Google Account as Official Virtual ID!? Yikes! [video]
The Truther Girls
October 11, 2012
The UK government is working on a new system that would allow you to use your social media and other accounts as official virtual ID for accessing government services. Am I the only one who find this scary?!
http://www.independent.co.uk/news/uk/politics/national-virtual-id-card-scheme…
India’s Universal Biometric ID program:
http://www.bbc.co.uk/news/world-asia-india-18141584
http://www.bbc.co.uk/news/world-asia-india-18156858
UN E-Government Readiness Program- survey 2012
http://unpan1.un.org/intradoc/groups/public/documents/un/unpan048065.pdf
The Smart Phone Control Grid And Online Privacy [video]
Press For Truth
September 25, 2012
Technology is a double edged sword that can be used by the government to set up a big brother control grid but this same technology can also be used by concerned citizens who seek to expose corruption in government at all levels.
This poses a problem for TPTB so they are now taking all the necessary steps to ensure that their very own system of surveillance is not used against them.

Everyone Who Attended OWS with a Cell Phone had Their Identity Logged
United States Patent by Apple Inc
Amazing mind reader reveals his ‘gift’
Get updates like this everyday and support independent media by joining Press For Truth TV
We rely on you the viewer to help us continue to do this work. With your help I can continue to make videos and documentary films for youtube in an effort to raise awareness all over the world. Please support independent media by joining Press For Truth TV!
As a Press For Truth TV subscriber you’ll have full access to the site’s features and content including Daily Video Blogs on current news from the PFT perspective and High Quality Downloads of all Press For Truth Films, Music and Special Reports! Subscribe to Press For Truth TV
Truther Channels Are Being Hijacked! [video]
The Truther Girls
September 26, 2012
My husband’s channel got hacked, but that’s not all. The person who did this has apparently hacked a whole long list of prominent truther channels!
Arron opened a new channel, BarbarianRebellionTV but someone (falsely) flagged it for ‘impersonation’ and it has not only been shut down, but he has been banned completely from using youtube! Google has not been very helpful so far and it is going to take us a while to get this sorted out, but I’m sure Arron will get things up and running again.
Be very careful with your account security and who you add on skype or anything else!
Social Media, Smartphones And Police Ctreate A Stasi Web Of Surveillance
by Susanne Posel, Contributing Writer
White Owl Conspiracy
September 21, 2012
Twitter has released a report confirming that the US government leads the world in requesting information on their citizens. The Transparency Report shows the US government has made requests that are infringing on American privacy rights. Twitter states that “we’ve received more government requests in the first half of 2012, as outlined in this initial dataset, than in the entirety of 2011.”
As the US government sifts through the tweets US citizens are making and analyzing information from illegal means, there are decisions about particular citizens being made to justify the construction of an all-encompassing Big Brother network.
Cloud computing is also under surveillance as every conversation is recording and filed. While Microsoft denies this is true, the adherence to their rules and regulations explains that all your personal information is stored within Skype. In section 2 of their user contract explains: “Our primary purpose in collecting information is to provide you with a safe, smooth, efficient, and customized experience. Skype collects and uses, or has third party service providers acting on Skype’s behalf collecting and using, personal data relating to you, as permitted or necessary to . . .”
The Department of Homeland Security’s Delaware Information and Analysis Center (DIAC) “now offers a mobile app to report suspicious activities in real-time by attaching a photo, sending location information, or entering details about suspicious vehicles or persons. In addition, users can choose to make their report anonymously or can include contact information for follow-up by law enforcement.”
The Anti-Terrorism Mobile FORCE 1-2 App is designed for iPhone and Android users that create spies out of average citizens for the sake of the State. The information collected by users is funneled to a National Security Agency (NSA) Fusion Center to be disseminated with federal agencies and local law enforcement.
Using terrorism and 9/11 phone calls as a fear-mongering campaign to coerce the general public into participating in this new Stasi, the Delaware government hopes to keep its citizens “ever vigilant in the fight against terrorism and this new app is just one way for our citizens to help.”
Simultaneously, Symantec’s Norton Cybercrime Report states that cybercrimes involving smartphones are costing consumers $110 billion annually as these thieves peruse mobile devices and social networks looking for loopholes. Smartphones are sent fake bills which add to the telecommunications services and rack-up charges as well as implant viruses into devices through apps.
Infected phones infect other phones through sending of information, text messages and emails. Nameless, faceless hackers change segments of code and inject the malware into the smartphone. However, most mobile phone and telecommunications corporations still maintain that mobile applications are safe and there should be no precautions taken when downloading these apps.
The CIA-sponsored AntiSec hacker group was successful in stealing millions of ID numbers from Apple, Inc. from databases where the corporation had been storing user personal data. They then leaked this information out for the general public to see. However this action serves another purpose.
The FBI was also infiltrated by the same state-controlled hacker group wherein a laptop was “compromised and private data regarding Apple UDIDs was exposed. At this time, there is no evidence indicating that an FBI laptop was compromised or that the FBI either sought or obtained this data.” The bureau’s press office later posted on its Twitter account that it “never had” the information in question and that the reports its laptop was hacked were “totally false.”
While data mining, cell phone corporations are using mobile phone habits to decipher the predictive movements of users. Scientists from the University of Brimingham in the UK have revealed that they can predict the movements of mobile phone users through tracking the network usage in real time with algorithms that forecast probabilities. This means that cell phone corporations, if using this system could predict the future whereabouts of their customers at any time of the day or night.
As our cell phone become weapons of mass surveillance, police departments across the nation are installing more CCTV cameras to better spy on citizens. In Maryland, local police have been using speed cameras at intersections to watch citizens under the guise of mitigating damages caused by car accidents.
Researchers for the Defense Department have created working prototypes of bi-static radar that can utilize WiFi to spy on citizens through walls. In tests, a one foot think brick wall was used and the monitoring radar could send back visual data to be interpreted.
WiFi signals can be extended and are available virtually everywhere which makes the capability of transmitting information easier with radio signals and laptops.
With the siphoning of information from a wireless router, surveillance software can be used as well to see through walls. A person’s whereabouts can be correctly pinpointed by using WiFi signals that bounce off objects which can decipher speed, location and direction of an individual.
Justification for this technology is surmised as: “See Through The Wall (STTW) technologies are of great interest to law enforcement and military agencies; this particular device has the UK Military of Defense exploring whether it might be used in ‘urban warfare,’ for scanning buildings. Other more benign applications might range from monitoring children to monitoring the elderly.”
These surveillance grids are being implemented to compliment the State and Local Anti-Terrorism Traning (SLATT) program that defines for police departments what an extremist is and how to “recognize and report indicators of terrorism/criminal extremism.”
The SLATT’s definition of terrorism is vague and broad. It encompasses “the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” While terrorism is meant to intimidate and coerce a population into submission, the local law enforcement is employed to play an integral part in bringing intelligence to the federal agencies and “international intelligence communities” involved with hindering terrorism.
The SLATT explains that those who use cash, stay in tight-knit groups, repeatedly use the word “God”, carry video or observation equipment and have hand-drawn maps are terrorists. The document goes on to explain that any type of surveillance that is not state-sponsored is terroristic in nature and should be reported.
Are You a Slave to Social Networking?
by Cherie Roe Dirksen
Conscious Life News
September 16, 2012

This is not going to be an article bashing social networking or shouting from the rooftops that it’s from the devil. No, I find it an extremely helpful, if not detrimental, modern-day tool. I utilize it socially — to stay in touch with friends and family — and I use it for my business.
Social networking is a great device for spreading information and touching base. However, it can also be abused.
All too often I see people with their noses stuck to their iPods, even when they are publicly with someone else. Does anyone else find this extremely rude? What is it that keeps the populace stuck to other people’s dramas or, in some case, tedious actions? Are we craving attention? Is it the need to feel connected? Is it that ugly ego rearing its head and wanting to be seen or to compare?
Let’s Get Real
I think we will all have different reasons for using social networking but if you are finding it hard to keep those nimble thumbs off your key-pad, then let’s dive into a bit of introspection — answer these questions honestly:
- Control – do you have command over how much time you spend on social networks such as facebook or twitter, or does it have an irrepressible hold on you?
- Breaks — can you go without it for a long period of time and not be bothered? Have you ever tested yourself on this?
- Loss — do you feel disconnected if you don’t ‘plug in’? Are you just itching to be updated again? Are you feeling like you are missing out on something?
- Time – how many moments do you waste scouring news feeds only to find that 2 hours have passed and you have not really found anything of true value?
- Question — how are you using it? Is it benefitting you in some way? Or is it serving as a distraction? Or both?
- Limits — can you set yourself boundaries and time limits?
- Trimming —Hone down who and what you give your energy to. Are you wasting a lot of time on engaging in a drama that really doesn’t involve you? Are you helping or fueling the situation? Or are you just filling empty space?
- Clarity — are you using facebook for friends and people you actually know? Or do you befriend any Tom, Dick and Harry that requests your precious time? Get clear about which social networks are for what. In other words, use facebook or twitter to stay in touch with interesting people, friends and family and sites like LinkedIn and facebook business pages for your associates, promotions and dealings. Be clear about the reason you are using these sites and don’t just give your time away willy-nilly.
- Allocations — assign specific times to go on for personal and business use and be liable for those periods — keep to that schedule.
Rudeness Concealed as ‘The Norm’
At all costs avoid whipping out your iPad in real conversation with bona fide friends and colleagues – nobody appreciates this and you may end up losing a tangible friend or business deal for one moment of digital gratification.
The friends who are willing to meet up with you in the flesh are the ones that will be there for you when you need them. Give them your undivided attention and respect.
If someone has taken time out to be with you, they should take precedence over any electronic device that is beeping for your attention — learn to turn it off if it’s a distraction.
Take the Test
If you find that social networking is controlling you and you can’t let go, try this out:
- Alert your connections that you will be taking one weeks (or however long you feel you need) ‘vacation’ from the net.
- Hold yourself accountable for it, no matter what juicy adventures you want to share – be present with that urge to splurge and be at peace with telling no-one.
- Observe how remaining silent makes you feel – do you feel a certain tranquility or are you chomping at the bit? Really question yourself — do you truly need to share that photo of your dinner last night? Do your friends need to know how long you were at the gym this morning? Possibly not.
- If you are experiencing more calm and ease without social networking, then this exercise has worked. You will be more aware of how to limit your time dedicated to it in the future. Work out a viable timetable and stick to it.
- If you are edgy and feel anxious, then this exercise has also worked and you need to go into why you are feeling this way. Social networking has a hold over you and there is something there that needs addressing. Dig deep and follow the thread of answers to this question: Why do I feel the need to be distracted? You will be taken to the core of your inability to ‘let go’ of being in the loop about every little detail, or keeping people in the loop about every endeavor you undertake.
You Are the Center of Your Own World
When you take a break from your social networking sites, I can bet that you most likely will not be missed — however, this will not be from the lack of love your friends and associates have for you.
The reason is, in all actuality, you are not going to be the center of their worlds and they will most likely have many other diversions to keep them busy. Don’t take offense at this — it is helpfully indicative that everyone has a ‘life’. You are at the center of your revolving world and they are conducting their version of reality too — learn to honor this and be grateful when your worlds collide for the greater good.
This can give you a clearer perspective of how you identify what is important and hone down what you feel you need to distribute that will benefit others. It will aid you to ascertain what needs to be shared and what can remain private.
Call to Action
I want you to work out approximately how much time a week you spend on social networking and then compare it to your new timetable. Let us know how much time you have saved!
Use social networking responsibly and you will have the best of both worlds.
Is Social Media Leading Us to a Hyper Revolution? [videos included]
Activist Post
September 12, 2012
Social media has become the new mainstream media. As the video at the end of this article illustrates, the number of people involved is simply staggering. In much of the alternative media, we refer to the sharing of information as the infowar. And even Hillary Clinton has used that phrase … to announce that she and her globalist counterparts are not doing well in that war.
However, as David Icke has stated: “We must become street smart” if we are going to seal our victory and protect ourselves from government propaganda designed to lead us down a dead-end street.
The very same corporate entities and their globalist minions who have directed old-guard media have their sights set on the Internet. Not a day goes by now when we don’t hear of some new piece of legislation that threatens to return us to a Dark Age, where only a select few receive pure information, and the rest of the public are resigned to the dictates of those in the know.
So, we must remain skeptical thus far when we hear of social media starting revolutions (how is Egypt doing now after their moment in Liberation Square?). But the numbers and the power illustrated in this video are spot on, just as they were in the on-site.org infographic illustrating the exponential power of the Internet.
As stated by the video creators:
You are a change agent whether you know it or not. Whether you want to be or not.
But, we cannot permit The Year of the Protester — proclaimed by Time Magazine — to once again become The Year of the Dupe. We need to be awareof the changes desired by people far more devious than ourselves, so that we can be proper agents of the change we wish to see in the world.
From the video creators:
When Gil-Scott Heron wrote that “The revolution will not be televised” he was right. Instead, it will be youtubed, it will be statused, and it will be retweeted. Social networking sites reach more than 82% of the global population: 1.2 billion people. And governments are afraid.
Today, a handful of users on Facebook, Twitter, and Youtube can launch a movement that can topple a regime. Just look at Tunisia. Just look at Egypt. It can organize the frustration of middle class Americans from the impotent complaints of individuals into a spontaneous, passionate and primal force. A wave doesn’t demand concessions, but you have no choice but to acknowledge it when it crashes down on you. We are the 99 percent.
And what are the results? New governments, an informed and politically active people, and validation.
A little over a year ago, The United Nations declared Internet access a basic human right. You are a change agent whether you know it or not. Whether you want to be or not. Everyday you blithely browse your virtual network you participate in an engine of social transformation. Welcome to the Hyper Revolution.
RELATED ACTIVIST POST ARTICLE:
10 Ways to Stop Being a Slave and Bring Down the Pyramids of Control
The Printable Firearm Revolution is Closer Than You Think [video included]
by Adan Salazar
Infowars.com
September 21, 2012
The right to bear arms is undeniably explicit in the constitution, but what about the right to produce your own arms?

Cody Wilson
That question will inevitably come about following the somewhat recent innovation of 3D printing, and a group’s announcement it wants to distribute plans allowing you to create firearms in your own home.
3D printing is exactly what it sounds like. You can literally “print” physical 3D objects by scanning whatever you want replicated. A 3D printer can work like a copier, but it can also interpret 3D CAD data files to create just about anything.
Earlier this week, an online fund-raising campaign created by University of Texas law student Cody Wilson and a group of friends reached its goal of collecting $20,000 to fund an operation known as the Wiki Weapon Project.
Wilson described the project in a video posted to You Tube in July, stating, “So consider this, a CAD file containing the information for a 3D printable weapon system. If that file was seeded by 30 people, let’s say, as long as there’s a free Internet, that file is available to anyone at any time, all over the world. A gun can be anywhere. Any bullet is now a weapon.”
Under the name Defense Distributed, the group set up an Indiegogo account to accept contributions, however their account was shut down for violating the terms of service. Forbes detailed the manner in which Indiegogo terminated the account:
About a month after the Wiki Weapon project’s launch, Indiegogo sent Defense Distributed an email saying its funds had been frozen due to “unusual account activity,” and followed up with an explanation that it had violated Indiegogo’s terms of service, which don’t allow the sale of “ammunition, firearms, or certain firearm parts or accessories.”
Although Wilson says they weren’t selling any of those items, they didn’t allow the setback to derail their efforts. They opened another donation account on their personal website and have since raised the money needed to rent a 3D printer and further advance their vision. According to Forbes, they’ll also hold a gun design contest to review different firearm designs.
Even though some of their donations came from gun enthusiasts and constitution-upholding patriots, Wilson says the group isn’t just doing it to arm the masses: “It’s more the liberation of information. It’s about living in a world where you just download the file for the thing you want to make in this life.”
Printers, like the RepRap, will have the capability of producing their own replacement parts, thus creating self-sustaining units and opening the door for mass production of endless 3D printers.
The group is sure to face other hurdles in their pursuit of information distribution.
Undeniably, an armed population would lead to safer homes and businesses, effectively reducing police roles to little more than parking and traffic ticket distributors. The project’s success would also murder profits for firearms manufacturers, and might be seen as unfair competition.
Wilson, however, maintains an optimistic view of the precedent their ideas could set: “As the printing press kind of revolutionized literacy, 3D printing is in its moment.”
Below is the video Defense Distributed released in July:
Similar/Related Articles:
- A Closer Look at Truth Rising: Scenes from a Peaceful Revolution
- L.A. Times Proposes Reporting Firearm Sales to Government
- Own an Unregistered Firearm? You Must Be a Terrorist
- Britain’s Firearm Ban Coming to America?
- Residents Fumed Over Weekend Alcohol, Firearm Ban
- Man Arrested, Faces 5 Years In Jail For Reporting Firearm To Police
- Media Freaks Out After Man Filmed Carrying Legal Firearm Outside Obamacare Event
- U.S. Moves Closer to Arming Syrian Rebels
- Cashless Control Grid Inches Closer to Reality
- Democrat Proposes Law Requiring Firearm Owners Have $1,000,000 Insurance Policies
- Missile Defense: Washington and Poland just moved the World closer to War
- Globalists Take a Step Closer To $200 Dollar Oil
