Paris, France – A national state of emergency has been declared across France after at least six coordinated assaults were staged in Paris, which killed at least 120 people and injured an estimated 200 others.
Startling information has just surfaced that indicates French National Police met with German BKA federal police and German BND federal intelligence service to discuss an imminent pre-planned terrorist attack on Paris weeks ago.
According to a report by SOFREP:
Industrial targets were already being probed by suspected terrorists in France, and a bomb which failed to detonate was found in one facility. The explosives employed were those stolen in a little-publicized theft from a French military armory months prior. The French and German federal police and intelligence services strongly believed at that time that terrorists were casing soft targets inside Paris and that it was, “A matter of when, not if.” The only point of contention within the French security services was whether or not the target would be soft (civilian) or hard (military, government, industrial) in nature.
The Mumbai-style attack hit soft targets across Paris in a coordinated assault using explosives and semi-automatic rifles.
The Dutch National Police have taken an interest in Blockchain-based cloud services. A presentation given over the summer reveals a new focus on Storj and Filecoin.
Members of the Dutch National Police and UNIJURIS gave a presentation in July titled “Technical and Legal Challenges of Criminal Law Enforcement in the Digital Age .” This is an update of a presentation given in 2013 titled “The merits & challenges of distributed least authority data storage.”
The presentations explain how cloud storage and file hosting “Data is cut up in a hundred pieces. Pieces are spread over a hundred servers, in dozens of countries, over a multitude of hosters.”
Both presentations explain how Mega (Mega Limited) replaced the controversial Megaupload cloud storage service. Megaupload was seized and shut down by the United States Department of Justice in January 2012 over copyright infringement claims.
Extradition hearings are currently underway for Megaupload founder Kim DotCom in New Zealand. When the original Megaupload site was seized, federal prosecutors stated, “This action is among the largest criminal copyright cases ever brought by the United States and directly targets the misuse of a public content storage and distribution site to commit and facilitate intellectual property crime.” However, Kim DotCom, founder of Megaupload and Mega, recently distanced himself from Mega, stating over the summer that he would not trust Mega with user data and that he intends to create a third version of the site.
via Conspiracy School
by David Livingstone
Transhumanism may seem like a crackpot fringe movement, but it is the new ideology of the Illuminati.
Transhumanism is expressed as a bizarre aspiration to achieve immortality, according to lunatic ambitions like cryogenics, placing miniature robots in our bloodstream, “augmenting” ourselves as cyborgs, and even uploading our minds to the Internet.
Sound like the prognostications of a mad scientist? However, these new trends are being spearheaded by the likes of Google, and are therefore in the hands of those who have at their disposal the means to exercise extraordinary control over our lives. One of Google’s own heads of engineering, Ray Kurzweil, is the adored modern-day prophet of transhumanism.
The truth is, that a formidable conspiracy has taken place right under our noses for the last 50 years. While all the attention of conspiracy researchers has been focused on JFK, UFOs and 9/11, a plot to create the ultimate surveillance tool has proceeded almost unsuspected. It has been the plan to bring about the All-Seeing Eye of the reverse side of the American dollar bill: the personal computer.
The history of transhumanism is the history of Satanism in our time. It begins with the Cybernetics Group, a CIA front, headed by Norbert Wiener. In God and Golem, Inc., Wiener compares the creation of artificial intelligence with the Kabbalistic legend of the golem, a supposed living being created through magical means.
From the Cybernetics Group also emerged MK-Ultra, the CIA’s “mind-control” program, which was an extension of the Nazis’ experiments on schizophrenics, imported with Operation Paperclip. MK-Ultra promoted the “mind-expanding” quality of psychedelic drugs, based on occult legends that the shamans of ancient times used similar substances, equated with the “apple” of the Tree of Knowledge, to contact the spirit world.
Through MK-Ultra patients among the Beat Poets, like Allen Ginsberg, and agents William S. Burroughs, the CIA produced the Hippie culture of 60s. With “sex, drugs and rock ‘n roll”, they fulfilled the plans of the Frankfurt School to overthrow traditional morality by way of the infamous bands of the Laurel Canyon scene, in league with members of Crowley’s OTO, the Manson Family and the Church of Satan.
Knowing that the creation of the computer would be correctly suspected as a tool of Big Brother, the CIA aligned the Hippie ideals with the emerging computer culture to produce a movement called Cyberpunk, from which transhumanism evolved.
Sep 12, 2015
Siri and A.I.helpers are super convenient for users providing direct access to their personal data and storing the information they search for. However, all these devices are sparking concerns over people’s privacy.
21st Century Wire says…
Aug 20, 2015
[Potent News editor’s update: John McAfee: Ashley Madison database stolen by lone female who worked for Avid Life Media]
Finally, the real reason why professional hackers have lifted the data of 37 million users from the fashionable ‘infidelity’ website Ashley Madison.
Anyone employed by the state who was stupid enough to join this site should by now realize that this whole hacking affair was a staged exercise in mass entrapment, and blackmail. The media are making a big deal about how this hack is somehow a “goldmine” for cyber criminals, but do not dare mention that, besides a public hack, what this kind of information could do in the hands of the deep state via covert agencies like the NSA, the FBI or the CIA, Canada’s CSIS, or overseas spook houses like Britain’s MI5, or Israel’s Mossad. Easy pickings, all in one place.
Much has been made of the not-so-bright conclave of 15,000 US gov’t and military personnel with .gov and .mil addresses – all of whom who were using the website to facilitate their extramarital flings, but the pool of suckers is not limited to American shores. AP reports:
“Although many may have signed up out of curiosity and some have little more to fear than embarrassment, the consequences for others could reverberate beyond their marriages. The French leak monitoring firm CybelAngel said it counted 1,200 email addresses in the data dump with the .sa suffix, suggesting users were connected to Saudi Arabia, where adultery is punishable by death.”
According to the Telegraph, UK gov’t and Defense Dept. staff were particularly badly hit in the data dump:
“According to the website Political Scrapbook, there are 92 Ministry of Defence email addresses among the leaked details. The website has found 1,716 email addresses from universities and further education colleges, using the .ac.uk suffix; 124 using .gov.uk; 92 using .mod.uk; 65 local education authorities and schools using .sch.uk; 56 National Heath Service emails and less than 50 police emails (.police.uk)”
“Michelle Thomson, one of the SNP’s newly-elected Westminster MPs, has said one of her email addresses is among the leaked data dumped online by hackers. The married MP said someone had stolen her email address and used it without her knowledge.”
Of course, the really big winner in this scandal, as with most things – are the lawyers. Elizabeth Hicks, partner at British divorce law firm Irwin Mitchell, must be chuffed about the potential for future business:
“With 1.2m Britons apparently affected by the data leak, 95 per cent of whom are reportedly male, there will no doubt be a few nervous husbands sat round the dinner table tonight.”
It’s also a potential disaster for the website’s closet gay users. Business Insider adds here:
“Avid Life is based in Toronto, but, as its site boasts, it has “over 40 million members worldwide.” Many of these members live in countries where adultery or homosexuality are illegal, and often with very serious punishments. One Reddit user says that he lives in Saudi Arabia, but used Ashley Madison while studying in the US to “keep my [gay] hookups extremely discreet,” and that he “only used AM to hook up with single guys.” He says he has since been forced to flee the country.”
This just goes to show what a true ‘honey pot’ these types of “vice” websites really are…
Maybe the solution to all crime is more surveillance and direct control over the minds of all prisoners, anyone marked with violent tendencies and ultimately everyone in society.
That’s what one futurist is proposing, as he runs on a political platform based around psycho-physical state control over mind and body.
Zoltan Istvan, presidential candidate for the Transhumanist Party, thinks that prisoners would be better motivated to obey the law if the death penalty were abolished, and it be replaced by implanting a surveillance brain chip that notify the law and can even deploy a “tranquiliser triggered to block violent behavior.”
Of course, once it becomes legal to control the brains of one sector of society (convicted criminals), the rest of society may follow, each with their own rationales and justifications that make using spy chips inside the brain somehow acceptable.
It is a scenario ripped straight from the plot of A Clockwork Orange, where the ethics and finer points of behaviorism are put into practice as prison-reform-via-mind-control, in turn packaged neatly for political debates and electioneering. According to the International Business Times:
Brain implants able to manage out-of-control tempers and violent actions of prisons were suggested to minimise crime rates in the United States and as alternative for death penalty, according to Zoltan Istvan. The futurist and presidential candidate for the Transhumanist Party, Istvan suggested that the technology could be a near-term alternative for criminals on death row and might be considered sufficient punishment.
“Violent crime is a version of mental disease,” Istvan stated in an article published in Motherboard, suggesting conducting brain alterations to prisoners could change behaviour and attitudes of criminals into decent members of society. The brain implants would work as a surveillance device that could monitor or possibly control each action of the prisoner with a tranquiliser triggered if violent behaviour is reported or attempted by the inmate.
But, of course, the story isn’t limited to just murderers and the worst violent offenders with career prison sentences.
You knew that.
The full solution proposed here would come only at the hand of further deep-seated government control over the entire population.
Of course. Why not?
No one can ever be safe without giving up total control, right?
via Press For Truth
Jun 29, 2015
Canadians can now be detained if they advocate or promote “terrorism offences in general.” In this video Dan Dicks of Press For Truth shows how this bill will be used to attempt to silence the new alternative media.
Jun 3, 2015
Exclusive: Federal agency is developing technology to track commercial and civilian drones via cell coverage, with first tests of air traffic control system set for this summer.
Verizon, the US’s largest wireless telecom company, is developing technology with Nasa to direct and monitor America’s growing fleet of civilian and commercial drones from its network of phone towers.
According to documents obtained by the Guardian, Verizon signed an agreement last year with Nasa “to jointly explore whether cell towers … could support communications and surveillance of unmanned aerial systems (UAS) at low altitudes”.
That $500,000 project is now underway at Nasa’s Ames Research Center in the heart of Silicon Valley. Nasa is planning the first tests of an air traffic control system for drones there this summer, with Verizon scheduled to introduce a concept for using cell coverage for data, navigation, surveillance and tracking of drones by 2017. The phone company hopes to finalise its technology by 2019.
Nasa’s new UAS (unmanned aircraft system) traffic management operation is intended to enable safe low-altitude drone flights within the next four years. At the moment, there is little to stop operators flying wherever they want. The agency would like technology that will automatically “geo-fence” drones to keep them away from sensitive areas like the White House, ground drones in bad weather, help them to avoid buildings and each other while flying and decide which drones have priority in congested airspaces.
According to the documents, obtained under the Freedom of Information Act, the purpose of the agreement is to “jointly explore if cell towers and communications could possibly support Unmannned Aerial Systems (UAS) Traffic Management (UTM) for communications and surveillance of UAS at low altitudes”. The focus is “exploratory” since “the requiremements and technology paths [for commercial drones] have not been clearly defined by the FAA”.
In February, the Federal Aviation Authority released its proposals for regulating commercial drones. The FAA proposal would allow drones weighing up to 55lb to fly within sight of their remote pilots during daylight hours at heights below 500ft and at speeds of less than 100mph.
Mar 11, 2015
“One of the reason that the authorities tend to be anxious about the future is that things are, in a sense, getting out of control,” says Jay Cornell, co-author of the new book The Disinformation Encyclopedia of Transhumanism and the Singularity.
Reason TV interviewed Cornell and co-author R.U. Sirius, who both worked as editors of the transhumanist/futurist magazine h+. They discussed the future of of biohacking, body modification, and the effects that decentralizing technologies such as 3-D printing will have on the future of scientific innovation in America.
Approximately 7 minutes. Interview by Zach Weissmueller. Camera by Justin Monticello. Music by Lee Rosevere and Psilopat.
[Potent News editor’s note: One of the youtube commentors, SweetLiberty01, mentioned, “There is always risk with every new technological advancement that someone will use it for harm. However, for the most part, individual entrepreneurs use technology for innovations that better mankind (which is how they profit from their creations), whereas governments craft new technologies into weapons. While some might fear the solitary mad scientist, I lose a lot more sleep wondering what the next “innovation” governments or military organizations around the globe are going to come up with.”]
by Jay Dyer
via 21st Century Wire
May 29, 2015
For most consumers of alternative news and media, the lineup of the players constitutes the tyrants and their systemic control, and the enlightened underground, with both sides fighting the great battle of winning the hearts and minds of the rest of the public.
For the alternative news and information community, the possibility of large-scale psychological operations within alternative media itself are generally outside the spectrum of the possible.
Indeed, crowds today are sill cheering on Assange and his Vaudeville Whistleblower Roadshow with Bradley-Chelsea Manning, and more recently, finding themselves intellectually snowed-in by our last hero, Snowden.
Enter Jade Helm…
Jade Helm 15
In 2015, the focal point has become the Jade Helm 15 training operation across at least 7 states, with SOCOM running the training exercise for realistic military training. The brief document lists role-playing involving Texas and Utah as “hostile” areas, with insurgents in Southern California and other states like Colorado, California and Nevada as “friendly.”
On the surface, the exercise gives credence to the ultimate fears and paranoia of tea party and militia groups – clearly the U.S. government is prepping for everything from “martial law,” to “economic collapse,” and everything else under the sun that can be gleaned from a Google search and baseless YouTube speculation.
Fending off the mainstream media’s dishonest portrayal of the patriot and alternative media’s fears, Alex Newman of The New American concludes:
“Of course, critics of Jade Helm and the Obama administration should stick to facts that can be proven, rather than speculation. Most have done that, including many of those being dishonestly smeared by the deceitful media. However, the establishment press has an even more serious responsibility and duty to do the same — stick to the facts, do not deceive readers, question those in power, and adhere to basic journalistic ethics. Instead of sticking to the facts and being honest, though, establishment propagandists masquerading as journalists have once again shown the world why they cannot be trusted. As such, it is no surprise that so few Americans trust the “mainstream” press and are flocking to the alternative media by the millions.”
‘Common Sense Show’ host Dave Hodges has argued the end goal of Jade Helm is the imminent roundup, gulag confinement and gun confiscation of all Americans who have been marked as rebellious, with bank account confiscations, martial law and false flags just around the corner. Infowars reporters Joe Biggs and David Knight have argued similarly that the threats are rather constant, slow build ups to condition the American public into the acceptance of moving towards a third world, ‘banana republic’ scenario. However, what all these portrayals have not delved into is the possibility that Jade Helm 15’s sensational “leak” (a Powerpoint slide show) to the “alternative news and patriot community” itself may be nothing more than a psychological warfare operation.
In order to understand this possibility, it is necessary to understand the purpose and goal of PsyOps.
21st Century Wire says…
[Mar 18, 2015]
It’s official: The US federal government is addicted to spying on its own citizens – a tyrannical vice which is in direct contravention with the US Constution and Bill Of Rights.
Establishment think tank, the Pew Research Center, has found in its latest report the US public does cares about privacy – but has no idea how to protect their data, and which tools they can use.
“Large numbers of Americans say they are anxious about their privacy, and yet, there’s this fairly significant gap in knowledge.”
Some big tech firms appear to be working to change this trend by educating users and marketing new privacy tools. How well they work, and whether we can trust these firms not to collude illegally with US government agencies – is a another matter all together.
The bigger question however – and the one that 21WIRE is interested in – is whether or not those of us who opt for using encrypted products will be profiled by the US government snoops as ‘suspicious’ and will that choice be used against us to assign guilt before the fact? According to Pew’s findings on this, it seems like that is the case.
The second issue is a clandestine one. Are certain companies who are offering ‘encrypted email and communication’ products actually giving the other half of their encryption key over to the NSA – as was the case before? If so, is this level of cooperation illegal, or will it be “protected” as part of a “National Security” program, or even classified?
Welcome to the new digital Stasi…
Nearly two years after former government contractor Edward Snowden revealed details of extensive government surveillance programs, a Pew Research report suggests that the news has prompted some Americans to change their approach to online privacy.
The group surveyed about 500 adult Americans, finding that nearly 90 percent of them had heard about government surveillance programs and more than a third of those aware of the programs “have taken at least one step to hide or shield their information from the government,” the report said.
Though the report found that a majority of Americans are skeptical of government surveillance programs, it also found very few are taking the extra step of encrypting the content of their e-mails. In fact, half of those surveyed said using encryption software gives the government enough suspicion to monitor a U.S. citizen’s communications.