June 6, 2013
June 13, 2013
The Canadian government has been spying on its people by monitoring their telephone records and Internet data, Press TV reports.
Canadian newspaper The Globe and Mail reported on June 10 that Defense Minister Peter MacKay had approved a “metadata” surveillance program in 2011 that tracks online activity and phone calls in search of suspicious activities.
However, in response to a question whether the Ottawa government was monitoring the phone and email records of the Canadian people, MacKay claimed that the “program is specifically prohibited from looking at the information of Canadians.”
“This program is very much directed at activities outside the country, foreign threats in fact,” he added.
The program, introduced by the former Liberal government in 2005, was put on hold on account of concerns that it could lead to warrantless surveillance of Canadians.
But according to the daily, the program was quietly reinstated in 2011, after MacKay signed a ministerial directive, which is not subject to parliamentary scrutiny.
June 13, 2013
Breaking news! CNN reports Obama is set to announce Syria has crossed the red line for military intervention by using chemical weapons to kill hundreds of civilians in Syria.
Details are just coming in but the news means the United States will now be launching military action against Syria as Obama has previously promised the use of Chemical weapons in Syria would be a “game changing” red line.
According the the reports from US intelligence officials given just moments ago to congress in a secret closed door meeting, the Syria government has been using Sarin gas.
June 11, 2013
The news is replete with headlines about our government snooping and spying on Americans. We’re all being watched in some way or another. It kind of reminds me of that Simon and Garfunkel song “America,” where he sings, “The man in the gabardine suit is a spy. I said, ‘Be careful; his bowtie is really a camera.’”
It’s not just NSA that’s keeping tabs on everybody. Apparently, James Bond-style coffee trays are in demand by the IRS. And they need them immediately.
What in the world would the IRS need coffee trays with hidden cameras for? They also ordered plants and clock radios with hidden cameras and remote surveillance systems to go along with their “covert” items. Here’s what their purchase order read, and I have no idea why they kept misspelling “equipment”:
by Tyler Durden
June 11, 2013
In the last 24 hours, sales of the ‘big brother’ book 1984 on Amazon.com have soared by almost 7000% as the reality of the surveillance state come to the public’s attention. As Liberty Blitzkrieg’s Mike Krieger notes, we suppose it makes sense that people would want to get up to speed on the dystopian world being constructed rapidly and secretly around them. 1984 is now the 4th fastest rising sales book and 184th most popular on Amazon!
June 11, 2013
In this special edition of The Boiling Frogs Post Eyeopener report, James introduces new members of the irate minority to the problem, as well as the false hopes (and real solutions) that are available to address that problem.
For more information on the abuses of the NSA, please visit:
For more information on CALEA, please visit:
For more information on pirate internet, please visit:
For a Google alternative, please use:
For a Gmail alternative, please visit:
For more information on the concept of open source information and how it can help to create alternative, spy-free technologies, please visit:
by Catherine J. Frompovich
June 6, 2013
Finally, some members of the U.S. Congress are waking up to what’s been going on right under their noses. Members of Congress are initiating oversight proceedings—why so late?—and the Senate Intelligence Committee is planning an investigation of the National Security Agency (NSA) regarding the collection of individuals’ personal phone data.
Doesn’t that sound like something that would have taken place in the former Soviet Union or definitely in Nazi Germany, that is, if old Adolph would have had current technology? Instead of making Germany’s Jewish citizens wear their traditional six-pointed-star—actually interlocking triangles depicting “as above, so below”—Hitler would have targeted their every conversation, just like what’s going on now in the United States of America. Who would believe that really is going on in the USA?
Congress is to blame, in this writer’s opinion, because it has gone along with all the changes to the 2001 Patriot Act and certainly is not bridling all those Presidential Executive Orders (PEOs) citizens don’t know about—or care about—until they take effect. Please study all Mr. Obama’s PEOs.
Warning: Take a calming sedative before reading. Mr. Obama has issued over 150 PEOs since his very first PEO (#13489) dealing with Presidential Records secrecy the day after he was first inaugurated in 2009 to his most recent PEO Authorizing the Implementation of Certain Sanctions… issued June 3, 2013. In essence, what PEOs do is legally establish one-man-authoritarian-rule! A dictatorship, if and when a sitting president wants to invoke his ‘special’ privileges that he gave himself by issuing PEOs, while voters, the Congress, and the U.S. Supreme Court can’t do a damn thing about it. Did you know that?
If that’s the case, so why do we need Congress? Or even the U.S. Supreme Court? We certainly could save a lot of taxpayers’ money—and get closer to a balanced budget—by not having to pay those not-so-cheap-salaries plus pensions. Or, is that the ultimate plan for future change?
In view of how the Affordable Care Act (ObamaCare) was ramrodded down Congress’s collective throats, and how we now learn that it is not affordable at all, with healthcare insurance premiums for a family of five probably costing between $20,000 to $25,000 a year, shouldn’t everyone who breathes air be demanding change that Mr. Obama promised, e.g., like no more ‘sneaky Pete’ surprises from Congress, SCOTUS, or the Executive branch, i.e., the president. U.S. citizens deserve better, I think. How about you?
But wait! You haven’t heard how bad it gets. Thanks to WND’s columnist Andrea Shea King’s enlightening article “DHS Flags Tweets About ‘Militia’ But Not ‘Jihad’” we learn about what this writer terms “Passwords to Surveillance”—certain words in Internet postings that are guaranteed to put the writer on the Department of Homeland Security’s surveillance list(s) as possible homeland terrorists.
According to the listing in King’s article, which I encourage you to read, this is how those selected ‘passwords’ or phrases break out:
Domestic Security includes 54 with such mundane words as recovery and drill. So, if you are writing an email telling your friend about your recovery from the drill bit accident you suffered, you have used two passwords to surveillance, i.e., recovery and drill.
Hazmat & Nuclear includes 35 words or phrases with such pedestrian words as cloud and burn.
Again, if you send an email to your sister telling her about your fantastic day spent at the beach being a cloudless day and that you suffered a nasty sun burn, you are now under DHS’s surveillance.
Health Concern & H1N1 has 38 words or phrases that will put everyone on DHS’s surveillance, in this writer’s opinion, because that list includes such words as pork, virus, flu, food poisoning, etc. Just imagine sharing this with your BFF: Boy, did I get a bad case of food poisoning from eating that pork barbecue sandwich we had for lunch today. At first I thought I was coming down with a virus or the flu until I went to the emergency room. Can you imagine being put on a watch list for those two sentences using 4 passwords to surveillance?
Even though we need terrorist-proof security, we also need common sense, something that seems to be lacking with the current administration and Congress, I think. If we are supposed to be protected from foreign terrorists, most of whom have been identified as Al-Qaeda associated, wouldn’t you think there would be some foreign language, Arabic-like, Farsi, or even Israeli words on that DHS “passwords to surveillance” lists? It’s not too hard to figure out what’s going on, but what do we do about it?
Catherine J Frompovich (website) is a retired natural nutritionist who earned advanced degrees in Nutrition and Holistic Health Sciences, Certification in Orthomolecular Theory and Practice plus Paralegal Studies.
Her work has been published in national and airline magazines since the early 1980s. Catherine authored numerous books on health issues along with co-authoring papers and monographs with physicians, nurses, and holistic healthcare professionals. She has been a consumer healthcare researcher 35 years and counting.
Catherine’s latest book, A Cancer Answer, Holistic BREAST Cancer Management, A Guide to Effective & Non-Toxic Treatments, is available on Amazon.com and as a Kindle eBook.
Two of Catherine’s more recent books on Amazon.com are Our Chemical Lives And The Hijacking Of Our DNA, A Probe Into What’s Probably Making Us Sick (2009) and Lord, How Can I Make It Through Grieving My Loss, An Inspirational Guide Through the Grieving Process (2008).
May 28, 2013
In recent weeks we have been told to focus on a series of scandals which, we are told, are rocking the Obama Administration. Has the media finally found outrage over the Obama regime’s use of drone strikes to kill scores of innocent women and children in countries that are not even at war with the United States? Or the DOJ’s recent admission that the strikes had indeed killed American citizens? Or John Kerry’s recent attempts to once again lead the American public into supporting military intervention in the Middle East based on provably false claims of WMD?
Of course not. No, the media’s sudden discovery of outrage is directed at an entirely different scandal: the fact that reporters have now allegedly found themselves in the government’s crosshairs.
Find out more about the real scandal behind the AP spying story in this weeks edition of The Eyeopener from BoilingFrogsPost.com
TRANSCRIPT AND SOURCES:
by Susanne Posel
August 23, 2012
In Chaffee County, Colorado, the voter ballots for the 2012 Republican Primary election contain a smartphone data matrix barcode that ties the voter to the ballot. Both the ballot number and data matrix are on the ballot stub.
Using a smartphone and a free downloadable program called Barcode Director , the data matrix can be scanned and will produce a corresponding number to the one found on the ballot. The, with access to the county records through open-record laws, the ballot can be traced to the individual who voted by cross referencing the corresponding county.
Since the ballots containing the data matrix barcode are filed with the Chaffee County clerk, the information is obtainable by anyone – including campaign officials who might be interested in knowing who voted for which candidate.
The Colorado State Constitution says that ballots cannot have markings that would indicate the voter’s identity printed on the ballot and/or provide that the ballot be able to be traced back to the voter. However, that is exactly what the data matrix barcodes do.
Smartphone apps for the Obama For America and Mitt’s VP are data mining with the use of software. The app user’s name, address, home phone number, and Facebook information is given over during the account process and turned over by the app software. GPS location and access to the phone’s camera, along with audio recording abilities are accessed as well. The software can also extract the smartphone’s contact numbers, call logs and SD Card contents.
According to Joyce Reno, Chaffee County clerk, the reason the ballots contain a data matrix barcode is to prevent double voting and forgery.
The Election Protection Smartphone App has made data mining easier with direct access to “information and resources” just in time for the 2012 elections. With the app, a user can verify:
• Where the voter registered
• Where they voted
• Key rules and regulations for their state
• What type of machine the voter used
The ballot machines being used in Chaffee County are manufactured by Hart Intercivic Systems .
Gregg Burt, the Chairman of (HIS) is the former CEO of BuildForge, Inc., and a start-up enterprise software firm that was purchased by IBM in 2006. More employees of HIS have questionable backgrounds:
• Neil Tuch, managing director, a former Goldman Sachs employee who worked in Mergers and Acquisitions
• Jeff Bohl, principal capital, former JPMorgan Chase & Co. and Wells Fargo employee in mortgage-backed securities, M&A transactions and consultant for small businesses
• Amanda Kalin, associate capital, former private equity and investor of banking capital for CitiGroup Banking
Taylor v. Pile , a 1964 Colorado court case ruled that: “An election wherein ballots are numbered in such a manner that the vote of any person thereafter may be determined by comparison with the number on the ballot and poll registration book is contrary to constitutional and statutory guarantee of a secret ballot and results in a void election.”
by Madison Ruppert
Editor of End the Lie
May 23, 2013
By default, the upcoming Xbox One from Microsoft will feature an always-on microphone and camera that works in the dark, both of which are constantly connected to the internet and can’t be turned off.
The creepiness is only compounded when one realizes that Microsoft helps develop massive surveillance systems like the Domain Awareness System used in New York City. Microsoft has also been questioned about the privacy and security of Skype and criticized for censoring Windows Live Messenger chats.
Putting a product like this by Microsoft – a company that backed privacy-crushing legislation in the past – is only asking for trouble.
The new Kinect 2.0 will be bundled with every Xbox One and according to Extreme Tech, the Xbox One will not work if the Kinect isn’t plugged in.
That might sound quite nonsensical, but it was confirmed by Xbox’s UK marketing director.
“Xbox’s UK marketing director Harvey Eagle has said that the console will not function without Kinect connected,” Keza MacDonald wrote for IGN.
“Kinect does require to be connected to Xbox One in all cases, yes,” Harvey Eagle told IGN after a Microsoft-hosted event in London on May 21, 2013.
This was also confirmed by Corporate VP of Microsoft Studios Phil Spencer when he told Joystiq, “Kinect has to be connected to Xbox One.”
It gets even creepier when we learn that the new Kinect is capable of examining your facial features and identifying you, even if you don’t have the controller in hand. Perhaps even worse, it can estimate your heart rate.
“By examining your face’s skin color and transparency, the Kinect and Xbox One are able to estimate your current heart rate,” according to Joystiq.
While some users may think the Kinect will be awesome, others will be troubled by the fact that it remains on even when the Xbox One itself is turned off.
This fact is revealed when one realizes that one of the “great addition[s]” of the new Kinect is that it has “the ability to turn on the console just by saying ‘Xbox On,’” according to iDigital Times.
Obviously the device must remain on even when the Xbox itself is off in order for this feature to work.
Furthermore, the 1080p HD camera on the Kinect uses active infrared technology, thus eliminating any need light to accurately sense motion.
That wouldn’t necessarily be all that worrisome if Microsoft was vigilant in protecting user privacy. Unfortunately, Microsoft states in their Xbox Live terms of service that users should not expect any level or privacy.
Some of the statements in the terms of service that make this type of technology troubling include:
“[W]e may access or disclose information about you, including the content of your communications, in order to: (a) comply with the law or respond to lawful requests or legal process; (b) protect the rights or property of Microsoft or our customers, including the enforcement of our agreements or policies governing your use of the Service; or (c) act on a good faith belief that such access or disclosure is necessary to protect the personal safety of Microsoft employees, customers, or the public.”
Not to mention the explicit statement:
“You should not expect any level of privacy concerning your use of the live communication features (for example, voice chat, video and communications in live-hosted gameplay sessions) offered through the Service. These communications may be monitored; however, we cannot monitor the entire Service and make no attempt to do so. You understand that these communications can be recorded and used by others , and communications in live-hosted gameplay sessions may be broadcast to others.”
While it’s obviously quite obvious that the in-game communication is not private (since you’re talking to other human beings), the terms do not limit the lack of privacy to only those types of communications.
Instead, it says, “for example,” leaving the possibility that the information captured by the always-on Kinect would fall under similar terms.
Unfortunately when it comes to corporations like Microsoft, we can’t assume the best and think that all communications captured by Kinect will be treated as private and protected.
Furthermore, we must realize that this type of technology would be a prime target for hackers.
Microsoft says that privacy is a “top priority” and that “Kinect for Xbox 360 was designed and built with strong privacy protections in place and the new Kinect will continue this commitment.”
Yet as Extreme Tech points out, “we know from experience, though, no system is invulnerable to the manifold attack vectors exploited by malware authors. The Xbox and Xbox 360 were chipped/modded/rooted, and it’s fairly safe to assume that the Xbox One will also suffer the same fate.”
To make matters even worse, in 2012 Microsoft filed for a patent related to their Kinect system that uses “camera-based system that would monitor the number of viewers in a room and check to see if the number of occupants exceeded a certain threshold set by the content provider.”
“If there are too many warm bodies present, the device owner would be prompted to purchase a license for a greater number of viewers,” Extreme Tech explained in an article.
Concerned? You have some very legitimate reasons to be. You will probably want to keep these in mind when considering the purchase of an Xbox One.
UPDATE: While Extreme Tech says that it will constantly be connected to the Internet, Kotaku writes, “Microsoft is also being sketchy about whether or not the platform will be always-online, something that has been rumored for quite some time now.”
I’d love to hear your opinion, take a look at your story tips and even your original writing if you would like to get it published. Please email me at Admin@EndtheLie.com
May 11, 2013
The Agenda with Steve Paikin: David McFadden: Electricity’s Smart Future
TVO | May 1, 2013
David J. McFadden, co-author of the “Renewing Ontario’s Electricity Distribution Sector” report, discusses Ontario’s uniquely complex and inefficient electricity system, and what needs to change so that it can support the province’s economic future.
The guest is talking about reducing the number of power distribution systems to a much smaller number. Would this require seizing control over them by a centralized government-empowered monopoly? He hopes it can be done voluntarily. I guess the corporatocracy can do whatever it wants – eventually.
This whole discussion is about smart meters and smart grid. The most stomach-churning part of the interview is when he paints smart meters as a way of providing more choice to consumers. But of course it is an invasion of privacy and is going to allow remote interference and monitoring of our power use.
Please note: He expects everyone to have electric cars in the future – for some reason – actually because our society is centrally planned more than ever. And every night when we plug in our car, it might disrupt the old-style power grid. This is one of his explanations for why we need the smart grid.
Talk about collectivism! You’d think by now we could all have our own independent power source! But everything is moving in the opposite direction. Isn’t it amazing?
If you plug your car in, you might disrupt the network, or we might need to drain off some of your power, so therefore you must have the smart grid. Don’t you want to live in a utopia?
So we’re talking about massive centralization of our electricity system, as well as electronic surveillance and control over our energy use.
In my opinion, this is actually just getting us ready for not having enough energy – or enough money to pay for more expensive energy. And one reason for centralization and the smart grid is to “efficiently” manage an artificially created scarcity of electricity – caused by shutting down coal plants for instance.
And all of this is going to be sold to us as “choice” – as if we have a choice – with never-ending streams of propaganda telling us how empowered we are.
Press For Truth
May 17, 2013
According to the Canadian Security Intelligence Service website under the “Terrorism” section “Domestic Terrorists” is defined as: “Domestic Terrorism (which includes the threat or the use of violence by groups advocating for issues such as the environment, anti-abortion, animal rights, anti-globalization, and white supremacy, and the dissemination of militia messages by groups in the United States)”
The resistance to tyranny continues to grow and we must remain vigilant of those who seek to silence our political views.
From the CSIS website:
Get updates like this everyday and support independent media by joining Press For Truth TV:
We rely on you the viewer to help us continue to do this work. With your help I can continue to make videos and documentary films for youtube in an effort to raise awareness all over the world. Please support independent media by joining Press For Truth TV!
As a Press For Truth TV subscriber you’ll have full access to the site’s features and content including Daily Video Blogs on current news from the PFT perspective and High Quality Downloads of all Press For Truth Films, Music and Special Reports! Subscribe to Press For Truth TV:
For more information visit:
You can also support Press For Truth and help us continue to do this work by donating or becoming a sponsor at pressfortruth.ca
May 9, 2013
Google Glass App Identifies People With Criminal Records Using Facial Recognition
Check out The Illuminati: Facts & Fiction in paperback on Amazon.com, or e-book on Kindle, iBooks, Nook, or Google Play.
Mark Dice is a media analyst, political activist, and author who, in an entertaining and educational way, gets people to question our celebrity obsessed culture, and the role the mainstream media and elite secret societies play in shaping our lives. Check out Mark’s books in paperback on Amazon.com or e-book on Kindle, iBooks, Nook, or Google Play.
Mark frequently stirs up controversy from his commentaries, protests, and boycotts, and has repeatedly been featured in major media outlets around the world.
Several of Mark’s YouTube videos have gone viral, earning him a mention on ABC’s The View, Fox News’ O’Reilly Factor, CNN, Drudge Report, TMZ.com, and other mainstream media outlets. Mark has also been featured in (or attacked in) the New York Post’s Page Six, Rolling Stone Magazine, USA Today, The New York Daily News, and in major papers in Pakistan and Iran.
Mark Dice appears in several documentary films including Invisible Empire, The 9/11 Chronicles, and has been featured on the History Channel’s Decoded, Conspiracy Theory with Jesse Ventura, the Sundance Channel’s Love/Lust: Secret Societies and more. He enjoys enlightening zombies, as he calls them, (ignorant people) about the mass media’s effect on our culture, pointing out Big Brother’s prying eyes, and exposing elite secret societies along with scumbag politicians and their corrupt political agendas. You can support Mark’s work by sending a PayPal donation to Donate@MarkDice.com or by using the Donate link on MarkDice.com.
He has called into several top-rated talk shows dozens of times, including the Sean Hannity Show, Glenn Beck, and Michael Savage, and verbally battles with the hosts on various issues since he has never been asked to be a guest on them as of yet. Audio of some of these calls are then posted online.
The term “fighting the New World Order” is used by Mark to describe some of his activities, and refers to his and others’ resistance and opposition (The Resistance) to the overall system of political corruption, illegal wars, elite secret societies, mainstream media, Big Brother and privacy issues; as well as various economic and social issues.
Dice and his supporters sometimes refer to being “awake” or “enlightened” and see their knowledge of these topics as part of their own personal Resistance to the corrupt New World Order. This Resistance involves self-improvement, self-sufficiency, personal responsibility and spiritual growth.
Mark Dice is the author of several books on current events, secret societies and conspiracies, including his newest book, Big Brother: The Orwellian Nightmare Come True which is available on Amazon.com, Kindle and Nook. While much of Mark’s work confirms the existence and continued operation of the Illuminati today, he is also dedicated to debunking conspiracy theories and hoaxes and separating the facts from the fiction; hence the “Facts & Fiction” subtitle for several of his books. He has a bachelor’s degree in communication from California State University.
If you have an iPad or Android tablet, then you can download the Kindle app and then download any of Mark’s books from the Kindle store for only $6.99 or $7.99. Some of them are also available in e-book on Google Play. Or you can get paperback copies from Amazon.com too if you prefer a physical book. They are not available in stores. A lot of work and research went into them and they’ll save you countless hours of web surfing or YouTube watching in your search for pieces of the puzzle. Your support also funds more of Mark’s videos and other operations. Equipment, software, travel, and the props all cost money, so by purchasing his paperback books and e-books, you are helping The Resistance continue and your help is greatly appreciated. Be sure to subscribe to Mark’s YouTube channel, and look him up on Facebook, and Twitter.
On Thursday May 9th the Texas House wil be voting on two very important pieces of legislation. House Bill 149, The Liberty Preservation Act, and House Bill 1608, are scheduled for a full house vote that could create yet another battle between State and Federal authorities.
by Derrick Broze
May 8, 2013
The Liberty Preservation Act nullifies certain sections of the controversial National Defense Authorization Act of 2012, which allowed for indefinite detention of American citizens without trial. The bil states:
“Sections 1021 and 1022 of the National Defense Authorization Act for Fiscal Year 2012 violate portions of federal law, the United States Constitution, and the Texas Constitution and, as such, are invalid and illegal in this state.”
Texas is the latest of 13 states to take on the NDAA. There are also several local, city wide efforts to nullify the unconstitutional act. While the states attempt to stay off tyranny, the case has also been taken to federal court.
Last year, Federal Judge Katherine Forrest struck down these indefinite detention powers as unconstitutional. She issued a temporary court order blocking the use of these powers. That order was revoked by the appeals court and indefinite detention powers remain while the case is currently on appeal but not decided.
When questioned on whether or not indefinite detention could still occur, President Obama’s attorneys refused to comment. This caused many to speculate that the law is still being put to use despite the judges best efforts.
According to the Texas Tenth Amendment Center’s facebook, the bill will receive a full house vote on Thursday May 9th. They warn, “the bill still can be held up by Speaker of the House Joe Straus. We seriously need your help to push this bill forward.” If the bills are not brought to vote tomorrow it could be another 2 years before they are brought to vote again.
House Bill 1608 deals with cell phone privacyy. The authors of the bill aim to determine whether Texs will respect the privacy of mobile phone geolocation data. The bill would require law enforcement to show probable cause and gain a warrant from a judge before accessing your cell phone or other digital device.
It seems ridiculous that we have to pass laws to require the government to follow its own rules and abide by the 4th amendment, but this is the situation we find ourselves in. If you believe in fighting within political channels call your Senators and demand a vote on these important topics.
The state government is one of the last areas of government where we still seem to have a legitimate effect. If you wish to wrangle the federal government down to a more manageable size I recommend fighting for change on the local and state level.
IF you support these efforts, please call and email your Rep. NOW
Find him/her here: http://www.fyi.legis.state.tx.us/Home.aspx
SUPPORT HB 1608 (Cell Phone Privacy) and HB 149 (NDAA Nullification)
Derrick Broze is a founding member of The Houston Free Thinkers.
He writes for IntelliHub.com a popular independent news website.
He can be heard on Orion Talk Radio, Local Live Houston and the upcoming Unbound Radio.
May 4, 2013
As many as 10000 drones could be prowling American skies by 2020, says the US Aviation Administration. And as Washington continues to boost domestic surveillance in the name of public safety, growing numbers of young Americans are choosing to get in on the action. RT’s Anastasia Churkina has the story.
Subscribe to RT!
RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 500 million YouTube views benchmark.
Mind Control TI Magnus Olsson Sweden on Vimeo
[released 2 years ago]
Magnus Olsson is a recent victim of modern Mind Control technology in Sweden.
[hat tip: Emmanuel Buckshi]