HIGHLY POTENT NEWS THAT MIGHT CHANGE YOUR VIEWS

tyranny

VIDEO — The End of Oppression – Part 2: The Game

Josie Outlaw
Jul 31, 2014

“The End of Oppression” is a six-part series of videos which show what it will take for humanity to finally outgrow and escape its long history of violence and oppression.

[The End of Oppression – Part 1: The Problem]

Part Two (“The Game”) shows how tyrants use the game called “politics” to legitimize violent domination and to deceive decent people into advocating their own subjugation and enslavement.

———————————
(If you like this video, check out http://www.josietheoutlaw.com
follow Josie on Twitter at @JosietheOutlaw1
on Instagram at @josiewalesoutlaw
and share with anyone and everyone YOU feel needs to hear this message.)


Wide-Area Surveillance from the Sky Coming to a Neighborhood Near You — video included

by Frankie Gotz
Canadian Awareness Network
Apr 23, 2014

A retired U.S Air Force veteran by the name of Ross McNutt owns a company called Persistent Surveillance Systems (PSS) based out of Ohio USA.

On the PSS website it writes, “Persistent Surveillance Systems provides Wide-Area Surveillance Sensors and Services that enable continuous, second-by-second video monitoring of a city-sized area. Because of the very high-resolution nature of PSS’s sensors (up to 200 megapixels), vehicle and pedestrian activity can be tracked over a 16 square-mile area. If an event-of-interest happens within this area (a murder, for example), users can rewind the event to identify the perpetrator’s place-of-origin, meeting locations, accomplices, driving routes, and final destination. PSS’s HAWKEYE sensor has been used in countless major crime investigations, and has been used to backtrack criminals for officers to apprehend.”

Video Report from LeakSourceNews below:

The operation involves flying a small civilian aircraft high in the sky (10,000 feet) with cameras pointed at desired locations.  There are three types of cameras or sensors available for wide range surveillance from sky:

[…CONTINUE READING THIS ARTICLE]


600 million Apple devices contain secret backdoors, researcher claims — video included

Friends of Syria
Jul 26, 2014

000_gyi0060073312.si

A security researcher considered to be among the foremost experts in his field says that more than a half-billion mobile devices running Apple’s latest iOS operating system contain secret backdoors.

Jonathan Zdziarski, also known by his online alias “NerveGas,” told the audience attending his Friday morning presentation at the Hackers on Planet Earth conference in New York City that around 600 million Apple devices, including iPhones and tablets, contain hidden features that allow data to be surreptitiously slurped from those devices.

During Zdziarski’s HOPE presentation, “Identifying Backdoors, Attack Points and Surveillance Mechanisms in iOS Devices,” the researcher revealed that several undocumented forensic services are installed on every new iPhone and iPad, making it easier that ever for a third-party to pull data from those devices in order to compromise a target and take hold of their personal information, including pictures, text messages, voice recordings and more.

Among the hidden functions running on iOS devices, Zdziarski said, are programs called “pcapd,” “file_relay” and “file_relay.” If used properly, he added, those programs can allow anyone with the right means and methodology to pull staggering amounts of data from a targeted phone, even when the rightful owner suspects the device is sufficiently locked.

Zdziarski has previously exploited older versions of the iOS operating system and authored several books on mobile security. Even after raising multiple questions with Apple, however, he said he has yet to figure out why, exactly, the tech giant ships iOS devices with programs that appear to do nothing other than leak digital data.

According to the slides Zdziarski presented during Friday’s talk, there’s little reason to believe the functions are used to run diagnostics or help developers.

Most services are not referenced by any known Apple software,” one slide says in part, and “the raw format of the data makes it impossible to put data back onto the phone, making useless for Genius Bar or carrier tech purposes.”

“The personal nature of the data makes it very unlikely as a debugging mechanism,” he added.

Reuters / David Gray

Reuters / David Gray

According to the researcher, evidence of the mysterious programs raises more questions than it does answers.

“Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?” he asked in one slide. “Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone? Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?”

“Apple really needs to step up and explain what these services are doing,” Zdziarski told Ars Technia on Monday after his HOPE presentation was hailed over the weekend by the conference’s attendees as a highlight of the three-day event. “I can’t come up with a better word than ‘backdoor’ to describe file relay, but I’m willing to listen to whatever other explanation Apple has. At the end of the day, though, there’s a lot of insecure stuff running on the phone giving up a lot of data that should never be given up. Apple really needs to fix that.”

Indeed, Apple responded on late Tuesday by saying that the tree functions in question are “diagnostic capabilities to help enterprise IT departments, developers and AppleCare troubleshoot issues.”

“Apple has, in a traditional sense, admitted to having back doors on the device specifically for their own use,” Zdziarski responded quickly on his blog. “Perhaps people misunderstand the term ‘back door’ due to the stigma Hollywood has given them, but I have never accused these ‘hidden access methods’ as being intended for anything malicious, and I’ve made repeated statements that I haven’t accused Apple of working with NSA. That doesn’t mean, however that the government can’t take advantage of back doors to access the same information. What does concern me is that Apple appears to be completely misleading about some of these (especially file relay), and not addressing the issues I raised on others.”

“I give Apple credit for acknowledging these services, and at least trying to give an answer to people who want to know why these services are there – prior to this, there was no documentation about file relay whatsoever, or its 44 data services to copy off personal data. They appear to be misleading about its capabilities, however, in downplaying them, and this concerns me,” he added.

On Apple’s part, the company said they have “never worked with any government agency from any country to create a backdoor in any of our products of services.”

Source


PODCAST/RADIO — What On Earth Is Happening – #155 [Scientism, Religion, Brain Imbalance, and MORE]

What On Earth Is Happening

Date: 2014-05-10
Topics: Interference Theory Of Human Origins, Darwinian “Evolution” Theory vs. Creationism as a Controlled Dialectical Paradigm, Scientism, Religion, Brain Imbalance, Natural Evolutionary Progression (NEP), Cycles of Consciousness, Entropy vs. Syntropy, Epigenetics, Free Will.
Related Images: 1 | 2 | 3 | 4 | 5

VIDEO — 7/30/2014 — HAARP Rings and Scalar Squares featured on Television

Dutchsinse
Jul 30, 2014

My original discovery, “HAARP rings” and “Scalar Squares” was mentioned, and discussed on a TV show discussing H.A.A.R.P. and weather modification.

Many thanks to Unsealed Conspiracy Files for covering the topic of HAARP, weather modification, RADAR pulses (HAARP rings and Scalar Squares).

Here is much more on the topic of weather modification using frequency:

http://dutchsinse.tatoott1009.com/wan…

Here’s to hopefully seeing another season of this cool show !


Kiev Fires Ballistic Missiles into Eastern Ukraine — video included

Land Destroyer

Pentagon intentionally withholds  information on Kiev’s indiscriminate use of ballistic missiles in populated areas.

July 30, 2014 (Tony Cartalucci – LD) – CNN has reported that the regime in Kiev launched several short-range ballistic missiles into eastern Ukraine – each missile containing warheads of up to 1,000 lbs (450 kg). The missiles fired were OTR-21 Tochka also known by their NATO reporting name as SS-21 Scarabs and are considered far from “precision” weapons.

While smaller than the infamous “Scud” missile, SS-21s are similarly inaccurate and their use in combat against an enemy entrenched in populated areas is almost guaranteed to cause indiscriminate mass casualties. In fact, when Libyan leader Muammar Qaddafi allegedly fired Scuds at NATO-backed Al Qaeda terrorists, according to the Telegraph in its article, “Col Gaddafi fires scud missile at rebel territory as Nato braces itself for final violent showdown,” one Western official claimed:

That it didn’t hit anything or kill anyone is not the point. It’s a weapon of mass destruction that Col Gaddafi is willing to train on his own people.

Clearly the West’s conscience has shifted and now weapons of mass destruction Ukraine is willing to train on its own people appears more than acceptable.

The US Department of Defense admittedly holds information regarding Kiev’s use of the ballistic missiles but is refusing to disclose it, only confirming that indeed the weapons have been used. In the CNN report, Major General James A. “Spider” Marks claimed that the reasoning behind the Pentagon’s decision was because “Ukraine has a right to defend itself,” before admitting that SS-21s are used offensively ahead of an invasion or other armed incursion.

What it appears the West is doing by admitting to what is otherwise a crime against humanity by their own definition, is acclimatizing what is left of their impressionable audiences to an increasingly brutal campaign of indiscriminate violence against the whole of eastern Ukraine in an effort to not only break armed resistance, but the civilian population that has rejected Kiev’s authority. The use of such weaponry, just as the Telegraph and others noted before the fall of Libya, hints at tactical weakness and impending strategic defeat – and while the West covers for Kiev’s numerous and multiplying atrocities, the fact that Kiev must resort to increasingly brutal and indiscriminate measures indicates a failure no amount of Western support can undo.

[related: Kiev Deploys WMDs Against Eastern Ukraine]


VIDEO — MH17 engines wrong size for Boeing 777 it is ?

tatoott1009 TATS 2 MIN NEWS REVOLUTION TO ABOILSH CORPORATE GOVERNMENT
Jul 20, 2014