HIGHLY POTENT NEWS THAT MIGHT CHANGE YOUR VIEWS

police state

Order Out Of Chaos In Spain – Debt By Design [video]

Press For Truth
September 28, 2012

This week huge protests took place in Spain as the government has announced their proposed austerity cuts as a means of dealing with the current economic crisis. The international financiers are seeking a one world government and it can only be achieved through their motto of “order out of chaos”

Spain prepares more austerity, protesters battle police

Spain Protests Erupt as Bank Warns of ‘Deep Recession’

Police Beat Young Teenage Girls At Madrid Spain #25s Protest

Watch The Euro Crisis – Debt By Design

Get updates like this everyday and support independent media by joining Press For Truth TV

We rely on you the viewer to help us continue to do this work. With your help I can continue to make videos and documentary films for youtube in an effort to raise awareness all over the world. Please support independent media by joining Press For Truth TV!

As a Press For Truth TV subscriber you’ll have full access to the site’s features and content including Daily Video Blogs on current news from the PFT perspective and High Quality Downloads of all Press For Truth Films, Music and Special Reports! Subscribe to Press For Truth TV


Freemason Semi-Truck Hauling FEMA Coffins? in Wisconsin Sept. 2012 [video]

LittleSisMedia
September 24, 2012


DRONE: Rise of the Autonomous Super Soldier [videos included]

by Nicholas West
Activist Post
September 3, 2012

image source: Android World

A dystopian science fiction plot has indeed entered our reality whereby machines have not only supplanted humans on the battlefield and in the workforce, but they can now work together and make decisions on their own.

Autonomous machine warfare is here. And similar to all military experimentation, the technology has a coincidental way of trickling down to be experienced by everyday citizens and consumers, such as augmented reality applications.The foundation for drone bombings abroad is the very same that is ready to escalate across the Western world. Fleets of weaponized surveillance drones with the ability to communicate amongst themselves and wage war independently is part of a project called MUSIC. It integrates unmanned and manned aircraft in combat, and has been displayed as a showcase of aircraft interoperability.

These aircraft also possess the ability to exchange and use the information as needed, whether it is to conduct surveillance or reconnaissance of a given area. This interoperability creates a Universal Ground Control Station, or network of drones and their payloads. (Source)

This is what is open to the public now. Imagine 10 years from now. A new webseries called DR0NE postulates some of what we can expect.

This four-part series, which will continue over the coming three weeks each Thursday on YouTube HERE, begins as humanoid robot soldiers redefine the landscape of the battlefield in 2023 . . . and one of them is on the run.

As noted by Singularity Hub:

The director behind DR0NE is Robert Glickert, who worked as a production assistant on both Iron Man and Transformers, as well as writing and directing the 2009 horror short Road to Moloch and a distributed thriller called The Descendent, which was actually Glickert’s film school thesis project at Chapman University in 2006.

The quality and cost of production is evident. Part 1 seems to indicate a shrouded humanity within what appears to be a reluctant robot that has been compromised by an incident involving a civilian murder. Whether this is predictive programming employed to elicit empathy for the coming drone army, or truly a cautionary tale is up for debate.

However, humanoid robots such as DARPA’s PETMAN have already been designed to balance, walk, crawl, and even climb stairs, while also having the ability to simulate human physiology such as sweating, so we can only conclude that all of what we are not being shown is likely to come online by this film’s 10-year timeframe.

Other autonomous robots are in development as well, but naturally they are being promoted as “peacekeepers” to help in rescue missions, or as evacuation assistants needed for natural or man-made disasters. This is a familiar refrain, as the friendly face of technology is often paraded first, before the darker applications are implemented. (Source)

Regardless of how film portrays the rise of autonomous super soldiers, one no longer needs much of an imagination to see what is on the horizon for humanity in the very short term if mad scientists and technocrats have their way.Read other articles by Nicholas West HERE

You can support this information by voting on Reddit HERE


Whistleblower: Saakashvili knew of torture in Georgia prison [video]

Russia Today
September 22, 2012

The penal system in Georgia is rife with the sadistic abuse of inmates covered under a glossy façade, claims Vladimir Bedukadze, an ex-deputy chief warden, who released footage of beatings and rape allegedly taken in a Tbilisi prison – READ FULL SCRIPT http://on.rt.com/tzbyig

RT LIVE http://rt.com/on-air

Subscribe to RT! http://www.youtube.com/subscription_center?add_user=RussiaToday

Like us on Facebook http://www.facebook.com/RTnews
Follow us on Twitter http://twitter.com/RT_com
Follow us on Google+ http://plus.google.com/+RT

RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 500 million YouTube views benchmark.


Black Swamp Festival walkaround — Find out how many people have heard of the NDAA [video]

P.A.N.D.A People Against The NDAA
September 21, 2012

Join the movement: peopleagainstndaa.com/join-us


PANDA Featured Online in WND, Examiner, Western Journalism

P.A.N.D.A. People Against The NDAA
September 21, 2012

We are becoming more and more the authority on all things NDAA across the web. PANDA was recently quoted in World Net Daily, the Examiner Magazine and Western Journalism. Take a look!

http://www.wnd.com/2012/09/obama-detention-ok-for-1st-amendment-activities/

http://www.examiner.com/article/obama-declares-war-on-the-validity-of-the-american-constitution

http://www.westernjournalism.com/appeals-court-indefinitely-detains-ndaa-ruling/


Social Media, Smartphones And Police Ctreate A Stasi Web Of Surveillance

by Susanne Posel, Contributing Writer
White Owl Conspiracy
September 21, 2012

Twitter has released a report confirming that the US government leads the world in requesting information on their citizens. The Transparency Report shows the US government has made requests that are infringing on American privacy rights. Twitter states that “we’ve received more government requests in the first half of 2012, as outlined in this initial dataset, than in the entirety of 2011.”

As the US government sifts through the tweets US citizens are making and analyzing information from illegal means, there are decisions about particular citizens being made to justify the construction of an all-encompassing Big Brother network.

Cloud computing is also under surveillance as every conversation is recording and filed. While Microsoft denies this is true, the adherence to their rules and regulations explains that all your personal information is stored within Skype. In section 2 of their user contract explains: “Our primary purpose in collecting information is to provide you with a safe, smooth, efficient, and customized experience. Skype collects and uses, or has third party service providers acting on Skype’s behalf collecting and using, personal data relating to you, as permitted or necessary to . . .”

The Department of Homeland Security’s Delaware Information and Analysis Center (DIAC) “now offers a mobile app to report suspicious activities in real-time by attaching a photo, sending location information, or entering details about suspicious vehicles or persons. In addition, users can choose to make their report anonymously or can include contact information for follow-up by law enforcement.”

The Anti-Terrorism Mobile FORCE 1-2 App is designed for iPhone and Android users that create spies out of average citizens for the sake of the State. The information collected by users is funneled to a National Security Agency (NSA) Fusion Center to be disseminated with federal agencies and local law enforcement.

Using terrorism and 9/11 phone calls as a fear-mongering campaign to coerce the general public into participating in this new Stasi, the Delaware government hopes to keep its citizens “ever vigilant in the fight against terrorism and this new app is just one way for our citizens to help.”

Simultaneously, Symantec’s Norton Cybercrime Report states that cybercrimes involving smartphones are costing consumers $110 billion annually as these thieves peruse mobile devices and social networks looking for loopholes. Smartphones are sent fake bills which add to the telecommunications services and rack-up charges as well as implant viruses into devices through apps.

Infected phones infect other phones through sending of information, text messages and emails. Nameless, faceless hackers change segments of code and inject the malware into the smartphone. However, most mobile phone and telecommunications corporations still maintain that mobile applications are safe and there should be no precautions taken when downloading these apps.

The CIA-sponsored AntiSec hacker group was successful in stealing millions of ID numbers from Apple, Inc. from databases where the corporation had been storing user personal data. They then leaked this information out for the general public to see. However this action serves another purpose.

The FBI was also infiltrated by the same state-controlled hacker group wherein a laptop was “compromised and private data regarding Apple UDIDs was exposed. At this time, there is no evidence indicating that an FBI laptop was compromised or that the FBI either sought or obtained this data.” The bureau’s press office later posted on its Twitter account that it “never had” the information in question and that the reports its laptop was hacked were “totally false.”

While data mining, cell phone corporations are using mobile phone habits to decipher the predictive movements of users. Scientists from the University of Brimingham in the UK have revealed that they can predict the movements of mobile phone users through tracking the network usage in real time with algorithms that forecast probabilities. This means that cell phone corporations, if using this system could predict the future whereabouts of their customers at any time of the day or night.

As our cell phone become weapons of mass surveillance, police departments across the nation are installing more CCTV cameras to better spy on citizens. In Maryland, local police have been using speed cameras at intersections to watch citizens under the guise of mitigating damages caused by car accidents.

Researchers for the Defense Department have created working prototypes of bi-static radar that can utilize WiFi to spy on citizens through walls. In tests, a one foot think brick wall was used and the monitoring radar could send back visual data to be interpreted.

WiFi signals can be extended and are available virtually everywhere which makes the capability of transmitting information easier with radio signals and laptops.

With the siphoning of information from a wireless router, surveillance software can be used as well to see through walls. A person’s whereabouts can be correctly pinpointed by using WiFi signals that bounce off objects which can decipher speed, location and direction of an individual.

Justification for this technology is surmised as: “See Through The Wall (STTW) technologies are of great interest to law enforcement and military agencies; this particular device has the UK Military of Defense exploring whether it might be used in ‘urban warfare,’ for scanning buildings. Other more benign applications might range from monitoring children to monitoring the elderly.”

These surveillance grids are being implemented to compliment the State and Local Anti-Terrorism Traning (SLATT) program that defines for police departments what an extremist is and how to “recognize and report indicators of terrorism/criminal extremism.”

The SLATT’s definition of terrorism is vague and broad. It encompasses “the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” While terrorism is meant to intimidate and coerce a population into submission, the local law enforcement is employed to play an integral part in bringing intelligence to the federal agencies and “international intelligence communities” involved with hindering terrorism.

The SLATT explains that those who use cash, stay in tight-knit groups, repeatedly use the word “God”, carry video or observation equipment and have hand-drawn maps are terrorists. The document goes on to explain that any type of surveillance that is not state-sponsored is terroristic in nature and should be reported.