HIGHLY POTENT NEWS THAT MIGHT CHANGE YOUR VIEWS

surveillance

Spiral Of Silence Also Exists On Social Media: Pew Poll

redOrbit
Aug 27, 2014

Image Credit: Thinkstock.com

April Flowers for redOrbit.com – Your Universe Online

In our social circles – especially among family, friends and co-workers – we have a tendency to hold in our views on public policy issues. This is especially true when we think our own opinion isn’t widely shared in those groups, according to pre-internet human behavior studies. Scientists call this phenomenon the “spiral of silence.”

The hope for social media sites such as Facebook and Twitter was that they would provide such a wide variety of discussion forums that people holding minority views would feel free to express their opinions. Such freedom would broaden public discourse and add new perspectives to the discussions.

The Pew Internet Research Project studied the effect of social media on the spiral of science by conducting a survey of 1,801 adults in 2013. The survey was restricted to one public policy issue: Edward Snowden’s 2013 revelations of widespread government surveillance of Americans’ phone and email records. Other Pew Research polls showed the division Americans were feeling over this issue, making it a timely question for the survey. These studies found that Americans were conflicted over both whether the information leaks were justified and whether the NSA policy itself was appropriate or not. One survey, for example, found that 44 percent say that the classified information leak harms the public interest, while 49 percent said it serves the public interest.

The current survey asked questions about people’s opinions about the Snowden leaks, how willing they were to discuss the revelations in various in-person and online situations, and their perceptions of their peers’ views both online and in-person.

The results showed the following key findings:

• More people were willing to discuss the Snowden-NSA story in person than on social media — 86 percent were willing to discuss it in person, while only 42 percent of Facebook or Twitter users were willing to post about the issue.

• For those not willing to discuss the issue in person, social media did not provide an alternative platform. Only 0.3 percent of the 14 percent who were unwilling to discuss the issue face to face would post about it on social media.

• In both forums, people are more willing to share their views if they believe their audience agrees. People who believe their co-workers share their opinion were three times more likely to join a workplace conversation.

• Previous findings on the spiral of silence apply to social media platforms. Facebook users were twice as likely to join a conversation about the Snowden-NSA issue if they believed their followers agreed with them.

• Social media users were less likely to share their views in face to face settings, especially if they thought their social media followers disagreed with them. The average Facebook user is half as likely to share their opinion as other people.

[...CONTINUE READING THIS ARTICLE]


Matrix: who is Edward Snowden? Does His Story Add Up?

Canadian Awareness Network
Aug 13, 2014

Matrix: Who is Edward Snowden?

By Jon Rappoport

July 8, 2013

www.nomorefakenews.com

This article is a compilation of a number of pieces I’ve written about Ed Snowden and the NSA. It doesn’t replace them, but it hits the high points…

Let’s begin here: If you absolutely must have a hero, watch Superman movies.

If your need for a hero is so great, so cloying, so heavy, so juicy that it swamps your curiosity, don’t read this.

If you can’t separate Snowden’s minor revelations from the question of who he is, if you can’t entertain the notion that covert ops and intelligence-agency games are reeking with cover stories, false trails, and limited hangouts, you need more fun in your life.

NSA? CIA? These guys live for high-level bullshit. They get down on their knees and worship it. They fall into a suicidal funk if they aren’t lying on at least three or four levels at once.

Okay. Let’s look at Snowden’s brief history as reported by The Guardian. Are there any holes?

Is the Pope Catholic?

In 2003, at age 19, without a high school diploma, Snowden enlists in the Army. He begins a training program to join the Special Forces. At what point after enlistment can a new soldier start this elite training program?

Snowden breaks both legs in an exercise. He’s discharged from the Army. Is that automatic? How about healing and then resuming service?

If he was accepted in the Special Forces training program because he had special computer skills, then why discharge him simply because he broke both legs?

“Sorry, Ed, but with two broken legs we just don’t think you can hack into terrorist data anymore. You were good, but not now. Try Walmart. They always have openings.”

Circa 2003, Snowden gets a job as a security guard for an NSA facility at the University of Maryland. He specifically wanted to work for NSA? It was just a generic job opening he found out about?

Snowden shifts jobs. Boom. He’s now in the CIA, in IT. He has no high school diploma. He’s a young computer genius.

In 2007, Snowden is sent to Geneva. He’s only 23 years old. The CIA gives him diplomatic cover there. He’s put in charge of maintaining computer-network security. Major job. Obviously, he has access to a wide range of classified documents. Sound a little odd? He’s just a kid. Maybe he has his GED. Otherwise, he still doesn’t have a high school diploma.

Snowden says that during this period, in Geneva, one of the incidents that really sours him on the CIA is the “turning of a Swiss banker.” One night, CIA guys get a banker drunk, encourage him to drive home, the banker gets busted, the CIA guys help him out, then with that bond formed, they eventually get the banker to reveal deep secrets to the Agency.

This sours Snowden? He’s that naïve? He doesn’t know by now that the CIA does this sort of thing all the time? He’s shocked? He “didn’t sign up for this?” Come on.

In 2009, Snowden leaves the CIA. Why? Presumably because he’s disillusioned. It should noted here that Snowden claimed he could do very heavy damage to the entire US intelligence community in 2008, but decided to wait because he thought Obama, just coming into the presidency, might keep his “transparency” promise.

After two years with the CIA in Geneva, Snowden really had the capability to take down the whole US inter-agency intelligence network, or a major chunk of it?

If you buy that without further inquiry, I have condos for sale on the dark side of the moon.

In 2009, Snowden leaves the CIA and goes to work in the private sector. Dell, Booze Allen Hamilton. In this latter job, Snowden is assigned to work at the NSA.

He’s an outsider, but, again, he claims to have so much access to so much sensitive NSA data that he can take down the whole US intelligence network in a single day. The. Whole. US. Intelligence. Network.

This is Ed Snowden’s sketchy legend. It’s all red flags, alarm bells, sirens, flashing lights.

Then we have the crowning piece: they solved the riddle: Ed Snowden was able to steal thousands of highly protected NSA documents because…he had a thumb drive.

It’s the weapon that breached the inner sanctum of the most sophisticated information agency in the world.

It’s the weapon to which the NSA, with all its resources, remains utterly vulnerable. Can’t defeat it.

Not only did Snowden stroll into NSA with a thumb drive, he knew how to navigate all the security layers put in place to stop people from stealing classified documents.

“Let’s see. We have a new guy coming to work for us here at NSA today? Oh, whiz kid. Ed Snowden. Outside contractor. Booz Allen. He’s not really a full-time employee of the NSA. Twenty-nine years old. No high school diploma. Has a GED. He worked for the CIA and quit. Hmm. Why did he quit? Oh, never mind, who cares? No problem.

“Tell you what. Let’s give this kid access to our most sensitive data. Sure. Why not? Everything. That stuff we keep behind 986 walls? Where you have to pledge the life of your first-born against the possibility you’ll go rogue? Let Snowden see it all. Sure. What the hell. I’m feeling charitable. He seems like a nice kid.”

NSA is the most awesome spying agency ever devised in this world. If you cross the street in Podunk, Anywhere, USA, to buy an ice cream soda, on a Tuesday afternoon in July, they know.

They know whether you sit at the counter and drink that soda or take it and move to the only table in the store. They know whether you lick the foam from the top of the glass with your tongue or pick the foam with your straw and then lick it.

They know if you keep the receipt for the soda or leave it on the counter.

They know whether you’re wearing shoes or sneakers. They know the brand of your underwear. They know your shaving cream, and precisely which container it came out of.

But this agency, with all its vast power and its dollars…

Can’t track one of its own, a man who came to work every day, a man who made up a story about needing treatment in Hong Kong for epilepsy and then skipped the country.

Just can’t find him.

[...CONTINUE READING THIS ARTICLE]


FBI uses facial recognition to arrest 14-year fugitive overseas

End the Lie – Independent News
[Aug 13, 2014]

Reuters/Michael CaronnaReuters/Michael Caronna

After spending 14 years on the run from American law enforcement authorities, a man suspected of child sex abuse was detained in by the FBI using the State Department’s new facial recognition technology.

The case marks a notable milestone for the FBI, which has also recently been beefing up its ability to identify individuals through face-scanning software.

Announced on Tuesday by the FBI, the case in question actually began back in 1999, when New Mexico resident Neil Stammer was arrested on multiple charges, including child sex abuse and kidnapping. After posting bail, Stammer fled the United States and never appeared for this arraignment. When federal fugitive charges were filed a month afterwards, the FBI became involved.

Catching Stammer proved to be particularly tricky, the FBI said, especially since the fugitive spoke about a dozen languages and could have potentially been anywhere in the world. In January 2014, the FBI’s fugitive coordinator Russ Wilson created a new “wanted” poster for Stammer after the case caught his eye, inadvertently causing the hunt to heat up once again.

Around the same time as this poster was drafted, the US State Department began trying out its own newly designed facial recognition software, which was intended to catch passport fraud. Luckily for the FBI, a security service agent within the State Department decided to test the software out on the Bureau’s wanted posters – a course of action that ultimately matched Stammer’s face with someone named Kevin Hodges.

“When he came upon Stammer’s poster online, a curious thing happened. Stammer’s face matched a person whose passport photo carried a different name,” the FBI said in its statement.

Former New Mexico resident Neil Stammer was captured in Nepal earlier this year after 14 years on the run. (Image from www.fbi.gov)Former New Mexico resident Neil Stammer was captured in Nepal earlier this year after 14 years on the run. (Image from http://www.fbi.gov)

Further investigation revealed that Hodges – teaching English classes in Nepal and routinely visiting the local US Embassy to prolong his stay – was actually Stammer. Soon enough, he was arrested and extradited to the US.

“He was very comfortable in Nepal,” Wilson said. “My impression was that he never thought he would be discovered.”

The arrest comes as the FBI continues to expand its facial recognition database. As RT reported in April, the agency projects that it will have 52 million images stored in its Next Generation Identification (NGI) program by 2015. The NGI database currently features more than 100 million records, including those that link an individual’s fingerprints, palm prints, iris scans, and personal information like addresses and legal status. The next step for the FBI is to flesh out its trove of facial images.

In some more local cases, meanwhile, facial recognition technology is already being used by law enforcement. According to Fox News, officials in Iowa said the software enabled them to track down and arrest an armed robber in June – about 41 years after he escaped from a North Carolina jail.

Source: RT


VIDEO — Kristov Atlas interview, pt. 2 – “Anonymous Bitcoin, Cryptography, and Online Safety” – #204 – Gnostic Media

Gnostic Media
Jul 2, 2014

GM_204

[click here for part 1]

This episode is part 2 about Bitcoin, cryptography and online security and safety and is called Anonymous Bitcoin, Cryptography and Online Safety: It’s being released on Wednesday, July 2, 2014, and was recorded yesterday on Tuesday, July 1, 2014.

Kristov Atlas is a network security and privacy researcher who studies crypto-currencies. He is the author of Anonymous Bitcoin: How to Keep Your Ƀ All to Yourself, a practical guide to maximizing financial privacy with Bitcoin. Kristov is also a correspondent for the World Crypto Network, appearing regularly on the the weekly roundtable show “The Bitcoin Group”, and host of “Dark News”, a show about un-censorship technologies.


References to this episode
:

Anonymous Bitcoin
book:
http://anonymousbitcoinbook.com

Dark News Show:
https://twitter.com/darknewsshow

Tor Project:
https://www.torproject.org

I2P Network:
https://geti2p.net/en/

Tails Linux
https://tails.boum.org

Send Bitcoin donations for this episode to:
12EQTDMzU5mxtEd8ZfyrHrxABZi3jtaCCo

Please make other forms of donations here:
http://www.gnosticmedia.com/donate/

Donations. This episode is brought to you by:

Joseph
Tresor
Barry
David
Joseph
Salman

This episode is video only.

 


Wide-Area Surveillance from the Sky Coming to a Neighborhood Near You — video included

by Frankie Gotz
Canadian Awareness Network
Apr 23, 2014

A retired U.S Air Force veteran by the name of Ross McNutt owns a company called Persistent Surveillance Systems (PSS) based out of Ohio USA.

On the PSS website it writes, “Persistent Surveillance Systems provides Wide-Area Surveillance Sensors and Services that enable continuous, second-by-second video monitoring of a city-sized area. Because of the very high-resolution nature of PSS’s sensors (up to 200 megapixels), vehicle and pedestrian activity can be tracked over a 16 square-mile area. If an event-of-interest happens within this area (a murder, for example), users can rewind the event to identify the perpetrator’s place-of-origin, meeting locations, accomplices, driving routes, and final destination. PSS’s HAWKEYE sensor has been used in countless major crime investigations, and has been used to backtrack criminals for officers to apprehend.”

Video Report from LeakSourceNews below:

The operation involves flying a small civilian aircraft high in the sky (10,000 feet) with cameras pointed at desired locations.  There are three types of cameras or sensors available for wide range surveillance from sky:

[...CONTINUE READING THIS ARTICLE]


600 million Apple devices contain secret backdoors, researcher claims — video included

Friends of Syria
Jul 26, 2014

000_gyi0060073312.si

A security researcher considered to be among the foremost experts in his field says that more than a half-billion mobile devices running Apple’s latest iOS operating system contain secret backdoors.

Jonathan Zdziarski, also known by his online alias “NerveGas,” told the audience attending his Friday morning presentation at the Hackers on Planet Earth conference in New York City that around 600 million Apple devices, including iPhones and tablets, contain hidden features that allow data to be surreptitiously slurped from those devices.

During Zdziarski’s HOPE presentation, “Identifying Backdoors, Attack Points and Surveillance Mechanisms in iOS Devices,” the researcher revealed that several undocumented forensic services are installed on every new iPhone and iPad, making it easier that ever for a third-party to pull data from those devices in order to compromise a target and take hold of their personal information, including pictures, text messages, voice recordings and more.

Among the hidden functions running on iOS devices, Zdziarski said, are programs called “pcapd,” “file_relay” and “file_relay.” If used properly, he added, those programs can allow anyone with the right means and methodology to pull staggering amounts of data from a targeted phone, even when the rightful owner suspects the device is sufficiently locked.

Zdziarski has previously exploited older versions of the iOS operating system and authored several books on mobile security. Even after raising multiple questions with Apple, however, he said he has yet to figure out why, exactly, the tech giant ships iOS devices with programs that appear to do nothing other than leak digital data.

According to the slides Zdziarski presented during Friday’s talk, there’s little reason to believe the functions are used to run diagnostics or help developers.

Most services are not referenced by any known Apple software,” one slide says in part, and “the raw format of the data makes it impossible to put data back onto the phone, making useless for Genius Bar or carrier tech purposes.”

“The personal nature of the data makes it very unlikely as a debugging mechanism,” he added.

Reuters / David Gray

Reuters / David Gray

According to the researcher, evidence of the mysterious programs raises more questions than it does answers.

“Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?” he asked in one slide. “Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone? Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?”

“Apple really needs to step up and explain what these services are doing,” Zdziarski told Ars Technia on Monday after his HOPE presentation was hailed over the weekend by the conference’s attendees as a highlight of the three-day event. “I can’t come up with a better word than ‘backdoor’ to describe file relay, but I’m willing to listen to whatever other explanation Apple has. At the end of the day, though, there’s a lot of insecure stuff running on the phone giving up a lot of data that should never be given up. Apple really needs to fix that.”

Indeed, Apple responded on late Tuesday by saying that the tree functions in question are “diagnostic capabilities to help enterprise IT departments, developers and AppleCare troubleshoot issues.”

“Apple has, in a traditional sense, admitted to having back doors on the device specifically for their own use,” Zdziarski responded quickly on his blog. “Perhaps people misunderstand the term ‘back door’ due to the stigma Hollywood has given them, but I have never accused these ‘hidden access methods’ as being intended for anything malicious, and I’ve made repeated statements that I haven’t accused Apple of working with NSA. That doesn’t mean, however that the government can’t take advantage of back doors to access the same information. What does concern me is that Apple appears to be completely misleading about some of these (especially file relay), and not addressing the issues I raised on others.”

“I give Apple credit for acknowledging these services, and at least trying to give an answer to people who want to know why these services are there – prior to this, there was no documentation about file relay whatsoever, or its 44 data services to copy off personal data. They appear to be misleading about its capabilities, however, in downplaying them, and this concerns me,” he added.

On Apple’s part, the company said they have “never worked with any government agency from any country to create a backdoor in any of our products of services.”

Source


PODCAST/VIDEO — Interview 798 – What is Greenwald Covering Up? – BFPRoundtable #02

The Corbett Report
Dec 20, 2013

In this blockbuster no-holds-barred conversation, Sibel Edmonds, Guillermo Jimenez and James Corbett discuss Edmonds’ recent series of articles on Glenn Greenwald and his connection to billionaire Pierre Omidyar. We talk about the NSA/PayPal connection and Greenwald’s refusal to discuss this issue, and Edmonds reveals specific examples of publicly documented cases that Greenwald has been covering up for years.


VIDEO — More Disney Indoctrination: ‘Everything You Do, We’ll Be Spying on You!’

Truthstream Media
Jan 29, 2014

So Disney Jr., the Disney brand aimed at preschoolers, apparently has a cartoon named Special Agent Oso (http://disneyjunior.com/special-agent…) that features a nanny state ladybug drone named Shutterbug which comes complete with a little camera that transmits video up to a satellite that then sends that data in to headquarters for analysis…”She’s always in flight, on the case both day and night.” (The “case,” in this case, is an infraction involving a parent leaving her daughter in a parked car in their driveway without a seat belt on…)

Even die hard Disney fans that hate on us for reporting on them will have a hard time ignoring the obvious big brother propaganda and indoctrination going on in this creepy, creeeepy cartoon.

There’s even a theme song…but we warn you; it’s the stuff Orwell’s nightmares were made of — http://www.youtube.com/watch?v=9hLowm…

Original article up at 21st Century Wire: http://21stcenturywire.com/2014/01/29…

Website: TruthstreamMedia.com
Twitter: @TruthstreamNews
FB: Facebook.com/TruthstreamMedia

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*

­~*~*~*~*~*~*~*~*~*~*~
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.


MUST WATCH DOCUMENTARY — “Trance-Formation” — Trans-Humanism / Genetic Modification of all Life / Nano-Technology / HAARP / Geoengineering

PEREXUSREX
Nov 24, 2012

[HD-version]

OUTSTANDING VIDEO . . .
Genetic Modification of all Life!!! New Documentary Film
Enslavement of the human race
This is part of the Endgame but not all . . .MUST WATCH
The State of our World

‘Trans Formation’ By Max Igan

Geoengineering

Trans-Humanism / Genetic Modification of all Life / Nano-Technology / HAARP / Geoengineering -Film

Chemtrails

The latest film by Max Igan, one of the greatest humans to ever walk this planet. This man deserves his rightful place in the history books, right next to the greatest minds of all time. http://thecrowhouse.com/home.html

Max Igan’s YouTube Channel:
http://www.youtube.com/user/aodscarec…

TO SUPPORT:
http://thecrowhouse.com/home.html [Max Igan's Website]

Category:
Education

Electromagnitism and Chemtrails

Transhumanism is – http://www.wordwebonline.com/search.p…

Tags:
Trans Humanism genetic modification of all life nano technology. HAARP nanotechnology nano transformation trans formation humanism is. Nanoparticles nanotech what is nanotechnology. Future technology transformation


PODCAST/VIDEO– Interview 856 – The Beard World Order roundtable on “Meta-Conspiracy”

The Corbett Report
Apr 9, 2014

via TracesOfReality.com:

Welcome to The Beard World Order: On today’s episode Tom, James, and Guillermo take on “meta-conspiracy” and the “conspiracy to inject conspiracy.”

Do the infiltration and subversion tactics of the NSA and private intelligence contractors present a unique challenge for activists and the alternative media in the 21st century? Are “sockpuppets” and other disinfo exploits any different than the decades old COINTELPRO? What is cognitive infiltration, and how has it already succeeded in invading our minds? Have privacy norms (#aftersex) been irreversibly altered? Is there any hope left for humanity? And why would the Department of Defense be involved in the making of Ernest Goes to Camp?

Your answers to these questions, beards, beards, yeah, and more.

Enjoy.

Contact Guillermo, James, and Tom with questions, comments, and suggestions for future topics to be discussed on the show.

For a High Quality audio download of this episode, click here (right-click, and save-as).

Show Notes:

Beard World Order: Episode 01 – Uncorking Conspiracy

Wired: Why You Should Embrace Surveillance, Not Fight It

Invasion of the Data Snatchers: Big Data and the Internet of Things Means the Surveillance of Everything

Americans say they’re shopping less online. Blame the NSA.

Many say NSA news changed their behavior

How Did Snowden Change Search Behavior? New Research Shows, More Than You Might Think

Beyond Snowden: Don’t Coddle the National Security State; Smash It

Border Patrol Throw Political Bone to Civil Libertarians; Will We Fetch?

TOR Radio: Drug Culture, Bodycams, and Romanticizing the Republic

The Corbett Report: Solutions: Sousveillance (video)

ClandesTime episode 025 – Fun with FOIA

Complete list of DOD-assisted movies

The House’s NSA bill could allow more spying than ever. You call this reform?

The #aftersex selfie is a betrayal of intimacy

Bearded bands and facial hair appreciation clubs: the hairy-faced trend is back

U.S. government sues Philadelphia schools over beard policy

Beard transplants (video)


Australian Security Agencies Target “SyrianGirl” Mimi Al-Laham

by Brandon Turbeville
Activist Post
Jun 12, 2014

Mimi Al-Laham (SyrianGirl)

In the Orwellian world of post 9/11 hysteria and the Global War On Terror, speaking truth is a revolutionary act. Indeed, such is evidenced by the fact that speaking out against terrorism is now enough to cause you to be labeled as a supporter of terrorism. At least, that is, in certain instances.

This is particularly the case with Mimi Al-Laham, (aka SyrianGirl), a young Syrian woman who has been active on YouTube, social media, and her own website in speaking out about the Western-backed destabilization of Syria.

Laham has consistently denounced the death squads operating inside Syria as terrorists and agents of the West as well as identified the so-called rebellion as being nothing more than a Western – organized, funded, and directed campaign against the Syrian government , all documented fact. For more information on this topic, please see my book, The Road To Damascus, The Anglo-American Assault On Syria.

However, her statements against terrorism, beheadings, rapes, slavery, and wholesale slaughter have caused her to be labelled as a potential “extremist” and purveyor of “extremist rhetoric.” For that reason, Australian security agencies have been closely monitoring Laham’s online statements and, presumably, much more than that.

Australian Institute of Criminology’s Shandon Harris-Hogan said that such statements and online behavior should be watched for “signs of an escalation in rhetoric or calls for violence” and that “When it crosses that line, particularly into encouraging, facilitating or preparing for violence, that’s when it’s going to particularly hit the radar of security services.”

[...CONTINUE READING THIS ARTICLE]


Follow

Get every new post delivered to your Inbox.

Join 866 other followers