HIGHLY POTENT NEWS THAT MIGHT CHANGE YOUR VIEWS

surveillance

FBI uses facial recognition to arrest 14-year fugitive overseas

End the Lie – Independent News
[Aug 13, 2014]

Reuters/Michael CaronnaReuters/Michael Caronna

After spending 14 years on the run from American law enforcement authorities, a man suspected of child sex abuse was detained in by the FBI using the State Department’s new facial recognition technology.

The case marks a notable milestone for the FBI, which has also recently been beefing up its ability to identify individuals through face-scanning software.

Announced on Tuesday by the FBI, the case in question actually began back in 1999, when New Mexico resident Neil Stammer was arrested on multiple charges, including child sex abuse and kidnapping. After posting bail, Stammer fled the United States and never appeared for this arraignment. When federal fugitive charges were filed a month afterwards, the FBI became involved.

Catching Stammer proved to be particularly tricky, the FBI said, especially since the fugitive spoke about a dozen languages and could have potentially been anywhere in the world. In January 2014, the FBI’s fugitive coordinator Russ Wilson created a new “wanted” poster for Stammer after the case caught his eye, inadvertently causing the hunt to heat up once again.

Around the same time as this poster was drafted, the US State Department began trying out its own newly designed facial recognition software, which was intended to catch passport fraud. Luckily for the FBI, a security service agent within the State Department decided to test the software out on the Bureau’s wanted posters – a course of action that ultimately matched Stammer’s face with someone named Kevin Hodges.

“When he came upon Stammer’s poster online, a curious thing happened. Stammer’s face matched a person whose passport photo carried a different name,” the FBI said in its statement.

Former New Mexico resident Neil Stammer was captured in Nepal earlier this year after 14 years on the run. (Image from www.fbi.gov)Former New Mexico resident Neil Stammer was captured in Nepal earlier this year after 14 years on the run. (Image from http://www.fbi.gov)

Further investigation revealed that Hodges – teaching English classes in Nepal and routinely visiting the local US Embassy to prolong his stay – was actually Stammer. Soon enough, he was arrested and extradited to the US.

“He was very comfortable in Nepal,” Wilson said. “My impression was that he never thought he would be discovered.”

The arrest comes as the FBI continues to expand its facial recognition database. As RT reported in April, the agency projects that it will have 52 million images stored in its Next Generation Identification (NGI) program by 2015. The NGI database currently features more than 100 million records, including those that link an individual’s fingerprints, palm prints, iris scans, and personal information like addresses and legal status. The next step for the FBI is to flesh out its trove of facial images.

In some more local cases, meanwhile, facial recognition technology is already being used by law enforcement. According to Fox News, officials in Iowa said the software enabled them to track down and arrest an armed robber in June – about 41 years after he escaped from a North Carolina jail.

Source: RT


VIDEO — Kristov Atlas interview, pt. 2 – “Anonymous Bitcoin, Cryptography, and Online Safety” – #204 – Gnostic Media

Gnostic Media
Jul 2, 2014

GM_204

[click here for part 1]

This episode is part 2 about Bitcoin, cryptography and online security and safety and is called Anonymous Bitcoin, Cryptography and Online Safety: It’s being released on Wednesday, July 2, 2014, and was recorded yesterday on Tuesday, July 1, 2014.

Kristov Atlas is a network security and privacy researcher who studies crypto-currencies. He is the author of Anonymous Bitcoin: How to Keep Your Ƀ All to Yourself, a practical guide to maximizing financial privacy with Bitcoin. Kristov is also a correspondent for the World Crypto Network, appearing regularly on the the weekly roundtable show “The Bitcoin Group”, and host of “Dark News”, a show about un-censorship technologies.


References to this episode
:

Anonymous Bitcoin
book:
http://anonymousbitcoinbook.com

Dark News Show:
https://twitter.com/darknewsshow

Tor Project:
https://www.torproject.org

I2P Network:
https://geti2p.net/en/

Tails Linux
https://tails.boum.org

Send Bitcoin donations for this episode to:
12EQTDMzU5mxtEd8ZfyrHrxABZi3jtaCCo

Please make other forms of donations here:
http://www.gnosticmedia.com/donate/

Donations. This episode is brought to you by:

Joseph
Tresor
Barry
David
Joseph
Salman

This episode is video only.

 


Wide-Area Surveillance from the Sky Coming to a Neighborhood Near You — video included

by Frankie Gotz
Canadian Awareness Network
Apr 23, 2014

A retired U.S Air Force veteran by the name of Ross McNutt owns a company called Persistent Surveillance Systems (PSS) based out of Ohio USA.

On the PSS website it writes, “Persistent Surveillance Systems provides Wide-Area Surveillance Sensors and Services that enable continuous, second-by-second video monitoring of a city-sized area. Because of the very high-resolution nature of PSS’s sensors (up to 200 megapixels), vehicle and pedestrian activity can be tracked over a 16 square-mile area. If an event-of-interest happens within this area (a murder, for example), users can rewind the event to identify the perpetrator’s place-of-origin, meeting locations, accomplices, driving routes, and final destination. PSS’s HAWKEYE sensor has been used in countless major crime investigations, and has been used to backtrack criminals for officers to apprehend.”

Video Report from LeakSourceNews below:

The operation involves flying a small civilian aircraft high in the sky (10,000 feet) with cameras pointed at desired locations.  There are three types of cameras or sensors available for wide range surveillance from sky:

[...CONTINUE READING THIS ARTICLE]


600 million Apple devices contain secret backdoors, researcher claims — video included

Friends of Syria
Jul 26, 2014

000_gyi0060073312.si

A security researcher considered to be among the foremost experts in his field says that more than a half-billion mobile devices running Apple’s latest iOS operating system contain secret backdoors.

Jonathan Zdziarski, also known by his online alias “NerveGas,” told the audience attending his Friday morning presentation at the Hackers on Planet Earth conference in New York City that around 600 million Apple devices, including iPhones and tablets, contain hidden features that allow data to be surreptitiously slurped from those devices.

During Zdziarski’s HOPE presentation, “Identifying Backdoors, Attack Points and Surveillance Mechanisms in iOS Devices,” the researcher revealed that several undocumented forensic services are installed on every new iPhone and iPad, making it easier that ever for a third-party to pull data from those devices in order to compromise a target and take hold of their personal information, including pictures, text messages, voice recordings and more.

Among the hidden functions running on iOS devices, Zdziarski said, are programs called “pcapd,” “file_relay” and “file_relay.” If used properly, he added, those programs can allow anyone with the right means and methodology to pull staggering amounts of data from a targeted phone, even when the rightful owner suspects the device is sufficiently locked.

Zdziarski has previously exploited older versions of the iOS operating system and authored several books on mobile security. Even after raising multiple questions with Apple, however, he said he has yet to figure out why, exactly, the tech giant ships iOS devices with programs that appear to do nothing other than leak digital data.

According to the slides Zdziarski presented during Friday’s talk, there’s little reason to believe the functions are used to run diagnostics or help developers.

Most services are not referenced by any known Apple software,” one slide says in part, and “the raw format of the data makes it impossible to put data back onto the phone, making useless for Genius Bar or carrier tech purposes.”

“The personal nature of the data makes it very unlikely as a debugging mechanism,” he added.

Reuters / David Gray

Reuters / David Gray

According to the researcher, evidence of the mysterious programs raises more questions than it does answers.

“Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?” he asked in one slide. “Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone? Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?”

“Apple really needs to step up and explain what these services are doing,” Zdziarski told Ars Technia on Monday after his HOPE presentation was hailed over the weekend by the conference’s attendees as a highlight of the three-day event. “I can’t come up with a better word than ‘backdoor’ to describe file relay, but I’m willing to listen to whatever other explanation Apple has. At the end of the day, though, there’s a lot of insecure stuff running on the phone giving up a lot of data that should never be given up. Apple really needs to fix that.”

Indeed, Apple responded on late Tuesday by saying that the tree functions in question are “diagnostic capabilities to help enterprise IT departments, developers and AppleCare troubleshoot issues.”

“Apple has, in a traditional sense, admitted to having back doors on the device specifically for their own use,” Zdziarski responded quickly on his blog. “Perhaps people misunderstand the term ‘back door’ due to the stigma Hollywood has given them, but I have never accused these ‘hidden access methods’ as being intended for anything malicious, and I’ve made repeated statements that I haven’t accused Apple of working with NSA. That doesn’t mean, however that the government can’t take advantage of back doors to access the same information. What does concern me is that Apple appears to be completely misleading about some of these (especially file relay), and not addressing the issues I raised on others.”

“I give Apple credit for acknowledging these services, and at least trying to give an answer to people who want to know why these services are there – prior to this, there was no documentation about file relay whatsoever, or its 44 data services to copy off personal data. They appear to be misleading about its capabilities, however, in downplaying them, and this concerns me,” he added.

On Apple’s part, the company said they have “never worked with any government agency from any country to create a backdoor in any of our products of services.”

Source


PODCAST/VIDEO — Interview 798 – What is Greenwald Covering Up? – BFPRoundtable #02

The Corbett Report
Dec 20, 2013

In this blockbuster no-holds-barred conversation, Sibel Edmonds, Guillermo Jimenez and James Corbett discuss Edmonds’ recent series of articles on Glenn Greenwald and his connection to billionaire Pierre Omidyar. We talk about the NSA/PayPal connection and Greenwald’s refusal to discuss this issue, and Edmonds reveals specific examples of publicly documented cases that Greenwald has been covering up for years.


VIDEO — More Disney Indoctrination: ‘Everything You Do, We’ll Be Spying on You!’

Truthstream Media
Jan 29, 2014

So Disney Jr., the Disney brand aimed at preschoolers, apparently has a cartoon named Special Agent Oso (http://disneyjunior.com/special-agent…) that features a nanny state ladybug drone named Shutterbug which comes complete with a little camera that transmits video up to a satellite that then sends that data in to headquarters for analysis…”She’s always in flight, on the case both day and night.” (The “case,” in this case, is an infraction involving a parent leaving her daughter in a parked car in their driveway without a seat belt on…)

Even die hard Disney fans that hate on us for reporting on them will have a hard time ignoring the obvious big brother propaganda and indoctrination going on in this creepy, creeeepy cartoon.

There’s even a theme song…but we warn you; it’s the stuff Orwell’s nightmares were made of — http://www.youtube.com/watch?v=9hLowm…

Original article up at 21st Century Wire: http://21stcenturywire.com/2014/01/29…

Website: TruthstreamMedia.com
Twitter: @TruthstreamNews
FB: Facebook.com/TruthstreamMedia

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*

­~*~*~*~*~*~*~*~*~*~*~
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.


MUST WATCH DOCUMENTARY — “Trance-Formation” — Trans-Humanism / Genetic Modification of all Life / Nano-Technology / HAARP / Geoengineering

PEREXUSREX
Nov 24, 2012

[HD-version]

OUTSTANDING VIDEO . . .
Genetic Modification of all Life!!! New Documentary Film
Enslavement of the human race
This is part of the Endgame but not all . . .MUST WATCH
The State of our World

‘Trans Formation’ By Max Igan

Geoengineering

Trans-Humanism / Genetic Modification of all Life / Nano-Technology / HAARP / Geoengineering -Film

Chemtrails

The latest film by Max Igan, one of the greatest humans to ever walk this planet. This man deserves his rightful place in the history books, right next to the greatest minds of all time. http://thecrowhouse.com/home.html

Max Igan’s YouTube Channel:
http://www.youtube.com/user/aodscarec…

TO SUPPORT:
http://thecrowhouse.com/home.html [Max Igan's Website]

Category:
Education

Electromagnitism and Chemtrails

Transhumanism is – http://www.wordwebonline.com/search.p…

Tags:
Trans Humanism genetic modification of all life nano technology. HAARP nanotechnology nano transformation trans formation humanism is. Nanoparticles nanotech what is nanotechnology. Future technology transformation


PODCAST/VIDEO– Interview 856 – The Beard World Order roundtable on “Meta-Conspiracy”

The Corbett Report
Apr 9, 2014

via TracesOfReality.com:

Welcome to The Beard World Order: On today’s episode Tom, James, and Guillermo take on “meta-conspiracy” and the “conspiracy to inject conspiracy.”

Do the infiltration and subversion tactics of the NSA and private intelligence contractors present a unique challenge for activists and the alternative media in the 21st century? Are “sockpuppets” and other disinfo exploits any different than the decades old COINTELPRO? What is cognitive infiltration, and how has it already succeeded in invading our minds? Have privacy norms (#aftersex) been irreversibly altered? Is there any hope left for humanity? And why would the Department of Defense be involved in the making of Ernest Goes to Camp?

Your answers to these questions, beards, beards, yeah, and more.

Enjoy.

Contact Guillermo, James, and Tom with questions, comments, and suggestions for future topics to be discussed on the show.

For a High Quality audio download of this episode, click here (right-click, and save-as).

Show Notes:

Beard World Order: Episode 01 – Uncorking Conspiracy

Wired: Why You Should Embrace Surveillance, Not Fight It

Invasion of the Data Snatchers: Big Data and the Internet of Things Means the Surveillance of Everything

Americans say they’re shopping less online. Blame the NSA.

Many say NSA news changed their behavior

How Did Snowden Change Search Behavior? New Research Shows, More Than You Might Think

Beyond Snowden: Don’t Coddle the National Security State; Smash It

Border Patrol Throw Political Bone to Civil Libertarians; Will We Fetch?

TOR Radio: Drug Culture, Bodycams, and Romanticizing the Republic

The Corbett Report: Solutions: Sousveillance (video)

ClandesTime episode 025 – Fun with FOIA

Complete list of DOD-assisted movies

The House’s NSA bill could allow more spying than ever. You call this reform?

The #aftersex selfie is a betrayal of intimacy

Bearded bands and facial hair appreciation clubs: the hairy-faced trend is back

U.S. government sues Philadelphia schools over beard policy

Beard transplants (video)


Australian Security Agencies Target “SyrianGirl” Mimi Al-Laham

by Brandon Turbeville
Activist Post
Jun 12, 2014

Mimi Al-Laham (SyrianGirl)

In the Orwellian world of post 9/11 hysteria and the Global War On Terror, speaking truth is a revolutionary act. Indeed, such is evidenced by the fact that speaking out against terrorism is now enough to cause you to be labeled as a supporter of terrorism. At least, that is, in certain instances.

This is particularly the case with Mimi Al-Laham, (aka SyrianGirl), a young Syrian woman who has been active on YouTube, social media, and her own website in speaking out about the Western-backed destabilization of Syria.

Laham has consistently denounced the death squads operating inside Syria as terrorists and agents of the West as well as identified the so-called rebellion as being nothing more than a Western – organized, funded, and directed campaign against the Syrian government , all documented fact. For more information on this topic, please see my book, The Road To Damascus, The Anglo-American Assault On Syria.

However, her statements against terrorism, beheadings, rapes, slavery, and wholesale slaughter have caused her to be labelled as a potential “extremist” and purveyor of “extremist rhetoric.” For that reason, Australian security agencies have been closely monitoring Laham’s online statements and, presumably, much more than that.

Australian Institute of Criminology’s Shandon Harris-Hogan said that such statements and online behavior should be watched for “signs of an escalation in rhetoric or calls for violence” and that “When it crosses that line, particularly into encouraging, facilitating or preparing for violence, that’s when it’s going to particularly hit the radar of security services.”

[...CONTINUE READING THIS ARTICLE]


NSA Whistleblower: Snowden Never Had Access to the “Juiciest” Intelligence Documents

Global Research
June 9, 2014

Washington’s Blog 7 June 2014

nsa

NSA whistleblower Russel Tice was a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping.

Tice told PBS and other media that the NSA is spying on – and blackmailing – top government officials and military officers, including Supreme Court Justices, highly-ranked generals, Colin Powell and other State Department personnel, and many other top officials:

He says the NSA started spying on President Obama when he was a candidate for Senate:

Many of Tice’s allegations have been confirmed by other government whistleblowers. And see this.

Washington’s Blog called Tice to find out more about what he saw when he was at NSA.

RUSSELL TICE: We now know that NSA was wiretapping [Senator] Frank Church and another Senator.  [That has been confirmed.]

And that got out by accident. All the information the NSA had back then – and probably many other senators and important people too, back in the 70s – they shredded and they destroyed all of that evidence.  As much as they could find, they destroyed it all. By accident, something popped up 40 years later.

And, in fact, they were asked 40 years ago whether NSA had bugged Congress. And, of course, they lied. They lied through their teeth.

NSA Has Hidden Its Most Radical Surveillance Operations … Even from People Like Snowden Who Had General “Code Word” Clearance

WASHINGTON’S BLOG: Glenn Greenwald – supposedly, in the next couple of days or weeks – is going to disclose, based on NSA documents leaked by Snowden, that the NSA is spying on all sorts of normal Americans … and that the spying is really to crush dissent.  [Background here, here and here.]

Does Snowden even have documents which contain the information which you’ve seen?

RUSSELL TICE:  The answer is no.

WASHINGTON’S BLOG: So you saw handwritten notes. And what Snowden was seeing were electronic files …?

RUSSELL TICE: Think of it this way.  Remember I told you about the NSA doing everything they could to make sure that the information from 40 years ago – from spying on Frank Church and Lord knows how many other Congressman that they were spying on – was hidden?

Now do you think they’re going to put that information into Powerpoint slides that are easy to explain to everybody what they’re doing?

They would not even put their own NSA designators on the reports [so that no one would know that] it came from the NSA.  They made the reports look like they were Humint (human intelligence) reports.  They did it to hide the fact that they were NSA and they were doing the collection. That’s 40 years ago.  [The NSA and other agencies are still doing "parallel construction", "laundering" information to hide the fact that the information is actually from mass NSA surveillance.]

Now, what NSA is doing right now is that they’re taking the information and they’re putting it in a much higher security level.  It’s called “ECI” – Exceptionally Controlled Information  – and it’s called the black program … which I was a specialist in, by the way.

I specialized in black world – DOD and IC (Intelligence Community) – programs, operations and missions … in “VRKs”, “ECIs”, and “SAPs”, “STOs”. SAP equals Special Access Program. It’s highly unlikely Mr. Snowden had any access to these. STO equals Special Technical Operations  It’s highly unlikely Mr. Snowden had any access to these.

Now in that world – the ECI/VRK world – everything in that system is classified at a higher level and it has its own computer systems that house it.  It’s totally separate than the system which Mr. Snowden was privy to, which was called the “JWICS”: Joint Worldwide Intelligence Communications System.  The JWICS system is what everybody at NSA has access to.  Mr Snowden had Sys Admin [systems administrator] authority for the JWICS.

And you still have to have TS/SCI clearance [i.e. Top Secret/ Sensitive Compartmented Information - also known as “code word” - clearance] to get on the JWICS. But the ECI/VRK systems are much higher [levels of special compartmentalized clearance] than the JWICS. And you have to be in the black world to get that [clearance].

ECI = Exceptionally Controlled Information. I do not believe Mr. Snowden had any access to these ECI controlled networks). VRK = Very Restricted Knowledge. I do not believe Mr. Snowden had any access to these VRK controlled networks.

These programs typically have, at the least, a requirement of 100 year or until death, ’till the person first being “read in” [i.e. sworn to secrecy as part of access to the higher classification program] can talk about them.  [As an interesting sidenote, the Washington Times reported in 2006 that – when Tice offered to testify to Congress about this illegal spying – he was informed by the NSA that the Senate and House intelligence committees were not cleared to hear such information.]

It’s very compartmentalized and – even with stuff that they had – you might have something at NSA, that there’s literally 40 people at NSA that know that it’s going on in the entire agency.

When the stuff came out in the New York Times [the first big spying story, which broke in 2005] – and I was a source of information for the New York Times –   that’s when President Bush made up that nonsense about the “terrorist surveillance program.” By the way, that never existed. That was made up.

There was no such thing beforehand. It was made up … to try to placate the American people.

The NSA IG (Inspector General) – who was not cleared for this – all of a sudden is told he has to do an investigation on this; something he has no information or knowledge of.

So what they did, is they took a few documents and they downgraded [he classification level of the documents] – just a few – and gave them to them to placate this basic whitewash investigation.

Snowden’s Failure To Understand the Most Important Documents

RUSSELL TICE: Now, if Mr. Snowden were to find the crossover, it would be those documents that were downgraded to the NSA’s IG.

The stuff that I saw looked like a bunch of alphanumeric gobbledygook.  Unless you have an analyst to know what to look for – and believe me, I think that what Snowden’s done is great – he’s not an intelligence analyst.  So he would see something like that, and he wouldn’t know what he’s looking at.

But that would be “the jewels”. And the key is, you wouldn’t know it’s the jewels unless you were a diamond miner and you knew what to look for. Because otherwise, there’s a big lump of rock and you don’t know there’s a diamond in there.

I worked special programs. And the way I found out is that I was working on a special operation, and I needed information from NSA … from another unit. And when I went to that unit and I said “I need this information”, and I dealt with [satellite spy operations], and I did that in the black world. I was a special operations officer. I would literally go do special missions that were in the black world where I would travel overseas and do spooky stuff.

Cheney Was Running the Show

WASHINGTON’S BLOG: You said in one of your interviews that Dick Cheney ordered the intercepts that you found in the burn bags [the bags of documents which were slated to be destroyed because they were so sensitive].

Is that right … and if so, how do you know that?

RUSSELL TICE: I did not know one way or the other until I talked to a very senior person at NSA who – much later – wanted to have a meeting with me. And we had a covert, clandestine style meeting. And that’s when this individual told me that the whole thing was being directed and was coming from the vice president’s office … Cheney, through his lawyer David Addington.

WASHINGTON’S BLOG:  It sounds like it wasn’t going through normal routes?  It’s not like Cheney or Addington made formal requests to the NSA … through normal means?

RUSSELL TICE: No, not normal at all. All on the sly … all “sneaky pete” under the table, in the evening when most NSA employees are gone for the day. This is all being done in the evenings … between like 7 [at night] and midnight.

NSA Is Spying On CONTENT as Well as Metadata

WASHINGTON’S BLOG: And from what you and others have said, it’s content as well as metadata?

RUSSELL TICE: Of course it is. Of course. [Background. But see this.]

NSA Spying On Journalists, Congress, Admirals, Lawyers …

RUSSELL TICE: In 2009, I told [reporters] that they were going after journalists and news organizations and reporters and such.

I never read text of Congressman’s conversations. What I had was information – sometimes hand-written – of phone numbers of Congressmen, their wives, their children, their staffers, their home numbers, their cellphone numbers, their phone numbers of their residence back in Oregon or whatever state they’re from, and their little offices back in their state.

Or an Admiral and his wife, and his kids and his staffers …

The main thing I saw more than anything else were lawyers and law firms. I saw more lawyers or law firms being wiretapped than anything else.

These are the phone numbers I saw written. And then I would see those numbers incorporated into those lists with the columns of information about the phone number, and the serial number and the banks of recorders and digital converters and the data storage devices. I could see handwritten phone numbers and notes, sometimes with names, sometimes not.

Snowden and Greenwald’s Whistleblowing Was Done In the Right Way

RUSSELL TICE: If Mr. Snowden would have had access to VRK, ECI, SAP, STO (and a few others that I will not mention here), and he released them en masse to the press, I would volunteer to shoot him as a traitor myself.

But this is not what he did.

He gave up JWICS info that he insisted be vetted for sources and methods, and true damage to national security. Mr. Greenwald and company should be congratulated on the restraint that they have shown with the JWICS documentation that they have in hand via Mr. Snowden.

Postscript: When Tice started blowing the whistle on NSA mass surveillance in the early 2000s, the NSA all of a sudden decided that Tice was “crazy”. As Tice told us:

For many years, I was the only NSA whistleblower in public.

And what they did is call me in – 9 months after my routine psychological evaluation – which I passed with flying colors, like every other one I’ve had in my entire career, passed with flying colors.

They called me in for an “emergency” psychological evaluation, and they declared me nuts.

I am a fairly good judge of character, and I found Tice to be humorous, self-deprecating in a healthy and light-hearted way, and consistent on the facts. Tice talked about how he was a pretty darn good football player in junior college, but no star athlete. He talked about how one reporter tried to make him out to be James Bond with leading man looks, and he thought that was ridiculous. We shared some normal “guy talk” about women. Tice has a little anger at the way the NSA tried to whitewash the mass surveillance that he uncovered (wouldn’t you be?), but he wasn’t enraged or over-the-top. Tice is also a patriotic American, not a subversive. Specifically, we spent a long time talking about the importance of the Constitution and the rule of law. In other words, Tice seems “oriented to reality”, completely sane, normal, ethical and bright to me.

And the following facts are more important than my personal impression:

Given the way that the NSA has been repeatedly caught in lies about its surveillance programs – and the way that it has attacked whisteblowers – I believe Tice over the NSA.


PODCAST/VIDEO — Why We Must Oppose Bilderberg

The Corbett Report
May 30, 2014

As the Bilderbergers gather in Denmark to discuss this year’s agenda, James Corbett presents “Why We Must Oppose Bilderberg” to the We The People Anti-Bilderberg Conference taking place in Copenhagen. Learn more about the history, aims, and goals of the Bilderberg Group, why they must be opposed, and how best to do it on this special edition of The Corbett Report podcast.

SHOW NOTES AND MP3: http://www.corbettreport.com/?p=9338

[related videos:


12,000 entries: Google flooded with Europeans’ ‘right to forget’ requests

Blacklisted News
June 1, 2014

Source: RT

Reuters / Francois Lenoir

Reuters / Francois Lenoir

In one day after offering a form for requests to remove links to harmful information about individuals, Google has received 12,000 entries. The search giant will have to process the inflow individually.

The number of requests was given out by a company spokesman in Germany on Saturday, a day after Google revealed its new instrument for people seeking to exercise their new ‘right to be forgotten.’

The form was set up in compliance with a ruling by EU’s highest court, which said individuals can demand that links to material to irrelevant or outdated information about them be removed from search query results.

Germany leads in the number of request, according to Google data, with four out of ten submissions coming from there. Spaniards and Britons are also flocking in numbers to have links to information on them removed.

Coinciding with the launch, Google’s chief executive officer Larry Page warned that the court’s decision may empower dictators.

“It will be used by other governments that aren’t as forward and progressive as Europe to do bad things. Other people are going to pile on, probably… for reasons most Europeans would find negative,” the executive told the Financial Times.

He also claimed that the move would stifle innovation, because small startup companies would not have the resources Google has to address such regulations.

Google’s search results would be changed only according to requests in the EU. But human employees will review all the thousands of requests, rather than software used by the giant, to deal with millions of request to remove links to copyrighted material.

The company said it would in each case weigh the demand for privacy with the public’s right to know, especially when the individual in question is some sort of a public figure.

“When evaluating your request, we will look at whether the results include outdated information about you, as well as whether there’s a public interest in the information—for example, information about financial scams, professional malpractice, criminal convictions, or public conduct of government officials,” comments explaining the form say.

Europeans started sending Google requests to redact links even before the company set up the complaint form, and have sent thousands of them. Unsurprisingly, a large portion of those was connected to criminal records or some other past sins.

According to media reports, among the first requests submitted were those of a man convicted for possession of child pornography, an actor, who had an affair with a teenager, a politician, who misbehaved while in office, and a physician disliking negative reviews.

Other large search engines, Yahoo and Microsoft’s Bing, are also subject to the court’s decision. Yahoo said in a statement it is in the process of developing a solution to comply. Microsoft said it hopes “the courts and data protection authorities will strike the right balance between protecting privacy rights and the freedom of expression.”


The True Purpose of Chemtrails?

AirCrap.org
May 3, 2014

by Zen Gardner – Apr 30, 2014

Star Wars

[An archived article with some very compelling information which may also help explain some of the strange maladies many are experiencing. Watch your thoughts. - Zen]

By Carolyn Williams Palit

Rense.com

We are dealing with Star Wars. It involves the combination of chemtrails for creating an atmosphere that will support electromagnetic waves, ground-based, electromagnetic field oscillators called gyrotrons, and ionospheric heaters. Particulates make directed energy weapons work better. It has to do with “steady state” and particle density for plasma beam propagation.

They spray barium powders and let it photo-ionize from the ultraviolet light of the sun. Then, they make an aluminum-plasma generated by “zapping” the metal cations that are in the spray with either electromagnetics from HAARP, the gyrotron system on the ground [Ground Wave Emergency Network], or space-based lasers. The barium makes the aluminum-plasma more particulate dense. This means they can make a denser plasma than they normally could from just ionizing the atmosphere or the air.

More density [more particles] means that these particles which are colliding into each other will become more charged because there are more of them present to collide. What are they ultimately trying to do up there — is create charged-particle, plasma beam weapons.
Chemtrails are the medium – GWEN pulse radars, the various HAARPs, and space-based lasers are the method, or more simply:

Chemtrails are the medium — directed energy is the method.

Spray and Zap.

This system appears to be in Russia, Canada, the United States, and all of Europe. Exotic weapons can be mobile, stationary, land-based, aerial, or satellite.

It is an offensive and defensive system against EM attacks and missiles. It uses ionospheric particle shells as defense mechanisms [like a bug-zapper shell]* against missiles and EM attacks. That means they spray and then pump up the spray with electromagnetics. When these shells are created using the oscillating, electromagnetic, gyrotron stations, it “excludes” and displaces the background magnetic field. These shells can be layered one above another in a canopy fashion for extra protection from missiles. The chemtrail sprays have various elements in them like carbon which can used to absorb microwaves. Some of these sprays have metal flakes in them that make aerial craft invisible to radar. Spoofer sprays. Sprays like these can be used to create colorful, magnetized plasmas to cloak fighter jets.

There are satellite weapons involved. Activists are using meters and are getting readings of microwaves, x-rays, and some other kind of emission that they are not sure of, maybe a low-intensity laser.

They are also photographing gas plasma generation due to the heating of chemtrails by electromagnetics. The technical names for vertical and horizontal plasma columns are columnar focal lenses and horizontal drift plasma antennas. Various size of gas plasma orbs are associated with this technology. These orbs can be used as transmitters and receivers because they have great, refractory and optical properties. They also are capable of transmitting digital or analog sound. Barium, in fact, is very refractive — more refractive than glass.

What does that mean? Someone or someones are very involved in unconstitutional, domestic spying and the entrained plasma orbs carried on electromagnetic beams can be used for mind control programming. The satellites can be programmed to track and monitor various frequencies on different parts of your body. These electromagnetic beams carrying the gas plasma orbs stick due magnetic polarity and frequency mapping and tracking to people’s eyes, ears, temples, and private parts. A beam with entrained orbs carries pictures in each orb just like the different frames in a movie. It is a particle beam that is also a frequency weapon.

The satellites download holographic mind control movies, pictures, sounds, and sensations to people through this technology. The Air Force has stated in “Air Force 2025? that their goal is to develop virtual and augmented reality mind control. Depending on the how the computer is programmed or depending on the mood or intent of the person interfacing with the technology, you can be probed, bothered, gaslighted, frightened, manipulated, electronically raped, or tortured. It scans your brain frequencies and deciphers your thoughts. The satellites track you by mapping your bioenergetic signature [body biometrics] and constantly scanning an area to find you.

We are the lab rats for this technology and something is very wrong in the military or intelligence branches somewhere. Because developmental projects in government and military are often so compartmentalized, I suppose someone could be using and developing this technology secretly and without authorization. Then again, behavioral and mind control programs were an authorized policy under MKULTRA. Our country has a history of experimenting on its citizens. We are talking about satellite charged-particle frequency weapons attacking a person 24 hours a day. Psychotronic weapons are considered weapons of mass destruction by the U.N.

“HAARPs” can create earthquakes and can also x-ray the earth to find underground military bases, gold, or oil reserves. These ionospheric heaters can also operate as an over-the-horizon or under-the-ocean communications system. This system can control the weather or create disasters. Taken together with the aurora keyhole through-your-roof satellite surveillance system, Echelon electronic computer/phone sweeps, plasma-cloaked DOD Drug War helicopters and stealths, implants, and cameras on the street, it constitutes one, big global and space control grid.

These weapons involve beams. Two beams overlapped will couple into a particle-ion beam that will bounce off of a remote target and send a holographic image back to the satellite for remote spying operations. When you cross two strong beams, you can supposedly* create scalar energies. These energies can be used as untraceable weapons for nuclear size explosions or for defense. These crossed-energies can be used to cause a person’s physical electrical system to fail or with a lower frequency, administer a kind of remote electro-shock. Visualize touching a positive and negative electric cable to each other on top of your head. Scalar energies can be utilized in hand-held military guns and on tanks. They can dud-out electronics or cause large, electrical blackouts. Scalar energies are practically impossible to shield against. You need lead, ceramics, and a deep underground facility to not be affected by these weapons. Or, you need to be up and above the field of battle.

People who are working on these issues hear tones and hums. If you hear persistent tones and static; have body vibrations, burning sensations, “bangs” to the head, neurological damage, or immune system damage; are hearing electronic voices or hearing the sound of a plasma; suffering from pains deep in your organs or constant headaches; or experiencing other anomalous activity then you may be being targeted by directed energy, mind control weapons. These weapons could be on helicopters, jets, stealth fighters, or on satellites. Directed energy beams and electromagnetic waves can be sent to you via hand-held devices or piggy-backed in on cell phone and satellite towers.

Is it possible that someone(s) are very afraid of coming famines and riots due to the ongoing, man-induced failure of the ecological system, and they are saturating the earth with chemtrails for large- scale, gas plasma mind control? Is this the last grasp for the world’s resources? Or, are they just control freaks and money mongers? Someone would like to get to that oil under the melting [due to chemtrail-trapped EM heat] Artic. And, I guess the Third World is not a part of this system. I don’t think that the developed nations are going to let them in on this either.

Any country that joins this NATO system will become mind-controlled and diseased due to the associated, intense, oscillating, electromagnetic fields, electromagnetic soup, and the poisonous, toxic chemtrails. Our DNA will break. We risk the earth’s spin and tilt becoming messed up due to mucking around with the magnetic fields through this military technology. Maybe, it is already messed up.

It constitutes U.S. global domination via NATO and the erosion of civil rights. According to Charlotte Iserbyt and Al Martin, there are ex-KGB and ex-STASI advising our new Office of Total Information Awareness. They are the ones creating our new internal passports [national ID]. And under “The Treaty on Open Skies,” we have overflights by Russian and German military. Who exactly is flying those plasma-cloaked craft that are seen all over this country and mistaken for UFOs by people who do not know about this aerial deception technology? Obviously, we have another “Project Paperclip” in the making. We can add the new thugs to the 2,000 Iraqi brought into country by Daddy Bush who are now living in Nebraska.

The elitist corporate government is going to hold the rest of us hostage with directed energy weapons in space, if the Policy for a New American Century group – PNAC – Bush and cronie think tank has their way, along with directed energy attacks against any country or citizen that they decide they do not like. These weapons can create climate war, weather war, mind war, cyber war, disease war, disaster war, and undetectable war. Taken together they can create economic war.

If this system is not stopped, it will kill billions due to aluminum and barium poisoning. It will kill billions due to crop failures and world-wide famine. It will cause heart attacks, strokes, and cancers. It will cause stillbirths, miscarriages, and infertility. The chemtrail sprays often have fungi, bacteria, viruses, dessicated red blood cells, crystalline substances, carbon, metal cations, lithium, other chemicals, heavy metals, and God knows what – probably smart dust, or nanocrap. Years of biowarfare testing on the American public is no big secret anymore. Spraying germs in the sky where they mutate due to the ultra-violet light — brillant plan, my man. Are we acceptable losses or is this by design?

I know that many of the major players have big investments in pharmaceutical companies, GM seeds [seeds that can grow in an electromagnetic soup], weapons and directed energy development contracts, oil contracts, genetic research, and mind control research. Some of these people have had a familial history of financial and policy support for population control, eugenics, Hitler, Mao, Stalin, Lenin, Marx, Pinochet, Hussein, and various other dictators. Some of the major players were the masterminds of the death squads in Central and South America. They stand to make a big profit on our death and disease. Just take a look at Rumsfield and Tamiflu.

I assume that they know the dangers of this system and that they take care to stay in their shielded, air-filtered offices, homes, bases, and cars. I assume they take chelating substances to remove the barium and aluminum from their bodies and minds. If not, then they really do not understand the far-ranging implications of this destructive system. Congress may not understand just what a terrible weapons system and control grid they are funding.

As I understand it, Tesla towers attached to deep-earth, free-energy taps are to be created over the 10-12 magnetic poles and the GWEN system phased-out. Has this already been done? This should allow total control of the earth through giant, Tesla death ray-guns. This natural, electromagnetic earth was not meant to be an unnatural dynamo to power man’s weapons or his utility companies.

Over-unity systems [Tesla devices]* are as of yet, another unexplored and probably not understood man-made energy. We should be very suspect of free energy. As we can see, the forms of man-made energy that have been created and used in the past have not been good for this planet. Maybe it is time to reconsider the options available to us through the development of crops for fuel, wind, solar, and water power. We need world-wide, different, more holistic, renewable, energy programs.

Is there any good news? Yes. There has been tons of particulate dumping through the spray operations for (15) years over the Americas, Europe, Scandinavia, Eastern Europe, and from what I can find out, over Russia. And, what goes around blows around, right? So, these substances are probably actually global. It sure makes a ton of sense to spray poisonous elements in 24 NATO countries and let the substances be carried around the earth on the jet streams to poison yourself, your enemies, and all neutral and non-combatent countries. Talk about making more enemies.

The water, air, and soil of all of these countries is so saturated with metal cations that these weapons freaks should be able to zap and mind f–k each other quite well now and as often as they wish. Once they have clobbered each other with light-saber beams for a few years and razed and scorched sections of the earth, they may start to realize that this foreign policy will lead to a defective human race and a rotten economy.

MORE>>

+++

ZenGardner.com


VIDEO — No More Net Neutrality? – #NewWorldNextWeek

New World Next Week
Apr 24, 2014

Welcome to http://NewWorldNextWeek.com — the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. This week:

Story #1: Federal Judges Order Obama to Release Memo Justifying Assassination of Americans
http://ur1.ca/h5w06
John Yoo makes the case that the President can torture children if necessary
http://ur1.ca/h5w1b
Life’s Good If You’re a Drone-Loving Criminal Regime: ‘US Drone Strikes Continue With Impunity’
http://ur1.ca/h5w0j
Makers Say Don’t Worry About Privacy as Civilian Drone Industry Takes Off in Sunny Spain
http://ur1.ca/h3von

Story #2: FCC Finally Announces New Rules That Will Kill Net Neutrality
http://ur1.ca/h5w1g
Internet “Fast Lane”? Big Companies May Soon Be Able to Pay to Have Their Websites Load Faster
http://ur1.ca/h5w1m
Corbett Report Episode 262: Pirate Internet
http://ur1.ca/h5w1v
Cronyism At Its Finest, U.S. Government Arguing Against Aereo On Behalf Of Broadcasters Before SCOTUS
http://ur1.ca/h5w1z

Story #3: #MyNYPD Hashtag Attracts Photos of Police Violence, Abuse
http://ur1.ca/h5w22
The Folks Behind #MyNYPD Are Learning a Tough Lesson Right Now
http://ur1.ca/h5w24
General Mills Reverses Legal Terms After Controversy
http://ur1.ca/h5w29
Federal Judge Approves Class Action Case Against Ford, IBM for Helping South African Apartheid
http://ur1.ca/h5w2j
Colorado Crime Rates Down 14.6% Since Legalizing Marijuana
http://ur1.ca/h5w2q
Open Source Comes to Farms With Restriction-Free Seeds
http://ur1.ca/h5w2y
​Vermont Poised to Enact Toughest US GMO-Labeling Law Yet
http://ur1.ca/h5w38

#NewWorldNextWeek Updates:
Researchers Unveil System to Start Storms & Lightning on Command
http://ur1.ca/h5w3f
Controversial Light Bulb Listens to Conversations, Tweets What It Hears
http://ur1.ca/h5w3n
@Pepsico: Why Are You Bulldozing The Rainforest? Why The Blood-Palm Oil?
http://ur1.ca/h5w3z
Capital and ‘Captain America': Media Oligarchs Plan Comic Book Movies Into 2028
http://ur1.ca/h5w4b

Visit http://NewWorldNextWeek.com to get previous episodes in various formats to download, burn and share. And as always, stay up-to-date by subscribing to the #NewWorldNextWeek RSS feed or iTunes feed. Thank you.

Previous Episode: Crowdsourcing Surveillance, Mainstream Conspiracies, No GMO Russia
http://www.corbettreport.com/?p=9063


VIDEO — Silent Circle’s Blackphone unveiled

RT America
Feb 28, 2014

It may look like a typical phone on the outside, but on the inside, it’s a device that runs completely on encrypted technology. Blackphone, released this week at the Mobile World Congress, is a new privacy-focused smartphone developed by privacy communications firm, Silent Circle, and smartphone manufacturer, Geeksphone. RT’s Ameera David takes a deeper look at what this phone has to offer, then talks to Liz Wahl about the groundbreaking technology.

Find RT America in your area: http://rt.com/where-to-watch/
Or watch us online: http://rt.com/on-air/rt-america-air/

Like us on Facebook http://www.facebook.com/RTAmerica
Follow us on Twitter http://twitter.com/RT_America


PODCAST — The Corbett Report | Interview 843 – The Intelligence-Industrial Complex: James Corbett on ClandesTime

The Corbett Report
Mar 24, 2014

James Corbett joins Tom Secker of SpyCulture.com to talk about the privatization of intelligence and the development of the intelligence industrial complex. In this typically wide ranging conversation James began by breaking down the different layers in the existing discussion on this topic. We looked at the history of private intelligence, how 9/11 turned it into a massive industry, Edward Snowden, Anonymous, so called cyberterrorism and much more.

Sources:

NBC – Intelligence contractors on the rise since 9/11

Private Intelligence Firms – short list

Operation AntiSec

ODNI document on US intelligence budget

The EyeOpener- CIA Front Companies

Radiohead – Where I End and You Begin


Canadians File Class Action Lawsuit Against Facebook For Interception Of Private Messages

by Terry Wilson
Canadian Awareness Network
Apr 11, 2014

cio.com

Facebook is facing a class-action lawsuit in Canada over its alleged interception of private message of users of the social network.

The lawsuit in the Ontario Superior Court alleges that URLs (uniform resource locators) in the private messages were “harvested” by Facebook in violation of its users’ privacy, without their knowledge or consent, Rochon Genova, the law firm representing the users, said Wednesday.

Facebook did not disclose to users that their private messages would be intercepted and scanned, and the contents of those messages treated as “likes” for third-party sites through the social plug-in function, according to the law firm.

The complaint is without merit and we will continue to defend ourselves vigorously, a spokeswoman for the social networking company said via email.

The company is already facing similar lawsuits in the U.S. over its alleged interception and scanning of the content of private messages.

Citing research by Swiss information security firm High-Tech Bridge and others, Facebook users Matthew Campbell and Michael Hurley filed in December a suit in the U.S. District Court for the Northern District of California on behalf of all Facebook users in the U.S. who have sent or received private Facebook messages that included a URL in the content of the message.

High-Tech Bridge wrote in August last year that Facebook was one of the Web services it tested that was caught scanning URLs despite such activity remaining undisclosed to the user, according to the complaint.

Facebook mined user data and profited by sharing the data with third parties such as advertisers, marketers, and other data aggregators, despite having made representations that “reflect the promise that only the sender and the recipient or recipients will be privy to the private message’s content, to the exclusion of any other party, including Facebook,” the complaint added.

The lawsuit is proposed to be consolidated with a similar one filed in January in the Northern District of California by another Facebook user David Shadpour. If there was a URL in the private message, Facebook searched the website identified in the URL for purposes such as data mining and user profiling, according to Shadpour’s complaint.
Continue Reading


VIDEO — “Snoopy” Drone That Can Hack Your Smart Phone

by Terry Wilson
Canadian Awareness Network
Apr 11, 2014

A London based company named Sensepoint security researchers have developed a drone called ‘Snoopy’. The drone can hack into a person’s smart phone by “spoofing” a wifi signal.

The best way to protect yourself from hackers and/or government agencies (police use similar handheld devices) who are utilizing this type of software, is to keep wifi on your phone turned off until necessary.


Cows Are Getting Plugged Into The Internet of Things

by Heather Callaghan
Activist Post
Apr 4, 2014

Photo: by hbomb

The Internet of Things envisions a world where all things are “smartened” and connected to the Internet, always broadcasting real-time updates. Usually people think of appliances, which for me always conjures images of The Brave Little Toaster.

Did you ever carry this idea out into living things? Plants, then animals…then humans? Well, technology from the Internet of Things has definitely crept into the world of plants and is now making its way toward animals. Large-scale farms are particularly eager to use new technical applications – anything to help stay ahead of the changing food system and a shuttering economy.

So now plugged into the Internet of Things, we’ve got appliances, electrical meters, industrial equipment, devices for plants, and…cows. Yes, more and more cattle are connecting through their collars which emit real-time updates about their heat cycles.

The special Wi-Fi connected collar is called the Silent Herdsman, originating from Glasgow, Scotland. Not only does it monitor, but also uses artificial intelligence software to determine when Ms. Moo is in heat. There’s a similar product actually called the MooMonitor but requires more interpretation from the farmer.

In recent years a LOT of thought and theories have gone into methods for the most milk production for the farmer’s buck. This could be anything from waterbeds to relieve stress to biotech help with fertilization to the above-mentioned devices which are intended to capture the exact moment a mother cow can get pregnant again after having just birthed a baby calf.

To a large-scale farmer, it is apparently worth it, because one missed cycle means 5 more gallons of milk per day that could have been sold, to the tune of $315 per cycle. All of these cows are artificially inseminated – one failed attempt, during a tiny window of time that farmers believe happens during the night – is a high price.

Battery power is also no longer a concern. The Silent Herdsman lasts for three years and has actually synced the cow’s personal data to the software whenever it enters into the receiving area, be it a designated field or barn.

Source:
http://singularityhub.com/2014/04/03/why-farmers-are-connecting-their-cows-to-the-internet/

Also read:

Recent posts by Heather Callaghan:


Microsoft Windows Enters The Internet of Things Surveillance Matrix

by Kevin Samson
Activist Post
Apr 2, 2014

Following other behemoth tech companies IBM, AT&T and Google, Microsoft has finally come along to state their intentions for promoting The Internet of Things.

Where Google sees adding robotic intelligence to every home, and the IBM/AT&T global partnership is to ensure that no home, appliance, or gadget is left behind, Microsoft’s Windows on Devices aims to offer its proprietary operating system to engage users on an already familiar platform.

Specific details remain sparse, but the video below speculates on a few areas that have come to light. The possible uses that have been offered are tame compared to what we already know are the intentions behind the move toward a Smart World.

In what researcher Julie Beal has dubbed “Uberveillance” she outlines the greater picture in her article from 2012:

Now global surveillance of citizens is announced with pride and accepted without question. This is the age of the ‘Internet of things’ – everything is to be woven into the Web. Companies like IBM are busily creating ‘smartworld’ where the Internet becomes the system of systems, linking all devices, people, and even nature.

Everything we buy from the shops, even our food, will one day incorporate smart tags. This practice is on the increase, facilitating what is known in the industry as ‘asset tracking’, and is being taken up more and more to enable tracking and tracing of documents, equipment, pharmaceuticals, warehouse stock, etc. (Source)

Clearly the potential is such that former CIA director David Petraeus made mention of it, implying that Smart tech will most likely lead to a CIA (and NSA) home invasion:

CIA Director David Petraeus made headlines with a speech given at the summit for In-Q-Tel, the CIA’s venture capital firm. In this talk, Petraeus discussed the emerging “internet of things” and the implications it will have for increased levels of surveillance. Petraeus explained that, because of the rise of gadgets which are connected and controlled by apps, intelligence agencies will no longer need to place spy devices inside your home – you will do it for them.

In conjunction with a recent unveiling of a new low-powered computer chip by ARM, one of the world’s largest chip companies, the fact is virtually every piece of electronic equipment (including appliances) can be controlled via apps and Internet-based systems. It is for this reason that Petraeus stated that the CIA will be able to read these devices via the Internet and even radio waves outside of the home.

Petraeus further stated,

‘Transformational’ is an overused word, but I do believe it properly applies to these technologies.

Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters – all connected to the next-generation Internet using abundant, low-cost, and high-power computing.

He also added, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately heading to quantum computing.”

 (Source)

As the world moves toward connecting real devices to the virtual world of the Internet, the recent U.S. move to relinquish Internet control to a structure of global governance will have even vaster implications. Also consider the fact that major tech companies are working together rather than competing in the Internet of Things space by forming an “Industrial Internet Consortium.” Lastly, we have Facebook pursuing the purchase of a solar drone company to potentially offer planet-wide connectivity.

As if all of that should not be troubling enough, the Windows on Devices website states the following:

Connections are everything

Your Windows device can connect to the cloud to enable interesting new scenarios. Use Azure data services, build a new mashup, analyze your data, connect your devices together, or update your devices remotely. Once your device is in the cloud, the sky’s the limit. (emphasis added).

So beyond the normal government backdoors into your devices, Cloud interaction will be built in as well. In her article “Prepping the cloud for the internet of things” tech writer Barb Darrow leaves no doubt:

As billions more devices get connected to the internet (estimated to be 26 billion by 2020 – Ed.), there will be a huge infrastructure transformation on the backend. Cloud computing will play a major role in how the world takes advantage of that device-driven data explosion. (Source)

This push continues despite the fact that Apple co-founder Steve Wozniak went on record to caution that Cloud Computing is absolutely not secure and is in fact fully compromised.

When the above developments are combined with the stated goals of UN Agenda 21, we are seeing a convergence of disparate areas under a simple single banner of connectivity.

To be sure, having you stay permanently connected in the real and virtual world has very little to do with your coffee mug or pet robot bear.

[VIDEO]

Video transcript with additional research links posted below:

Microsoft Could Bring Windows to Coffee Mugs, Robots
by Adam Falk

A new site suggests Windows might be coming to your coffee mug.

Engadget reports the site, called Windows on Devices, showed up briefly Tuesday – just ahead of Microsoft’s Build 2014 conference.

But it’s since been taken down and now looks like this, which tells us, well, nothing.

Before leaving the web, the site reportedly said Microsoft is “bringing Windows to a whole new class of small devices.”

It even used a smart coffee mug as an example. This suggests Microsoft might embrace the so-called ‘Internet of Things.’

Meaning, it’s going to make our everyday, dumb devices – like kitchen appliances or coffee mugs – smarter by connecting them to the internet.

Reports indicate Microsoft is aiming Windows on Devices at makers. That is, if it’s even happening.

Reports are speculation at this point, and as CNET notes, “The Internet of Things is certainly designed to extend smart technology to ‘dumb’ devices, but a coffee mug or bear? That might be a stretch.”

How about a watch? The Verge says the question is whether Windows on Devices could power things like watches or eyewear, “both of which Microsoft is rumored to be working on.”

We should likely know more about this mysterious site and more as Microsoft Build kicks off Wednesday.

Additional source:
http://www.extremetech.com/extreme/179617-microsoft-finally-gets-into-the-internet-of-things-prepare-for-blue-screening-fridges-mugs

Recently by Kevin Samson:


Samsung Smart Watches and Smartwrist bands Have Heartbeat Sensor, Microphones and Cameras — video included

by Frankie Gotz
Canadian Awareness Network
Feb 25, 2014

Yesterday we released an article on Samsung’s Galaxy S5 smart phone which has it’s basic features such as camera and microphone but has new biometric features on it such as fingerprint and heartbeat sensor.  But it’s not like it monitors the heartbeat of the individual 24/7, it only monitors heartbeat when the individual puts their finger on the home button.

Samsung also released three other technologies with the similar biometric features on it but the only difference is, it monitors heartbeat 24/7 of the individual wearing it and stores it in the phone through a health app.

“The Gear 2 and Gear 2 Neo leaked out a few days ago. They’re similar to the original Gear, but the strap is now replaceable, and as a result they feel a lot less bulky. The Gear 2 Neo lacks a camera, but is otherwise very similar to the Gear 2….In terms of new functionality, you get a heart rate sensor on the back, which is in constant contact with your skin, and regularly feeds data back to built-in mobile health app….(Gear Fit) smartwatch is all about fitness and activity. The heart rate sensor on the back will keep track of your pulse while you exercise, and tell you whether you need to speed up or slow down to maintain the desired rate. The display is a 1.84-inch 432×138 Super AMOLED unit, which can display notifications from your smartphone (via Bluetooth 4.0) — but unlike the Gear 2 and Gear 2 Neo, there’s no microphone on the Fit.”
~ SOURCE

If any of these health apps were tested at appthwack then its very possible it could’ve came from the CIA because appthwack just recently went into partnership with In-Q-Tell (CIA front)  to test In-Q-Tell apps.  Also In-Q-Tell has indirectly funded Samsung in the past. In-Q-Tell mission is to adapt and deliver innovative technology solutions to support the missions of the CIA and broader US Intelligence Community

[related: Smartphone giants want your body]


VIDEO — Smart Tyranny: How to resist the smart grid

Boiling Frogs Video
Feb 25, 2014

Smart technology represents less of a breakthrough in power distribution and more of a revolution in complete, constant, panopticon-like surveillance of everyone. As these smart technologies begin to invade our homes, we are becoming mere nodes in a giant network that we yet but dimly comprehend. Called the “Internet of Things,” the plan is to create a network that will eventually include every single object on the planet. And as the public is finally becoming aware, such networks provide golden opportunities for corporations and governments alike to collect data and spy on the population.

PLEASE SUPPORT BFP: http://ur1.ca/gnpck
TRANSCRIPT AND SOURCES: http://www.corbettreport.com/?p=8781

[related: Major US Utility Firm Blasts Smart Meters As “Irrational” And “Security Risk”]


VIDEO — Secret ‘Minority Report’ Tech In All Post-2010 iPhones

Infowars
Jan 20, 2014

Apple installed secret ‘Minority Report’ tracking technology in all iPhones from 2010 and only just told you about it.

https://twitter.com/PrisonPlanet
http://infowars.com


Minority Report Is Here: Chicago Residents Get Police Visit Based on Pre-Crime Surveillance List

by Nicholas West 
Activist Post
Feb 19, 2014

Chicago’s “Heat List” – image source

As we look around at the Police State being built across the world, combined with enhanced mind control techniques, it is easy to draw direct parallels with books like 1984 and Brave New World. It’s almost as if these books formed a clear blueprint for anyone seeking control over large populations.

With the quickening pace of technological advancement it is no surprise to see “ideas” become reality quicker than ever before. Philip K. Dick explored the concept of pre-crime in his short story “The Minority Report” in 1956, but it wasn’t until Steven Spielberg offered it on the big screen as Minority Report in 2002 that the audience got a true look at a potential day-to-day existence under corporate and government data management and control.

We are now at the point where “Minority Report” is being used as a sound description of current technological applications, even in mainstream news, which means that the future is actually the present. Below you will find 10 signs that we have now entered the world depicted in fiction.

The latest news from Chicago only adds to this list, as police are moving beyond simply possessing the technology and are now putting it into effect.

Chicago’s “Heat List” is an index of approximately 400 people who have been identified by a computer algorithm as being future threats to commit violent crime. Without having actually committed a crime, some of those on the list are beginning to get visits from Chicago police warning them that they are already being watched:

When the Chicago Police Department sent one of its commanders to Robert McDaniel’s home last summer, the 22-year-old high school dropout was surprised. Though he lived in a neighborhood well-known for bloodshed on its streets, he hadn’t committed a crime or interacted with a police officer recently. And he didn’t have a violent criminal record, nor any gun violations. In August, he incredulously told the Chicago Tribune, “I haven’t done nothing that the next kid growing up hadn’t done.” Yet, there stood the female police commander at his front door with a stern message: if you commit any crimes, there will be major consequences. We’re watching you.

Chicago is apparently considering this to be part of “policing in the 21st century.” A report from The Verge explains how Chicago has taken the lead in predictive behavior police tech:

In 2009, the National Institute of Justice (NIJ) made millions of dollars in grants available for any police department with a burgeoning predictive program. Police all over the country applied to tap into those NIJ dollars. The big winner was Chicago; its combination of headline-making homicide rates and already established data- and tech-focused policing made it a perfect fit. The CPD received more than $2 million to test two phases of its experimental program.

Though it took awhile to get started in earnest (staff turnover and internal politics in 2011 and 2012 stalled the project), last year the CPD’s predictive program picked up steam. One man behind that progress was Miles Wernick.

Wernick is the Motorola professor and director of the Medical Imaging Research Center at Illinois Institute of Technology (IIT) in Chicago. He says he’s been doing predictive analysis work since the 1980s, when he worked with the US military to recognize potential targets in the battlefield. From there he proceeded to medical imaging. A lot of his current work focuses on analysing data and brain scans to make automated diagnoses of dementias in elderly patients — not exactly police work.

These paragraphs encapsulate two of the major warnings that the alternative media has been shouting for years: namely that military tech always trickles down into local law enforcement; and, secondly, that Big Data initiatives which are heralded by the establishment as solutions in the computing and medical fields have a range of privacy-killing additional applications that affect people far beyond the initially stated reach.

Also highlighted are the same concerns that are cropping up in the area of NSA spying – association is an assumption of tendency toward eventual guilt. Miles Wernick goes on to say:

“It’s not just shooting somebody, or being shot,” he says. “It has to do with the person’s relationships to other violent people.”

This is in line with what Andrew Papachristos, a Yale sociologist and Chicago native, calls a social networking theory. When it comes to violence, Papachristos recently told Chicago Magazine, “It’s not just about your friends and who you’re hanging out with, it’s actually the structure of these networks that matter.”

So while Wernick acknowledges that sometimes people such as Robert McDaniel — who haven’t been convicted of a violent crime — may find themselves in the wrong social networks, their presence on the list is not random.

A commander of the program stated it even more simply:

 If you end up on that list, there’s a reason you’re there.

This indicates a fundamental shift in the way policing will be done in the future of America. Until now, we have been reporting on this type of technology and have been forced to speculate about its coming implementation. Well, now there is no doubt. And lest anyone believe that this is just an outcropping of Chicago’s notoriously Police State-happy mentality, Police Commander Jonathan Lewin matter-of-factly states the following:

This [program] will become a national best practice. This will inform police departments around the country and around the world on how best to utilize predictive policing to solve problems. This is about saving lives. [emphasis added]

Whether it will actually save lives is debatable. Has the No-Fly List saved lives? Have any of the other of the many lists one can be added to these days actually saved any lives? These lists are secretive and have become nearly impossible to independently verify as to how someone got on the list, if they deserve to be there; and, if not, how to get off the list … or if the lists are effective.

The Verge article linked below highlights the potential racial profiling of such policies – and indeed this has happened in the case of New York’s own low-tech Stop-and-Frisk policy.

So the verdict is out on saving lives. But one thing is for certain: the arrival of the high-tech Police State is certainly not about saving freedom, nor is it about preserving a Constitution designed to protect us from a Minority Report society.

Source:
http://www.theverge.com/2014/2/19/5419854/the-minority-report-this-computer-predicts-crime-but-is-it-racist
____________________________________________________________________________
10 Signs We Live In a “Minority Report” World

Individual pieces of news often get lost or forgotten rather easily in today’s fast-paced news cycle, so let’s look at an aggregate of 10 mainstream news items that offer a comprehensive picture of where we are and where we are likely to be headed both from a government surveillance standpoint, as well as targeted advertising.

1. They’re watching … Japanese electronics company NEC develops ‘Minority Report’ style billboard, The Telegraph, 3/10/2010: “Engineers have developed the billboard, similar to one used in the Tom Cruise blockbuster, that uses built in cameras to instantly identify a shopper’s age and gender as they walk past. The facial-recognition system, called the Next Generation Digital Signage Solution, then offers consumers a product it thinks is suited to their demographic.”

2. Microsoft Kinect Learns to Read Hand Gestures, Minority Report-Style Interface Now Possible, IEEE Spectrum, 3/10/2013:

3. The Long Eye of the Law: So Who’s Ready for a ‘Minority Report’-Style Future? Motherboard, 3/20/2013: On Monday, Japanese tech developers Fujitsu announced they had created . . . a bit of technology that can measure a person’s pulse using a camera or a computer webcam, just by analyzing that person’s face . . .  It’s Minority Report-style technology, to be sure—another in a burgeoning list of tech-driven ways police could prevent crimes before they happen.”

*Also see New York’s Domain Awareness System helped along by Microsoft.

4. Minority Report moves step closer as Lord Sugar launches face recognition adverts, The Telegraph, 7/9/2013: “The media company has launched OptimEyes, which will be used in more than 6,000 of its screens to target over 50m people in the UK, Germany, Poland, Switzerland, UAE, Oman, Kenya, Angola and South Africa. However, the majority of the screens, some 3,561, are in the UK in doctors’ surgeries, hospitals, convenience stores, petrol forecourts, Halifax banks, airports and train stations . . . The product comes less than a week after Sky Deutschland revealed it has developed technology to transfer adverts from train windows directly and silently into commuters’ heads.

5. Brain scans of inmates could lead to ‘Minority Report’ style ability to predict if they will re-offend, The Daily Mail, 7/15/2013: “Groundbreaking new research could allow scientists to predict if prisoners will re-offend – potentially condemning those convicted of serious crimes to a lifetime behind bars . . . It could also be used to the benefit of society in using brain imaging in deciding parole.”

6. Gesture Through News Minority Report-Style With New York Times’ Leap Motion App, Fast Company, 7/18/2013: Rather than having to flick through headlines on a touch-screen device or scroll through articles using a mouse — how antiquated! — the company’s new app allows readers to navigate through stories by motioning their hands in mid-air, with Leap Motion sensors interpreting the signals . . . The New York Times has also suggested it will give the company an opportunity to implement new advertising capabilities ‘that [will] allow brands to connect with readers using motion-controlled ad units.'”

7. Minority Report finally becomes a reality: new hi-tech video wall will let law enforcement agencies sift through data with a wave of their hand, The Daily Mail, 7/23/2013: “The hi-tech computer system behind the film Minority Report – where Tom Cruise speeds through video on a large screen using only hand gestures – is making its way into the real world. American computer experts have revealed the software has become a reality – and they hope to sell it to law enforcement agencies around the world. The interface developed by scientist John Underkoffler has been commercialized by the Los Angeles firm Oblong Industries as a way to sift through massive amounts of video and other data.”

*Also see this report on Big Data and pre-crime software.

8. Control Google Earth with Minority Report-style gestures, via Leap Motion, TNooz, 8/5/2013:

9. Minority Report-style Advertising Coming to NYC, 247Sports, 8/8/2013: “Recycling bins data mine your smartphone when you are in proximity to tailor ads when you walk by the screen and stuff. Already in London, looking to expand to NYC and other World cities soon.”

10. Google Submits Patent For Minority Report Style Eye Tracking Device, Prison Planet, 8/15/2013: “The patent filing describes a “head mounted device”, for example hi-tech glasses, that would have the ability to track eye movement, effectively monitoring reactions to external stimuli, including changes in emotion.” From The Verge: “Google could be betting that advertisers will pay to know whether consumers are actually looking at their billboards, magazine spreads, and online ads.”

From the patent application, which was filed in May 2011:

Pay per gaze advertising need not be limited to on-line advertisements, but rather can be extended to conventional advertisement media including billboards, magazines, newspapers, and other forms of conventional print media. Thus, the gaze tracking system described herein offers a mechanism to track and bill offline advertisements in the manner similar to popular online advertisement schemes.

***********

The ways that we are tracked, traced, and databased are increasing every day. Some of it is arriving without our agreement and is being utilized by private corporations and governments without our explicit approval, as the recent revelations of data spying have exposed. If we have learned one thing it is that information is knowledge and knowledge is power. The power of data collection in the hands of those who wish to exert more control is not likely to halt.  And all indications show that it is not enough to have logged and charted where we have been; the surveillance state wants to know where we are going.

Our Orwellian world is beginning to look nostalgic compared to what is in production. Neuroscientists in 2010 stated that they know you better than you know yourself.  Meanwhile, it is being estimated that computers know to a 93% accuracy where you will be, before you make your first move. The recent major global funding of neuroscience and narrative control indicates that the final target is the human brain and every thought that resides there.

However, we ought to be aware that much of our data is willingly being given via social media and the gadgets we choose to buy. As technology continues to march forward at an exponential rate, we might do well to consider how much of this we are comfortable buying into.  And if we must, should we be seeking ways to subvert the information stream?

Recently From Nicholas West:


Follow

Get every new post delivered to your Inbox.

Join 838 other followers