HIGHLY POTENT NEWS THAT MIGHT CHANGE YOUR VIEWS

surveillance

Wide-Area Surveillance from the Sky Coming to a Neighborhood Near You — video included

by Frankie Gotz
Canadian Awareness Network
Apr 23, 2014

A retired U.S Air Force veteran by the name of Ross McNutt owns a company called Persistent Surveillance Systems (PSS) based out of Ohio USA.

On the PSS website it writes, “Persistent Surveillance Systems provides Wide-Area Surveillance Sensors and Services that enable continuous, second-by-second video monitoring of a city-sized area. Because of the very high-resolution nature of PSS’s sensors (up to 200 megapixels), vehicle and pedestrian activity can be tracked over a 16 square-mile area. If an event-of-interest happens within this area (a murder, for example), users can rewind the event to identify the perpetrator’s place-of-origin, meeting locations, accomplices, driving routes, and final destination. PSS’s HAWKEYE sensor has been used in countless major crime investigations, and has been used to backtrack criminals for officers to apprehend.”

Video Report from LeakSourceNews below:

The operation involves flying a small civilian aircraft high in the sky (10,000 feet) with cameras pointed at desired locations.  There are three types of cameras or sensors available for wide range surveillance from sky:

[…CONTINUE READING THIS ARTICLE]


600 million Apple devices contain secret backdoors, researcher claims — video included

Friends of Syria
Jul 26, 2014

000_gyi0060073312.si

A security researcher considered to be among the foremost experts in his field says that more than a half-billion mobile devices running Apple’s latest iOS operating system contain secret backdoors.

Jonathan Zdziarski, also known by his online alias “NerveGas,” told the audience attending his Friday morning presentation at the Hackers on Planet Earth conference in New York City that around 600 million Apple devices, including iPhones and tablets, contain hidden features that allow data to be surreptitiously slurped from those devices.

During Zdziarski’s HOPE presentation, “Identifying Backdoors, Attack Points and Surveillance Mechanisms in iOS Devices,” the researcher revealed that several undocumented forensic services are installed on every new iPhone and iPad, making it easier that ever for a third-party to pull data from those devices in order to compromise a target and take hold of their personal information, including pictures, text messages, voice recordings and more.

Among the hidden functions running on iOS devices, Zdziarski said, are programs called “pcapd,” “file_relay” and “file_relay.” If used properly, he added, those programs can allow anyone with the right means and methodology to pull staggering amounts of data from a targeted phone, even when the rightful owner suspects the device is sufficiently locked.

Zdziarski has previously exploited older versions of the iOS operating system and authored several books on mobile security. Even after raising multiple questions with Apple, however, he said he has yet to figure out why, exactly, the tech giant ships iOS devices with programs that appear to do nothing other than leak digital data.

According to the slides Zdziarski presented during Friday’s talk, there’s little reason to believe the functions are used to run diagnostics or help developers.

Most services are not referenced by any known Apple software,” one slide says in part, and “the raw format of the data makes it impossible to put data back onto the phone, making useless for Genius Bar or carrier tech purposes.”

“The personal nature of the data makes it very unlikely as a debugging mechanism,” he added.

Reuters / David Gray

Reuters / David Gray

According to the researcher, evidence of the mysterious programs raises more questions than it does answers.

“Why is there a packet sniffer running on 600 million personal iOS devices instead of moved to the developer mount?” he asked in one slide. “Why are there undocumented services that bypass user backup encryption that dump mass amounts of personal data from the phone? Why is most of my user data still not encrypted with the PIN or passphrase, enabling the invasion of my personal privacy by YOU?”

“Apple really needs to step up and explain what these services are doing,” Zdziarski told Ars Technia on Monday after his HOPE presentation was hailed over the weekend by the conference’s attendees as a highlight of the three-day event. “I can’t come up with a better word than ‘backdoor’ to describe file relay, but I’m willing to listen to whatever other explanation Apple has. At the end of the day, though, there’s a lot of insecure stuff running on the phone giving up a lot of data that should never be given up. Apple really needs to fix that.”

Indeed, Apple responded on late Tuesday by saying that the tree functions in question are “diagnostic capabilities to help enterprise IT departments, developers and AppleCare troubleshoot issues.”

“Apple has, in a traditional sense, admitted to having back doors on the device specifically for their own use,” Zdziarski responded quickly on his blog. “Perhaps people misunderstand the term ‘back door’ due to the stigma Hollywood has given them, but I have never accused these ‘hidden access methods’ as being intended for anything malicious, and I’ve made repeated statements that I haven’t accused Apple of working with NSA. That doesn’t mean, however that the government can’t take advantage of back doors to access the same information. What does concern me is that Apple appears to be completely misleading about some of these (especially file relay), and not addressing the issues I raised on others.”

“I give Apple credit for acknowledging these services, and at least trying to give an answer to people who want to know why these services are there – prior to this, there was no documentation about file relay whatsoever, or its 44 data services to copy off personal data. They appear to be misleading about its capabilities, however, in downplaying them, and this concerns me,” he added.

On Apple’s part, the company said they have “never worked with any government agency from any country to create a backdoor in any of our products of services.”

Source


PODCAST/VIDEO — Interview 798 – What is Greenwald Covering Up? – BFPRoundtable #02

The Corbett Report
Dec 20, 2013

In this blockbuster no-holds-barred conversation, Sibel Edmonds, Guillermo Jimenez and James Corbett discuss Edmonds’ recent series of articles on Glenn Greenwald and his connection to billionaire Pierre Omidyar. We talk about the NSA/PayPal connection and Greenwald’s refusal to discuss this issue, and Edmonds reveals specific examples of publicly documented cases that Greenwald has been covering up for years.


VIDEO — More Disney Indoctrination: ‘Everything You Do, We’ll Be Spying on You!’

Truthstream Media
Jan 29, 2014

So Disney Jr., the Disney brand aimed at preschoolers, apparently has a cartoon named Special Agent Oso (http://disneyjunior.com/special-agent…) that features a nanny state ladybug drone named Shutterbug which comes complete with a little camera that transmits video up to a satellite that then sends that data in to headquarters for analysis…”She’s always in flight, on the case both day and night.” (The “case,” in this case, is an infraction involving a parent leaving her daughter in a parked car in their driveway without a seat belt on…)

Even die hard Disney fans that hate on us for reporting on them will have a hard time ignoring the obvious big brother propaganda and indoctrination going on in this creepy, creeeepy cartoon.

There’s even a theme song…but we warn you; it’s the stuff Orwell’s nightmares were made of — http://www.youtube.com/watch?v=9hLowm…

Original article up at 21st Century Wire: http://21stcenturywire.com/2014/01/29…

Website: TruthstreamMedia.com
Twitter: @TruthstreamNews
FB: Facebook.com/TruthstreamMedia

~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*

­~*~*~*~*~*~*~*~*~*~*~
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.


MUST WATCH DOCUMENTARY — “Trance-Formation” — Trans-Humanism / Genetic Modification of all Life / Nano-Technology / HAARP / Geoengineering

PEREXUSREX
Nov 24, 2012

[HD-version]

OUTSTANDING VIDEO . . .
Genetic Modification of all Life!!! New Documentary Film
Enslavement of the human race
This is part of the Endgame but not all . . .MUST WATCH
The State of our World

‘Trans Formation’ By Max Igan

Geoengineering

Trans-Humanism / Genetic Modification of all Life / Nano-Technology / HAARP / Geoengineering -Film

Chemtrails

The latest film by Max Igan, one of the greatest humans to ever walk this planet. This man deserves his rightful place in the history books, right next to the greatest minds of all time. http://thecrowhouse.com/home.html

Max Igan’s YouTube Channel:
http://www.youtube.com/user/aodscarec…

TO SUPPORT:
http://thecrowhouse.com/home.html [Max Igan’s Website]

Category:
Education

Electromagnitism and Chemtrails

Transhumanism is – http://www.wordwebonline.com/search.p…

Tags:
Trans Humanism genetic modification of all life nano technology. HAARP nanotechnology nano transformation trans formation humanism is. Nanoparticles nanotech what is nanotechnology. Future technology transformation


PODCAST/VIDEO– Interview 856 – The Beard World Order roundtable on “Meta-Conspiracy”

The Corbett Report
Apr 9, 2014

via TracesOfReality.com:

Welcome to The Beard World Order: On today’s episode Tom, James, and Guillermo take on “meta-conspiracy” and the “conspiracy to inject conspiracy.”

Do the infiltration and subversion tactics of the NSA and private intelligence contractors present a unique challenge for activists and the alternative media in the 21st century? Are “sockpuppets” and other disinfo exploits any different than the decades old COINTELPRO? What is cognitive infiltration, and how has it already succeeded in invading our minds? Have privacy norms (#aftersex) been irreversibly altered? Is there any hope left for humanity? And why would the Department of Defense be involved in the making of Ernest Goes to Camp?

Your answers to these questions, beards, beards, yeah, and more.

Enjoy.

Contact Guillermo, James, and Tom with questions, comments, and suggestions for future topics to be discussed on the show.

For a High Quality audio download of this episode, click here (right-click, and save-as).

Show Notes:

Beard World Order: Episode 01 – Uncorking Conspiracy

Wired: Why You Should Embrace Surveillance, Not Fight It

Invasion of the Data Snatchers: Big Data and the Internet of Things Means the Surveillance of Everything

Americans say they’re shopping less online. Blame the NSA.

Many say NSA news changed their behavior

How Did Snowden Change Search Behavior? New Research Shows, More Than You Might Think

Beyond Snowden: Don’t Coddle the National Security State; Smash It

Border Patrol Throw Political Bone to Civil Libertarians; Will We Fetch?

TOR Radio: Drug Culture, Bodycams, and Romanticizing the Republic

The Corbett Report: Solutions: Sousveillance (video)

ClandesTime episode 025 – Fun with FOIA

Complete list of DOD-assisted movies

The House’s NSA bill could allow more spying than ever. You call this reform?

The #aftersex selfie is a betrayal of intimacy

Bearded bands and facial hair appreciation clubs: the hairy-faced trend is back

U.S. government sues Philadelphia schools over beard policy

Beard transplants (video)


Australian Security Agencies Target “SyrianGirl” Mimi Al-Laham

by Brandon Turbeville
Activist Post
Jun 12, 2014

Mimi Al-Laham (SyrianGirl)

In the Orwellian world of post 9/11 hysteria and the Global War On Terror, speaking truth is a revolutionary act. Indeed, such is evidenced by the fact that speaking out against terrorism is now enough to cause you to be labeled as a supporter of terrorism. At least, that is, in certain instances.

This is particularly the case with Mimi Al-Laham, (aka SyrianGirl), a young Syrian woman who has been active on YouTube, social media, and her own website in speaking out about the Western-backed destabilization of Syria.

Laham has consistently denounced the death squads operating inside Syria as terrorists and agents of the West as well as identified the so-called rebellion as being nothing more than a Western – organized, funded, and directed campaign against the Syrian government , all documented fact. For more information on this topic, please see my book, The Road To Damascus, The Anglo-American Assault On Syria.

However, her statements against terrorism, beheadings, rapes, slavery, and wholesale slaughter have caused her to be labelled as a potential “extremist” and purveyor of “extremist rhetoric.” For that reason, Australian security agencies have been closely monitoring Laham’s online statements and, presumably, much more than that.

Australian Institute of Criminology’s Shandon Harris-Hogan said that such statements and online behavior should be watched for “signs of an escalation in rhetoric or calls for violence” and that “When it crosses that line, particularly into encouraging, facilitating or preparing for violence, that’s when it’s going to particularly hit the radar of security services.”

[…CONTINUE READING THIS ARTICLE]