The police and surveillance state predicted in the forward-looking 1940s classic “1984” by George Orwell, has slowly, but steadily, come to fruition. However, like a frog sitting idly in a pan of steadily-warming water, too many Americans still seem unaware that the slow boil of big government is killing their constitutional liberties.
The latest sign of this stealth takeover of civil rights and freedom was epitomized in recent Senate testimony by FBI Director James Comey, who voiced his objections to civilian use of encryption to protect personal data – information the government has no automatic right to obtain.Continue reading »
Minority Report, eat your heart out. The real system is worse than anyone could have imagined.
By now, everybody knows that the NSA and a host of other alphabet agencies are spying on Americans, collecting virtually every piece of communications data they exchange, regardless of whether or not they are “doing anything wrong.”
But what are they doing with it?
Apart from its value in consumer and marketing fields, the data is used to create “threat assessments” and put a black mark on the record of anyone who the authorities deem troublesome that will follow them throughout their career, and make it harder for individuals to get a job, qualify for a loan, travel, or enjoy the rights of a (now once) free society.
DJ published the below video on her Level 9 News YouTube channelon May 29, 2015. As of this writing the video has 11,570 views, meaning that 11,570 individuals now know the bigger picture which looms much larger behind the appearance (the “symptom”) called JADE HELM 2015. This may be one of the most important videos anyone will see this year.
We are looking at the takeover of world rulership by a system of quantum computers erected and directed by globalizing socialist financiers who control the world’s regional economies and leverage dispersion of multiple international governmental assets and corporate sector businesses to promote their plans for a “New World Economic Order” being operated by both “state” and “non-state” Actors. The American Constitution is the last obstacle these financiers must conquer, so they are mapping the human terrain with plans to “Master The Human Domain”. DJ identifies their technology along with their intent.
Churches are joining the widening club of entities using Big Brother-style facial recognition software to track people. And they are doing so in secret, according to a producer of a specialized program designed for religious institutions.
In just four months, some 30 churches around the world, from Indonesia and India to Portugal and the US have started using facial recognition software called Churchix, says Moshe Greenshpan, the CEO of Israel- and Las Vegas-based company Face-Six that sells the technology. The program is a derivative of other products his company offers to clients, such as law enforcement, public venues and retail outlets. Continue reading »
One of my great pleasures in life is attending conferences on fields I’m intrigued by, but know nothing about. (A second pleasure is writing about these events.) So when my friend Kate Crawford invited me to a daylong “Listening Machine Summit,” I could hardly refuse.
What’s a listening machine? The example of everyone’s lips was Hello Barbie, a version of the impossibly proportioned doll that will listen to your child speak and respond in kind. Here’s how The Washington Post described the doll back in March: “At a recent New York toy fair, a Mattel representative introduced the newest version of Barbie by saying: ‘Welcome to New York, Barbie.’ The doll, named Hello Barbie, responded: ‘I love New York! Don’t you? Tell me, what’s your favorite part about the city? The food, fashion, or the sights?’ Continue reading »
Just in time for facial recognition technology to lose its few privacy allies in the U.S., police in the U.K. demonstrated just what that kind of mass surveillance of the public might look like in reality.
Over the weekend, Leicestireshire police planted a series of “strategically placed cameras” throughout the grounds of an outdoor concert—ironically called the Download Festival—to scan the faces of more than 100,000 people and match them against a database of wanted criminals across Europe.
In the Governmentally bankrupt UK, big projects are rarer than ‘rocking horse crap’, but that hasn’t stopped a continuous investment in a Rothschild funded “Smart Motorway ‘ project, officially designed to ease congestion, but with added controls. Designed to give total electronic surveillance of the arterial ‘motorways’ with reactive speed sensors and continuous total CCTV coverage.
The century of ‘big data’ will be the century of unprecedented surveillance. The dream of tyrants down through history has been the total monitoring, control and management of the public, with the ability to predict the behaviour of entire populations the most efficient means of achieving this objective. For millennia, this has mainly existed in the realm of fantasy; however, with the vast leap in technology in recent decades, this idea is becoming less a dystopian science fiction movie and more the daily business of totalitarian high-tech regimes.
Most readers are now familiar with the predatory surveillance practices of agencies such as the NSA and GCHQ, which high-level NSA whistleblower William Binney describes as “totalitarian” in nature, adding that the goal of the NSA is “to set up the way and means to control the population”. Yet many people may not be aware of the next phase in the 21st century surveillance grid; the ‘smarter city’. Continue reading »
Orwellian Language – the Slide toward “Velvet Glove” Fascism Continues
Sometimes we get the feeling the ruling elites are investing the laws they enact with a kind of impertinent, slap-in-your-face black humor. How else to explain the Orwellian names given to the liberty-crushing laws that have been put in place since the “war on terror” started? Continue reading »
If you’re one of those people that gets a bit vocal about politics, you’ll be interested to know that your Facebook, Twitter and personal blog are about to begin being monitored for references to the Government.
Ministers announced yesterday that the Government had awarded a contract to five companies who will monitor what people tweet, post to Facebook or blog about the Government and provide updates to Whitehall in real time.
Officials and ministers will provide a list of keywords and topics to the companies so that they know what to monitor. Continue reading »
WASHINGTON —Without public notice or debate, the Obama administration has expanded theNational Security Agency‘s warrantless surveillance of Americans’ international Internet traffic to search for evidence of malicious computer hacking, according to classified N.S.A. documents.Continue reading »
In Odessa — the same city where the Ukrainian civil war started on 2 May 2014 with a massacre of opponents that had been carefully planned by a team connected to the U.S. White House — there are reported to be two bloggers for the “Voice of Odessa” political site who were seized by the Security Bureau of Ukraine on April 7th, and whose “whereabouts are unknown.” This report appeared in the local Odessa News.
The “Voice of Odessa” site was formed right after the massacre, in order to get an independent investigation and prosecution of the perpetrators of that massacre, in which officially 46 people were burned, shot and clubbed to death, but unofficial estimates run over 200, all victims who have not been heard from since, and some of whom had allegedly even been abducted from hospitals after the massacre.Continue reading »
The U.S. government started keeping secret records of Americans’ international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed.
For more than two decades, the Justice Department and the Drug Enforcement Administration amassed logs of virtually all telephone calls from the USA to as many as 116 countries linked to drug trafficking, current and former officials involved with the operation said. Continue reading »
There are very few government checks on what America’s sweeping surveillance programs are capable of doing. John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics.
In recent months, Facebook has been quietly holding talks with at least half a dozen media companies about hosting their content inside Facebook rather than making users tap a link to go to an external site.
The new proposal by Facebook carries another risk for publishers: the loss of valuable consumer data. When readers click on an article, an array of tracking tools allow the host site to collect valuable information on who they are, how often they visit and what else they have done on the web.
And if Facebook pushes beyond the experimental stage and makes content hosted on the site commonplace, those who do not participate in the program could lose substantial traffic — a factor that has played into the thinking of some publishers. Their articles might load more slowly than their competitors’, and over time readers might avoid those sites.
Last night, I came across an incredibly important article from the New York Times, which described Facebook’s plan to provide direct access to other websites’ content in exchange for some sort of advertising partnership. The implications of this are so huge that at this point I have far more questions than answers.
The exceptionally broad new surveillance bill lets the government do nearly unlimited warrantless mass surveillance, even of lawyer-client privileged communications, and bans warrant canaries, making it an offense to “disclose information about the existence or non-existence” of a warrant to spy on journalists.
Despite that move away from retaining communications metadata by the EU and continuing concerns in the US about the National Security Agency’s bulk phone metadata spying program, the Australian government was able to push through the amendments implementing data retention thanks to the support of the main opposition party. Labor agreed to vote in favor of the Bill once a requirement to use special “journalist information warrants” was introduced for access to journalists’ metadata, with a view to shielding their sources. No warrant is required for obtaining the metadata of other classes of users, not even privileged communications between lawyers and their clients. Even for journalists, the extra protection is weak, and the definition of what constitutes a journalist is rather narrow—bloggers and occasional writers are probably not covered. Continue reading »
Nothing you write, say, text, tweet or share via phone or computer is private anymore. As constitutional law professor Garrett Epps points out, “Big Brother is watching…. Big Brother may be watching you right now, and you may never know. Since 9/11, our national life has changed forever. Surveillance is the new normal.”
This is the reality of the internet-dependent, plugged-in life of most Americans today.Continue reading »
RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept.
The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. Continue reading »
The National Vaccine Information Center has issued an alert for Texans to help stop forced vaccination and government coercion in their home state. A total of nine bills are currently pending in the Texas state legislature that threaten medical choice and fundamental human rights.
These laws are the extension of the current wave of vaccine hysteria sweeping America thanks to an aggressive new push toward medical fascism by the mainstream media.
These bills blatantly violate the American Medical Association’s published Code of Ethics which require informed consent for all medical interventions. But medical extremism in America today is not bound by anything resembling medical ethics, and if these Texas lawmakers get their way, every person living in Texas will be tracked like dogs with a government-run vaccine status database that will almost certainly be used to conduct house-to-house SWAT raids and arrests of those who refuse to be vaccinated. Continue reading »
The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world’s computers, according to cyber researchers and former operatives.
That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations.
Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said. (reut.rs/1L5knm0) Continue reading »
Here come the “information sharing and analysis organizations”, or ISAOs.
* * *
In the aftermath of the Snowden whistleblowing scandal which has now all but been forgotten, there was a brief period when it seemed the growth of the US spying apparatus would be halted if not put into reverse. Those days are long forgotten and later today Obama is expected to to sign an executive order “that aims to make it easier for the government to share classified cyberthreat information with companies.”
The spin, as proposed by the WSJ, is that “this will be effort designed to spur collaboration and deter hackers, the White House said.” In reality what Obama’s latest executive order will do, is expand the universe of entities that has access to the trove of private confidential data contained in the vast government spying apparatus, which as has been made all too clear now focuses as much on US citizens as it does on legitimate foreign threats, and further eviscerate the concept of individual privacy in the US. Continue reading »
If Americans were honest with themselves they would acknowledge that the Republic is no more. We now live in a police state. If we do not recognize and resist this development, freedom and prosperity for all Americans will continue to deteriorate. All liberties in America today are under siege.
It didn’t happen overnight. It took many years of neglect for our liberties to be given away so casually for a promise of security from the politicians. The tragic part is that the more security was promised — physical and economic — the less liberty was protected.
With cradle-to-grave welfare protecting all citizens from any mistakes and a perpetual global war on terrorism, which a majority of Americans were convinced was absolutely necessary for our survival, our security and prosperity has been sacrificed.
It was all based on lies and ignorance. Many came to believe that their best interests were served by giving up a little freedom now and then to gain a better life. Continue reading »
Feds’ position on decoy cell-site towers continues anti-privacy theme.
The Federal Bureau of Investigation is taking the position that court warrants are not required when deploying cell-site simulators in public places. Nicknamed “stingrays,” the devices are decoy cell towers that capture locations and identities of mobile phone users and can intercept calls and texts.
The FBI made its position known during private briefings with staff members of Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Sen. Chuck Grassley (R-Iowa). In response, the two lawmakers wrote Attorney General Eric Holder and Homeland Security chief Jeh Johnson, maintaining they were “concerned about whether the FBI and other law enforcement agencies have adequately considered the privacy interests” of Americans.
The National Security Agency today released reports on intelligence collection that may have violated the law or U.S. policy over more than a decade, including unauthorized surveillance of Americans’ overseas communications.
The NSA, responding to a Freedom of Information Act lawsuit from the American Civil Liberties Union, released a series of required quarterly and annual reports to the President’s Intelligence Oversight Board that cover the period from the fourth quarter of 2001 to the second quarter of 2013. Continue reading »
The campaign to rein in the surveillance of Americans by the National Security Agency (NSA) has become even more difficult. Instead, Congress has used a set of provisions to expand the agency’s data-gathering power.
By way of two pieces of legislation, Congress maintained and expanded the NSA’s surveillance powers. In a bill now headed for President Barack Obama’s desk, Congress gave the agency what civil liberties advocates argue is an unprecedented authority to collect and store data belonging to American citizens. Continue reading »
Anonymous leaks government communication detailing real-time cell phone surveillance
An audio recording leaked by the hacktivist group Anonymous appears to prove that Chicago police used an IMSI catcher, commonly referred to as a Stingray, to intercept phone calls during an Eric Garner protest Thursday evening.
IMSI catchers, small devices that mimic cell phone towers, give police and government agencies the ability to capture people’s cellular data in real-time. The audio, posted to the official Anonymous Twitter account Friday, reveals a conversation between the CPIC, Chicago’s Homeland Security-run Fusion Center, and a police officer spying on an alleged protest leader.
Chicago police and CPIC discuss cell phone surveillance at 01:05
“Yeah, just uhh, the one of the girls is kind of an organizer here, um, she’s been on her phone a lot,” an unknown government employee told CPIC. “Are you guys picking up any, uh, any, uh, information, uh, where they’re going, possibly?” Continue reading »
Surveillance conducted by British intelligence agency GCHQ does not contravene human rights, a tribunal has heard, despite warnings from civil and internet liberties activists.
The decision was made by the Investigatory Powers Tribunal (IPT), after the case was brought to British courts by a collection of civil liberties groups including Privacy International, Amnesty International and Liberty earlier this year.
According to the IPT, it could only find one area of surveillance procedures that they were concerned about, regarding whether they would breach internet users’ right to privacy. Continue reading »