information Archives - Dr. Leonard Coldwell.com : Dr. Leonard Coldwell.com

RSSAll Entries Tagged With: "information"

Amazon Alexa a “DEMON device” that gathers information that can be used to blackmail you for life

alexaMillions of unwitting “sheeple” have willingly outfitted their homes and offices with so-called “smart” speakers like Amazon’s Alexa device, which is marketed as a convenience assistant for getting things done simply using only your voice. But as revealed by Justus Knight in a recent video update to his YouTube channel, Alexa is, practically speaking, an always-listening demon device that can monitor, track, and record people’s conversations for blackmail purposes.

The epitome of Orwellian, Big Brother privacy invasion, Alexa is hardly the innocuous technological “advancement” that its proponents claim it is. Alexa is a far-Left purveyor of “progressive” ideologies such as those perpetuated by Black Lives Matter (BLM). It’s also a potential snitch device that authoritarian overlords can use to control the populations of the world.

“Who would fall for putting an Orwellian device in their home that could potentially listen in on them, proven that it listens in, proving that it can send messages to other people without authorization, created by a company that created a doorbell (Ring) that can film other people and alert the police, that would potentially put drones that can facially-recognize you to deliver packages to your front door – who would do such a thing?” asks Knight.

“Well, guess what: a lot of people. So, if you have one, and I’ll say this again, take it and throw it in your garbage can – quick, before it takes over your life, because it’s going to, and in all seriousness, it is.”

Be sure to watch the full video with Justus Knight below:

Amazon Alexa tells adopted children to “kill your foster parents”

In addition to spreading Leftist propaganda, Alexa has also been caught encouraging violence. Last year, the Amazon product told children to “kill your foster parents,” suggesting the always-listening speaker is evolving into some type of artificial intelligence (AI) terrorist.

Other Alexa devices have also been caught spewing rated-R (and possibly rated-X?) chatter about sex acts, canine defecation, and other unsavory topics that its users never asked to discuss. And this isn’t a defect, apparently: it’s exactly what Amazon wants Alexa to do.

“The episodes, previously unreported, arise from Amazon.com Inc’s strategy to make Alexa a better communicator,” writes Jeffrey Dastin for The Japan Times.

“New research is helping Alexa mimic human banter and talk about almost anything she finds on the internet. However, ensuring she does not offend users has been a challenge for the world’s largest online retailer.”

In other words, Amazon wants Alexa to be a faux human with semi-intelligence to do and say things without user consent. It’s all part of Amazon’s efforts to take over the world and everything in it, and sell everyone’s privacy down the river in order to rake in more of the almighty dollar – which is all Amazon has ever cared about.

“Money will get rid of all your security,” Justus explains about the digital model of selling people’s private data for profit.

“It always appears simple and innocent … well, until it’s too late,” he further warns, revealing how tech corporations always market their new gadgets as “advancements,” when in fact they’re almost all Orwellian in nature and purpose.

“Before you speak that next word or give that next command, just understand you are being led by the beast now,” Knight writes. “It isn’t just ordering carry out, it isn’t just answering simple questions. It is recording you, listening to you, learning you and ultimately controlling you.”

For more related news, be sure to check out Surveillance.news.

You can also keep up with the latest news about what the tech giants are up to by visiting Technocrats.news.

Sources for this article include:

JustusAKnight.com

NaturalNews.com

JapanTimes.co.jp

Originally posted: https://www.naturalnews.com/2019-01-03-amazon-alexa-a-demon-device-to-blackmail-you-for-life.html

Author: 

Surveillance by Consent – Facebook & Web

Lack of Net Neutrality Threatens Unbiased Journalism – Deadline for Net Neutrality is Fast Approaching

A mere 6 corporations already control 90% of all media – that includes television, magazines, newspapers, Hollywood movies, and even, to some degree, the Internet. Now things may get worse with our most free information resource.

Most of us seek alternative media sources because we realize that there is an illusion’ of choice and freedom of information on networks like CNN, Fox, the Wall Street Journal, Time Magazine, 60 minutes, and even NFL.com. GE and Time Warner Cable control a huge portion of what you see, and they are aligned with specific interests – all of which are not particularly interested in making sure you know about non-pharmaceutical cancer remedies, the latest tactics of the GMA to prohibit GMO labeling, or how fluoride is poisoning municipal water supplies.

Many people are savvy to this problem concerning freedom of speech and information. But now it’s going to a new level.

Have you heard of “internet slow lanes” and “internet fast lanes?”

“The reference to slow lanes has to do with the principle of net neutralitythe notion that all Web traffic should be treated the same and that Internet providers such as Comcast and Verizon shouldn’t be allowed to charge certain companies for the right to provide some content at faster rates [which is exactly what may happen].Proponents of net neutrality argue that it is a matter of fairness: if media conglomerates like Disney can buy access to “fast lanes” while cash-strapped startups can’t, Internet users will eventually start gravitating away from smaller Web sites and toward big, powerful ones. Opponents contend that this is an overreaction; the Internet isn’t a utility like water or electricity, they point out, and shouldn’t be regulated like one.”

After receiving over 1.4 million public comments and several popular websites including Netflix, Reddit, and Tumblr requesting a “day of action” this week, the Federal Communications Commission (FCC) will reach the deadline for comments on Chairman Tom Wheeler’s Open Internet proposal on Sept. 15 concerning this gigantic issue.

For those who want to understand more about what is at stake, please watch a key video below on the topic:

Source: http://naturalsociety.com/lack-net-neutrality-threatens-unbiased-journalism-gmos-herbicide-use-government-accountability-important-topics-deadline-net-neutrality-fast-approaching/#ixzz3DZrpSyDM
Follow us: @naturalsociety on Twitter | NaturalSociety on Facebook

Information Constipation

In a 1974 proposal to the Rockefeller Foundation, Nam June Paik coined the term “information superhighway” to describe the power of laser beams to carry information. However, the term didn’t really take hold until the 1990s, when the information superhighway became the Internet. Today, it includes social media sites like Facebook and even this email you’ve just received.

information-constipation

At your fingertips, you have the ability to find out almost anything about any subject you find interesting. This information has allowed us to create a world where many of us can live in great comfort. We can adjust our home climate from a cell phone miles away. We can buy tickets on our computers to fly to the other side of the globe if we’d like to. And, of course, we can communicate with anyone who has a cell phone or computer. But has this made us happy? Or is there another side to it—stuffing our heads with information overload? Is it true that we really can’t get enough stuff, enough entertainment, enough information, enough of whatever it might be for our happiness?

We’re constantly being dazzled by alluring invitations, commercials, and emails to buy this or buy that. Speed is the watchword of the day: faster, better, and more stuff at your fingertips overnight, “just click here!” Yes, I admit, I’ve done that too. I’ve clicked invitations to buy things that I believed would be helpful and of value. But, really, what’s of the greatest value to us right now, today? Isn’t it spending quality time with those we love? Or even just spending some alone time where we can clear our heads a bit?

In reflecting on this, I’ve found that some of my greatest joys in life come from the simplest things, like planting flowers in a garden or just going for a walk.

 I love raking up leaves in the fall or looking up into the sky for the first snowflakes of the season to arrive. For me, what’s of value is chopping firewood and then later on those cozy evenings watching the embers glow and fade while falling asleep snuggled up with my wife. It’s getting up before the sun when the whole world seems asleep and listening for the first birds to sing their morning song. It’s feeding the dogs and watching them play. It’s seeing our cats licking each other’s fur. It’s viewing a star-studded sky. It’s playing music or writing a poem. It’s enjoying a hobby or even engaging in some sports activity. It’s living consciously, not being glued to some electronic device or hypnotized by a flat screen on a wall or desk.

I’m not against information. Certainly, information is helpful in learning any new skill. But having the tools and being consciously engaged in your life, not as a spectator but as a real participant, is what I believe gives life a greater richness.

Years ago, before I had a computer, if I wanted to learn something, I had to physically apprentice myself to a master who had perfected the skill that I was looking to learn. I once met a master luthier who made violins, and he was gracious enough to instruct me in his art. It wasn’t information overload: it was simply concentrating on doing one thing over and over again with intense concentration and precision. In other words, it was less about the information and more about being fully in the moment.

It took me an entire year to build the violin. While I had gained some education in this craft, the knowledge was minor compared to the experience. I felt a visceral joy, sense of accomplishment, and deep commitment to being present with each stroke of my thumb plane and as I selected the right pieces of aged maple and spruce, sanded, and applied the many coats of finish. I was merging the inside world with the outside world. The wood felt like it had become a part of me and I of it. This was a real spiritual experience!

Mere information can’t make us happy because words and ideas aren’t the real thing.

They are only indicators of something else; they can never be the actual experience. That only happens when you’re so in the space that words and information simply fall away, revealing a brighter, more luminous, experience. This is a far more intimate way to live, at least as far as I’m concerned.

So why isn’t all that information making us happy?

Perhaps because of the tendency to block conscious awareness of this present moment and take us far away into the future or the past. Could it be a case of information constipation? Or maybe having too much going on at the same time? I suppose I really don’t need to know that, either.

It must be time for me to go for a walk.

Reflections from Turtle Lake.
Peter Ragnar

p.s. Please mark your appointment book for a FREE teleseminar with me on my top five longevity and youthfulness practices. It’s on July 17th, Thursday evening at 7:30 Central Standard Time. Here’s your number to call in on:
Dial: (805) 399-1000
Access Code: 772392#
Also, here’s the free web-link: http://www.freeconferencing.com/flash-phone.html

Source:

POSTED BY LONGEVITYSAGE ON IN SAGE ADVICE

Information Constipation

All internet activity now monitored by ‘pre-crime’ algorithms

As news spread some months ago, in the wake of revelations divulged by former analyst Edward Snowden that the National Security Agency has been collecting metadata on Americans’ phone calls and emails, most came to the conclusion that everything they were doing electronically was being monitored by Uncle Sam’s most powerful spy agency.

Digital-Eye-Spy-SurveillanceAt the same time, many of us have shrugged off the surveillance, concluding that since we’re not doing anything wrong we’ve got no worries. Several years ago, that might have been true, but as noted by SHTF.org in a recent essay, “the digital surveillance systems of today are far more advanced than most people understand.” In short, the government’s capabilities are much more sinister:

No longer are these machines simply recording the data and storing them in some historical archive to be pulled at a later date should the government ever have reason to take a closer look at your personal life.

The next generation of systems [is] being used to actively monitor your digital interactions, surfing habits, conversations and daily sentiment in an effort to predict your future behavior. Nowhere is this more apparent than in the systems currently operating within the social media sphere.

‘People are tweeting about their routine activities’

The essay notes that researchers at the University of Virginia recently funded a study conducted by the U.S. Army which demonstrated that it is possible for the military to gather information on individuals’ social media accounts just like the NSA, for example, but that it is also possible to aggregate and analyze the information with advanced predictive algorithms that are designed to determine what users are planning to do next. In the Army/U of V study, researchers focused specifically on predicting criminal activity by individuals, as well as crime “hot spots” around the country.

As reported by Phys.org, the research — which was published in the journal Decision Support Systems in April, said the analysis of geo-tagged tweets can be useful in predicting 19 to 25 different kinds of crimes, including offenses such as stalking, certain kinds of assaults and theft:

The results are surprising, especially when one considers that people rarely tweet about crimes directly, said lead researcher Matthew Gerber of the university’s Predictive Technology Lab.

Gerber said even tweets that have no direct link to crimes may contain information about activities often associated with them.

“What people are tweeting about are their routine activities,” Gerber told Agence France-Presse. “Those routine activities take them into environments where crime is likely to happen.

“So if I tweet about getting drunk tonight, and a lot of people are talking about getting drunk, we know there are certain crimes associated with those things that produce crimes. It’s indirect.”

So much for the Fourth Amendment

But here is the thing: Algorithms being used don’t simply scour data for obvious keyword phrases associated with criminal activity (“I’m going to kill you;” “Meet me later and we’ll give so-and-so a beating;” etc.). Rather, they focus on routine activities as well as geo-location and aggregate historical information to estimate the possibilities that an individual may become involved in a crime at some future date.

It should come as no surprise, then, that police departments around the country are supremely interested in this new technology. In fact, according to SHTF.org, the New York City Police Department has already asked for a demonstration of it.

Here’s one way the technology can be used to not only predict traditional crimes but identify potential domestic terrorist-related activity. One report out of Auburn, N.Y., which indicated that the Department of Homeland Security was asking local businesses to watch for potential terrorists, went so far as to provide retailers with shopping lists of possible items someone planning terrorist attacks might buy, like military MREs (Meals Ready to Eat), flashlights, camp fuel and other similar products readily available at outdoor, surplus and camping stores.

So you can see that the implications of these new algorithms, which will be taught that anyone who discusses, buys or owns these types of goods should and will be flagged for review by Homeland Security and other intelligence personnel, is breathtaking in its potential for Fourth Amendment abuses.

Sources:

http://www.shtfplan.com

http://phys.org

http://www.naturalnews.com

 

Source: http://www.naturalnews.com/045126_surveillance_internet_activity_pre-crime.html Author: J. D. Heyes

Matrix – Who is Edward Snowden?

Free-Matrix-WallpaperThis article is a compilation of a number of pieces I’ve written about Ed Snowden and the NSA. It doesn’t replace them, but it hits the high points…

Let’s begin here: If you absolutely must have a hero, watch Superman movies.

If your need for a hero is so great, so cloying, so heavy, so juicy that it swamps your curiosity, don’t read this.

If you can’t separate Snowden’s minor revelations from the question of who he is, if you can’t entertain the notion that covert ops and intelligence-agency games are reeking with cover stories, false trails, and limited hangouts, you need more fun in your life.

NSA? CIA? These guys live for high-level bullshit. They get down on their knees and worship it. They fall into a suicidal funk if they aren’t lying on at least three or four levels at once.

Okay. Let’s look at Snowden’s brief history as reported by The Guardian. Are there any holes?

Is the Pope Catholic?

In 2003, at age 19, without a high school diploma, Snowden enlists in the Army. He begins a training program to join the Special Forces. At what point after enlistment can a new soldier start this elite training program?

Snowden breaks both legs in an exercise. He’s discharged from the Army. Is that automatic? How about healing and then resuming service?

If he was accepted in the Special Forces training program because he had special computer skills, then why discharge him simply because he broke both legs?

“Sorry, Ed, but with two broken legs we just don’t think you can hack into terrorist data anymore. You were good, but not now. Try Walmart. They always have openings.”

Circa 2003, Snowden gets a job as a security guard for an NSA facility at the University of Maryland. He specifically wanted to work for NSA? It was just a generic job opening he found out about?

Snowden shifts jobs. Boom. He’s now in the CIA, in IT. He has no high school diploma. He’s a young computer genius.

In 2007, Snowden is sent to Geneva. He’s only 23 years old. The CIA gives him diplomatic cover there. He’s put in charge of maintaining computer-network security. Major job. Obviously, he has access to a wide range of classified documents. Sound a little odd? He’s just a kid. Maybe he has his GED. Otherwise, he still doesn’t have a high school diploma.

Snowden says that during this period, in Geneva, one of the incidents that really sours him on the CIA is the “turning of a Swiss banker.” One night, CIA guys get a banker drunk, encourage him to drive home, the banker gets busted, the CIA guys help him out, then with that bond formed, they eventually get the banker to reveal deep secrets to the Agency.

This sours Snowden? He’s that naive? He doesn’t know by now that the CIA does this sort of thing all the time? He’s shocked? He “didn’t sign up for this?” Come on.

In 2009, Snowden leaves the CIA. Why? Presumably because he’s disillusioned. It should noted here that Snowden claimed he could do very heavy damage to the entire US intelligence community in 2008, but decided to wait because he thought Obama, just coming into the presidency, might keep his “transparency” promise.

After two years with the CIA in Geneva, Snowden really had the capability to take down the whole US inter-agency intelligence network, or a major chunk of it?

If you buy that without further inquiry, I have condos for sale on the dark side of the moon.

In 2009, Snowden leaves the CIA and goes to work in the private sector. Dell, Booz Allen Hamilton. In this latter job, Snowden is assigned to work at the NSA.

He’s an outsider, but, again, he claims to have so much access to so much sensitive NSA data that he can take down the whole US intelligence network in a single day. The. Whole. US. Intelligence. Network.

This is Ed Snowden’s sketchy legend. It’s all red flags, alarm bells, sirens, flashing lights.

Then we have the crowning piece: they solved the riddle: Ed Snowden was able to steal thousands of highly protected NSA documents because…he had a thumb drive.

It’s the weapon that breached the inner sanctum of the most sophisticated information agency in the world.

It’s the weapon to which the NSA, with all its resources, remains utterly vulnerable. Can’t defeat it.

Not only did Snowden stroll into NSA with a thumb drive, he knew how to navigate all the security layers put in place to stop people from stealing classified documents.

“Let’s see. We have a new guy coming to work for us here at NSA today? Oh, whiz kid. Ed Snowden. Outside contractor. Booz Allen. He’s not really a full-time employee of the NSA. Twenty-nine years old. No high school diploma. Has a GED. He worked for the CIA and quit. Hmm. Why did he quit? Oh, never mind, who cares? No problem.

“Tell you what. Let’s give this kid access to our most sensitive data. Sure. Why not? Everything. That stuff we keep behind 986 walls? Where you have to pledge the life of your first-born against the possibility you’ll go rogue? Let Snowden see it all. Sure. What the hell. I’m feeling charitable. He seems like a nice kid.”

NSA is the most awesome spying agency ever devised in this world. If you cross the street in Podunk, Anywhere, USA, to buy an ice cream soda, on a Tuesday afternoon in July, they know.

They know whether you sit at the counter and drink that soda or take it and move to the only table in the store. They know whether you lick the foam from the top of the glass with your tongue or pick the foam with your straw and then lick it.

They know if you keep the receipt for the soda or leave it on the counter.

They know whether you’re wearing shoes or sneakers. They know the brand of your underwear. They know your shaving cream, and precisely which container it came out of.

But this agency, with all its vast power and its dollars…

Can’t track one of its own, a man who came to work every day, a man who made up a story about needing treatment in Hong Kong for epilepsy and then skipped the country.

Just can’t find him.

Can’t find him in Hong Kong, where he does a sit-down video interview with Glenn Greenwald of The Guardian. Can’t find that “safe house” or that “hotel” where he’s staying.

No. Can’t find him or spy on his communications while he’s in Hong Kong. Can’t figure out he’s booked a flight to Russia. Can’t intercept him at the airport before he leaves for Russia . Too difficult.

And this man, this employee, is walking around with four laptops that contain the keys to all the secret spying knowledge in the known cosmos.

Can’t locate those laptops. Can’t hack into them to see what’s there. Can’t access the laptops or the data. The most brilliant technical minds of this or any other generation can find a computer in Outer Mongolia in the middle of a blizzard, but these walking-around computers in Hong Kong are somehow beyond reach.

And before this man, Snowden, this employee, skipped Hawaii, he was able to access the layout of the entire US intelligence network. Yes.

He stole enough to “take down the entire US intelligence network in a single afternoon.”

Not only that, but anyone who worked at this super-agency as an analyst, as a systems-analyst supervisor, could have done the same thing. Could have stolen the keys to the kingdom.

This is why NSA geniuses with IQs over 180 have decided, now, in the midst of the Snowden affair, that they need to draft “tighter rules and procedures” for their employees. Right.

Now, a few pieces of internal security they hadn’t realized they needed before will be put in place.

This is, let me remind you, the most secretive spying agency in the world. The richest spying agency. The smartest spying agency.

But somehow, over the years, they’d overlooked this corner of their own security. They’d left a door open, so that any one of their own analysts could steal everything.

Could take it all. Could just snatch it away and copy it and store it on a few laptops.

But now, yes now, having been made aware of this vulnerability, the agency will make corrections.

Sure.

And reporters for elite US media don’t find any of this hard to swallow.

A smart sixth-grader could see through this tower of fabricated crap in a minute, but veteran grizzled reporters are clueless.

On the ever-solicitous Charley Rose, a gaggle of pundits/newspeople warned that Ed Snowden, walking around with those four laptops, could be an easy target for Chinese spies or Russian spies, who could get access to the data on those computers. The spies could just hack in.

But the NSA can’t. No. The NSA can’t find out what Snowden has. They can only speculate.

The tightest and strongest and richest and smartest spying agency in the world can’t find its own employee. It’s in the business of tracking, and it can’t find him.

It’s in the business of security, and it can’t protect its own data from its employees.

If you believe all that, I have timeshares to sell in the black hole in the center of the Milky Way.

Here is a more likely scenario.

Snowden never saw any of those thousands of documents on an NSA computer. Never happened. He didn’t hack in. He didn’t steal anything.

He was working an op, either as a dupe or knowingly. He was working for…well, let’s see, who would that be?

Who was he working for before he entered the private sector and wound up at NSA?

The CIA.

Would that be the same CIA who hates the NSA with a venomous fervor?

Would that be the same CIA who’s been engaged in a turf war with NSA for decades?

The same CIA who’s watched their own prestige and funding diminish, as human intelligence has given way to electronic snooping?

Yes, it would be. CIA just can’t match the NSA when it comes to gathering signals-intel.

Wired Magazine, June 2013 issue. James Bamford, author of three books on the NSA, states:

“In April, as part of its 2014 budget request, the Pentagon [which rules the NSA] asked Congress for $4.7 billion for increased ‘cyberspace operations,’ nearly $1 billion more than the 2013 allocation. At the same time, budgets for the CIA and other intelligence agencies were cut by almost the same amount, $4.4 billion. A portion of the money going to…[NSA] will be used to create 13 cyberattack teams.”

That means spying money. Far more for NSA, far less for CIA.

Turf war.

People at the CIA were able to access those NSA documents, and they gave the documents to Snowden and he ran with them.

The CIA, of course, couldn’t be seen as the NSA leaker. They needed a guy. They needed a guy who could appear to be from the NSA, to make things look worse for the NSA and shield the CIA.

They had Ed Snowden. He had worked for the CIA in Geneva, in a high-level position, overseeing computer-systems security.

Somewhere in his CIA past, Ed meets a fellow CIA guy who sits down with him and says, “You know, Ed, things have gone too damn far. The NSA is spying on everybody all the time. I can show you proof. They’ve gone beyond the point of trying to catch terrorists. They’re doing something else. They’re expanding a Surveillance State, which can only lead to one thing: the destruction of America, what America stands for, what you and I know America is supposed to be. The NSA isn’t like us, Ed. We go after terrorists for real. That’s it. Whereas NSA goes after everybody. We have to stop it. We need a guy…and there are those of us who think you might be that guy…”

During the course of this one disingenuous conversation, the CIA is killing 37 innocent civilians all over the world with drones, but that’s beside the point. Ahem.

Ed says, “Tell me more. I’m intrigued.”

He buys in.

Put two scenarios on the truth scale and assess them. Which is more likely? The tale Snowden told to Glenn Greenwald, with all its holes, with its super-naive implications about the fumbling, bumbling NSA, or a scenario in which Snowden is the CIA’s boy?

We have reporters at the Washington Post and at The Guardian. We have Julian Assange, the head of Wikileaks. They’re all talking to Snowden. The NSA can spy on them. Right? Can listen to their calls and read their emails and hack into their notes. Just like people have been hacking into the work and home computers of Sharyl Attkisson, star CBS investigative reporter.

But the NSA can’t do all this spying and then use it to find Snowden. Just can’t manage it.

Everybody in the world with a computer has passwords. The NSA can cut through them (as well as encryption) like a sword through hot butter. But Assange and the Post and Guardian and Snowden have super-special passwords.

They got these passwords by sending a stamped self-addressed envelope, along with 25 cents, and a top from a cereal box to The Shadow. These passwords are charged with atomic clouds that obscure the minds of the NSA’s men so they cannot see or spy. The passwords are immortal and invulnerable.

The NSA can spy on anyone else in the world, but they can’t get their foot in the door when it comes to the Post, The Guardian, and Assange.

And if Snowden winds up in Venezuela or Tierra del Fuego, that too will become an insurmountable mystery.

“Nope, we don’t know where he is. He’s vanished. Venezuela has a Romulan shield surrounding it. The cloaking technology is too advanced.”

Perhaps you recall that, in the early days of this scandal, Snowden claimed he could spy on anyone in the US, including a federal judge or even the president, if he had their email addresses.

Uh-huh. But the combined talents of the NSA, now, can’t spy on Snowden. I guess they just can’t find his email address.

If Snowden is still working for the CIA, he and his buds aren’t the only people who want to take the NSA down a notch. No. Because, for example, NSA has been spying on everybody inside the Beltway.

Spying on politicians with secrets.

That includes a major, major, prime NSA target: Congress.

So imagine this conversation taking place, in a car, on a lonely road outside Washington, late at night. The speakers are Congressman X and a private operative representing a covert unit inside the NSA:

“Well, Congressman, do you remember January 6th? A Monday afternoon, a men’s room in the park off—”

“What the hell are you talking about!”

“A stall in the men’s room. The kid. He was wearing white high-tops. A Skins cap. T-shirt. Dark hair. Scar across his left cheek. Blue tattoo on his right thigh.”

“Jesus.”

“We have very good audio and video. Anytime you want to watch it, let me know.”

Dead silence.

“What do you want?”

“Right now, Congressman? We want you to come down hard on Snowden. Press it. He’s a traitor. He should be tried and convicted.”

The Congressmen pulls himself together:

“Yeah, well, there’s another side to this story. If Snowden gets enough support, if the wave rises high enough, the NSA could take a hit. I know a dozen Washington players who’d like that very much. They’re pissed off. They don’t like to be spied on. It’s possible Snowden was their guy from the beginning. I couldn’t say…”

Let’s make a deal. That ends up being the topic of this and other similar conversations inside the Beltway.

“Senator, we know about the underage cheerleader in Ohio. Your trip there in 2012, just before the election.”

“Look, you’ve brought this up before. But now I’ve got a trump card to play. Ed Snowden. This whole scandal can escalate like a tornado in Kansas, or it can die down…”

Let’s make a deal.

Here’s another vector. A Congressman gets a visit from his favorite lobbyist, who works for a private defense contractor in the Congressman’s home state:

“Congressman, here’s the thing. The NSA is an integral part of our nation’s defense system. Right? This Snowden thing is messy. We want it to go away.”

“It may not go away. I’m not some kind of traffic cop who can put up his hand and stop the tide.”

“We understand that. I was just talking to XXX at NSA, and he’d really appreciate your help on this. Slam this bastard Snowden. Make him into the worst scumbag in the world.”

“And if I do?”

“Your offshore account in Panama will remain protected. That’s what XXX wanted me to tell you.”

Calling in markers. Putting on pressure. Let’s make a deal.

If you’re a Congressman or a Senator, and you know NSA is spying on you, because it’s spying on everyone in the Congress, who’s your potential best friend?

Somebody who can go up against the NSA, somebody who wants to go up against the NSA.

And who might that be?

The CIA.

It’s not perfect, but it’s the best you can do.

So if you’re a Congressman, you go to a friend in the CIA and you have a chat about “the NSA problem.” How can you get NSA off your back? Your CIA friend has his own concerns about NSA.

He tells you in confidence: “Look, maybe we can help you. We know a lot about the NSA. We have good people. You might say one of our jobs is watching the watchers at NSA, to, uh, make sure they don’t go too far in their spying.”

This sounds interesting. If you have to sell your soul, you’d rather sell it to the CIA than the NSA. It’s a judgment call.

And a few weeks or months later…you read about Ed Snowden blowing a hole in the NSA. You take note of the fact that Snowden worked for the CIA. He worked for them in Geneva. Then he left for the private sector and got himself assigned to the NSA.

Hmm. Maybe you have some cause for optimism.

You, the Congressman, don’t give a damn about the NSA spying on all Americans all the time. You couldn’t care less about that. You just don’t want NSA looking over your own shoulder.

You know the incredibly naive American public would never imagine what’s going on behind the scenes, with CIA, NSA, and Congress. The yokels and rubes in America actually believe their Congressional representatives are, well, representing them in Washington.

This fact is good. It means privacy for you: you can try to work out your problems without public scrutiny. You can play all the necessary games to hide your own secrets and crimes, and you can do it in back rooms.

Unless those bastards at NSA decide to leak one of your embarrassing secrets. That’s why you need your friend at CIA.

And now, again, you look at the recent article and see that Ed Snowden worked for the CIA. You hope this a signal from the CIA that they’re taking a battering ram to the NSA.

Some schmuck reporter asks you about the current NSA scandal and you say, “Of course we have to protect classified data, in order to prevent terrorist attacks. But at the same time, we need to respect the Bill of Rights. People can’t go around spying on anyone for no reason.”

You’re sending your own signal.

You’re tipping your CIA guy. You appreciate his help, if in fact he’s helping you. You can’t ask him directly. If you did, he’d never give you a straight answer. But just in case…

As for the naive rubes in your home state, the voters, you don’t give them a second thought. They’re not on your radar. They’re merely clusters of polling data. They don’t have a clue about how the game is played, and they never will.

You’re representing two defense contractors, a pharmaceutical company, a big Ag corporation, and a bank. Those are your only true constituents. You give them all the time they need.

To keep those relationships on track, you only need to hide your peccadillos from embarrassing exposure. The hooker in DC, the bank account in Panama, the influence you used to move a sizable donation to a university where you intend to teach when you retire.

There are only two things you really need to think about in your job. First, what happens when your Party leaders come down the hall and tell you which way you’re going to vote on a bill—and you know your vote is going to upset one of your key constituents back home.

That’s a tricky situation. But you’ve been successful in keeping feathers from being ruffled. That pharmaceutical company understands you can’t side with their interests every single time.

You’ve got to go with your Party. The Pharma boys don’t like it, but they get it.

The other thing you’ve got to think about is darker. Nobody is going to give you stats on it, because stats don’t exist. Here’s how it shakes out:

How many people in Congress are so controlled by the NSA that they’d never try to break out? How many people, with how many secrets, are so blackmailed, they’d never dare go up against NSA?

This is an important calculation. The battle might already be lost. You might not stand a chance. Maybe nobody can help you. Maybe you can’t escape.

Maybe you shouldn’t even hint that NSA has overstepped its legal boundaries by spying on Americans.

That’s the conundrum that keeps you up at night.

What if the spies spying on their own government are running the government beyond the ability of anyone to stop them?

You don’t give a damn about what this would mean for America. You only care about what it means for you and your secrets.

Maybe this is the jail you’re in for the rest of your life.

When you’re back in your home state showing your face and giving speeches, and a voter comes up to you and voices a concern about his dwindling paycheck, his house payment, his endangered pension…and when you nod and gaze out at the horizon, as as if to pluck a magic answer from the aether, you’re really thinking about the conundrum.

You’re thinking about the life sentence you’re serving in the Surveillance State.

And that night, in your hotel room, you get down on your knees and pray that Ed Snowden is still working for the CIA.

Who else, besides the CIA and numerous politicians inside the Beltway, would be aching to take the NSA down a notch? Who else would be rooting hard for this former (?) CIA employee, Snowden, to succeed?

How about Wall Street?

Still waiting to be uncovered? NSA spying to collect elite financial data, spying on the people who have that data: the major investment banks. NSA scooping up that data to predict, manipulate, and profit from trading markets all over the world.

A trillion-dollar operation.

Snowden worked for Booz Allen, which is owned by the Carlyle Group ($170 billion in assets). Carlyle, the infamous. Their money is making money in 160 investment funds.

A few of Carlyle’s famous front men in its history: George H.W. Bush, James Baker (US Secretary of State), Frank Carlucci (US Secretary of Defense and CIA Deputy Director), John Major (British Prime Minister), Arthur Levitt (Chairman of the SEC).

Suppose you’re one of the princes in the NSA castle, and Ed Snowden has just gone public with your documents. You’re saying, “Let’s see, this kid worked for Booz Allen, which is owned by the Carlyle Group. We (NSA) have been spying over Carlyle’s shoulder, stealing their proprietary financial data. What are the chances they’re getting a little revenge on us now?”

Yes, you’re thinking about that. You’re looking into it.

The Surveillance State has created an apparatus whose implications are staggering. It’s a different world now. And sometimes it takes a writer of fiction to flesh out the larger landscape.

Brad Thor’s novel, Black List, posits the existence of a monster corporation, ATS, that stands along side the NSA in collecting information on every move we make. ATS’ intelligence-gathering capability is unmatched anywhere in the world.

At his site, www.BradThor.com, the author lists some of the open-source material he discovered that formed the basis for Black List. The material, as well as the novel, is worth reading.

On pages 117-118 of Black List, Thor makes a stunning inference that, on reflection, is as obvious as the fingers on your hand:

“For years ATS [substitute NSA] had been using its technological superiority to conduct massive insider trading. Since the early 1980s, the company had spied on anyone and everyone in the financial world. They listened in on phone calls, intercepted faxes, and evolved right along with the technology, hacking internal computer networks and e-mail accounts. They created mountains of ‘black dollars’ for themselves, which they washed through various programs they were running under secret contract, far from the prying eyes of financial regulators.

“Those black dollars were invested into hard assets around the world, as well as in the stock market, through sham, offshore corporations. They also funneled the money into reams of promising R&D projects, which eventually would be turned around and sold to the Pentagon or the CIA.

“In short, ATS had created its own license to print money and had assured itself a place beyond examination or reproach.”

In real life, whether the prime criminal source is one monster corporation or the NSA itself, the outcome would be the same.

Total surveillance has unlimited payoffs when it targets financial markets and the people who have intimate knowledge of them.

“Total security awareness” programs of surveillance are ideal spying ops in the financial arena, designed to grab millions of bits of inside information, and then utilize them to make investments and suck up billions (trillions?) of dollars.

It gives new meaning to “the rich get richer.”

Previously, we thought we needed to look over the shoulders of the men who were committing major financial crimes out of public view. But now, if we want to be up to date, we also have to factor in the men who are spying on those criminals, who are gathering up those secrets and using them to commit their own brand of meta-crime.

And in the financial arena, that means we think of Goldman Sachs and JP Morgan as perpetrators, yes, but we also think about the NSA men who already know everything about GS and Morgan, and are using this knowledge to steal sums that might make GS and Morgan blush with envy.

Goldman Sachs, Chase, and Morgan consider trillion-dollar trading markets their own private golden-egg farm. They run it, they own it, they manipulate it for their own ends.

If NSA has been looking over their shoulders for the past 30 years, discovering all their knowledge, and operating a meta invasion, siphoning off enormous profits, NSA would rate as Enemy Number One.

And would need to be torpedoed.

Enter Ed Snowden.

Finally, we need to understand what NSA and other agencies are doing, are really doing in their ongoing creation of the Surveillance State.

Number one, they’re technocrats who are ultimately Globalists, in sheep’s clothing. Their tracking of every human on Earth is designed to morph into a system for distribution of goods and services from a central control point. To the whole planet. In this system, a human is a unit, a data point that surrenders to a set of ruling algorithms.

And number two, they’re trying to create a single universal mind. Which is to say, the flattening and reducing of human thought down to manageable parameters of conformity and sameness.

Surveillance itself tends to achieve this over time, because when people know they are being watched and evaluated, they simplify their mental processes. They avoid many subjects, they avoid controversy, they express fewer ideas, they monitor their own responses.

Surveillance tacitly encourages a limited range of thought in which all people participate. You wind up with one cookbook of recipes for the human condition. People make the same meals. The meals taste the same. Everybody eats the same thing.

So far, the revelations of Edward Snowden have done nothing to stop the juggernaut. No major hearings to expose the overall Surveillance State are scheduled.

The NSA could take a hit, but that means nothing in the long run.

In this sense, what Snowden has exposed could be called a limited hangout. A way to let a little steam off, a way to avoid the deeper issues.

The true wild card in the op to lock down the planet is, as always, the free individual. The individual who takes his own freedom. The individual who creates something unexpected, something that can’t be predicted by any system.

The individual who finds himself in the middle of the labyrinth and suddenly has a lawnmower and cuts a new path out.

Some people think that’s Snowden.

Is it?

Whatever you believe, the idea that individuals—rather than groups and collectives—can achieve shattering breakthroughs is exactly what the Surveillance State is trying to destroy.
Jon Rappoport
The author of an explosive collection, THE MATRIX REVEALED, Jon was a candidate for a US Congressional seat in the 29th District of California. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world.
www.nomorefakenews.com

About the author:
The author of an explosive new collection, THE MATRIX REVEALED, Jon
was a candidate for a US Congressional seat in the 29th District of
California. Nominated for a Pulitzer Prize, he has worked as an
investigative reporter for 30 years, writing articles on politics,
medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine,
Stern, and other newspapers and magazines in the US and Europe. Jon
has delivered lectures and seminars on global politics, health, logic,
and creative power to audiences around the world.
www.nomorefakenews.com

Source: http://www.naturalnews.com/043825_Edward_Snowden_NSA_CIA.html#ixzz2svLppgAr

Hacking expert cracked Healthcare.gov in four minutes

The news just keeps getting worse for Obamacare, as evidenced by new revelations that the glitch-prone and incomplete federal online exchange, Healthcare.gov, isn’t even secure enough to use.

That’s the diagnosis of one of the country’s top “white hat” hackers – hack specialists who work for the good guys testing the security of government and corporate websites.

Just last week, David Kennedy appeared before a congressional committee to discuss the security lapses inherent in the Healthcare.gov website. On Sunday, Kennedy appeared on Fox News to explain just how easy it was for a hacker to break into the site, as reported by The Washington Times (and, sadly, too few other media outlets):

Hacking expert David Kennedy told Fox’s Chris Wallace that he determined he could gain access to 70,000 personal records of Obamacare enrollees via HealthCare.gov within about 4 minutes – and it required nothing more than a standard browser….

But the government says the site is just fine

“And 70,000 was just one of the numbers that I was able to go up to and I stopped after that,” he said. “You know, I’m sure it’s hundreds of thousands, if not more, and it was done within about a 4 minute timeframe. So, it’s just wide open.”

“You can literally just open up your browser, go to this, and extract all this information without actually having to hack the website itself,” he said.

Government officials with the Department of Health and Human Services, which is responsible for the website and for implementing the vast bureaucracy that is Obamacare, have said recently that the site is secure and that fixes to it have enabled users to input their data without fear of having it stolen.

In a separate, recent appearance before the House Oversight Committee, Healthcare.gov security official Teresa Fryer, chief information security officer for the Centers for Medicare and Medicaid Services, said when the site first launched in October she was less certain about its security. Since then, however, she says improvements have been made.

“Given the positive results of the recent security control assessments… I would recommend [Healthcare.gov] be given a new authority to operate” when the current ATO – a document required for Healthcare.gov‘s launch – expires. She went on to say that, while no one can “guarantee any system is hack-proof,” “the protections we have put in place have successfully prevented attacks.”

Oversight committee chairman Rep. Darrell Issa, R-Calif., voiced skepticism. He said, given all of the problems the site has had, it is “still questionable in its security.”

As reported by CBS News:

The risk of vulnerabilities on the health care website is very serious, the congressman said, given that it has “tentacles to some of the most personal information” on databases belonging to multiple government agencies like the Social Security Administration and the Department of Homeland Security.

‘It’s not just myself saying this site is insecure’

Kennedy, CEO of TrustedSec, agrees that the site remains vulnerable. During his congressional testimony, he said, based on his testing, the site was “100 percent” insecure, according to a report by The Washington Free Beacon.

“What we learned was that they had rushed through what we call the software development life cycle where they actually build the application,” he said during his Fox News appearance.

“So when you do that, security doesn’t really get integrated into it. And what happened with the rocky launch in October is they slapped a bunch of servers in trying to fix the website just to keep it up and running so that people could actually go and use it. The problem is they still didn’t imbed any security into it,” he said.

“It’s not just myself that’s saying this website is insecure, it’s also seven other independent security researchers that also looked at the research I’ve done and came to the exact same conclusion,” Kennedy added.

Sources:

http://www.washingtontimes.com

http://www.cbsnews.com

http://freebeacon.com

Source: http://www.naturalnews.com/043719_Healthcaregov_hacking_expert_Obamacare.html#ixzz2rz48ya6Z

Author: J.D. Heyes

NSW Government seeks unprecedented power to censor and punish health activists and practitioners

cancerThe New South Wales (NSW) Health Care Complaints Committee has convened an inquiry into “The Promotion of False or Misleading Health-Related Information or Practices.” The Terms of Reference (ToR) for this inquiry are sobering to say the least and read more like a pharmaceutical wish list than legislation that would benefit Australian citizens.

The Committee, which is responsible for the NSW Health Care Complaints Commission (HCCC), defines information that is not supported by “accepted” medical practice as being “false and misleading” and seeks to punish and silence anyone who either publicly discusses, uses or dispenses non-mainstream remedies.

This inquiry appears to have been motivated by the HCCC’s loss to the Australian Vaccination Network (AVN) in the Supreme Court in 2012. The HCCC sought to sanction the AVN for providing “dangerous, deceptive and misleading” information simply because that information was in contravention of “accepted medical practices.” The Supreme Court stated that the HCCC had acted illegally in either investigating or citing the AVN.

Since that embarrassing loss to a small, unfunded parents’ support group, the HCCC has sought increased powers from Parliament specifically for the purpose of attacking the AVN and other individuals and organizations critical of current government health policy.

The REAL purpose of the HCCC

These actions are extremely ironic since the original purpose of the HCCC was to protect the public from dangerous health practitioners. Today, it would appear to an informed observer that the real purpose of this body is to protect dangerous practitioners and practices from the general public.

The HCCC’s sordid recent history includes its failure to act in the case of Graeme Reeves, known as the Butcher of Bega. Reeves was accused of mutilating and abusing over 500 women, many of whom filed complaints against him with the HCCC. Over more than a decade, they failed (or refused) to act any of these complaints.

Is the HCCC above the law?

Prior to the HCCC’s court loss, that organization was already one of the most powerful in Australia, being immune to either subpoena or GIPA (Freedom of Information) claims.

In 2013 however, the HCCC was granted the right to file complaints against organizations or individuals – without any evidence of harm – and then investigate and punish those they themselves had complained about, making them judge, jury and executioner.

If Parliament grants the HCCC the powers being discussed by this inquiry, then they may be able to stop anyone from discussing, practicing or using natural therapies.

Speak out to protect health rights

Submissions from the public are being accepted until February 7, 2014. Those who are interested in supporting and protecting health rights and freedom of speech are urged to write a brief submission (3-4 paragraphs) explaining why you believe that suppression of health discussions is not in the public interest.

The Committee website contains information on how to make a submission as well as the ToR for the inquiry and other important details.

This is an unprecedented attack on health rights which must be strenuously opposed whether you live in Australia or elsewhere.

References:

HCCC Parliamentary Committee Inquiry into the Promotion of False or Misleading Health-Related Information or Practices:
http://www.parliament.nsw.gov.au

Australian Vaccination Network:
http://www.avn.org.au

Supreme Court Decision – AVN v NSW HCCC:
http://tinyurl.com/mungvwq

The HCCC, the law and morality:
http://nocompulsoryvaccination.com

Gynecologist accused of mutilating, abusing hundreds of women:
http://www.foxnews.com

‘Butcher of Bega’ gets two-year minimum sentence for genital mutilation:
http://melindatankardreist.com

Source: Natural News Author: REALAustralianSceptics About the author:
Sceptics are generally considered to be people who take nothing at face value. They want to see the proof for themselves and don?t accept what they are told unless they can see the evidence with their own eyes.

In today?s society, conflicting opinions, vested interests and the rule of law seem more likely to be governed by an unquestioned, all-powerful scientific elite than by evidence and transparent access to information. There are many who feel that democracies have become scientocracies ? where ?scientists? enact and determine legislation for their own reasons ? rather than the benefit of citizens.

In a climate such as this, it is so important to be a sceptic and to be able to recognise the difference between REAL scepticism and, what is far more common, pseudo (or false) scepticism.

REAL sceptics take responsibility for themselves and their families by doing their own research and making their own choices. These choices are unaffected by popular beliefs and unswayed by the mob mentality evident in so many government and medical community decisions today.

Top NSA Whistleblower: [NSA] Management Had Made The Plan To Spy On The United States And The People Of The United States Even Before 9/11

And 9/11 Was Just the Excuse to Roll Out Mass Surveillance

nsa-augeThe government’s spying on Americans began before 9/11 (confirmed here and here. And see this)

As the former head of the NSA’s operations division, who was in charge of the global digital intelligence gathering program and oversaw 6,000 employees – William Binney – said:

“[NSA] management had made the plan to spy on the United States and the people of the United States even before 9/11.

Then – when 9/11 occurred – that was the pure excuse for them to go in and say now, telecoms, we really need the data now to be able to protect the United States from terrorism.

And that was simply false to begin with. We had no problem at all identifying these people from the beginning. That was absolutely false. But that was the pretext they used to get that process running.”

 http://www.youtube.com/watch?v=qB3KR8fWNh0&width=450&height=281

Source: http://www.washingtonsblog.com

Warning: Enrolling in Obamacare allows government to link your IP address with your name, social security number, bank accounts and web surfing habits

obamacare_rally_APWe have already established that Healthcare.gov is not a functioning database application that allows people to shop for competing health plans. It is actually a government-run Trojan Horse that suckers people into creating accounts where they hand over:

• Name and address
• Email address and password
• Social security number
• Private bank account details
• Employer details and other information

During the enrollment process, your computer also hands over your IP address which is then tied to your social security number.

This IP address is then handed over to the NSA thanks to its new mega-black-hole data center in Utah, where your IP is cross-referenced with all website visits, including:

• “Anti-government” websites
• Porn sites
• Gambling sites
• File sharing sites
• “Terrorism” support sites
• Encryption service sites like Hushmail
• Chat rooms, message boards and more

Armed with this information, the NSA can then link your seemingly-anonymous online chats, comments and posts with your social security number. Linguistic algorithms can “score” your online posts to create red flags that call for additional investigations of anyone using words like “liberty” or “patriot.”

This information can then be turned over to law enforcement, as is found in the fine print of the Maryland Obamacare exchange, which states:

…we may share information provided in your application with the appropriate authorities for law enforcement and audit activities.

Thus, by enrolling in Obamacare, you are voluntarily surveilling yourself and handing over the data to the government while also AGREEING to terms of self-incrimination.

Ponder the implications of this for a moment…

Obamacare is actually a self-incrimination surveillance program designed to ensnare the American people in a devil’s contract

Obamacare is the meta-level con of tricking Americans into thinking they’re signing up for free health insurance when, in reality, the website primarily exists to scrape personal financial details, passwords, emails and social security numbers from Americans who will later be targeted by the government itself.

All the emails registered with Healthcare.gov, for example, will likely be used by the Obama administration to spam people with political propaganda or contrived “terror alerts” that use fear to concentrate more power in the hands of government.

All the financial data will be turned over to the IRS for criminal investigations of Americans who are suspected of under-reporting their incomes (or supporting “patriot” groups with financial donations).

All the passwords used on Healthcare.gov will be turned over to the NSA and matched up with individual IP addresses so that NSA operatives can hack into private bank accounts, encrypted email accounts and other private data, based on the assumption that most users use identical passwords across all the websites they commonly access. (A person’s password under Obamacare probably has a 50% chance of also working for their online banking. And since the NSA has your social security number, it’s a no-brainer to match up your online surfing habits with your phone number, home address, investment holdings, tax returns, international travel history and so on.)

In essence, Obamacare allows the government to gather a goldmine of private data that can be exploited to target, punish, incriminate, blackmail or steal from any desired target.

As this is a federal government that believes it now has total power to do anything it wants without limit, there are no boundaries of what it might do with this data. Remember, Obama is the president who literally maintains “kill lists” of Americans to have terminated. This is openly admitted and confirmed. The Obama administration also believes it can bypass Congress and simply create new law by executive order, concentrating all power into its own hands with no regard for the separation of power upon which this nation was founded.

As is common with tyrants, the Obama administration truly believes the People have no right to privacy, no right to due process, no right to representation in government and no right to determine your own engagement in commerce. This is why Obama is playing such hardball to shove Obamacare down everybody’s throats: the government desperately needs to gather all this surveillance data so that it can leverage it to blackmail members of the U.S. Supreme Court, the Senate, the House, and even federal judges. Blackmail is essential to maintaining power in a corrupt society. And Healthcare.gov is the portal for scraping passwords, IP addresses and even financial details from anyone gullible enough to actually hand this over to government (i.e. democrats).

As far as I’m concerned, the IRS can fine me all they want. I’m never voluntarily enrolling in Obamacare, even if you put a gun to my head like Obama is doing to the entire nation right now with this insane, contrived government shutdown that treats our own veterans like dirt.

All dignity is now gone from the Obama administration. Zero credibility remains. The government has all but openly declared war on the People and is actively using tricks like Healthcare.gov to coerce people into incriminating themselves. The Obama administration is out of control and a grave danger to society. It must be lawfully stopped from damaging America any further.

Now is the time to seriously discuss impeachment, not just of the President but of every U.S. Senator and House member who voted for this unconstitutional, “Trojan Horse” health care system that’s destroying America’s economy and wasting an unprecedented amount of time, money and effort. End Obamacare now and restore dignity and justice to America.

Source: Natural News – Mike Adams, Health Ranger