Find Out If You Are Doing Things Which Might Be Considered Suspicious
There have been so many anti-terrorism laws passed since 9/11 that it is hard to keep up on what kinds of things might get one on a “list” of suspected bad guys.
We’ve prepared this quick checklist so you can see if you might be doing something which might get hassled.
The following actions may get an American citizen living on U.S. soil labeled as a “suspected terrorist” today:
“Currently — as most of us know — TSA agents briefly examine government ID and boarding passes as each passenger presents their documents at a checkpoint at the end of a security line. Thom Patterson writes at CNN that under a 2008 Apple patent application that was approved in July and filed under the working title “iTravel,” a traveler’s phone would automatically send electronic identification to a TSA agent as soon as the traveler got in line and as each traveler waits in line. TSA agents would examine the electronic ID at an electronic viewing station. Next, at the X-ray stations, a traveler’s phone would confirm to security agents that the traveler’s ID had already been checked. Apple’s patent calls for the placement of special kiosks (PDF) around the airport which will automatically exchange data with your phone via a close range wireless technology called near field communication (NFC). Throughout the process, the phone photo could be displayed on a screen for comparison with the traveler. Facial recognition software could be included in the process. Several experts say a key question that must be answered is: How would you prove that the phone is yours? To get around this problem, future phones or electronic ID may require some form of biometric security function including photo, fingerprint and photo retinal scan comparisons. Of course, there is still a ways to go. If consumers, airlines, airports and the TSA don’t embrace the NFC kiosks, experts say it’s unlikely Apple’s vision would become reality. ‘First you would have to sell industry on Apple’s idea. Then you’d have to sell it to travel consumers,’ says Neil Hughes of Apple Insider. ‘It’s a chicken-and-egg problem.'”
Secret Service officials refused to allow protesting students at Wright State University to assemble within one-quarter mile of Vice President Joe Biden during his visit last week.
“The Secret Service respects everyone’s right to freedom of speech but we also have a duty to provide a safe and secure environment,” Secret Service spokesman Max Millien told Campus Reform, which reported that students rallying against Biden and President Obama in support of Mitt Romney moved twice at the orders of the Secret Service until they reached a designated “free speech zone.”
“After the students complied with the first request to move, they were again instructed to move – this time to the middle of a field, about a quarter mile away from the area where Biden planned to speak,” Campus Reform explains.
In July, the Secret Service shut down a student-led “fire Eric Holder” protest outside the White House, citing the discovery of a “suspicious package” just as the protest was getting underway.
Smartphones can be a cop’s best friend. They are packed with private information like emails, text messages, photos, and calling history. Unsurprisingly, law enforcement agencies now routinely seize and search phones. This occurs at traffic stops, during raids of a target’s home or office, and during interrogations and stops at the U.S. border. These searches are frequently conducted without any court order.
Several courts around the country have blessed such searches, and so as a practical matter, if the police seize your phone, there isn’t much you can do after the fact to keep your data out of their hands.
However, just because the courts have permitted law enforcement agencies to search seized smartphones, doesn’t mean that you—the person whose data is sitting on that device—have any obligation to make it easy for them.
Screen unlock patterns are not your friend
The Android mobile operating system includes the capability to lock the screen of the device when it isn’t being used. Android supports three unlock authentication methods: a visual pattern, a numeric PIN, and an alphanumeric password.
The pattern-based screen unlock is probably good enough to keep a sibling or inquisitive spouse out of your phone (providing they haven’t seen you enter the pattern, and there isn’t a smudge trail from a previous unlock that has been left behind). However, the pattern-based unlock method is by no means sufficient to stop law enforcement agencies.
After five incorrect attempts to enter the screen unlock pattern, Android will reveal a “forgot pattern?” button, which provides the user with an alternate way method of gaining access: By entering the Google account email address and password that is already associated with the device (for email and the App Market, for example). After the user has incorrectly attempted to unlock the screen unlock pattern 20 times, the device will lock itself until the user enters a correct username/password.
What this means is that if provided a valid username/password pair by Google, law enforcement agencies can gain access to an Android device that is protected with a screen unlock pattern. As I understand it, this assistance takes the form of two password changes: one to a new password that Google shares with law enforcement, followed by another that Google does not share with the police. This second password change takes place sometime after law enforcement agents have bypassed the screen unlock, which prevents the government from having ongoing access to new email messages and other Google account-protected content that would otherwise automatically sync to the device.
Anticipatory warrants
As The Wall Street Journal recently reported, Google was served with a search warrant earlier this year compelling the company to assist agents from the FBI in unlocking an Android phone seized from a pimp. According to the Journal, Google refused to comply with the warrant. The Journal did not reveal why Google refused, merely that the warrant had been filed with the court with a handwritten note by a FBI agent stating, “no property was obtained as Google Legal refused to provide the requested information.”
It is my understanding, based on discussions with individuals who are familiar with Google’s law enforcement procedures, that the company will provide assistance to law enforcement agencies seeking to bypass screen unlock patterns, provided that the cops get the right kind of court order. The company insists on an anticipatory warrant, which the Supreme Court has defined as “a warrant based upon an affidavit showing probable cause that at some future time, but not presently, certain evidence of crime will be located at a specific place.”
Although a regular search warrant might be sufficient to authorize the police to search a laptop or other computer, the always-connected nature of smartphones means that they will continue to receive new email messages and other communications after they have been seized and searched by the police. It is my understanding that Google insists on an anticipatory warrant in order to cover emails or other communications that might sync during the period between when the phone is unlocked by the police and the completion of the imaging process (which is when the police copy all of the data off of the phone onto another storage medium).
Presumably, had the FBI obtained an anticipatory warrant in the case that the Wall Street Journal wrote about, the company would have assisted the government in its attempts to unlock the target’s phone.
Praise for Google
The fact that Google can, in some circumstances, provide the government access to data on a locked Android phone should not be taken as evidence that Google is designing government backdoors into its software. If anything, it is a solid example of the fact that when presented with a choice between usability and security, most large companies offering services to the general public tend to lean towards usability (for example, Apple and Dropbox can provide law enforcement agencies access to users’ data stored with their respective cloud storage services).
The existence of the screen unlock pattern bypass is likely there because a large number of consumers forget their screen unlock patterns. Many of those users are probably glad that Google lets them restore access to their device (and any data on it), rather than forcing them to perform a factory reset whenever they forget their password.
However, as soon as Google provides a feature to consumers to restore access to their locked devices, the company can be forced to provide law enforcement agencies access to that same functionality. As the old saying goes, “If you build it, they will come.”
In spite of the fact that Google has prioritized usability over security, Google’s legal team has clearly put their customers’ privacy first.
First, the company has insisted on a stricter form of court order than a plain-vanilla search warrant, and then refused to provide assistance to law enforcement agencies that seek assistance without the right kind of order.
Second, by providing the government access to the Android device via a (temporary) change to the users’ Gmail password, Google has ensured that the target of the surveillance receives an automatic email notice that their password has been changed. Although the email they receive won’t make it explicit that the government has been granted access to their mobile device, it will still serve as a hint to the target that something fishy has happened.
Third, by changing the user’s password a second time, Google has prevented the government from having ongoing, real-time access to the surveillance target’s emails. There is, I believe, no law requiring Google to take this last step—Google has done it to protect the privacy of the user, and to deny the government what would otherwise be an indefinite email wiretap not approved by the courts.
For real protection you need full-disk encryption
Of the three screen lock methods available on Android (pattern, PIN, password), Google only offers a username/password based bypass for the pattern lock. If you’d rather that the police not be able to gain access to your device this way (and are comfortable with the risk of losing your data if you are locked out of your phone), I recommend not using a pattern-based screen lock, and instead using a PIN or password.
However, it’s important to understand that while locking the screen of your device with a PIN or password is a good first step towards security, it is not sufficient to protect your data. Commercially available forensic analysis tools can be used to directly copy all data off of a device and onto external media. To prevent against such forensic imaging, it is important to encrypt data stored on a device.
Since version 3.0 (Honeycomb) of the OS, Android has included support for full disk encryption, but it is not enabled by default. If you want to keep your data safe, enabling this feature is a must.
Unfortunately, Android currently uses the same PIN or password for both the screen unlock and to decrypt the disk. This design decision makes it extremely likely that users will pick a short PIN or password, since they will probably have to enter their screen unlock dozens of time each day. Entering a 16-character password before making a phone call or obtaining GPS directions is too great of a usability burden to place on most users.
Using a shorter letter/number PIN or password might be good enough for a screen unlock, but disk encryption passwords must be much, much longer to be able to withstand brute force attacks. Case in point: A tool released at the Defcon hacker conference this summer can crack the disk encryption of Android devices that are protected with 4-6 digit numeric PINs in a matter of seconds.
Hopefully, Google’s engineers will at some point add new functionality to Android to let you use a different PIN/password for the screen unlock and full disk encryption. In the meantime, users who have rooted their device can download a third-party app that will allow you to choose a different (and hopefully much longer) password for disk encryption.
What about Apple?
The recent Wall Street Journal story on Google also raises important questions about the phone unlocking assistance Apple can provide to law enforcement agencies. An Apple spokesperson told the Journal that the company “won’t release any personal information without a search warrant, and we never share anyone’s passcode. If a court orders us to retrieve data from an iPhone, we do it ourselves. We never let anyone else unlock a customer’s iPhone.”
The quote from Apple’s spokesperson confirms what others have hinted at for some time: that the company will unlock phones and extract data from them for the police. For example, an anonymous law enforcement source told CNET earlier this year that Apple has for at least three years helped police to bypass the lock code on iPhones seized during criminal investigations.
Unfortunately, we do not know the technical specifics of how Apple retrieves data from locked iPhones. It isn’t clear if they are brute-forcing short numeric lock codes, or if there exists a backdoor in iOS that the company can use to bypass the encryption. Until more is known, the only useful advice I can offer is to disable the “Simple Passcode” feature in iOS and instead use a long, alpha-numeric passcode.
By Chris Soghoian, Principal Technologist and Senior Policy Analyst, ACLU Speech, Privacy and Technology Project at 11:48am
Police State Build Up
Surveillance Technology
Life After Martial Law
Elite Globalist Agenda
Specific Solutions for Humanity
CLICK TO LISTEN LIVE
Bob Tuskin
An eternal student of economics, science and the arts. His radio career began at age 15, then with 911 as the backdrop, his activist side began to emerge. An organic gardener, a radio show host and activist, he seeks a higher form of wisdom and works hard to ensure a better place for his children’s children.
Seeking an end to the current slavery-based system in which we live, his solutions based understanding is an important asset. As an active! activist, and with the skills of grammar, logic and rhetoric, the Trivium, in hand, Tuskin often speaks in front of city commissions, the environmental protection agency and others in the pursuit of 911 justice, to promote awareness of geo-engineering and other topics.
Never pollyannaish and never afraid to speak his mind, with Bob Tuskin the truth shall be told. Bob will also be running for his local sheriffs office.
The Bob Tuskin Show is live Monday through Friday 8 to 10pm est.
The first thing is to know what to expect before hand. While people think about the dollar dropping to nothing, or an Obama re-election, you need to consider the most pressing signs of a pending martial law.
How pending?
About 15 minutes or less away from being put into a bus.
Now there are people who would look forward to 3 hots and a cot. And there are some who would actively encourage you to go to the camps. There was an article that said that social services folks are encourage self-sufficient people to use food stamps, and that the self-sufficient mentality was preventing more people from being on food stamps.
But we aren’t those people. We are the kinds that enjoy freedom.
So what do we look for?
Using the backbone of a military operation, you must make the enemy (that would be you) deaf, dumb, and blind.
What does that mean? It means you must be blind: Not knowing what to expect, how many men are in the operation, and what your final destination will be. This means that the operation will most likely take place in the middle of the night. When they roll up, mega watt lights will be shone onto the neighbourhood. This disorientates you as well as illuminate your home for movement. This also means the power to your block will be secured. Depending on the size of the town, perhaps several blocks at once. That would be a good thing. Read on…
Deaf means that you won’t know what is going on. Loud noises, such as bullhorns shouting orders, diesel engines running, and people yelling at you to go here or there. It also means you won’t be able to receive texts or cell phone service.
Dumb, or mute, means you won’t be able to call anyone, tweet, post a Facebook update, send an email of warning. Imagine if the events took place in Chicago. How quick would such a warning get spread all over Facebook or Twitter. It would “trends” quickly and the element of surprise would be gone.
Making you deaf and dumb is as simple as securing the internet with the Internet Kill Switch. That ends Facebook, Twitter, and Email.
And all you have to do to secure the cell phone or land-line service is to have the US military show up at the local phone office and have them secure all lines in the place. Turning the power off would be as effective as cutting lines, but once power is restored you could have normal service. Infrastructure would be maintained.
Your neighbourhood is now deaf, dumb, and blind.
You need to buy yourself some time. Not much time, but just enough time.
And you have about 5 minutes to do it in. Maybe less.
What do you need?
You need to make an alert when you lose power. This is from my site:
“I took a small wall wart that is rated at 12 volts and about 100 mA. I attached it to the power and ground part of a small 12v relay I bought from radio shack. I then took a 9v battery connector and a piezeo alarm and put it on the connectors of the relay that if there is no power to the relay – will allow current to flow. The way you find that is to put the red wire of the connector to the relay, and one of the leads from the alarm to the opposite side of the relay. Connect the black wire and the other alarm wire together.
Provided you have a 9v battery on the connector you should hear a sound. If not, change to a different spot on the relay. So when you apply power by plugging in the wall wart, the sound goes off. Remove the wart or turn off the power, you get an alarm sound. “
When I was in the Navy, any time we lost power we went into an immediate Security Alert. And you should too. When that alarm sounds (Put it in your bedroom as close to the bed as possible), after you pull the alarm out of the socket, get up and hide the children,
And that means you have to have pre-arranged hiding spots.
A window seat is a great way to start. Make a bench, bolt it to the wall under the bedroom window, and make small doors for the child to hide in. You can do the same for your room. Tell the children just to go if they are ever told, and to stay very quiet until you tell them to come out. And only you. Pretend to be someone else and see if they come to them. Soldiers may be very sneaky and say, “Your parents told me to get you. Come on, let’s go to them!”
Practice this frequently so they are aware of what needs to be done, and to be done in the dark, and to be done without question.
If you can’t make a window bench, then fill your closet up with “boxes”. These boxes are “stacked” to make it look like a storage area, but it’s just a shell. If you are in a manufactured home or a single story home, go to the closet and cut open a hatch to the crawl space. Have a black blanket so you can hide under the blanket to stay concealed. USE YOUR IMAGINATION!
The idea is that soldiers don’t have much time to search each home. They have to keep moving onto the next house. Once they leave and the power goes back on – DON’T CHANGE ANYTHING. If the bathroom light was on, leave it on. The smart meters will detect and record ANY changes and it will alert someone that there are people within the home!
Drones will be used to monitor communities and neighbourhoods. Going out after dark is the same as going out during the day.
If you go out at night, take a night vision capable video camera. Put black plastic around the IR lamp that is usually beneath the camera’s lens. This will prevent the drone from seeing the IR light, but you’ll be able to see the IR lights on the drone in the dark.
If you feel froggy, shoot down the drone AS IT LEAVES! The flight will be level and of constant speed, enough for you to get a bead on it. It’s difficult to tell where the shot came from, and you’ll get some satisfaction of taking one down. These thing are expensive and if they have to redirect one away from another area, that means someone else is getting a break.
If you have to move from one place to another, do so during a rain or thunderstorm. These conditions make drone flying very difficult and seeing anything of value VERY difficult. Yes, it is horrible conditions for you, but at least you will be free.
If, during the day, you see people wandering through your town, ignore them and hide. They may be “spies” looking for the last holdouts. As a rule of thumb, 8 to 80, blind, crippled, or crazy, means anyone may be a threat. Don’t kill them, just let them pass through. Watch them to see if they use a radio. IF they do use one, listen for codes such as, “Secure”, “Subjects”, “Natives”, or “SitRep (Situation Report)”
Such phrases would mean that they are looking for you as wolves in sheep’s clothing. DO NOTHING towards them. Get their photos if you can but remain hidden.
Satellites may detect heat from fireplaces, so use the covert cooking methods like solar cooking, Hay Box cooking or Creveche. If you can, light a match in the sewers to eliminate any flammable gasses, and cook down there. The streets should hide the heat signature well enough, especially in the day. Solar cooking using the back of a pickup may be a good decision as it may imitate the accumulated heat of a canopy.
You will be on your own. You will be the deciding factor if you live free or die free.
But it’s your decision. No one else makes it for you.
A man whose bid to become a police officer was rejected after he scored too high on an intelligence test has lost an appeal in his federal lawsuit against the city.
The 2nd U.S. Circuit Court of Appeals in New York upheld a lower court’s decision that the city did not discriminate against Robert Jordan because the same standards were applied to everyone who took the test.
“This kind of puts an official face on discrimination in America against people of a certain class,” Jordan said today from his Waterford home. “I maintain you have no more control over your basic intelligence than your eye color or your gender or anything else.”
He said he does not plan to take any further legal action.
Jordan, a 49-year-old college graduate, took the exam in 1996 and scored 33 points, the equivalent of an IQ of 125. But New London police interviewed only candidates who scored 20 to 27, on the theory that those who scored too high could get bored with police work and leave soon after undergoing costly training.
Most Cops Just Above Normal The average score nationally for police officers is 21 to 22, the equivalent of an IQ of 104, or just a little above average.
Jordan alleged his rejection from the police force was discrimination. He sued the city, saying his civil rights were violated because he was denied equal protection under the law.
But the U.S. District Court found that New London had “shown a rational basis for the policy.” In a ruling dated Aug. 23, the 2nd Circuit agreed. The court said the policy might be unwise but was a rational way to reduce job turnover.
Jordan has worked as a prison guard since he took the test.
Prison Industrial Complex Explained: Learn how Corporations are outsourcing & privatizing labor costs to the Prison Industry and how there are massive profits exploding from within this corrupted Incarceration System. Slave Labor Camps, Return of the Debtor Prisons, Products most often created by Prisoners, Recent Wallstreet investments & the Goldman Sachs connection. SERCO, UNICOR, Federal Prison Industries, Inc. and the astronomical nationwide per-capita figures that will make your head spin.
Written by Giordano Nanni & Hugo Farrant
Welcome back, netizens, to this newest edition in
Juice media’s series of Rap News journalism with me, Robert Foster:
this evening we’re actively delving in depth
to facts which affect all of us who dwell on this internet and we’ve got to
give a special welcome to all the ladies and a-gents,
from the NSA, ASIO, MI5: glad you’re listening in;
Because today’s show is
all about surveillance and how it’s spreading from the streets into our modems
As we speak, laws are being tacitly written in
to implement ways of controlling the expanse of this internet,
to keep us safe, we’re told; but from whom?
And will this place ever be the same if these plans go through?
To find out, we connect with our first guest to comment on the matter
we’re live at the Pentopticon with General Baxter,
General – Son! – Good to have you back again with us
explain why the State is spying on us? – My Fellow Oceanians,
As you know, we’ve always been at war with Eurasia…
or is it Eastasia? Either way, it’s war ‘n we need division to wage it!
but now the proles are connecting online bypassing these
illusory divisions of race, religion and nationality…
– Sounds grand to me… – It’s a catastrophe!
Centuries of hard work are being undone, profits are vanishing
And it’s due to the internet, it’s empowering humanity
we need to get this SNAFU under control; rapidly.
– How? – Behold the latest weapon in the War of Terror
our greatest invention since nine eleven
guaranteed to keep us free and safe forever
i give you The Surveillance State, ladies and generals.
Our secret wires log your key style
monitor every single number on your speed dial
rewind straight to your position with facial recognition,
and pinpoint you within point oh-three of a mile!
we’ve put eyes everywhere without consulting you,
keeping you safe, whether or not you want us to.
Soon there’ll be no freedoms left for threatening.
Then we’ll have won the war! Take that Terrorism!
– Brilliant, thank you General, we now interview
Our resident guru, Terence Moonseed, for a different view
– Greetings. – How does this situation look?
– I have one word for you, Robert: doubleplusungood!
The world populace of seven point four billion are all heading in
the direction of Orwellian totalitarian oblivion
My voice is hoarse yelling about Stellar Winds cold chilling em
And TrapWire weaving through the world wide web we all dwelling in
Face it: the all-seeing eye’s in all of our Facebooks like a virus
and in these Eye-phones, with Siri, or should I say “Iris”.
And next in line is RFID devices and mind chips
triggered by Chemtrails the planes spray the sky with.
This time it’s too far: check out the base they’re building in Utah
where they’ll be storing all ya data for over a century; it’s Fubar!
And under the outback is an entire tunnel of wires,
an ECHELON base called Pine Gap, to hijack our Mother Gaia.
– Hey, maybe your mother’s gayer! – Boo hoo!
Why don’t you just kill yourself like most of your troops do!
– That’s it, now you’re on the Cast Iron list
– Hang on, General, why weren’t we informed about this?
– Sorry we didn’t tell you about our grand plan before,
it was meant to be a surprise, under wraps and in store.
But some spoilsports had to go and ruin it for all
by blowin’ whistles, in spite of the damn law.
– Bill Binney and Thomas Drake are Trailblazers for leaking these tactics…
– Hey, civil-liberty fagtivists… err, activists:
this is all legal: anything we do now actually is!
– How did… – You can’t question my authorit-ah, thanks to this.
– And that shit’s global, people! in Australia it’s now legal
for the government to store all SMS’s, searches and emails…
Australians, it’s taking place under your nose
unless you wake up, all your data are belong to ASIO.
– Come on! everyone knows: you can trust the government now
If you’ve got nothing to hide, you got nothing to worry about
– That might be the case with things that are happening now,
because most people agree with most of the laws that are being handed down.
But once the Illuminati reveal their agenda for you
this surveillance will enforce laws you no longer consent to,
but by then it’ll be too late to protest too
and anything you’ve ever said, typed or browsed can and will be used against you.
– I’m confused, so what should we do then?
– What should we do? Nothing! this is all an illusion,
It’s just a ride, a delusion, the matrix, the Maya deceiving us.
– Ah, you hippies really make our job so much easier…
– Sorry to interrupt but we’re picking up
a signal from beyond the space-time continuum
Quick, switch on the Juice Channelling Portal…..
…………….Wait……. is that…… George Orwell?!
– Good day to you – Wow …what do we owe this honour to?
– I tried to warn you noobs, but I see you are actually fools
or else you thought this was an instruction manual.
– Yes, ahem… so can you advise us? What would you have us do?
– An open and universal internet is the most effective tool you have
to address the issues that afflict the world at hand
therefore, protecting it is the most essential task that stands
before your generation – I think I understand… – hush, man
You must not lose the internet. Heed this mantra:
‘who controls the Internet, controls the data
and who controls the data, controls the future’
– We’re losing you – I leave you with a tool to use…
– An onion? – Don’t be simple, Robert, this is but a simile
It stands for ‘Tor’ – Tor? – Google it! It’s for anonimity:
this onion router open network helps considerably against tyrranny
But its abilities only work if all you f***kers use it consistently
and even if you don’t use it, run it so its force swells.
– Thanks, Mr. Orwell – From now on call me: George Torwell
if we’d had such tools when I wrote this, well
It would’ve been so much simpler to tell Big Brother to go f**k himself,
the motherf***king, c***-sucking piece of sh[…]
– Thanks, George Torwell, for manifesting direct from this
memory hole of history, to impress on us these messages.
We’re told we need safety; which is precious, yes,
but can a society that can enforce all its laws ever progress?
Hindsight shows that many figures guilty of “thought-crime”
turned out to be luminaries and heroes, before their time.
But if a surveillance state had reigned then in this form and design
Just think of all the progress we may’ve all been denied:
Could lobbies for women’s or gay rights have appeared and thrived
Would revolutionary ideals have materialised
Would science have pioneered or even survived,
If every word had been monitored by thought police and spies?
Big Brother brings chilling effects, freezing our collective hopes
he doesn’t protect our safety, but protects the status quo,
and threatens this internet, the one channel yet uncontrolled
whose openness we are now called upon to effect and uphold.
Juice Rap News: Episode 15 – Big Brother is WWWatching You. September 2012 rocks around with some crucial developments in the ongoing struggle over the future of the internet. Will it remain the one open frequency where humanity can bypass filters and barriers; or become the greatest spying machine ever imagined? The future is being decided as we type. Across Oceania, States have been erecting and installing measures to legalise the watching, tracking and storage of data of party-members and proles alike. If they proceed, will this place ever be the same? Join our plucky host Robert Foster as he conducts an incisive analysis of the situation at hand. Joining him are newly appointed Thought Police General at the Pentopticon, Darth O’Brien Baxter, and a surprisingly lucid Terence Winston Moonseed. Once again, in the midst of this Grand Human Experiment, we are forced to ask tough questions about our future. Will it involve a free internet which will continue to revolutionise the way the world communicates with itself? Or is our picture of the future a Boot stamping on this Human InterFace forever?
Written & created by Giordano Nanni & Hugo Farrant – on Wurundjeri Land in Melbourne, Australia.
– SUPPORT the creation of new episodes of Juice Rap News,
a show which relies on private donations: http://thejuicemedia.com/donate
– CREDITS:
* MAIN BEAT Produced by the Goat Beats http://www.thegoatbeats.com
* ORCHESTRATION & George-Orwell theme by Adrian Sergovich
* ARTWORK by Zoe Tame of http://visualtonic.com.au for images and website wizardry!
* EFFECTS & ANIMATIONS by Jonas Schweizer (See his work: http://www.indiegogo.com/CaribbeanNewcomer)
* PROPS: Thanks to Zoe Umlaut of Umlautronics for constructing the Juice Channeling Portal, worryingly close to spec. And to Gilles Gundermann for sourcing awesome Orwellian props.
* CAPTIONS: Merci to Koolfy from la Quadrature du Net, for creating English Captions.
* Thanks to Dave Abbott for technical advice; and deep gratitude to Lucy & Caitlin for all the ongoing support (and patience).
– TRANSLATIONS: If you would like to translate this episode into your language, please contact us via our website http://thejuicemedia.com/contact/ to obtain the SRT file.
* INTERNET ACTIVISM: We highly recommend checking out this great video-interview with Julian Assange (WikiLeaks), Jacob Appelbaum (Tor Project), Jeremie Zimmerman (La Quadrature du Net) and Andy Muller-Maguhn (Chaos Computer Club): assange.rt.com/cypherpunks-episode-eight-full-version-pt1
The New York City Police Department (NYPD) really has gone rogue; at least that’s what a high-level FBI official believes.
Among the 5 million emails the group Anonymous hacked from the servers of private intelligence firm Stratfor in February, one seems to not only confirm the controversial NYPD surveillance activities uncovered by the Associated Press, but hints at even worse civil liberties violations not yet disclosed. Anonymous later turned the emails over to WikiLeaks, with which Truthout has entered into an investigative partnership.
I keep telling you, you and I are going to laugh and raise a beer one day, when everything Intel (NYPD’s Intelligence Division) has been involved in during the last 10 years comes out – it always eventually comes out. They are going to make [former FBI Director J. Edgar] Hoover, COINTEL, Red Squads, etc look like rank amatures [sic] compared to some of the damn right felonious activity, and violations of US citizen’s rights they have been engaged in.
The description of alleged NYPD excesses was leveled by an unnamed FBI “senior official” in late November 2011, in an email sent to Fred Burton, vice president for intelligence at the Austin, Texas-based Stratfor and former deputy chief of the counterterrorism division at the State Department. Burton then sent the official’s email to what appears to be a listserv known as the “Alpha List.”
Burton did not identify the senior FBI official in the email he sent to the listserv. He describes him as a “close personal friend,” and claims he “taught him everything that he knows.” He also instructs members of the listserv not to publish the contents of the email and to use it only for background.
Stratfor, in a statement released after some of the emails were made public, said some of the emails “may be forged or altered to include inaccuracies; some may be authentic” but “having had our property stolen, we will not be victimized twice by submitting to questioning about them.”
What’s particularly stunning about the FBI senior official’s description of NYPD Intelligence Division activities, is how he connects them to previous instances when his own agency bent and broke the law in pursuit of intelligence on perceived enemies of the state throughout the 20th century – and concludes the NYPD Intelligence Division’s violations are worse. As Pulitzer Prize-winning author and former New York Times reporter Tim Weiner writes in his new book, “Enemies: A History of the FBI,” the Bureau has been “America’s closest counterpart” to a secret police.
In the email, Burton queried the FBI official to gain a better understanding of why the FBI declined to get involved with a case involving an alleged “lone wolf” terrorist and al-Qaeda sympathizer named Jose Pimentel, a 27-year-old American of Dominican descent, accused of trying to build three pipe bombs to detonate in New York City.
The FBI official responded by describing some turf and relationship issues between NYPD intelligence officials and NYPD and FBI investigators on New York City’s Joint Terrorism Task Force. It appears the FBI senior official was responding to a news story about Pimentel’s arrest published by the far-right leaning Newsmax, headlined “FBI- NYPD Tensions Highlighted in Terror Case,” which was attached to an email Stratfor analysts had sent around the office.
There are two issues with this case (off the record of course).
One is the source (confidential informant) was a nightmare and was completely driving the investigation. The only money, planning, materials etc the bad guy got was from … the source. The source was such a maron [sic], he smoked dope with the bad guy while wearing an NYPD body recorder – I heard in open source [sic] yesterday btw [by the way], he is going to be charged with drug possession based on the tape. Ought to go over very nicely when he testifies against the bad guy, don’t you think?
Issue two is that the real rub is between NYPD Intel, [Intelligence Division] and NYPD – JTTF [Joint Terrorism Task Force], not the FBI per se. The NYPD JTTF guys are in total sync with the Bureau and the rest of the partners who make up the JTTF – I understand there are something like 100 NYPD dics [detectives] assigned to the JTTF. NYPD Intel (Cohen, et al) on the other hand, are completely running their own pass patterns. They hate their brother NYPD dics on the JTTF and are trying to undermine them at every turn. They are also listening to [former CIA official David] Cohen [the head of NYPD’s Intelligence Division] who, near as anybody can tell, never had to make a criminal case or testify in court.
Joint Terrorism Task Forces are FBI-led counterterrorism investigative units that combine federal, state and local law enforcement in an effort to detect and investigate terrorist activity and prevent attacks before they occur. Originally created in the 1980s, the creation of JTTFs nationwide was accelerated after 9-11. Currently, 104 JTTFs operate nationwide and are considered one of the most important assets in the federal government’s muscular counterterrorism architecture.
After reviewing the Stratfor email thread for Truthout, Michael German, senior policy counsel at the American Civil Liberties Union’s Washington Legislative Office and a former FBI agent who infiltrated white supremacist terrorist organizations, described the FBI official’s criticism of the NYPD’s intelligence as “doubly ironic.”
“The FBI has engaged in widespread spying on the Muslim American community as well, including counting mosques and mapping Muslim neighborhoods, infiltrating mosques with informants, and using the guise of community outreach to spy on Muslim religious and advocacy organizations,” German told Truthout. “But more critically, because the FBI is charged with enforcing the civil rights laws in this country, including violations under color of law.
“This agent suggests the FBI knew the NYPD Intelligence agents were involved in widespread ‘felonious’ activity in violation of Americans’ civil rights, yet the FBI does not appear to have opened a civil rights investigation or done anything to stop this illegal activity. Our laws are designed to apply equally to protect all of us, including to protect us from illegal police activity. When the FBI abdicates this responsibility, all Americans suffer.”
Responding to the background information from the FBI senior official, Sean Noonan, a “tactical analyst” with Stratfor, wrote in an email sent to the “Alpha List,” “The point that the divide is within NYPD is contradictory to how they would like present it. [sic]. The way the pro-NYPD stories cover it is that NYPD CT/Intel [counterterrorism/intelligence] has successfully gained influence within the JTTF, almost to the point of having infiltrated it.”
German, however, tells Truthout that the rift between the NYPD’s intelligence analysts and NYPD investigators assigned to the FBI’s JTTF, as revealed by the senior FBI official’s email, is consistent with his experience.
“Criminal investigators, like those assigned to the JTTFs, typically find information produced by these intelligence analysts to be useless, whether they’re NYPD intelligence or FBI intelligence,” he said.
And no matter how bad the mutual acrimony between NYPD intelligence analysts and New York City’s JTTF has gotten, German isn’t surprised that the FBI has declined to investigate allegations of the NYPD Intelligence Division breaking the law.
“The FBI didn’t open investigations when it discovered other government agencies engaging in torture and illegal wiretapping either,” he said.
But eventually, the senior FBI official predicts in his email to Burton, the extent of NYPD’s alleged crimes will be revealed.
“As Rush Limbaugh likes to say, ‘don’t doubt me on this,'” he wrote at the end of his correspondence.
Matthew Harwood is a journalist in Washington, DC, and a frequent contributor to the Guardian’s Comment is Free. His writing has appeared in The Washington Monthly, Progress Magazine (U.K.) as well as online at Columbia Journalism Review, CommonDreams, and Alternet. He is currently working on a book about evangelical Christian rhetoric and aggressive US foreign policy. You can follow Matt on Twitter @mharwood31.
Jason Leopold is lead investigative reporter of Truthout. He is the author of the Los Angeles Times bestseller, News Junkie, a memoir. Visit jasonleopold.com for a preview. His most recent investigative report, “From Hopeful Immigrant to FBI Informant: The Inside Story of the Other Abu Zubaidah,” is now available as an ebook. Follow Jason on Twitter: @JasonLeopold.
Activists threaten legal action over failure to investigate
Corporations in the UK who used a secret “blacklisting” database to screen out ‘left wing trouble-makers’ and union sympathizers as potential job recruits are facing renewed scrutiny after the UK-activist group Liberty called for a fresh investigation Monday night.
A demonstration outside the Olympic site on March 1, 2011 was called in solidarity with the whistleblower who was fired for standing up for an illegally blacklisted workmate. The blacklist scandal first broke in 2008, when the UK media revealed that more than 40 leading employers had subscribed to the vetting service provided by The Consulting Association, which had surveillance files on more than 3,200 workers, including political activists, shop stewards and health and safety representatives.
Police seized the database three years ago and Ian Kerr, the founder of The Consulting Association, was fined only about $7,500. Invoices were discovered showing that 44 companies had paid to access the names on the list.
But full details of the material it contained only emerged as workers began to pursue legal action over their inclusion.
Liberty is now threatening to go to court to force the UK government to investigate the case, which it has compared in severity to the national press phone hacking scandal.
Corinna Ferguson, legal officer for Liberty, told the Independent: “We can’t believe the inaction of the Information Commissioner on a human-rights violation of such wide public interest.
“Contracting out the blacklisting of innocent workers, politicians and journalists is no better than farming out phone hacking to private detectives and the consequences for our democracy are just as grave. If we cannot persuade the Commissioner to discharge his public duty, we will consider seeking assistance from the courts.”
Mick Abbott, a 74-year-old ex-scaffolder, commented: “This nearly ruined my marriage and it meant that my children were on free meals at school. My file goes back to 1964 and the last entry says that I rekindled the campaign for justice for the Shrewsbury picketers in 2006. They have been watching me all these years and passing this information around, blighting my life over four decades.”
Steve Kelly, an electrician and spokesperson for the Blacklist Support Group said: “I was blacklisted because I was a union member and because I raised issues about safety. In 2007, [Sir Robert] McAlpine sacked me from the Colchester Barracks project after 2 days for refusing to work on a moving platform without proper training (exactly as we had been instructed in the site induction) – the dismissal is recorded on my blacklist file.
“Over the year I suffered severe financial strain, my wages were cut in half which caused immense stress paying bills and putting food on table. I was out of work for a year apart from few weeks here and there in 2001. Being sacked from Colchester Barracks after only two days piled up the stress and caused a nervous breakdown for me eventually.
“The blacklisting firms should be made to pay compensation for years lost and years in future. They should be made to employ blacklisted workers or not be awarded any public government backed contracts. An apology in national press and to individuals whose lives they ruined would be a start.”
Wildcard Friday: Relevant News & Unravelling Reality and the Matrix of Deception. DARPA funding AI Robots, Banking Crisis Warnings, Julian Assange and the future of Whistleb-lowing, Molding Your Reality to what you Prefer, Ley Lines and their Connection to the Mysterious & Impossible Ancient Structures throughout History, Police State Red Flags with Imminent Martial Law? NDAA in USE! Reporting the Facts – You decide.
The era of Big Data is upon us. Major corporations in the areas of advertising, social media, defense contracting, and computing are forming partnerships with government agencies to compile virtual dossiers on all humans.
This data integration initiative is taking place across the board in our largest federal agencies and departments as part of an Office of Science and Technology outline (PDF) that includes a $200 million upfront investment, as well as a $250 million annual investment by military departments into human-computer interaction.
The $200 million in the Obama program will be spread among the National Institutes of Health, Department of Defense, National Science Foundation, the Department of Energy, the U.S. Geological survey, and DARPA to see that the information they collect will move quickly “from data to decisions.”
Seeing the vast potential of Big Data management and applications, Oblong Industries – the actual creator of the software that appeared in the movie Minority Report, (known by its propriety name g-speak) – is now offering a commercial version in the marketplace. An AFP article posted at Raw Story is quick to point out that the software has been stripped of its “pre-crime” detection analytics. But should this blanket dismissal by a mainstream news agency be comforting in light of stated U.S. government goals that seek to turn science fiction into science reality?
John P. Holdren, Obama’s science czar, and author of the controversial eugenics tome, Ecoscience, is one of those directing the solution to the data overload problem. This alone should force us to be hyper-vigilant.
We also know that the NSA is constructing a massive new $2 billion data center that aims to expand its spy activities by September, 2013:
A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks.
(…)
Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital ‘pocket litter. It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration… (Source)
The FBI has recently announced that facial recognition will be coming to a state near you:
While Oblong Industries claims to have disabled the analytics portion of the software that could be used in pre-crime screening taken right from the Minority Report film, they state that private companies and law enforcement agencies could certainly augment their scaled-back version by introducing their own analytics.
Furthermore, the earlier-mentioned AFP article downplays the significance of the software by stating that “Oblong currently has no government customers in the United States or abroad but offers itself as ‘a core technology provider.'”
However, two of Oblong’s current clients are Boeing – the world’s second largest defense contractor and drone specialists; and #12 General Electric – specialists in electronic warfare components and military communication systems. Their combined annual sales are more than $35 billion, which makes it quite likely that new technology will be embraced and proliferated. (Source)
Oblong’s own website states that their company “works with Global Fortune 500 companies, government agencies, and universities to develop custom g‑speak solutions.” Their application areas include:
To reinforce the obvious, Oblong’s Chief Executive, Kwin Kramer, has stated flatly that, “We think law enforcement and intelligence are big data users and we think our technology is the leader.”
It is also worth noting that the g-speak “Minority Report” technology was developed at MIT and has been 30 years in the making. MIT has quite a storied history of connections to intelligence agencies; the CIA having actually started the Massachusetts Institute of Technology Center for International Studies (MIT-CIS) in 1950. (Source)
And Orwell smiles.
Until recently, we might have held out hope that it was the vastness of data collection that was the weakest point for potential tyrants, as it was nearly impossible to sift through, manage, and apply all of it. With the birth of Big Data applications that are literally coming straight from science fiction, however, we might do well to accept the possibility of a truly dystopian reality descending upon us even faster than the speed of thought.
For a glimpse into the cool sales pitch behind Oblong Industries’ Big Data management software, please view the following video. While we should keep an open mind to how advancements in computer tech can be exciting and rewarding, while offering novel ways of human interaction, it is most important to ensure that these technologies are not hoarded by governments and elites who have a clear history of negatively impacting true human development, as well as freedom of movement, expression and self-determination.
Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.
Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented.
The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.
Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails.
On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning.
Mr. Ferguson and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote on Twitter that the DDoS attacks flooding the WikiLeaks server were reported to be dropping upwards of 40 gigabytes of traffic per second on the site.
According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be “analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.”
In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.” Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces.
What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf).
“Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.”
In a 2005 interview with The Entrepreneur Center, Abraxas founder Richard “Hollis” Helms said his signature product:
“can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” He calls it “a proprietary technology designed to protect critical national infrastructure from a terrorist attack by detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack is executed,” and that, “The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push information out to local law authorities automatically.”
An internal email from early 2011 included in the Global Intelligence Files has Stratfor’s Burton allegedly saying the program can be used to “[walk] back and track the suspects from the get go w/facial recognition software.”
Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the “See Something, Say Something” program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well.
In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes, “God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.” Files on USASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the past eleven months.
News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the government’s Trailblazer Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas.
Police State Inbound! Writing on the Wall, Numerology Explained, Reasons for Practical Emergency Preparation. Government Insiders, Geological Activity, Extra Olympics Security, Numerology & the Mayan Calender connection!
One of the most shocking realization emerging from the James Holmes Batman movie shooting rampage in Aurora, Colorado is the fact that nobody apparently tried to stop the shooter. This is absolutely baffling. Out of at least 70 moviegoers (and maybe more, as numbers remain sketchy at the moment), it appears that nobody tried to tackle him to the ground, shoot back with their own gun, or even fight back in any way whatsoever. The accounts of witnesses are those of people fleeing, ducking and screaming… but not fighting for their lives.
This story is in no way intended to blame those present at the theater for what was obviously a horrifying, shocking and probably very confusing event, but at the same time we must ask the question: Why did no one fight back?
See my previous story, by the way, which asks other questions about this shooting, such as where did Holmes get the training and the funds to build a complex maze of flammable booby-traps? That story is available at: http://www.naturalnews.com/036536_James_Holmes_shooting_false_flag.ht…
“There were bullet [casings] just falling on my head. They were burning my forehead,” Jennifer Seeger told reporters in an LA Times article (http://latimesblogs.latimes.com/lanow/2012/07/colorado-shooting-suspe…). “Every few seconds it was just: Boom, boom, boom,” she said. “He would reload and shoot and anyone who would try to leave would just get killed.”
A baby was shot at point blank range, the family were gathered around screaming.
Huh?
If the baby was shot at point blank range, that means the shooter was right there beside them. Instead of gathering around and screaming, why didn’t the family tackle the shooter?
This is not any sort of insensitive attempt at satire or blaming anyone, by the way. This is purely an effort to ask a deeply disturbing question that has been bothering me ever since this whole thing went down:
How can a lone gunman fire off at least 100 rounds in a crowded theater full of people and have NOBODY fight back, shoot back or attempt to tackle him?
The guy literally walked in, tossed a couple of smoke bombs, started shooting everybody in sight, and for some reason that remains entire unexplained, they let him do it. When he finished, he walked out the door and calmly surrendered to police, mission accomplished. He was never shot at, stabbed, kicked, punched, tripped or attacked in any way whatsoever, apparently.
It would have taken at least two full minutes to carry out the attack
Importantly, this shooting had to have taken several minutes to carry out. To fire 100+ rounds of ammunition from any weapon requires multiple reloads, each of which takes several seconds to carry out. There would have been long pauses in the shooting. There has even been a report that the AR-15 rifle used by the shooter jammed, which would have created an even longer pause.
These pauses are opportunities to bum rush the guy, or shoot back, or throw something at him, or just punch him right in the jaw with everything you’ve got. Holding a gun does not make you invincible. If anything, it makes you very, very vulnerable to all sorts of attacks. As I learned in my own defensive training, often alongside peace officers:
• Nobody has eyes in the back of their head. Attacks from behind are very, very effective.
• A gun only points in one direction at a time. It cannot shoot backwards, behind the person holding it.
• A gas mask SEVERELY limits angle of perception of vision. Someone wearing a gas mask, as is reported in this incident, is ridiculously vulnerable to attacks from behind, from above, from the sides and from below.
• No man can ignore a deliberate knee to the groin (from the front), or a “kickball” kick to the groin from behind. Such moves are taught in martial arts such as Krav Maga, and they are very, very effective at bringing any man to his knees, either screaming or even vomiting in pain.
• At close range, guns are LESS dangerous than knives. A knife can cut along an entire geometric plane, but a gun can only fire at a single point in space. Guns jam, guns run out of ammo, guns need to be reloaded. A knife, on the other hand, has none of these limitations. Disarming someone with a gun is MUCH easier than disarming someone with a knife.
Something doesn’t add up
It is bewildering that during the several minutes it would have taken for Holmes to fire 100+ rounds into the crowd, nobody fought back.
Again, I’m not blaming the people there, I’m just bewildered that nobody fought back. It doesn’t make sense. Unless, of course, the very fabric of American culture is now so passive and afraid that people have forgotten how to take action in the face of fear.
I think I speak for a great many concealed carry permit holders when I say that if I had been in that theater, I would have been emptying magazines in the direction of the threat (i.e. putting sights on target and repeatedly pulling the trigger). Like many concealed carry weapon holders, I would have turned that scene into what we sometimes jokingly call a “two-way range.”
Like all other concealed carry holders, I am reluctant to ever draw a weapon on anyone, but I’m absolutely willing to do so in order to try to stop a massacre from taking place.
What I can’t understand is how apparently NOBODY in the entire theater had the training or the presence of mind to fight back. This is truly astonishing at every level. In America today, do people just lay down to die when there’s a gunman in the room? I’m not asking this to be insulting in any way, I’m simply bewildered by the lack of action. This is an honest question: WHY did no one act?
Shattering myths: Guys with guns can be physically assaulted, even if you’re unarmed
Here’s a news flash for those who have never trained in these scenarios: Guys wielding guns are very, very easy to disarm during reloads — far easier than trying to disarm someone with a knife, as mentioned earlier. “Weapon takeaways” are routinely taught in Krav Maga, for example, and they are fast and effect, usually breaking the bad guy’s trigger finger in the process.
Taking away a weapon from a gunman is surprisingly easy. Forcing him to the ground takes almost no effort at all. This shooter could have been easily disarmed and pummeled to the ground by a single person, not to mention two or three working together.
Instead, the only reports we get from this incident are those of people screaming and hiding, or sometimes fleeing. To my knowledge, there are no eyewitness accounts of anyone rushing the gunman, shooting back, or trying to even trip him to fall on the floor. And yet empty shell casings were literally falling right onto people within arms’ reach of the guy.
Twenty-five-year-old Jennifer Seeger, of Aurora, says she was in the second row, about four feet from the gunman. She says she ‘was just a deer in headlights’ and ducked to the ground.
Tactically speaking, there is absolutely no way that one person can shoot 70 people unless those 70 people just lay there and let it happen. To shoot 70 people, the guy must have pulled the trigger at least 100 times, probably a lot more, as accuracy in these situations is usually quite poor. Most likely we’re going to find up to 200 rounds expended, once a final forensic count is completed.
News reports say he used as 90-round ammo “drum” for the AR-15. These drums are notoriously bad at feeding ammo, making them useless on the battlefield, which is why soldiers never use them on their personal AR-15s (they use 30-round mags). According to reports, Holmes’ AR-15 drum jammed during the shooting (no surprise) and he had to abandon that weapon and start using something else. All this would have taken time for him to sort out, during which the shooter is completely vulnerable to all sorts of grappling attacks, punches, kicks to the groin, eye gouges, weapon takeaways, etc.
Yet, strangely, nobody rushed the guy. Nobody shot back. Nobody tried to punch him. I honestly don’t understand this.
A culture of passive victims
It occurs to me that maybe I’m different from most Americans today in the fact that I am willing to fight back. For some reason, that seems to be a rarity these days. Too many people have bought into learned helplessness, where they depend on the government to take care of them, keep them safe and solve all their problems.
Once you outsource your personal security to the government — usually by having no defense skills and hoping 911 will respond quickly — you make yourself an easy victim for violent criminals.
The true path to personal safety and security is to learn how to protect yourself and your loved ones. There are many ways to do that, from basic hand-to-hand combat and martial arts skills to learning proficiency in the “American martial art” of hand-gunning. I’ve personally trained with numerous instructors who could have taken Holmes out from 20 – 30 meters away with a single shot to the head, with about 90% accuracy even under pressure. There are lots of proficient firearms owners across America, and a great many of them are carrying those weapons into movie theaters, shopping malls, retail stores and even at the airport. Why was no one carrying a concealed weapon at the Batman movie theater in Aurora? I have no idea.
Again, it’s difficult to second guess what really went down there with all the confusion, the screaming, the smoke and so on. Maybe there were concealed carry weapon holders in the room but they couldn’t get a clear shot. One thing concealed carry holders are always taught is to never shoot at a bad guy if there are innocent civilians behind him. (You’re always trained to know what’s BEHIND your target.) This might have made target acquisition difficult, but given the reality of what was unfolding, it would seem logical to pull the trigger anyway, as allowing the shooter to stand would clearly result in a great number of additional deaths.
Also, there is the distinct possibility that perhaps someone did pull a gun on Holmes, but they got shot by him first. We don’t know the real story on this until more information is released by investigators. So perhaps there was someone who had the courage to fight back and we just haven’t learned about them yet.
What we do know, so far at least, is that no stories of attempted heroism have emerged. Not a single account that I’m aware of, and I’ve been scanning the stories. This is very, very strange. Something doesn’t add up yet again.
Is American culture now one of total surrender?
What I’m starting to think really happened is that the American culture is becoming one of total surrender to criminals. Why do people line up at the airports and allow the TSA go grope their genitals? Because they’re passive and they’ve surrendered instead of fighting back. Why do stay silent when runaway criminality is happening all around them in the form of armed raids on raw milk farmers (http://www.naturalnews.com/033220_Rawesome_Foods_armed_raids.html) and government hit squads trying to kill farmers’ ranch pigs in Michigan? (http://www.naturalnews.com/035585_Michigan_farms_raids.html) Because people are scared into silence.
Americans, it turns out, are easy to terrorize. They’re easy to freeze into a state of fear-based non-action. That fear can and will be used against them, again and again. Look at the post 9/11 effort to crush freedom and destroy the Bill of Rights. It succeeded because Americans were terrorized and willing to give up all their liberties for the false promise of a little security.
The police cannot protect you
This is concerning for lots of reasons beyond the Batman shooting. It means the population is just cannon fodder for armed gangs of looters when the next collapse comes, and the debt spending of the U.S. government absolutely guarantees a financial collapse is just around the corner. (It’s only a matter of time.)
It’s beginning to look more and more like only those of us who have the natural instinct to fight back — and who are willing to acquire fundamental skills of personal defense — will be left standing in the long run. Even those of us who have such skills will need to be both well practiced and, to some extent, lucky. But luck has a way of bending your way when you’re prepared, I’ve noticed.
I hope YOU, the readers, are among those of us who are survivors. We need more good people to survive and help lead our nation into a future of liberty, abundance and lasting health. We need more good people to survive social unrest, the aftermath of natural disasters, the coming economic collapse, food shortages, roving bands of armed gangs and so on. If anything, right now is a time for more people to go out and get trained on personal defense, whether that’s with martial arts, rape prevention classes, or even quality firearms training.
It should hopefully be obvious at this point that the police cannot protect you. Calling 911 is about as useless as crossing your fingers and hoping you won’t die. And that’s even if 911 answers, because 911 services are easily taken offline even by wind storms (as we saw recently in Washington D.C.). If you cannot protect yourself and your family, you’re not ready for what’s coming, I believe. Get prepared. Get some skills. Practice to the point of proficiency. Decide to survive rather than surrendering to violence.
Much of this, after all, is simply a mental decision. I have no idea why that mental decision did not take place inside the Batman movie theater, but I know that you and I can make that decision right now — the decision to SURVIVE — and we can move forward in life with the strength and power of sticking with that decision.
According to news reports, this sudden violent rampage was completely out of character for James Holmes, who was described as “shy.”
The New York Times is now reporting: Billy Kromka, a pre-med student at the University of Colorado, Boulder, worked with Mr. Holmes for three months last summer as a research assistant in a lab of at the Anschutz Medical Campus. Mr. Kromka said he was surprised to learn Mr. Holmes was the shooting suspect. “It was just shocking, because there was no way I thought he could have the capacity to do commit an atrocity like this,” he said. (http://www.nytimes.com/2012/07/21/us/colorado-mall-shooting.html?page…)
“He spent much of his time immersed in the computer, often participating in role-playing online games…”
There is already conjecture that James Holmes may have been involved in mind-altering neuroscience research and ended up becoming involved at a depth he never anticipated. His actions clearly show a strange detachment from reality, indicating he was not in his right mind. That can only typically be accomplished through drugs, hypnosis or trauma (and sometimes all three).
His behavior doesn’t add up
His behavior already reveals stark inconsistencies that question the mainstream explanation of events. For example, he opened fire on innocent people but then calmly surrendered to police without resistance. This is not consistent with the idea of “killing everyone.”
Furthermore, he then admitted to police that his apartment was booby-trapped with explosives. If you were really an evil-minded Joker trying to kill people (including cops), why would you warn them about the booby trap in advance? It doesn’t add up.
“After his arrest, Holmes told police about ‘possible explosives in his residence,’ Oates said. When police searched his apartment, they discovered it was booby-trapped and evacuated surrounding buildings, police said. Oates said bomb technicians are determining how to disarm flammable or explosive material in the third-floor apartment. He said police could be there some time.”
None of this checks out. If you’re a killer bent on causing mayhem, why tell the police about your surprise bomb waiting for them back at your apartment?
Holmes was clearly provided with exotic gear
Continuing from CBS:
“He said pictures from inside the apartment are fairly disturbing and the devices look to be sophisticated, adding the booby-traps were ‘something I’ve never seen.’ One rifle, two handguns, a knife, a bullet proof vest, a ballistic helmet, a gas device, a gas mask, military SWAT clothing and unidentified explosives were also found in Holmes’ car, a law enforcement source told CBS News. Oates said Holmes wore a gas mask, a ballistic helmet and vest as well as leg, groin and throat protectors during the shooting.”
In other words, this guy was equipped with exotic gear by someone with connections to military equipment. SWAT clothing, explosives, complex booby-traps… c’mon, this isn’t a “lone gunman.” This is somebody who was selected for a mission, given equipment to carry it out, then somehow brainwashed into getting it done.
UPDATE: (This section added to the story Saturday at 2:30 pm central, July 21, 2012). It is now being reported that exotic, advanced booby-traps have been disarmed at the apartment of James Holmes. The Denver affiliate of CBS News is now reporting: (http://denver.cbslocal.com/2012/07/21/officials-expect-explosions-as-…)
Officials say they have removed all major threats at the booby-trapped apartment of the Aurora movie theater shooting suspect on Saturday. They have used a robot to go inside James Holmes’ apartment. …They were able to disable a trip wire that was set to go off when the apartment door was opened. “This is some serious stuff that our team is dealing with…”
Shortly before noon crews were successful performing a controlled detonation… More controlled detonations were possible.
…there were multiple trip wires throughout the apartment. Investigators have also seen what appear to be mortars planted in the apartment — sort of the kind of mortars that might be seen in a commercial fireworks show. Up to a half dozen of them are scattered around.
…they have seen a number of inflated balloons in the apartment… with many appearing to be filled with a powder. Also linked together are bottles of liquid. …a strong smell of gasoline emanating from the apartment.
…several boxes on top of the refrigerator and there are lights flashing on the boxes.
…30 aerial shells (fireworks) commercially legally available for purchase. …the suspect may have filled them with smokeless powder. …entering the apartment would have caused a trip wire to trigger one liquid container to pour/mix with another. When the two mix together, they set off the main charge of the device which may be additional flammable liquids.
…an enormously dangerous mission. About 100 personnel are on scene.
Technicians made a first attempt on Friday to disarm the traps, believed to include explosives, but withdrew when it became clear the property was too dangerous to enter. Sgt Carlson said the device was set up to detonate when the first person entered the flat. “We’ve defeated first threat. It was set up to kill, and that could have been police officers or anything,” she said.
FBI has a track record of staging similar assaults, then stopping them at the last minute
This is not your run-of-the-mill crime of passion. It was a carefully planned, heavily funded and technically advanced attack. Who might be behind all this? The FBI, of course, which has a long history of setting up and staging similar attacks, then stopping them right before they happen. See four documented stories on these facts:
As you soak all this in, remember that the FBI had admitted to setting up terror plots, providing the weapons and gear, staging the location of the bombings and even driving the vehicles to pull it off! This is not a conspiracy theory, it’s been admitted by the FBI right out in the open. Even the New York Times openly reports all this in stories like this one:
THE United States has been narrowly saved from lethal terrorist plots in recent years — or so it has seemed. A would-be suicide bomber was intercepted on his way to the Capitol; a scheme to bomb synagogues and shoot Stinger missiles at military aircraft was developed by men in Newburgh, N.Y.; and a fanciful idea to fly explosive-laden model planes into the Pentagon and the Capitol was hatched in Massachusetts. But all these dramas were facilitated by the F.B.I., whose undercover agents and informers posed as terrorists offering a dummy missile, fake C-4 explosives, a disarmed suicide vest and rudimentary training. …the F.B.I. provided a van loaded with six 55-gallon drums of “inert material,” harmless blasting caps, a detonator cord and a gallon of diesel fuel to make the van smell flammable. An undercover F.B.I. agent even did the driving…
Mystery man Holmes has no background
On top of all this, Holmes apparently has no background. “He’s not on anybody’s radar screen — nothing,” said a peace officer in a NYT article. “This guy is somewhat of an enigma. Nobody knows anything about him.” (http://www.nytimes.com/2012/07/21/us/colorado-mall-shooting.html)
Mr. Holmes’s only criminal history is a traffic summons, the authorities said. He earned a bachelor’s degree with honors in neuroscience in 2010 from the University of California, Riverside, and was a graduate student in neurosciences at the University of Colorado at Denver’s Anschutz Medical Campus… He was currently collecting unemployment…
Question: How does an unemployed medical student afford $20,000 in weapons gear?
If you start to look at the really big picture here, the obvious question arises: How does an unemployed medical student afford all the complex weapons gear, bomb-making gear, “flammable” booby trap devices, ammunition, multiple magazines, bullet-proof vest, groin protection, ballistic helmet, SWAT uniform and all the rest of it?
A decent AR-15 rifle costs $1,000 or more all by itself. The shotgun and handgun might run another $800 total. Spare mags, sights, slings, and so on will run you at least another $1,000 across three firearms. The bullet-proof vest is easily another $800, and the cost of the bomb-making gear is anybody’s guess. With all the specialty body gear, ammunition, booby-trap devices and more, I’m guessing this is at least $20,000 in weapons and tactical gear, much of which is very difficult for civilians to get in the first place.
The mere manufacture of an explosive booby-trap device is, all by itself, a felony crime by the way. And remember: “Aurora Police Chief Dan Oates said Holmes’ apartment is booby-trapped with a ‘sophisticated’ maze of flammable devices. It could take hours or days for authorities to disarm it,” reported Yahoo News (http://sg.sports.yahoo.com/blogs/lookout/suspect-neuroscience-phd-stu…).
Question: Where does an unemployed, introverted medical school student get the training to deploy sophisticated booby traps, tactical body armor, weapons systems and more? Certainly not in graduate school!
All this leads to an obvious third party influence over all this. Someone else taught this guy these skills and funded the acquisition of the equipment.
Note: Some readers have questioned the $20,000 figure estimated here, saying this gear could have been acquired for only $10,000 or so. I doubt that, as all the extras that you need to effectively run these guns cost a lot of money: training courses, spare magazines, etc. Just a decent AR-15 battle sight (a holographic red dot sight) can run $1,000 – $2,000. Search “ACOG” if you don’t believe me. It is also reported that Holmes bought 6,000 rounds of ammo, which definitely isn’t cheap either. It’s clear this guy was spending big bucks. Whether it’s $10k or $20k isn’t really that much of a point.
Staged just in time for a vote on the UN small arms treaty?
More and more, this shooting is looking like a deliberate plot staged by the government itself much like Operation Fast and Furious pulled off by the ATF (http://www.naturalnews.com/032934_ATF_illegal_firearms.html) which helped smuggle tens of thousands of guns into Mexico for the purpose of causing “gun violence” in the USA, then blaming the Second Amendment for it.
All this looks like James Holmes completed a “mission” and then calmly ended that mission by surrendering to police and admitting everything. The mission, as we are now learning, was to cause as much terror and mayhem as possible, then to have that multiplied by the national media at exactly the right time leading up the UN vote next week on a global small arms treaty that could result in gun confiscation across America. (http://lewrockwell.com/eddlem/eddlem61.1.html)
Even Forbes.com wrote about this quite extensively, warning readers about the coming gun confiscation effort related to the UN treaty. The story was authored by Larry Bell (http://www.forbes.com/sites/larrybell/2011/06/07/u-n-agreement-should…) and says the UN treaty could “override our national sovereignty, and in the process, provide license for the federal government to assert preemptive powers over state regulatory powers guaranteed by the Tenth Amendment in addition to our Second Amendment rights.”
In other words, this has all the signs of Fast & Furious, Episode II. I wouldn’t be surprised to discover someone in Washington was behind it all. After all, there’s no quicker way to disarm a nation and take total control over the population than to stage violence, blame it on firearms, then call for leaders to “do something!” Such calls inevitably end up resulting in gun confiscation, and it’s never too long after that before government genocide really kicks in like we saw with Hitler, Stalin, Pol Pot, Mao and other tyrants.
Governments routinely murder millions
Here’s a short list of government mass murder carried out throughout history, almost always immediately following the disarmament of the public (and usually involving staged false flag events to justify the disarmament):
50+ million dead: Mao Ze-Dong (China, 1958-61 and 1966-69, Tibet 1949-50)
12+ million dead: Adolf Hitler (Germany, 1939-1945) – concentration camps, civilian deaths and dead Russian POWs
8+ million dead: Leopold II of Belgium (Congo, 1886-1908)
6+ million dead: Jozef Stalin (USSR, 1932-39)
5+ million dead: Hideki Tojo (Japan, 1941-44)
2+ million dead: Ismail Enver (Turkey, 1915-22)
1.7 million dead: Pol Pot (Cambodia, 1975-79)
1.6 million dead: Kim Il Sung (North Korea, 1948-94)
1.5 million dead: Menghistu (Ethiopia, 1975-78)
1 million dead: Yakubu Gowon (Biafra, 1967-1970)
900,000 dead: Leonid Brezhnev (Afghanistan, 1979-1982)
800,000 dead: Jean Kambanda (Rwanda, 1994)
See more at: http://www.scaruffi.com/politics/dictat.html
A “monopoly of force” in government is far more dangerous than a crazed lone shooter
So yes, James Holmes and other crazed shooters kill a number of people each year in random acts of violence. It’s horrifying and wrong, but it’s nothing compared to the millions of lives that governments tend to destroy when they gain total power over the populace.
The most dangerous thing in the world, it turns out, is not a crazy person with a rifle; it’s a government with a “monopoly of force” over the entire population. And that’s exactly what the UN spells out as its goal for the world: Stripping all power from individual citizens and handing “monopolies of force” to the governments of the world, shoring up their positions as the only “legitimate” power on the planet.
As this document reveals, a table entitled “Governance solutions for reasserting the state monopoly on the use of force” lists the options available to governments to re-establish “monopolies of force” against their own people:
• (Re-)establish state monopoly
– Ownership of WMDs
– Safety Inspectorates
• Prohibit business activity
– Justice and Execution
– Deadly Force?
• Regulate/limit activities
– Private defense/security services
– Control of financial transfers
– Export controls
– Transport and infrastructure safety
– Environmental impact
Interestingly, that document also describes “terrorism” in a way that perfectly matches the Aurora, Colorado “Batman” movie theater shooter:
Terrorists aim to spread panic and fear in societies in order to achieve political goals, be they based on left- or right-wing, social-revolutionary, nationalistic or religious ideologies. They are organized in a clandestine way, most often in small groups and cells… Typical tactical means include kidnapping, hostage-taking, sabotage, murder, suicide attacks, vehicle bombs and improvised explosive devices.
A global monopoly of force
This document is a goldmine of information about the globalist agenda to disarm and enslave the population. Check out page 28, which reads:
The legitimate monopoly of force should not be limited to the nation-state but should be based on the local, national, regional and the global levels.
Global Security Governance and the Monopoly of Force
At the global level no monopoly of violence exists. The UN Security Council already has a monopoly power to authorize the use of force at the global level, although the UN was never given the necessary means to exercise this authority, such as the capacity to implement sanctions, a police force and armed forces…
This deficiency in global governance acts as a bottleneck and a barrier to the creation of the democratically legitimized monopoly of violence that is globally required.
This story gets deep, doesn’t it? Watch for more analysis here at NaturalNews.com, where we still fight for liberty and justice in a world that’s increasingly becoming enslaved.
UPDATE: Follow-up story now posted that asks the question: Why did not one fight back?
Within the next year or two, the U.S. Department of Homeland Security will instantly know everything about your body, clothes, and luggage with a new laser-based molecular scanner fired from 164 feet (50 meters) away. From traces of drugs or gun powder on your clothes to what you had for breakfast to the adrenaline level in your body—agents will be able to get any information they want without even touching you.
And without you knowing it.
The technology is so incredibly effective that, in November 2011, its inventors were subcontracted by In-Q-Tel to work with the US Department of Homeland Security. In-Q-Tel is a company founded “in February 1999 by a group of private citizens at the request of the Director of the CIA and with the support of the U.S. Congress.” According to In-Q-Tel, they are the bridge between the Agency and new technology companies.
Their plan is to install this molecular-level scanning in airports and border crossings all across the United States. The official, stated goal of this arrangement is to be able to quickly identify explosives, dangerous chemicals, or bioweapons at a distance.
The machine is ten million times faster—and one million times more sensitive—than any currently available system. That means that it can be used systematically on everyone passing through airport security, not just suspect or randomly sampled people.
Analyzing everything in real time
But the machine can sniff out a lot more than just explosives, chemicals and bioweapons. The company that invented it, Genia Photonics, says that its laser scanner technology is able to “penetrate clothing and many other organic materials and offers spectroscopic information, especially for materials that impact safety such as explosives and pharmacological substances.” [PDF]
Formed in Montreal in 2009 by PhDs with specialties in lasers and fiber optics, Genia Photonics has 30 patents on this technology, claiming incredible biomedical and industrial applications—from identifying individual cancer cells in a real-time scan of a patient, to detecting trace amounts of harmful chemicals in sensitive manufacturing processes.
Above: The Genia Photonics’ Picosecond Programmable Laser scanner is capable of detecting every tiny trace of any substance on your body, from specks of gunpowder to your adrenaline levels to a sugar-sized grain of cannabis to what you had for breakfast.
Meanwhile, In-Q-Tel states that “an important benefit of Genia Photonics’ implementation as compared to existing solutions is that the entire synchronized laser system is comprised in a single, robust and alignment-free unit that may be easily transported for use in many environments… This compact and robust laser has the ability to rapidly sweep wavelengths in any pattern and sequence.” [PDF]
So not only can they scan everyone. They would be able to do it everywhere: the subway, a traffic light, sports events… everywhere.
How does it work?
The machine is a mobile, rack-mountable system. It fires a laser to provide molecular-level feedback at distances of up to 50 meters in just picoseconds. For all intents and purposes, that means instantly.
The small, inconspicuous machine is attached to a computer running a program that will show the information in real time, from trace amounts of cocaine on your dollar bills to gunpowder residue on your shoes. Forget trying to sneak a bottle of water past security—they will be able to tell what you had for breakfast in an instant while you’re walking down the hallway.
The technology is not new, it’s just millions times faster and more convenient than ever before. Back in 2008, a team at George Washington University developed a similar laser spectrometer using a different process. It could sense drug metabolites in urine in less than a second, trace amounts of explosive residue on a dollar bill, and even certain chemical changes happening in a plant leaf.
And the Russians also have a similar technology: announced last April, their “laser sensor can pick up on a single molecule in a million from up to 50 meters away.”
So if Genia Photonics’ claims pan out, this will be an incredible leap forward in terms of speed, portability, and convenience. One with staggering implications.
Observation without limits
There has so far been no discussion about the personal rights and privacy issues involved. Which “molecular tags” will they be scanning for? Who determines them? What are the threshold levels of this scanning? If you unknowingly stepped on the butt of someone’s joint and are carrying a sugar-sized grain of cannabis like that unfortunate traveler currently in jail in Dubai, will you be arrested?
And, since it’s extremely portable, will this technology extend beyone the airport or border crossings and into police cars, with officers looking for people on the street with increased levels of adrenaline in their system to detain in order to prevent potential violent outbursts? And will your car be scanned at stoplights for any trace amounts of suspicious substances? Would all this information be recorded anywhere?
Above: A page from a Genia Photonics paper describing its ability to even penetrate through clothing.
There are a lot of questions with no answer yet, but it’s obvious that the potential level of personal invasion of this technology goes far beyond that of body scans, wiretaps, and GPS tracking.
In other words, these portable, incredibly precise molecular-level scanning devices will be cascading lasers across your body as you walk from the bathroom to the soda machine at the airport and instantly reporting and storing a detailed breakdown of your person, in search of certain “molecular tags”.
Going well beyond eavesdropping, it seems quite possible that U.S. government plans on recording molecular data on travelers without their consent, or even knowledge that it’s possible—a scary thought. While the medical uses could revolutionize the way doctors diagnose illness, and any technology that could replace an aggressive pat-down is tempting, there’s a potential dark side to this implementation, and we need to shine some light on it before it’s implemented.
The author of this story is currently completing his PhD in renewable energy solutions, focusing on converting waste to energy in the urban environment. Even while most of this information is publicly available, he wanted to remain anonymous.
Totalitarian governments, like persistent forms of cancer, have latched onto the long history of man, falling and then reemerging from the deep recesses of our cultural biology to wreak havoc upon one unlucky generation to the next. The assumption by most is that these unfortunate empires are the product of bureaucracies gone awry; overtaken by the chaotic maddening hunger for wealth and power, and usually manipulated by the singular ambitions of a mesmerizing dictator. For those of us in the Liberty Movement who are actually educated on the less acknowledged details of history, oligarchy and globalized centralism is much less random than this, and a far more deliberate and devious process than the general unaware public is willing consider.
Unfortunately, the final truth is very complex, even for us…
One cannot place the blame of despotism entirely on the shoulders of globalists. Sadly, the crimes of elites are only possible with a certain amount of complicity from subsections of the populace. Without our penchant for apathy and fear, there can be no control. That is to say, there is no power over us but that which we give away. We pave the road to our own catastrophes.
In the end, a tyrant’s primary job is not to crush the masses and rule out of malevolence, but to obtain the voluntary consent of the citizenry, usually through trickery and deceit. Without the permission of the people, subconscious or otherwise, no tyranny can survive.
As with the oppressive regimes of the past, America has undergone a dramatic transformation, heavy with fear and ignorance. Our tradition of elections has been corrupted and negated by the false left/right paradigm, and the leaderships of both defunct parties now seek only to elevate a select minority of men bent on globalization. Our Constitutional liberties have been dismantled by legal chicanery. Our principles have been diluted by intellectual games of rationalism and moral relativism. Our country is ripe for conquest.
Americans battle over whose side is most to blame; Democrat or Republican, while ironically being disenchanted with both entities. For some people, the thought of holding each party equally accountable, or accepting that they are essentially the same animal, never crosses their minds.
While this irrelevant farce of a debate rages on, the true culprits plotting the demise of our Republic gain momentum, and implement policy initiatives that the public should and must take note of. In the past year alone, many blatant steps towards the Orwellian gulag have been openly administered. A carnival of peddlers and freaks and greasy popcorn overwhelms our senses, but the stench of this cheap circus still tickles our noses, and if we use our eyes for even a moment, certain dangerous trends reveal themselves. Here are just a few recent events that bear a dire warning; the ultimate assault on freedom in this nation grows near…
Acclimation To Subservience
Every totalitarian state worth its salt has its own goon squad. The Nazi’s had the “Brownshirts”, the Soviets had the “Militsiya” and the “Voluntary People’s Brigade”, the Communist Chinese have the “Chengguan”, etc. In America, however, all tyrannical measures are given innocuous bureaucratic labels to mislead and distract the masses. In this country, we have the Transportation Security Administration…
The TSA has become the most hated alphabet agency in the U.S. in perhaps the fastest time on record. It has violated the personal rights of more people on a daily basis in my view than the IRS, DEA, and the ATF combined. Clearly, this slobbering demon child of the Department of Homeland Security is being molded for something quite terrible and grand.
When confronted by the public on the use of irradiating and intrusive naked body scanner technology, the agency responded by allowing their blue handed ghoul army with to molest our nether-regions. When confronted by state and local governments on their absurd tactics, the TSA threatened economic blockades and airport shutdowns. The organization then began expanding its jurisdiction to bus and train stations and even our highways when it introduced the VIPR program and implemented random roadside checkpoints in Tennessee last year. But, this behavior is nothing compared to what is next on the horizon: a compromise…
Beware of government agencies bearing gifts. The TSA along with the International Air Transport Association has announced a new methodology of “less intrusive” passenger screening measures, in order to address the concerns of the public over pat downs and irradiating naked body scanners. This SOUNDS like a step in the right direction, and a proper response to the grievances of the citizenry. Instead, it turns out to be a refined example of totalitarianism in motion, and a perfect lesson in how the masses can be duped into handing over their inherent freedoms.
Revamped security protocols call for biometric data collection, including fingerprint and retina scans, and a tunnel which combines multiple detection systems into one area (who knows how radioactive this will end up being):
The mainstream article above makes this development sound like a win/win scenario for everyone, painting biometric data collection as a matter of convenience, but it also reveals the true design of the system; to illicit voluntary subservience:
“The key to speeding up checkpoints and making security less intrusive will be to identify and assess travelers according to the risks they pose to safety in the skies. The so-called riskiest or unknown passengers would face the toughest scrutiny, including questioning and more sensitive electronic screening. Those who voluntarily provide more information about themselves to the government would be rewarded with faster passage…”
They enforce destructive anti-personal rights policies then pretend to acquiesce by replacing them with a technocratic nightmare grid which requires the cataloging of our very genetic essence in order to function. The only remaining injustice left would be to apply this grid to the rest of the country outside of the airports and train stations, which I assure you, they plan to do.
Militarization
Last week, I covered the disturbing use of armored vehicles (APC’s or urban tanks) in open training regiments on the streets of St. Louis by the U.S Army, despite the fact that all of their exercises could have easily been accomplished on any number of military bases across the country. The action is an obvious attempt to condition the American populace to the sight of military units operating in a policing capacity:
I received multiple letters from current serving military who stated that in all their years in the armed forces they had never seen such a brash mishandling of public relations or an overstepping of bounds when it came to the restrictions of Posse Comitatus. It was encouraging to hear from military men and women who did not agree with or condone this kind of psyop activity on the part of our government.
Though the St. Louis event is not isolated, I believe it does represent an escalation.
Remember the controversy over the Mayor of Toledo and his refusal to allow 200 Marines to conduct urban combat drills on the public streets of his city in 2008? The media clamored to crucify this public official; one of the few who had any sense whatsoever in his head:
During each one of these events, city officials and local media attempted to inoculate the public with claims that they were “simply exercises”. This argument misses the point entirely. Whether or not these are “exercises” is not the issue. The issue is that this training could be done ON BASE. Using public streets and running drills within cities is absolutely unnecessary given the vast resources already available to the military, unless, of course, the goal is to BE SEEN by the public and to influence them to view the sight of armed troops around them as “normal”.
Add to this the fact that many of these military training exercises are being conducted in tandem with local police department, and you have a recipe for the utter militarization of our society, turning peace officers into combat soldiers, and combat soldiers into law enforcement mechanisms; a juxtaposition that will soon lead to unmitigated disaster.
Arms Race Against the People?
When a country is quietly preparing for war, the first signs are usually revealed by a disclosure of armaments. If stockpiling is taking place without a warranted threat present from a legitimate enemy, there is a considerable likelihood of aggression on the part of that nation. America has gone well beyond the psychological process of militarization and has begun the extensive arming of particular agencies whose primary purpose revolves around the domestic.
The DHS, for instance, placed an order for over 450 million rounds of hollowpoint .40 cal ammunition in April of this year:
While local police through federal programs (like the 1033 Program) are being given millions of dollars in free military equipment, including body armor, night vision equipment, APC’s, aircraft, first aid supplies, weapons, surveillance equipment, Kevlar helmets, gas masks and filters, vehicles, etc.:
All of this equipment, though issued to state agencies, is still heavily tracked and regulated by the federal government, making it clear that these “gifts” come with strings attached:
And finally, new FAA regulations will soon allow the dispersion of tens of thousands of predator drones with armament capability in the skies of the U.S. over the course of the next few years:
Now, anyone with any logic would ask who it is that the government is arming itself and local police to fight against? Al Qaeda? Let’s not be naïve…
The passage of the NDAA and its provisions for the indefinite detainment of ANY person, even an American citizen, under the laws of war has ended the debate over government intent in terms of domestic action. FBI Director Robert Mueller’s admission that he “did not know” if assassination programs would be used against American citizens also heaped evidence on the matter. The bottom line? Our government wishes to label and treat citizens as enemy combatants. Of course they would then organize armaments to follow through on their policy.
Pulling The Trigger
All despotic systems have another distinct similarity; they each began with a series of trigger events which opened the door to tighter controls over the population. The most immediate trigger event for the U.S. is the looming peril of a collapsing economy followed by inevitable civil unrest. With the EU currently in debt shambles, global markets are on the verge of a considerable breakdown. The Federal Reserve response will be predictable; QE3 and massive stimulus all around to mitigate the crisis. This time, though, the go-to Keynesian quick fix will not work in the slightest. In fact, it will make matters more untenable by placing the world reserve status of the dollar at risk.
Everything that has happened so far in the markets this year has been easy to foresee. Alt-Market predicted the economic slowdown around the world and the collapse of overall demand using the Baltic Dry Index as a gauge back in January:
If alternative economic analysts can predict these developments despite the manipulated statistics spewed out by the government every month, then I think the government and our central bank has a tremendously transparent view of what is coming down the road in terms of financial distress. I believe the establishment is very well aware of a potential crisis event, economic or otherwise, that is barreling down upon the U.S. I believe the evidence shows that they are preparing for this eventuality in a command and control fashion, without alerting the public to the coming implosion. I believe they will use the despair that flows forth from the fiscal wreckage as an excuse to institute martial law.
Call it “crazy”. Call it “conspiracy theory”. Call it “coincidence”. Call it “fear mongering”. Whatever you like. I find it far more insane to shrug off the strange and twisted behavior of our power structure, and simply hope that it’s all irrelevant to the future. Whenever I run into starry eyed historical romanticists who look back in astonishment at the tyrannies of the past and wonder out loud, “How could those people have not known where their country was headed?!!”, I think of where we are today…
Brandon Smith is the founder of Alt-Market is an organization designed to help you find like-minded activists and preppers in your local area so that you can network and construct communities for mutual aid and defense. Join Alt-Market.com today and learn what it means to step away from the system and build something better or contribute to their Safe Haven Project. You can contact Brandon Smith at: [email protected]
Ever wondered why your cell phone reception suddenly becomes terrible at protests? Ever worried that police could use electronic spoofing devices to suck up your mobile data because you are in the streets exercising your rights?
You might have been onto something.
Mobile “IMSI catchers”, currently on the market and being pushed to police and intelligence agencies worldwide, enable these creepy, stealth spying tactics. And if they build it and hawk it, history tells us police will buy it and deploy it.
On Tuesday, July 3, 2012, electronic privacy advocate and technology researcher Chris Soghoian tweeted a link to a photograph of a talk he gave at TED in Scotland in late June. Behind him in the photograph is another image, this one taken by privacy researcher Eric King at a surveillance trade show. (King’s Twitter bio contains a quote from a representative of the notorious ISS World — a global surveillance trade firm that often hosts such trade shows: the rep called him an “Anti-lawful interception zealot blogger.” High praise.)
Look at the slide behind Soghoian; that’s the photo in question. It shows an IMSI catcher strapped onto a model, under the model’s shirt.
IMSI stands for “International Mobile Subscriber Identity”. The technology is essentially a mobile phone tower with “a malicious operator”. It mimics the behavior of a cell tower and tricks mobile phones into sending data to it, instead of to the tower.
As such it is considered a Man In the Middle (MITM) attack. It is used as an eavesdropping device used for interception and tracking of cellular phones and usually is undetectable for the users of mobile phones.
Once it has made a connection with the phone and tricked it into thinking it is a mobile tower, the IMSI catcher forces the phone to drop its encryption, enabling easy access to the contents of the device. The tool then lets the attacker listen in on mobile conversations and intercept all data sent from a mobile phone, remaining undetected. In some cases the tool also allows the operator to manipulate messages.
Here’s a creepy video that a purveyor of IMSI catchers made to advertise its product:
Please note that by playing this clip YouTube and Google will place a long term cookie on your computer.
Police in the United States claim they do not need a warrant to use an IMSI catcher or other spoofing device to track your location. A case to determine whether or not the courts agree is working itself through the system.
Privacy International’s Eric King took the photo on the slide behind Soghoian at a surveillance trade show, where he says the tool was “pitched to me as being perfect for covert operations in public order situations.” In other words, at protests.
The FBI uses IMSI catchers and claims it does so legally, even though it says it doesn’t need a warrant to deploy them. The Electronic Privacy Information Center is currently pursuing FOIA litigation to find out exactly how the bureau uses the “Stingray” (a brand name IMSI catcher); unsurprisingly, the FBI wasn’t forthcoming with documents to reveal its legal standard or other information about how it uses the tool. Stay tuned for more information as that case makes its way through the courts.
Meanwhile, how can you protect yourself against IMSI catchers? Unfortunately, you probably can’t. And the threats are not just from government. As Soghoian and others warned in a friend of the court brief,
Finally, the communications privacy of millions of law-abiding Americans is already threatened by the use of this and similar interception technologies by non-US government entities, such as stalkers, criminals, and foreign governments engaged in espionage. As such, the public interest is best served by greater public discussion regarding these tracking technologies and the security flaws in the mobile phone networks that they exploit, not less.
Yet again, we are faced with a situation in which our technology has outpaced our law reform. It’s time for Congress to change that.
To get a more detailed sense of how the technology actually works, watch this excellent talk from DefCon 2011, with Chris Paget: “Practical Cellphone Spying”. He spoofs the phones of the people in the audience during the talk; it’s well worth watching if you have some time.
For more on IMSI catchers and the state of the law, click here.
Last week, Venezuelan President Hugo Chavez showcased his country’s first unmanned drone. It seems that an international race to dominate the sky has gone underway and the South American country has become a player in the game of drones with the help of Iran, Russia and China. Retired Army Colonel Douglas Macgregor joins us to explain why more and more countries are rushing to get their hands on an unmanned aircraft.
The United States Air Force, through the use of unmanned aerial drones, is set to be deployed inside the United States to collect data, investigate places of interest, and share data with local police agencies.
An unclassified Air Force Memo from late April documents the fact that the military is operating drone aircraft domestically and that, through a complete end run around the Constitution, can essentially share it with local law enforcement even if it has no relation to terrorism.
While many articles have already been published detailing the fact that the military is or will be sharing information they collect with local law enforcement, a more startling fact has been largely ignored by the corporate controlled media. (until now)
In a recently published op-ed, Andrew Napolitano outlined the fact that once the military identifies something of interest they can apply to a military commander for permission to conduct searches of American property and or citizens which in turn is a form of martial law.
“It gets worse. If the military personnel see something of interest from a drone, they may apply to a military judge or “military commander” for permission to conduct a physical search of the private property that intrigues them. And, any “incidentally acquired information” can be retained or turned over to local law enforcement. What’s next? Prosecutions before military tribunals in the U.S,” wrote Napolitano.
The Electronic Frontier Foundation has also publicly commented on the fact that the Air Force is now openly recording information on the American people in domestic situations.
“We’ve seen in some records that were released by the Air Force just recently, that under their rules, they are allowed to fly drones in public areas and record information on domestic situations,” explained Jennifer Lynch, of the EFF.
Madison Ruppert, writing for EndtheLie.com, detailed the broad exceptions to a guideline that is supposed to limit the military from non-consensual surveillance.
While the U.S. Air Force’s guidelines claim that drones are not allowed to carry out “non-consensual surveillance” on U.S. citizens or property, there are plenty of exceptions to this allowing such surveillance to occur.
Some of these many exceptions outlined in the Air Force documents include:
– Investigating or preventing clandestine intelligence activities by foreign powers, international narcotics activities, or international terrorist activities
– Protecting DoD employees, information, property and facilities
– Preventing, detecting or investigating other violations of law
Seems pretty broad, doesn’t it? “Other violations of law” leaves the door wide open for the drones to be used for just about everything. After all, jaywalking is a violation of law. Does this mean that if a drone captures someone jaywalking, the use of military drones in U.S. airspace is somehow justified?
That’s right, the Air Force now has the authority to carry out drone surveillance on American citizens for essentially any violation of law.
Sadly, we now live in a country were 30,000 drones are set to be launched by various law enforcement agencies, the military, and private companies.
The idea of the military not being used against the American people has now been completely thrown out the window with the only hope citizens of this country have left being the support of individual military members who choose to go against these Unconstitutional directives.
If you’re a zombie buff, you obviously have been paying attention to the slue of bizarre news that has been happening over the past week or so. By bizarre I mean zombie related. People getting their faces eaten off, someone cutting themselves open and throwing their intestines at cops, and someone else killed his roommate and then ate his heart and brains. Yes, it sounds like something out of the zombie movies that we’ve seen over the years and quite honestly, it’s frightening.
Can you imagine if a zombie outbreak really did occur? I can honestly tell you won’t be as badass as Frank West or any of the cast from Left 4 Dead. Most people will die horrible, horrible deaths and it’s going to be tragic!
I, on the other hand, will survive and be just fine thanks to this new zombie proof house by KWK Promes. This is something any zombie fan and most importantly, any zombie outbreak survivor would love to have.
“The most essential item for our clients was acquiring the feeling of maximum security,” begins the designers’ website in the summary of the structure. Maximum security is an understatement here.Even the windows are covered with a slab of concrete when the structure is on “nap time.”
With moveable walls, only one entrance (located on the second floor after closing the drawbridge), and a metal gate; this house is definitely something you’ll want to invest in especially with the current events that have been taking place.
Not only is the house zombie proof, but it’s also extremely luxurious. Glossy wooden floors, indoor pool, very modern kitchen, and several more great amenities that will make any zombie survivor completely comfortable.