The power and danger of complexity and secrecy

3/9/2015 – Corporations and the wealthy use complexity and secrecy combined to operate under the radar. This is a big deal– an approach and system that was a real shock to me. Imagine– a bank with thousands of subsidiary operations. I’m not talking about branch outlets for the public. I’m talking about subsidiaries created to hide what is being done by whom and what.

That is the current state of capitalism. It is designed for evading, skirting and totally breaking the law and avoiding paying taxes and externality costs. it is a system that should not exist.

Chris Taggart, of Opencorporates.com, presenting at personaldemocracyforum.com, gave a talk describing how complexity and secrecy are used by corporations. He said, “this complexity is really great if you want to avoid detection, if you don’t want to be supervised, if you don’t want people to know what you are doing. One of the groups that really loves this is criminals…. it also provides powerful incentives to do bad behavior.”

Taggart says, “The complexity of these things is absolutely mind-blowing. Lehman brothers, just before it went to the wall, it’s last filings with SEC filing had something like 300 subsidiaries in its filing disclosed. But the bank of international settlements subsequently did an audit of it and found 2985 legal entities… ”

The opencorporates.com site is a powerful tool. I don’t expect most readers to dive in and build something with their API (application programming interface– Opednews using numerous APIs in different parts of the custom designed Populum content management system.) But my hope is that when you see the name of a big company, you start thinking of it as a web or network of hundreds, if not thousands of veiled subsidiaries operating with multiple levels of complexity and secrecy.

Think about how these companies and their billionaire owners are doing all they can to sabotage, weaken and hamstring government watchdog organizations so as to prevent them from even tracking their existence. This is the current state of capitalism. Many say that there is no alternative better than capitalism. I would argue that there are many different manifestations and kinds of capitalism. it is possible to create models that require openness, transparency and simplicity. We need to start electing and supporting people who walk the talk. (Obama gave the talk but has not walked it.)

….Imagine an organism with two eyes. Now imagine an massive organism with sensors that reach out, like cilia, or moth antennae, sensing in thousands of ways from thousands of miles away, sensing almost every manifestation of your being. That’s what is possible with all of these subsidiaries– and you can be sure that agencies like the CIA and other intelligence and homeland security operations use the same strategies, setting up corporations and then subsidiaries of them to work in ways that they want to keep hidden….

By Rob Kall – OpEdNews.com –

Surveillance now happening to them, 64% of reporters say

The concept of a “free press” is all but dead and buried in America today, it seems. A recent poll conducted by the Pew Research Center revealed that nearly two-thirds (64 percent) of investigative reporters in the United States believe that the government has “probably collected data about their phone calls, emails or online communications, and eight-in-ten believe that being a journalist increases the likelihood that their data will be collected.”

This is a shocking revelation, especially considering the fact that the current administration promised to be “the most transparent” in the nation’s history. In fact, the Obama Administration has shown itself to be remorseless [and relentless] in pursuing those who leak information to the press and in spying on reporters who dare to investigate its activities….

Although most investigative reporters say that the spying has not affected their reporting, a significant percentage admit that they have modified their journalistic approach.

From the Pew report:

Just 14% say that in the past 12 months, such concerns have kept them from pursuing a story or reaching out to a particular source, or have led them to consider leaving investigative journalism altogether.

However, 49 percent say they have “at least somewhat changed the way they store or share sensitive documents.” And 29 percent admit they have changed the way they communicate with “other reporters, editors or producers.”….

One of the few journalists who has been outspoken on the matter is Sharyl Attkisson. She is the author of a new book entitled Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington, in which she claims that the government has harassed her, spied on her and even planted “incriminating evidence” on her computer’s hard drive….

By Daniel Barker – Natural News –

Can Revolution Produce Freedom in the Technological Age of Surveillance and Control?

The topic of the Unabomber came up again. The favorite passage of transhumanist Ray Kurzweil and Bill Joy, founder of the now acquired Sun Microsystems in which Ted Kaczynski explains the “New Luddite Challenge” – essentially the question of what happens if computers take over, and if not, what happens at the hands of an elite who don’t need the masses for labor, or anything else. Will people be simply exterminated?

Will the population be gradually but sharply reduced through population control, eugenics, family planning and propaganda (as is actually happening now), or will the masses instead be treated as “pets” with cute hobbies and trivial pursuits, but no real meaning in society? The question remains, or could be a combination of all of the above.

In the face of mass unemployment and depopulation, is violent revolution justified? For reasons I explain, likely not. It is not clear who could be stopped with force that would result in stopping the tyranny; the tyranny exists, but it is systematic and compartmentalized in the hands of thousands, and probably millions of people. Moreover, violence has become a trivial event for media sensationalism and in justifying greater police state powers, etc. Thus, violence is the wrong approach on many levels, including moral.

Meanwhile, there is the question of liberty, and the kind of freedom that America’s Founding Fathers pursued circa 1776. Though other methods were attempting – the Tea Party protest, for instance – the revolution was ultimately fought through violent, guerrilla warfare. One of Thomas Jefferson’s most famous quotes – as author of the Declaration of Independence and third president of the United States of America – is: “The tree of liberty must be refreshed from time to time with the blood of patriots and tyrants.”

Years later, in his letters to John Adams, the second president and a former political enemy of Jefferson’s, Jefferson posed the idea that freedom could not so easily restored through violence, particularly if the public were unenlightened and uneducated in the ways of liberty and good self government.

Jefferson discusses the case of ancient Rome, where the usurped powers of Julius Caesar transformed the republic into a thoroughly corrupt dictatorship. Caesar was killed in a conspiracy by the Senate, led by Brutus. Ultimately, the Caesar family remained in control of the empire anyway.

But Jefferson argues that even if Brutus had prevailed, or other Roman freedom lovers such as Cicero or Cato in power, it would have been nearly impossible to create good government in the climate of corruption, and the era of debased, demoralized masses who were uneducated in the virtues of self-government….

By Aaron Dykes – Activist Post –

Whistleblower: NSA Spying On & Blackmailing Top Gov’t & Military Officers

NSA whistleblower Russel Tice – a key source in the 2005 New York Times report that blew the lid off the Bush administration’s use of warrantless wiretapping – tells Peter B. Collins:

Tice: “Okay. They went after–and I know this because I had my hands literally on the paperwork for these sort of things–they went after high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the–and judicial. But they went after other ones, too. They went after lawyers and law firms. All kinds of–heaps of lawyers and law firms. They went after judges. One of the judges is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House–their own people. They went after antiwar groups. They went after U.S. international–U.S. companies that that do international business, you know, business around the world. They went after U.S. banking firms and financial firms that do international business. They went after NGOs that–like the Red Cross, people like that that go overseas and do humanitarian work.They went after a few antiwar civil rights groups. So, you know, don’t tell me that there’s no abuse, because I’ve had this stuff in my hand and looked at it. And in some cases, I literally was involved in the technology that was going after this stuff. And you know, when I said to [former MSNBC show host Keith] Olbermann, I said, my particular thing is high tech and you know, what’s going on is the other thing, which is the dragnet. The dragnet is what Mark Klein is talking about, the terrestrial dragnet. Well my specialty is outer space. I deal with satellites, and everything that goes in and out of space. I did my spying via space. So that’s how I found out about this.”

https://www.youtube.com/watch?v=2DmN80yi5mo&feature=player_embedded

Collins: “Now Russ, the targeting of the people that you just mentioned, top military leaders, members of Congress, intelligence community leaders and the–oh, I’m sorry, it was intelligence committees, let me correct that–not intelligence community, and then executive branch appointees. This creates the basis, and the potential for massive blackmail.”

Tice: “Absolutely! And remember we talked about that before, that I was worried that the intelligence community now has sway over what is going on. Now here’s the big one. I haven’t given you any names. This was is summer of 2004. One of the papers that I held in my hand was to wiretap a bunch of numbers associated with, with a 40-something-year-old wannabe senator from Illinois. You wouldn’t happen to know where that guy lives right now, would you? It’s a big white house in Washington, DC. That’s who they went after. And that’s the president of the United States now.”

By WashingtonsBlog.com

Gallup CEO: I May “Suddenly Disappear” For Telling Truth

Gallup CEO Jim Clifton told CNBC he might “suddenly disappear” for telling the truth about the Obama unemployment rate.

The real Obama unemployment rate has never recovered and is still above 10%. [See chart]]

Wall Street on Parade reported:

Years of unending news stories on U.S. government programs of surveillance,rendition and torture have apparently chilled the speech of even top business executives in the United States.

Yesterday, Jim Clifton, the Chairman and CEO of Gallup, an iconic U.S. company dating back to 1935, told CNBC that he was worried he might “suddenly disappear” and not make it home that evening if he disputed the accuracy of what the U.S. government is reporting as unemployed Americans.

The CNBC interview came one day after Clifton had penned a gutsy opinion piece on Gallup’s web site, defiantly calling the government’s 5.6 percent unemployment figure “The Big Lie” in the article’s headline. His appearance on CNBC was apparently to walk back the “lie” part of the title and reframe the jobs data as just hopelessly deceptive.

Clifton stated the following on CNBC:

“I think that the number that comes out of BLS [Bureau of Labor Statistics] and the Department of Labor is very, very accurate. I need to make that very, very clear so that I don’t suddenly disappear. I need to make it home tonight.” [See video]

By Jim Hoft – The Gateway Pundit –

Over 64% of reporters say Feds spying on them

In a survey of investigative reporters that makes Richard Nixon’s enemies list look like child’s play, nearly seven in 10 said they believe that the Obama administration has spied on their phone calls, emails and online searches.

According to a Pew Research Center survey of 454 media figures, 64 percent “believe that the U.S. government has probably collected data” from their calls and email and eight in 10 believe just being a journalist jumps the chance Uncle Sam is spying on them.

The survey follows multiple reports of actual spying by federal officials on reporters, and the White House’s effort to track down those who leak information to reporters despite long-forgotten promises to be the most transparent administration ever.

Still, most reporters said that they continue to plug away.

“Just 14 percent say that in the past 12 months, such concerns have kept them from pursuing a story or reaching out to a particular source, or have led them to consider leaving investigative journalism altogether,” said the survey of members of Investigative Reporters and Editors by Pew in association with Columbia University’s Tow Center for Digital Journalism.

It has, though, prompted about half to change how they do their job, by inventing new ways to store and collect their information.

That’s in part because they don’t have much faith in online security offered by their employers or internet service providers.

By Paul Bedard – Washington Examiner –

Note from OnlyWay Editor David McElroy: I too feel spied upon.

Facebook tracks you even when you are not on Facebook

Facebook is making users sign up for new privacy policy that allows it to track users everywhere on the Internet

This is really bad news for privacy lovers , he has just updated its privacy policy which allows to track you even after you have left Facebook website to surf other pages. And more over you have already agreed to it without knowing it.

Facebooks new policy allows it to gather data about you, from across the internet. This is in addition to the normal data it generally gathers when you post something or add friends to your network. The new privacy policy has such provisions that, Facebook now pass this information with its subsidiaries like WhatsApp and Instagram.Readers may not that Facebook had already announced the new privacy policy last November but it is being implemented from Friday. You may be surprised as to why Facebook did not notify you, but it so happens that you are deemed to have agreed to the new policy once you log into Facebook.Facebook management says that the new policy will help it tabulate data which can be used to serve precision adverts to the users and avoid serving unwanted information to them.

The saving grace is that you can opt out for some parts of the new policy by customising privacy settings. You can visit Facebook website settings page here and opt out of advertising that is shown on third party sites or is selected by comparing you with your friends.

If you want to opt out of Facebook tracking your use when you are not on Facebook, you can opt out by visiting individual pages listed in the privacy settings page for respective countries.

By Digital Munition –

Gov’t surveillance Greater Threat than Terrorism

….[In] George Orwell’s dystopian fiction classic, “Nineteen Eighty-Four.” Winston Smith was breaking the law by seeking privacy outside the range of the “telescreen” in his apartment.

In an irony that would no doubt give Orwell grim satisfaction in his own prescience, Britons today are being pursued and prosecuted under an Act of Parliament designed to curb terrorism… for failing to pay a license fee for the televisions in their own homes.

Big Brother is watching you!

Orwell wrote soon after the invention of the television, which he envisaged as having evolved into an all-seeing two-way surveillance and propaganda device: the telescreen. It subjected viewers to constant hectoring demands for obedience and reported their every move to Big Brother, the avatar of the all-seeing surveillance state.

The fact that the novel is set in a future (and fictional) Britain only heightens the irony of recent revelations in the U.K. The government of Tory Prime Minister David Cameron has been using surveillance powers designed for the “War on Terrorism” to ferret out Britons who have not paid their hated “TV License,” a £145.50 ($220) annual tax imposed on every home containing a set in the country.

Her Majesty’s government clearly takes this odious little tax very seriously, so much so that the BBC is using the Regulation of Investigatory Powers Act (RIPA) — designed to catch terrorists and Internet criminals — to track down people who dodge the license fee.

About 200,000 people were prosecuted for failing to buy a TV license between 2012 and 2013. More than 50 of those were sent to prison, and many others received penalties of up to £1,000 and a criminal record….

Orwell wrote with extraordinary perception and clarity, taking as his central theme the ways in which government’s attempts to serve its citizens are inevitably turned against us. Any policy, program or technique developed to “protect our freedoms” will be used to achieve the opposite.

Orwell would recognize the absurd irony of the situation in Western countries following the recent atrocities in Paris targeting the satirical newspaper Charlie Hebdo. In response to these terror attacks, David Cameron has effectively launched a war against encryption, deeming private communication too great a threat to afford to keep as it prevents government from tracking and monitoring potential terrorists.

After loud protestations for “freedom of speech” following a terrorist attack on a magazine, our leaders barely pause for breath before demanding even greater surveillance powers than they already have — powers that, as Winston Smith knew, turn us all into self-censoring drones, fearful of saying or doing something that might offend Big Brother.

….If otherwise law-abiding Britons can go to jail over a petty tax, courtesy of surveillance powers grabbed in the name of fighting terrorism, imagine what can and will happen if the government decides to turn its attention to you.

This is why, now more than ever, you need to take concrete steps to secure your privacy — not just from crooks, but from the greatest enemy of freedom there is: the government.

By using techniques of encryption (while it’s available), secure end-to-end communication and identity masking, you can become a free and sovereign man or woman, because you control the knowledge available about you.

But you’ve got to start now… before it’s too late.

By Ted Baumann – Personal Liberty –

Russian spy ship in Havana during US-Cuba talks

A Russian intelligence warship docked in Havana on Tuesday, a day before the start of historic US-Cuba talks aimed at normalizing diplomatic relations.

There was nothing stealthy about the arrival of the Viktor Leonov CCB-175, which was moored to a pier in Old Havana where cruise ships often dock. But the visit was not officially announced by Cuban authorities.

US officials in Washington played down the presence of the Russian vessel, saying it was perfectly legal and not at all out of the ordinary.

“It’s not unprecedented. It’s not unusual. It’s not alarming,” a defense official told AFP.

The Vishnya or Meridian-class intelligence ship, which has a crew of around 200, went into service in the Black Sea in 1988 before it was transferred seven years later to the northern fleet, according to Russian media.

From AFP & Yahoo News –

Welcome To The Matrix: Enslaved By Technology & The Internet

If ever Americans sell their birthright, it will be for the promise of expediency and comfort delivered by way of blazingly fast Internet; cell phone signals that never drop a call; thermostats that keep us at the perfect temperature without our having to raise a finger; and entertainment that can be simultaneously streamed to our TVs, tablets, and cell phones.

Likewise, if ever we find ourselves in bondage, we will have only ourselves to blame for having forged the chains through our own lassitude, laziness, and abject reliance on internet-connected gadgets and gizmos that render us wholly irrelevant.

Indeed, while most of us are consumed with our selfies and trying to keep up with what our so-called friends are posting on Facebook, the megacorporation Google has been busily partnering with the National Security Agency (NSA), the Pentagon, and other governmental agencies to develop a new “human” species, so to speak.

In other words, Google—a neural network that approximates a global brain—is fusing with the human mind in a phenomenon that is called “singularity”; and they’ve hired transhumanist scientist Ray Kurzweil to do just that. Google will know the answer to your question before you have asked it, Kurzweil said. “It will have read every email you will ever have written, every document, every idle thought you’ve ever tapped into a search-engine box. It will know you better than your intimate partner does. Better, perhaps, than even yourself.”

But here’s the catch: the NSA and all other government agencies will also know you better than yourself. As William Binney, one of the highest-level whistleblowers to ever emerge from the NSA said, “The ultimate goal of the NSA is total population control.”

Science fiction, thus, has become fact.

We’re fast approaching Philip K. Dick’s vision of the future as depicted in the film Minority Report. There, police agencies apprehend criminals before they can commit a crime; driverless cars populate the highways; and a person’s biometrics are constantly scanned and used to track their movements, target them for advertising, and keep them under perpetual surveillance.

Cue the dawning of the Age of the Internet of Things, in which internet-connected “things” will monitor your home, your health, and your habits in order to keep your pantry stocked, your utilities regulated, and your life under control and relatively worry-free.

The key word here, however, is control.

In the not-too-distant future, “just about every device you have — and even products like chairs, that you don’t normally expect to see technology in — will be connected and talking to each other.”

By 2018, it is estimated there will be 112 million wearable devices such as smart watches, keeping users connected in real time to their phones, emails, text messages, and the Internet. By 2020, there will be 152 million cars connected to the Internet and 100 million Internet-connected bulbs and lamps. By 2022, there will be 1.1 billion smart meters installed in homes, reporting real-time usage to utility companies and other interested parties.

….I’m not suggesting we all become Luddites. However, we need to be aware of how quickly a helpful device that makes our lives easier can become a harmful weapon that enslaves us.

This was the underlying lesson of The Matrix, the Wachowski siblings’ futuristic thriller about human beings enslaved by autonomous technological beings that call the shots. As Morpheus, one of the characters in The Matrix, explains:

“The Matrix is everywhere. It is all around us. Even now, in this very room. You can see it when you look out your window or when you turn on your television. You can feel it when you go to work… when you go to church… when you pay your taxes. It is the world that has been pulled over your eyes to blind you from the truth.”

“What truth?” asks Neo.

Morpheus leans in closer to Neo: “That you are a slave, Neo. Like everyone else, you were born into bondage. Born into a prison that you cannot smell or taste or touch. A prison for your mind.”

By John W. Whitehead – Western Journalism –

New police radars can ‘see’ inside homes

At least 50 U.S. law enforcement agencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance.

Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person’s house without first obtaining a search warrant.

The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. They can detect whether anyone is inside of a house, where they are and whether they are moving.

Current and former federal officials say the information is critical for keeping officers safe if they need to storm buildings or rescue hostages. But privacy advocates and judges have nonetheless expressed concern about the circumstances in which law enforcement agencies may be using the radars — and the fact that they have so far done so without public scrutiny.

“The idea that the government can send signals through the wall of your house to figure out what’s inside is problematic,” said Christopher Soghoian, the American Civil Liberties Union’s principal technologist. “Technologies that allow the police to look inside of a home are among the intrusive tools that police have.”

Agents’ use of the radars was largely unknown until December, when a federal appeals court in Denver said officers had used one before they entered a house to arrest a man wanted for violating his parole. The judges expressed alarm that agents had used the new technology without a search warrant, warning that “the government’s warrantless use of such a powerful tool to search inside homes poses grave Fourth Amendment questions.”

By Brad Heath – USA Today –

$10 USB charger that steals MS keyboard strokes

It sounds like the stuff of a James Bond flick or something described in documents leaked by former NSA subcontractor Edward Snowden. In fact, the highly stealthy keystroke logger can be built by someone with only slightly above-average technical skills for as little as $10. Called KeySweeper, it’s a device disguised as a functioning USB wall charger that sniffs, decrypts, logs, and transmits all input typed into a Microsoft wireless keyboard.

KeySweeper is the brainchild of Samy Kamkar, a hacker who has a track record of devising clever exploits that are off the beaten path. The namesake of the Samy worm that inadvertently knocked MySpace out of commission in 2005, Kamkar has concocted drones that seek out and hack other drones and devised exploits that use Google Streetview and Google Wi-Fi location data to stalk targets. His hacks underscore the darker side of the connected world that makes it possible for bad guys to monitor our most private communications and everyday comings and goings.

KeySweeper follows the same path. Unveiled on Monday, it provides the software and hardware specifications for building a highly stealthy sniffing device that plucks out every keystroke inputted to a Microsoft wireless keyboard. The device can either log the input on a chip for physical retrieval later, or it can use an optional GSM chip to transmit the keystrokes wirelessly to the attacker. For maximum efficiency, it can be programmed to send the operator SMS messages whenever certain keywords—think “bankofamerica.com,” “confidential,” or “password”—are entered. The entire sniffing device can be stashed inside an AC USB charger that powers the device. It recharges when plugged in and runs off of battery when not connected to a power source. To people being spied on, it looks like just another USB charger plugged into a wall socket.

By Dan Goodin – Ars Technica –

Examples of Police State Technology Making Our Rights Obsolete as we Head into 2015

Things are not looking pretty for the land of the free.

The year 2014 has made it very clear that privacy is under threat, and the situation is not likely to improve. Mass surveillance – which became a national issue via theEdward Snowden leaks – is not subsiding or under reform; instead, it is becoming more bold and complex with each passing day.

It would take several books to catalog the myriad ways in which the rights of The People have been casually infringed upon by various levels of government just in years since 9/11 and the introduction of the PATRIOT Act.

And it’s not only federal agencies like the NSA, Homeland Security and the FBI that are taking liberties with our … umm … liberties; it is local police, too. The rise of technology is rapidly fueling these agencies with data and “intelligence” with very little oversight and even less pause for reflection to use these powerful abilities wisely and, yes, judiciously.

Here are just a few major areas where privacy has lost badly to surveillance technology in 2014. Not that anyone is paying attention, but they are worth reflecting upon soon – hopefully before it is too late to turn things back around:

1. Militarized Police and Weapons of War on American Streets:

True, this technology has been in use for several years now and has been demonstrated at protests such as the those held outside of the G20 in Pittsburgh, Toronto and other locales.

But the events in Ferguson really allowed this brand of crowd control to come of age. This and other key protests have seemingly justified a massive police response for just about anything now …but… you know, the first amendment is still respected and all.

The Daily Sheeple reported:

Ferguson police have stocked up on less-lethal ammunition in the last few months including “hornets nest” CS sting grenades, which shoot out dozens of rubber bullets and a powdered chemical agent upon detonation, tear gas, riot gear, plastic handcuffs and the like in the lead up to the decision which is expected to come any time now. St Louis County police have spent $172,669 on this stuff just since August.

The Pentagon’s 1033 surplus program, which hands out everything from MRAP armored vehicles, to bulletproof vests, assault rifles, and other military weapons to domestic law enforcement agencies, is one of the major reasons that ordinary police departments, including those in small towns, are gearing up as for battle … and that includes Ferguson:

The Department of Defense Excess Property Program (1033 Program) is authorized under federal law and managed through the Defense Logistics Agency’s Law Enforcement Support Office (LESO) in Ft. Belvoir, Va. The 1033 Program provides surplus DoD military equipment to state and local civilian law enforcement agencies for use in counter-narcotics and counter-terrorism operations, and to enhance officer safety. The Missouri Department of Public Safety is the sponsoring state agency responsible for administration of the 1033 Program in Missouri.

2. Biometrics Comes of Age:
Fingerprints and iris scans are becoming normalized as identifiers on mobile phones, including the iPhone 5, computers and other platforms.

Increasingly, technology – including devices used by police – areutilizing other bodily features (in addition to fingerprints and eyes) to identify you, including ears, noses, heart rate (via electrocardiogram), blood vein matching, your scent or smell and even “butt biometrics” – no joke – which will allow smart car seats to identify the sitter based on their unique posture.

While these are surely being integrated into law enforcement devices, they are also becoming the mainstays of “wearables,” the new trendy technology that is collecting data on all of those using it to track health progress, etc.

Surveillance cameras have already been used to identify you by your walk for several years now, but advances have allowed technology to even identify the person wearing a camera, such as a police officer with a mounted body cam, by just 4 seconds of footage, revealing a ‘biometric fingerprint’of the individual.

Of course, roadside blood draws have already entered the picture in law enforcement work, including numerous locales that have implemented mandatory policies during stops. This is sure to pick up. In Seattle, the National Highway Traffic Safety Administration (NHTSA) recently conducted a paid, voluntary survey of drivers who received up to $60 to give blood and breath samples at a roadside stopin an effort to study how many people drive impaired.

3. Smart Phone Apps Know Everything About You:

Vocative published a long and unsettling list of apps for smart phones and other similar devices that all collect untold amounts of information about you every day.

Whether you realize it or not, permissions for apps routinely allow the collection and sharing of such information as your contact and address book, your text message, audio recorded from your device’s microphone, your call log and much more.

Yes, this is really happening, so beware if you are using mobile apps including:

By Mac Slavo – Activist Post –

Homeland Security fails to secure: congressional investigators

Less than 3 percent of illegal immigrants will ever be deported, and more than 700 miles of the U.S.-Mexico border remained unsecured as of 2014, according to Sen. Tom Coburn’s final oversight report released Saturday morning, which found the Homeland Security Department failing in several of its top missions.

The report also said corruption is a serious problem in the Border Patrol, but said agency officials actually told internal affairs investigators to cut down on the number of cases they were pursuing, according to the former division head.

In another finding Mr. Coburn’s staff on the Senate Homeland Security Committee found mission creep to be a problem: agents at one immigration agency spent time cracking down on women’s lingerie that they believed infringed on Major League Baseball’s officially licensed logos. The agents raided a lingerie store in Kansas City, Mo., flashed their badges and confiscated 18 pairs of underwear marked with an unauthorized Kansas City Royals logo, Mr. Coburn’s investigators found.

Mr. Coburn said that agency, U.S. Immigration and Customs Enforcement, should spend more time focusing on illegal immigrants and less time on property issues like women’s underwear.

Meanwhile, more than 700 miles of the border were deemed porous because there was “little to no deployment density or aviation surveillance coverage” to detect illegal immigrants, smugglers or others, said Mr. Coburn, an Oklahoma Republican who retired effective Saturday.

That 700-mile figure accounts for more than a third of the southern border. Mr. Coburn warned the northern border was even worse-off.

By Stephen Dinan – The Washington Times –

NSA Drops Christmas Eve Surprise

The National Security Agency on Christmas Eve day released twelve years of internal oversight reports documenting abusive and improper practices by agency employees. The heavily redacted reports to the President’s Intelligence Oversight Board found that NSA employees repeatedly engaged in unauthorized surveillance of communications by American citizens, failed to follow legal guidelines regarding the retention of private information, and shared data with unauthorized recipients.

While the NSA has come under public pressure for openness since high-profile revelations by whistleblower Edward Snowden, the release of the heavily redacted internal reports at 1:30PM on Christmas Eve demonstrates limits to the agency’s attempts to demonstrate transparency. Releasing bad news right before a holiday weekend, often called a “Christmas Eve surprise,” is a common tactic for trying to minimize press coverage.

The reports, released in response to a Freedom of Information Act request submitted by the American Civil Liberties Union, offer few revelations, but contain accounts of internal behavior embarrassing to the agency. In one instance an NSA employee “searched her spouse’s personal telephone directory without his knowledge to obtain names and telephone numbers for targeting”, a practice which previous reports have indicated was common enough to warrant the name “LOVEINT”.

Many of the reports appear to deal with instances of human error rather than malicious misuse of agency resources. Nonetheless, many of these errors are potentially serious, including entries suggesting that unminimized U.S. telephone numbers were mistakenly disseminated to unauthorized parties and that military personnel were given unauthorized access to raw traffic databases collected under the Foreign Intelligence Services Act.

By Murtaza Hussain – The Intercept –

The Strange World of NSA Mind Control

The surveillance society is a secretive apparatus of intrusion and deception. An enigma within a disinformation perception of reality is at the core all activities of spooks. One of the most pervasive and all reaching agencies is the NSA. The National Security Administration officially is a cryptologic intelligence agency whose primary function is Signals Intelligence Directorate (SID), which produces foreign signals intelligence information, and the Information Assurance Directorate (IAD), which protects U.S. information systems. The General Accounting Office defines the nature of the structure of the NSA.

“The National Security Agency (NSA) is a combat support agency within the Department of Defense (DOD) established by presidential directive in 1952. NSA has two separate missions: signals intelligence and communications security. For signals intelligence, NSA manages all U.S. signal collection and processing and produces signals intelligence in accordance with DOD and DCI priorities. For communications security, NSA provides leadership, products, and services to U.S. agencies that need to protect their information and communication systems from foreign exploitation. NSA is headed by a three-star flag officer, who reports to the Secretary of Defense. About 80 percent of the NSA workforce is civilian.”

….Have you ever head of Lt. Col. Michael A. Aquino? Aquino as high priest of the temple of set, arguably the world’s most prolific satanic institution and a former disciple of Anton LaVey (founder of First Church of Satan), is reportedly a master psychic, good at psionics, and rumored the highest ranking member of the NSA. The NSA site lists former Directors and has General Keith B. Alexander, United States Army as the current head of the agency. Are we supposed to believe that a devil worshipper can serve at the highest levels of the military industrial security complex? Can such claims be credible?

….Rational individuals, schooled in historic investigation, should not automatically dismiss the length and depths that evil rulers use to enslave societies. If the subject of mind control interests you, consider a review of the NSA Mind Control and Psyops. The theme of this material addresses methods used to influence and manipulate thinking and behavior. “Subliminal Implanted Posthypnotic Suggestions and Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic Commands without Somnambulistic Preparation in the Subject for Intelligence and Counterintelligence Applications by the United States National Security Agency.” Another source to review is “Domestic Surveillance and Mind Control Technology”. Under NSA “Signals Intelligence Use of EMF Brain Stimulation”, another diabolical technique is examined. “Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes.”

By James “Sartre” Hall – Breaking All The Rules –

They Have Been Ordered To “Weaponize the Government Against Unregulated Speech”

At first they will cite violations of terms of service. Then, they will select a few ‘troublemakers’ and identify them for criminal prosecution. Others will experience hacking and other electronic attacks. And during all of that, there will be the Obama team flooding the internet with misinformation and disinformation. In fact, that is already taking place.

To the modern tyrant the battlefield is everywhere and nowhere has it become more apparent than in cyberspace, where soldiers of the machine who claim they are just following orders actively work to supplant and undermine the voice of the people.

As Whittle highlighted in the video above, government officials are working to discredit anything that is not part of the mainstream narrative.

They’ll use the Federal Elections Committee to shut down any free political thought. They’ll use the IRS and the threat of prison to intimidate organizations and individuals that don’t tow the party line.

But they aren’t just targeting the organizers or those who produce content and videos that run counter to their ideals. They’re coming after the people as a whole. Your social network pages, forum comments, emails, and phone calls are being monitored .

Moreover, there is clear evidence according to a Department of Homeland Security insider that the very communities where people get together to share ideas are being targeted en masse by paid disinformation agents whose sole purpose is to destroy the credibility of the message through targeted web site takedowns and direct attacks against their users….

By Mac Slavo – SHTF.com – Video by Bill Whittle –

America Created Al-Qaeda and the ISIS Terror Group

By Garikai Chengu – Global Research –

Much like Al Qaeda, the Islamic State (ISIS) is made-in-the-USA, an instrument of terror designed to divide and conquer the oil-rich Middle East and to counter Iran’s growing influence in the region.

The fact that the United States has a long and torrid history of backing terrorist groups will surprise only those who watch the news and ignore history.

The CIA first aligned itself with extremist Islam during the Cold War era. Back then, America saw the world in rather simple terms: on one side, the Soviet Union and Third World nationalism, which America regarded as a Soviet tool; on the other side, Western nations and militant political Islam, which America considered an ally in the struggle against the Soviet Union.

The director of the National Security Agency under Ronald Reagan, General William Odom recently remarked, “by any measure the U.S. has long used terrorism. In 1978-79 the Senate was trying to pass a law against international terrorism – in every version they produced, the lawyers said the U.S. would be in violation.”

During the 1970′s the CIA used the Muslim Brotherhood in Egypt as a barrier, both to thwart Soviet expansion and prevent the spread of Marxist ideology among the Arab masses. The United States also openly supported Sarekat Islam against Sukarno in Indonesia, and supported the Jamaat-e-Islami terror group against Zulfiqar Ali Bhutto in Pakistan. Last but certainly not least, there is Al Qaeda.

Lest we forget, the CIA gave birth to Osama Bin Laden and breastfed his organization during the 1980′s. Former British Foreign Secretary, Robin Cook, told the House of Commons that Al Qaeda was unquestionably a product of Western intelligence agencies. Mr. Cook explained that Al Qaeda, which literally means an abbreviation of “the database” in Arabic, was originally the computer database of the thousands of Islamist extremists, who were trained by the CIA….

America is using ISIS in three ways: to attack its enemies in the Middle East, to serve as a pretext for U.S. military intervention abroad, and at home to foment a manufactured domestic threat, used to justify the unprecedented expansion of invasive domestic surveillance.

By rapidly increasing both government secrecy and surveillance, Mr. Obama’s government is increasing its power to watch its citizens, while diminishing its citizens’ power to watch their government. Terrorism is an excuse to justify mass surveillance, in preparation for mass revolt.

 
Continue Reading