List Of Top 10 Stories Underreported By The Mainstream Media

List Of Top 10 Stories Underreported By The Mainstream Media

“The restructuring of media in the United States is creating forms of censorship that are as potentially damaging as overt censorship.”

“Media corporations have been undergoing a massive merging process that is realigning our sources of information in America,”

The 11 largest or most influential media corporations in the United StatesGeneral Electric Company (NBC), Viacom Inc. (cable), The Walt Disney Company (ABC), Time Warner Inc.(CNN), Westinghouse Electric Corporation (CBS), The News Corporation Ltd. (Fox), Gannett Co. Inc., Knight-Ridder Inc., New York Times Co., Washington Post Co. and the Times Mirror Co. – represent the interests of corporate America, and that the media elite are the watchdogs of acceptable ideological messages, the parameters of news and information content and the general use of media resources. Your Mainstream Media is manipulating the news you are allowed to see.

Project Censored has been documenting inadequate media coverage of crucial stories since it began in 1967 at Sonoma State University.

Each year, the group considers hundreds of news stories submitted by readers, evaluating their merits. Students search Lexis Nexis and other databases to see if the stories were underreported, and if so, the stories are fact-checked by professors and experts in relevant fields.

.” Project Censored Director Mickey Huff told us the idea was to show how various undercovered stories fit together into an alternative narrative, not to say that one story was more censored than another.

Here’s Project Censored’s Top 10 list for 2013:

PCensored_art_1.jpg

1. Signs of an emerging police state

President George W. Bush is remembered largely for his role in curbing civil liberties in the name of his “war on terror.” But it’s President Obama who signed the 2012 NDAA, including its clause allowing for indefinite detention without trial for terrorism suspects.

Obama promised that “my administration will interpret them to avoid the constitutional conflict” — leaving us adrift if and when the next administration chooses to interpret them otherwise.

Another law of concern is the National Defense Resources Preparedness Executive Order that Obama issued in March 2012. That order authorizes the president, “in the event of a potential threat to the security of the United States, to take actions necessary to ensure the availability of adequate resources and production capability, including services and critical technology, for national defense requirements.”

The president is to be advised on this course of action by “the National Security Council and Homeland Security Council, in conjunction with the National Economic Council.” Journalist Chris Hedges, along with co-plaintiffs including Noam Chomsky and Daniel Ellsberg, won a case challenging the NDAA’s indefinite detention clause on Sept. 1, when a federal judge blocked its enforcement, but her ruling was overturned on Oct. 3, so the clause is back.

 

People who get their information exclusively from Mainstream Media sources may be surprised at the lack of enthusiasm on the left for President Barack Obama in this crucial election.

But that’s probably because they weren’t exposed to the full online furor sparked by Obama’s continuation of his predecessor’s (George Bush) overreaching approach to national security, such as Obama signing the 2012 National Defense Authorization Act, which allows the indefinite detention of those accused of supporting terrorism, even U.S. citizens.

PCensored_art_2.jpg

2. Oceans in peril

Big banks aren’t the only entities that our country has deemed “too big to fail.” But our oceans won’t be getting a bailout anytime soon, and their collapse could compromise life itself. In a haunting article highlighted by Project Censored, Mother Jones reporter Julia Whitty paints a tenuous seascape — overfished, acidified, warming — and describes how the destruction of the ocean’s complex ecosystems jeopardizes the entire planet, not just the 70 percent that is water.

Whitty compares ocean acidification, caused by global warming, to acidification that was one of the causes of the “Great Dying,” a mass extinction 252 million years ago.

Life on Earth took 30 million years to recover. In a more hopeful story, a study of 14 protected and 18 non-protected ecosystems in the Mediterranean Sea showed dangerous levels of biomass depletion.

But it also showed that the marine reserves were well-enforced, with five to 10 times larger fish populations than in unprotected areas. This encourages establishment and maintenance of more reserves.

PCensored_3.jpg

3. U.S. deaths from Fukushima

A plume of toxic fallout floated to the U.S. after Japan’s tragic Fukushima nuclear disaster on March 11, 2011. The U.S. Environmental Protection Agency found radiation levels in air, water and milk that were hundreds of times higher than normal across the United States.

One month later, the EPA announced that radiation levels had declined, and they would cease testing. But after making a Freedom of Information Act request, journalist Lucas Hixson published emails revealing that on March 24, 2011, the task of collecting nuclear data had been handed off from the U.S. Nuclear Regulatory Commission to the Nuclear Energy Institute, a nuclear industry lobbying group.

And in one study that got little attention, scientists Joseph Mangano and Jeanette Sherman found that in the period following the Fukushima meltdowns, 14,000 more deaths than average were reported in the U.S., mostly among infants. Later, Mangono and Sherman updated the number to 22,000.

PCensored_art_4.jpg

4. FBI agents responsible for terrorist plots

We know that FBI agents go into communities such as mosques, both undercover and in the guise of building relationships, quietly gathering information about individuals.

This is part of an approach to finding what the FBI now considers the most likely kind of terrorists, “lone wolves.” Its strategy: “seeking to identify those disgruntled few who might participate in a plot given the means and the opportunity. And then, in case after case, the government provides the plot, the means, and the opportunity,” writes Mother Jones journalist Trevor Aaronsen.

The publication, along with the Investigative Reporting Program at the University of California-Berkeley, examined the results of this strategy, 508 cases classified as terrorism-related that have come before the U.S. Department of Justice since the 9/11 terrorist attacks of 2001. In 243 of these cases, an informant was involved; in 49 cases, an informant actually led the plot.

And “with three exceptions, all of the high-profile domestic terror plots of the last decade were actually FBI stings.” facilitated by the F.B.I., whose undercover agents and informers posed as terrorists offering a dummy missile, fake C-4 explosives, a disarmed suicide vest and rudimentary training. Suspects naïvely played their parts until they were arrested.

 

PCensored_art_5.jpg

5. Federal Reserve loaned trillions to major banks

The Federal Reserve, the U.S.’s quasi-private central bank, was audited for the first time in its history this year. The audit report states, “From late 2007 through mid-2010, Reserve Banks provided more than a trillion dollars … in emergency loans to the financial sector to address strains in credit markets and to avert failures of individual institutions believed to be a threat to the stability of the financial system.” These loans had significantly less interest and fewer conditions than the high-profile TARP bailouts, and were rife with conflicts of interest. Some examples: the CEO of JP Morgan Chase served as a board member of the New York Federal Reserve at the same time that his bank received more than $390 billion in financial assistance from the Fed. William Dudley, who is now the New York Federal Reserve president, was granted a conflict of interest waiver to let him keep investments in AIG and General Electric at the same time the companies were given bailout funds. The audit was restricted to Federal Reserve lending during the financial crisis. On July 25, 2012, a bill to audit the Fed again, with fewer limitations, authored by Rep. Ron Paul, passed the House of Representatives. H.R. 459 was expected to die in the Senate, but the movement behind Paul and his calls to hold the Fed accountable, or abolish it altogether, seem to be growing.

Read More: /economy/2012/09/first-audit-in-the-federal-reserves-nearly-100-year-history-were-posted-today-the-results-are-startling-2449770.html

 

PCensored_6.JPG

6. Small network of corporations run the global economy

Reporting on a study by researchers from the Swiss Federal Institute in Zurich didn’t make the rounds nearly enough, according to Censored 2013. They found that, of 43,060 transnational companies, 147 control 40 percent of total global wealth. The researchers also built a model visually demonstrating how the connections between companies — what it calls the “super entity” — works. Some have criticized the study, saying control of assets doesn’t equate to ownership. True, but as we clearly saw in the 2008 financial collapse, corporations are capable of mismanaging assets in their control to the detriment of their actual owners. And a largely unregulated super entity like this is vulnerable to global collapse.

 

 

 

 

PCensored_art_7.jpg

7. The International Year of Cooperative

Can something really be censored when it’s straight from the United Nations? According to Project Censored evaluators, the corporate media underreported the U.N. declaring 2012 to be the International Year of the Cooperative, based on the co-op business model’s stunning growth. The U.N. found that, in 2012, 1 billion people worldwide are co-op member-owners, or one in five adults over age 15. The largest is Spain’s Mondragon Corporation, with more than 80,000 member-owners. The U.N. predicts that by 2025, worker-owned co-ops will be the world’s fastest growing business model. Worker-owned cooperatives provide for equitable distribution of wealth, genuine connection to the workplace, and, just maybe, a brighter future for our planet.

 

 

PCensored_art_8.jpg

8. NATO war crimes in Libya

In January 2012, the BBC “revealed” how British Special Forces agents joined and “blended in” with rebels in Libya to help topple dictator Muammar Gadaffi, a story that alternative media sources had reported a year earlier. NATO admits to bombing a pipe factory in the Libyan city of Brega that was key to the water supply system that brought tap water to 70 percent of Libyans, saying that Gadaffi was storing weapons in the factory. In Censored 2013, writer James F. Tracy makes the point that historical relations between the U.S. and Libya were left out of mainstream news coverage of the NATO campaign; “background knowledge and historical context confirming Al-Qaeda and Western involvement in the destabilization of the Gadaffi regime are also essential for making sense of corporate news narratives depicting the Libyan operation as a popular ‘uprising.’”

 

 

 

 

 

PCensored_art_9.jpg

9. Prison slavery in the U.S.

On its website, the UNICOR manufacturing corporation proudly proclaims that its products are “made in America.” That’s true, but they’re made in places in the U.S. where labor laws don’t apply, with workers often paid just 23 cents an hour to be exposed to toxic materials with no legal recourse. These places are U.S. prisons. Slavery conditions in prisons aren’t exactly news.

It’s literally written into the Constitution; the 13th Amendment, which abolished slavery, outlaws “slavery nor involuntary servitude, except as a punishment for crime whereof the party shall have been duly convicted.” But the articles highlighted by Project Censored this year reveal the current state of prison slavery industries, and its ties to war.

The majority of products manufactured by inmates are contracted to the Department of Defense. Inmates make complex parts for missile systems, battleship anti-aircraft guns and landmine sweepers, as well as night-vision goggles, body army and camouflage uniforms.

Of course, this is happening in the context of record high imprisonment in the U.S., where grossly disproportionate numbers of African Americans and Latinos are imprisoned, and can’t vote even after they’re freed. As psychologist Elliot D. Cohen puts it in this year’s book: “This system of slavery, like that which existed in this country before the Civil War, is also racist, as more than 60 percent of U.S. prisoners are people of color.”

 

PCensored_art_10.jpg

10. H.R. 347 criminalizes protest

H.R. 347, sometimes called the “criminalizing protest” or “anti-Occupy” bill, made some headlines. But concerned lawyers and other citizens worry that it could have disastrous effects for the First Amendment right to protest. Officially called the Federal Restricted Grounds Improvement Act, the law makes it a felony to “knowingly” enter a zone restricted under the law, or engage in “disorderly or disruptive” conduct in or near the zones.

The restricted zones include anywhere the Secret Service may be — places such as the White House, areas hosting events deemed “National Special Security Events,” or anywhere visited by the president, vice president and their immediate families; former presidents, vice presidents and certain family members; certain foreign dignitaries; major presidential and vice presidential candidates (within 120 days of an election); and other individuals as designated by a presidential executive order.

These people could be anywhere, and NSSEs have notoriously included the Democratic and Republican National Conventions, Super Bowls and the Academy Awards. So far, it seems the only time H.R. 347 has kicked in is with George Clooney’s high-profile arrest outside the Sudanese embassy.

Clooney ultimately was not detained without trial — information that would be almost impossible to censor — but what about the rest of us who exist outside of the mainstream media’s spotlight?

 

October 11, 2012 – DCMX Radio: Obama Classmate Tell-all, Spying by Court the DoJ, FEMA Update, 911 Missile & Alien Video Leak?!

October 11, 2012 – DCMX Radio: Obama Classmate Tell-all, Spying by Court the DoJ, FEMA Update, 911 Missile & Alien Video Leak?!

Obama’s Former Classmate: “He Told Us That His Father Was An Indonesian King, That He Was A Prince & Would Be A Ruler”

John Moore Whistleblower – Courts Are Spying!

Incredible Leaked Alien Footage?!

FEMA Mass Fatality Planning – Executive Order

9-11 WTC2 Missile or Plane?

Medical Marijuana Eases Symptoms of Autism


Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

The Supreme Court Isn’t Bothered By the NSA’s Warrantless Wiretapping

The Supreme Court Isn’t Bothered By the NSA’s Warrantless Wiretapping

The Supreme Court refused to hear a case on Tuesday that holds telecom companies accountable for letting the National Security Agency spy on unknowing Americans without a warrant. Dating back to 2006 when the American Civil Liberties Union and the Electronic Frontier Foundation first filed the class-action lawsuit, the case accuses AT&T of providing the NSA with customers’ personal information — phone calls, emails and web browsing history — without seeking a court order. Verizon and Sprint are also mentioned. The plaintiff, former AT&T technician Mark Klein, even provided internal documentation that showed evidence of the NSA surveilling Americans’ Internet traffic from a secret room in San Francisco. That case, Hepting v. AT&T, has now been thrown out, and the Supreme Court didn’t even comment on why.

This sound very important! After all, doesn’t the Constitution protect American citizens from being spied on by their government without their knowledge or consent? Well, yes and no. Warrantless wiretapping sounds invasive and terrible, sure, but it’s actually technically legal under a 2008 law that retroactively granted immunity to all of the telecom companies that were spying on Americans at the government’s behest. Unsurprisingly, the practice can be traced back to President George W. Bush’s anti-terrorism program following the 2001 World Trade Center attacks. Once things calmed down and people actually started suing the government for eavesdropping on everyday Americans, Congress passed the FISA Amendements Act. (FISA stands for the original law, the Federal Intelligence Surveillance Act.) That law is currently up for renewal in Congress.

As Wired points out, neither the Bush administration nor the Obama administration has confirmed or denied allegations of warrantless wiretapping. They’ve both argued that the surveillance program is a state secret and any sort of disclosure would endanger national security. The EFF doesn’t buy this argument. “The government still claims that this massive program of surveillance of Americans is a state secret, but after eleven years and multiple Congressional reports, public admissions and media coverage, the only place that this program hasn’t been seriously considered is in the courts — to determine whether it’s legal or constitutional,” said Cindy Cohn, the EFF’s legal director. “We look forward to rectifying that.”

Indeed, Heptig v. AT&T is not the civil liberties advocates’ last hope at gaining some clarity on the warrantless wiretapping issue. In a separate case, the EFF sued the government directly, rather than going after the telecom companies. The case was tossed out by a district court judge only to be picked up by the 9th Circuit Court of Appeals, where Judge Margaret McKeown ruled that the EFF’s arguments “are not abstract, generalized grievances and instead meet the constitutional standing requirement of concrete injury.”

That case will be heard in December. Until then, be careful what you say on the phone. You know who is listening.

via AtalanticWire

New Book Details the NSA’s Warrantless Wiretapping Program, As Government Moves to Avoid All Accountability in Court

New Book Details the NSA’s Warrantless Wiretapping Program, As Government Moves to Avoid All Accountability in Court

Former New York Times reporter Kurt Eichenwald’s new book, published last week, provides yet more details about how the the NSA’s unconstitutional warrantless wiretapping program came about, and confirms that even top Bush Administration lawyers felt there was a “strong argument” that the program violated the law. “Officials might be slammed for violating the Fourth Amendment as a result of having listened in on calls to people inside the country and collecting so much personal data,” Eichenwald wrote, and “in the future, others may question the legality” of their actions.

Yet even today, eleven years later, the government continues to claim that no court can judge the program’s legality. In the next month, the government will argue—in EFF’s case in federal district court and ACLU’s case in the Supreme Court—that courts must dismiss the legal challenges without ever coming to a ruling on the merits.

Eichenwald’s book, 500 Days: Secrets and Lies in the Terror Wars, describes how the NSA’s illegal program—what he calls “the most dramatic expansion of NSA’s power and authority in the agency’s 49 year history”— was devised just days after 9/11 to disregard requirements in the Foreign Intelligence Surveillance Act (FISA). Instead of getting individualized warrants to monitor Americans communicating overseas, the Bush administration unilaterally gave the NSA the power to sweep up millions of emails and phone calls into a database for analysis without court approval:

Connections between a suspect e-mail address and others—accounts that both sent and received messages there, whether in the United States or not—would be examined. At that point, a more detailed level of analysis would be applied creating something of a ripple effect. The suspect e-mail address would lead to a second, the second to the accounts it contacted.

In other words, the NSA was given the green light to warrantlessly spy of Americans communications on American soil—a power that was illegal under FISA. And the government—instead of finding probable cause for surveillance like the Constitution requires—started using a burden of proof akin to the game Six Degrees from Kevin Bacon.

Eichenwald’s reporting, focused on the immediate aftermath of 9/11, unfortunately overlooks the NSA’s longstanding desire to live “on the network” reflected in its presentations to the incoming Bush Administration officials in December, 2000. The idea that the NSA only came up with this idea after 9/11 isn’t really accurate.1 But regardless, Eichenwald’s reporting makes clear that Bush administration officials were terrified that this program would become public.

Of course, after several years, much of the NSA’s program did become public when the New York Times exposed its existence in their 2005 Pulitzer Prize winning investigation. Virtually every major news organization in the US subsequently reported on the NSA and its mass spying programs, which led to congressional investigations and a multitude of lawsuits—two which will be argued in the coming month.

In EFF’s lawsuit, in addition to a mountain of public information including many governmental admissions, the court will see evidence from AT&T whistleblower Mark Klein showing blueprints and photographs of the NSA’s secret room in AT&T’s facility in San Francisco. Three more NSA whistleblowers, including William Binney a former high ranking official involved with the program during its infancy, also submitted affidavits laying out how the NSA illegally spied on Americans in the aftermath of 9/11.

Despite this all of this, the government recently filed a motion in the Northern District of California invoking the controversial “state secrets” privilege. Essentially, the government argues that—even if all of the allegations are true—the case should be dismissed entirely because admitting or denying any fact would potentially endanger national security, even in the face of the government’s own craftily wordsmithed  “denials” before Congress and elsewhere.

In the ACLU’s case going before the Supreme Court this term, a group of journalists, lawyers, and human rights activists has sued over surveillance conducted after the passage of the FISA Amendments Act (FAA). The FAA was passed in 2008 and formalized some of the admitted portions of NSA’s program, allowing emails and phone calls to and from from overseas to continue to be acquired without a warrant. The government only needs one general court order to target large groups of people—even entire countries—communicating to Americans for an entire year.

The plaintiffs, given that their professions, regularly talk to people who are almost certainly spied on. They argue that surveillance of them without warrants  renders the statute unconstitutional. But the government contends the case must be dismissed on “standing” grounds because the plaintiffs can’t prove with certainty they have been surveilled, because, in a perfectly circular argument, the government won’t “admit” they have been surveilled, as if public admissions by the government is the only way to prove illegal wiretapping.

As the ACLU writes, “The government theory of standing would render real injuries nonjusticiable and insulate the government’s surveillance activities from meaningful judicial review.” The same can be said of the ‘state secrets’ privilege in EFF’s case. The government is contending they can use government secrecy as a sword to terminate judicial accountability. It doesn’t matter how much evidence is in the public domain, just by telling the Court that the information implicates “national security,” they can wall off entire subject matters from judicial oversight, effectively hiding illegality, unconstitutionality along with embarrassing or overreaching acts by NSA spooks and others.

Eichenwald is just the latest in a long line of journalists to discuss and organize details about the NSA’s unconstitutional program. At this point the American people are well aware of the NSA’s actions – only the courts have been kept in the dark.  And if the courts go along with blinding themselves, the government will have been given a license to violate the law and constitution long into the future.

via EFF.org

TrapWire Tied to Anti-Occupy Internet-spy Program Tartan by NTrepid Abraxas Cubic

TrapWire Tied to Anti-Occupy Internet-spy Program Tartan by NTrepid Abraxas Cubic

How do you make matters worse for an elusive intelligence company that has been forced to scramble for explanations about their ownership of an intricate, widespread surveillance program? Just ask Cubic, whose troubles only begin with TrapWire.

Days after the international intelligence gathering surveillance system called TrapWire was unraveled by RT, an ongoing investigation into any and all entities with ties to the technology has unturned an ever-increasing toll of creepy truths. In only the latest installment of the quickly snowballing TrapWire saga, a company that shares several of the same board members as the secret spy system has been linked to a program called Tartan, which aims to track down alleged anarchists by specifically singling out Occupy Wall Street protesters and the publically funded media — all with the aid of federal agents.

Tartan, a product of the Ntrepid Corporation, “exposes and quantifies key influencers and hidden connections in social networks using mathematical algorithms for objective, un-biased output,” its website claims. “Our analysts, mathematicians and computer scientists are continually exploring new quantification, mining and visualization techniques in order to better analyze social networks.” In order to prove as such, their official website links to the executive summary of a case study dated this year that examines social network connections among so-called anarchists, supposedly locating hidden ties within an underground movement that was anchored on political activists and even the Public Broadcasting Station [.pdf].

“Tartan was used to reveal a hidden network of relationships among anarchist leaders of seemingly unrelated movements,” the website claims. “The study exposed the affiliations within this network that facilitate the viral spread of violent and illegal tactics to the broader protest movement in the United States.”

Tartan is advertised on their site as a must-have application for the national security sector, politicians and federal law enforcement, and makes a case by claiming that “an amorphous network of anarchist and protest groups,” made up of Occupy Oakland, PBS, Citizen Radio, Crimethinc and others, relies on “influential leaders,” “modern technology” and “illegal tactics” to spread a message of anarchy across America.

“The organizers of Occupy Wall Street and Occupy DC have built Occupy networks through online communication with anarchists actively participating in the movements’ founding,” the executive summary reads. On the chart that accompanies their claim, the group lists several political activism groups and broadcast networks within a ring of alleged anarchy, which also includes an unnamed FBI informant.

Although emails uncovered in a hack last year waged at Strategic Forecasting, or Stratfor, suggested that Occupy groups had been under private surveillance, the latest discovery of publically available information implies that the extent to which the monitoring of political activists on American soil occurred may have extended what was previously imagined.

Things don’t end there, though. While the TrapWire tale is still only just beginning, the Ntrepid Corporation made headlines last year after it was discovered by the Guardian that the company was orchestrating an “online persona management” program, a clever propaganda mill that was touted as a means “to influence regional and international audiences to achieve U.S. Central Command strategic objectives,” according, at least, to the Inspector General of the US Defense Department [.pdf]. The investigation eventually revealed that the US Central Command awarded Ntrepid $2.76 million worth of taxpayer dollars to create phony Internet “sock puppets” to propagate US support.

One year later, the merits of Tartan’s analytics are now being brought into question, but so are the rest of the company’s ties. A trove of research accumulated by RT, Project PM founder Barrett Brown, PrivacySOS.org and independent researchers Justin Ferguson and Asher Wolf, among others, has linked Tartan with an even more unsettling operation.

Margaret A. Lee of Northern Virginia is listed on several websites as serving on the Ntrepid board of directors as secretary, a position she held alongside Director Richard Helms, CFO Wesley R Husted and President Michael Martinka. And although several parties are going to great lengths to deny the ties, a paper trail directly links Lee and company to Abraxas — and thus Cubic — and, of course, TrapWire, the very surveillance system that is believed to be blanketing the United States.

According to the Commonwealth of Virginia’s State Corporation Commission, TrapWire Inc. was registered to Margaret A Lee on March 7, 2009. Other publically available information reveals that, at least at one point, Wesley Husted served as chief financial officer for TrapWire, Inc., where Richard H Helms held the title of CEO.

Various sources have since claimed that Helms, a former CIA agent that once ran the agency’s European division, has severed ties with TrapWire, yet the other connections remain intact.

In RT’s earlier research in the TrapWire case, it was revealed that TrapWire’s parent company, Cubic Corporation, acquired an online identity masking tool called Anonymzer in a 2010 merger, and also controls the fare card system at some of the biggest public transportation systems in the world. According to the latest findings, Cubic’s control extends beyond just that, though. Under their Ntrepid branch, Cubic controlled an operation that spied on political activists with FBI informants and attempted to link them to crimes across America.

Whether or not the TrapWire system was implemented in such operations is unclear, and Cubic continues to maintain that they are not involved with the surveillance network.

Last week, Cubic Corporation issued a press release claiming, “Abraxas Corporation then and now has no affiliation with Abraxas Applications now known as Trapwire, Inc.”

“Abraxas Corp., a risk-mitigation technology company, has spun out a software business to focus on selling a new product,” the article reads. “The spinoff – called Abraxas Applications – will sell TrapWire, which predicts attacks on critical infrastructure by analyzing security reports and video surveillance.”

Not only does a 2007 report in the Washington Business Journal insist that the companies are practically one in the same, though, but a 2006 article in the same paper reveals that Abraxas had just acquired software maker Dauntless. Researchers at Darkernet have since linked Lee, Husted and Helms to the Abraxas Dauntless Board of Directors as well.

Justin Ferguson, the researcher who first exposed TrapWire two weeks ago, has noted that Lee, Helms and Husted were listed on Abraxas Dauntless’ filings with Virginia as recently as December 2011. They also are all present on the TrapWire filings dated September 2011 and the latest annual filing made with the Florida Department of State, Division of Corporations on behalf of Ntrepid.

Nevertheless, in a conversation this week with Project PM’s Barrett Brown, Cubic Corp. Communication Director Tim Hall dismisses this tie again.

“There is no connection at all with Abraxas Applications and Trapwire and or Ntrepid,” Hall allegedly insists, according to audio uploaded to YouTube.

Brown, on his part, says he has obtained Cubic’s 2010 tax filings that show that Ntrepd, like Abraxas, is “wholly owned” by Cubic.

Other trademark information publically available online says that the Abraxas Corporation first filed to claim the name TrapWire in 2004 and was granted a license for such in January of 2007.

 

TrapWire Training Courses Reveal Possible Purpose for its Creation

Although certain people reportedly playing key roles in the web-like leadership structure of TrapWire deny their involvement with the massive surveillance system, there is evidence that the engine driving this global company runs on the ambition of a common core of officers and directors.

Given the potential flood of legal challenges to its constitutionality, the corporation believed to be behind TrapWire is heading for higher ground, denying any association with the surveillance technology.

In a statement published on its website on August 13, Cubic Corporation attempted to sever the ties binding it to TrapWire. “Cubic Corporation (NYSE: CUB) acquired Abraxas Corporation on December 20, 2010. Abraxas Corporation then and now has no affiliation with Abraxas Applications now known as Trapwire, Inc. Erroneous reports have linked the company with Trapwire, Inc.,” the company insisted.

Despite such denials, many are rightly worried about any corporate connection — no matter how tenuous — between Cubic and TrapWire given the former’s access to the personal data of Americans through its other corporate interests. The synergy of such access with a massive surveillance apparatus could threaten the privacy of millions, as well as the freedom from unwarranted searches and seizures protected by the Fourth Amendment.

As for the scope and significance of TrapWire, the size of it cannot be exaggerated.

TrapWire is a massive and technologically advanced surveillance system that has the capacity to keep nearly the entire population of this country under the watchful eye of government 24 hours a day. Using this network of cameras and other surveillance tools, the federal government is rapidly constructing an impenetrable, inescapable theater of surveillance, most of which is going unnoticed by Americans and unreported by the mainstream media.

Unlike other elements of the central government’s cybersurveillance program, word about TrapWire was not leaked by Obama administration insiders. The details of this nearly unbelievable surveillance scheme were made public by WikiLeaks, the anti-secrecy group founded by Julian Assange. The TrapWire story percolated from the millions of e-mails from the Austin, Texas-based private intelligence-gathering firm Stratfor, published this year by WikiLeaks. Covering correspondence from mid-2004 to 2011, these documents expose Stratfor’s “web of informers, pay-off structure, payment-laundering techniques and psychological methods.”

This coterie of Stratfor co-conspirators is apparently angry about the leaks, considering that the WikiLeaks servers have been under near-constant Distributed Denial of Service (DDoS) attacks since the TrapWire revelations began attracting the notice of alternative journalists. Some outlets report that the cyberattacks are being carried out by agents of the American intelligence community determined to prevent the full depth of this scandal from being explored by reporters.

Exactly what is TrapWire? According to one description of the program, from Russia Today:

Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.

Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence.

Although many of the details remain undisclosed, it is known that the infrastructure of TrapWire was designed and deployed by Abraxas, an intelligence contractor based in northern Virginia headed and run by dozens of former American surveillance officers. As one article described it: “The employee roster at Abraxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented.”

The network is believed to be immense. An article published by transparency advocacy group Public Intelligence claims that Stratfor e-mails suggest that TrapWire is in use by the U.S. Secret Service, the British security service MI5, the Royal Canadian Mounted Police, as well as counterterrorism divisions in both the Los Angeles and New York Police Departments and the LA fusion center. The e-mails also suggest that TrapWire is in use at military bases around the country. A July 2011 e-mail from a “Burton” to others at Stratfor describes how the U.S. Army, Marine Corps, and Pentagon have all begun using TrapWire and are “on the system now.” Burton described the Navy as the “next on the list.”

A survey of WikiLeaks e-mails containing information about TrapWire reveals another facet of this ever-expanding tool for tracking and targeting individuals.

In a report filed by online news gathering site darkernet.in, a list of the training courses offered to end users shines a little light on the otherwise purposefully obscured goals of this global monitoring behemoth.

The first course listed in the darkernet article is called the Surveillance Awareness Workshop. This class is reportedly “designed to instruct network and security personnel to use and navigate the TrapWire software system to familiarize themselves with the indicators of surveillance, terrorist surveillance methodologies, facility vulnerabilities, and the identification of probable surveillance zones that exist within each facility.”

The goal is that those with their fingers on the buttons and eyes on the consoles will learn to “view their facility the same way as would a terrorist, and then to be alert to the indicators of pre-attack surveillance.”

Pre-attack is a statist way of saying “guilty until proven innocent.” These agents — typically law enforcement or federal intelligence officers — reportedly will learn to spot suspicious behavior that points to the target’s propensity for participation in illegal activities.

This sort of advance profiling is eerily similar to the philosophy undergirding the signature strike that is becoming the go-to tactic in the Obama administration’s drone war.

A signature strike is not a strike on a particular suspect, but rather an attack on a person or group of people demonstrating behavior that is typical of those who might be associated with terror.

Perhaps the TrapWire “pre-attack surveillance” and the drone war “signature strike” are just two identifiable examples of a wider, more insidious government movement toward a society where one can be found guilty in advance of any crime based solely on one’s likelihood to act unlawfully and then be summarily executed based on that probability alone.

The second class offered by the makers of TrapWire according to the Internet investigation is designed along similar lines. It is called the Terrorist Pre-Attack Operations Course (TPOC).

Darkernet reports that participation in TPOC “will enhance overall security awareness and improve participants’ understanding of terrorist and criminal pre-attack surveillance and intelligence collection operations.”

Once again, the watchers are taught to better understand “terrorists” and what behavior they display just prior to the commission of a crime.

Unlike actual laws, these technologies and the courses improving their capabilities in the hands of users do not offer definitions of “terrorist” or “criminal.” One is left to one’s own understanding, it would seem, in the matter of conceiving of who is and is not a terrorist.

Today, the typical target might be a Muslim seen frequenting a subway station, for example. However, as the gulf separating the rulers and the ruled widens, perhaps a future TrapWire operator will target a gun-owner or attendant at a rally opposing a government policy as a potential threat and will initiate the requisite “intelligence collection operations.” The end result of those operations may be indefinite detention or death by Hellfire missile.

Finally, the last class listed in the darkernet article is called the Deception Detection and Eliciting Responses (DDER) course. This class will “teach students to detect deception and elicit responses in individuals including those which have been identified by TrapWire as having been engaged in suspicious behavior.”

So, once the target’s image pops up on one of the myriad cameras tracking the movements of every citizen (all are targets and potential terrorists, apparently) and the intelligence officers are called in to begin building a dossier on the target, the responding agents will use their newly-acquired interrogation skills to get the truth out of the target. “We have ways of making you talk,” in other words.

Given the aversion of the wizards running the surveillance state to allowing the curtain to be pulled back exposing the incredible extent of its domestic surveillance activities, it is more likely than not that TrapWire’s use in the tracking of Americans is wider and more institutional than most of us would like to believe.

A link to a complete listing of all TrapWire courses and the associated material is found here.

October 2, 2012 – DCMX Radio: NDAA Appeals Update, Patriot Act Crushing 1st Amendment, Hacking & ZeroDays, Banking Situation

October 2, 2012 – DCMX Radio: NDAA Appeals Update, Patriot Act Crushing 1st Amendment, Hacking & ZeroDays, Banking Situation

DCMX Sound Effects Update~  Tribute to K-Rino with ‘Grand Deception’

National Detention Authorization Act (NDAA) Appeals Court Update Discussion

Viruses, Hacking, Stuxnet & Flame – ZeroDay Exploits, Who is Building Them?

Patriot Act Being Used to Silence Activism & Protest!

Romney goon offers absurd recommendation for the Banking Industry

Further Discussion of the Conspiracy Matrix


Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

October 1, 2012 – DCMX Radio: Bahrain Medics Get Jailtime, CIA’s Drone Killings, James Holmes Update, Bitcoin Digi-Currency

October 1, 2012 – DCMX Radio: Bahrain Medics Get Jailtime, CIA’s Drone Killings, James Holmes Update, Bitcoin Digi-Currency

Medics that treated Bahrain Protestors Recieve JAIL TIME

CIA Drone Killings & Obama’s National Security Secrecy

Future of Drone Policy – Risks of Artificial Intelligence  Taking Over

James Holmes Case Gagged – Evidence of Multiple Shooters, Refusal to release Security Cam Footage

Bitcoin Digital Currency – What’s Possible?

Further Discussion of Relevant News and Police State Creep


Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

All My Heros Have FBI Files

All My Heros Have FBI Files

 

Tupac Shakur, Bob Dylan, Lucille Ball, Jimmy Hendrix, Albert Einstein, John Lennon, Malcom X, Janice Joplin, Marylin Monroe, Martin Luther King

 

Micro-Drone: Mosquito Cyborg Spy with On-Board RFID NanoTech

Micro-Drone: Mosquito Cyborg Spy with On-Board RFID NanoTech

 

You are looking at an insect spy drone for urban areas, already in production, funded by the US Government. It can be remotely controlled an is equipped with a Camera and Microphone.  It can land on you and may have the potential to take a DNA sample, or leave RFID tracking nano-technology on (or in) your skin.  It can fly through an open window, or it can attach to your clothing until you take it in your home.

 

 

Shredding the Constitution: National Detention, Targeted Killing and Spying Cases

Shredding the Constitution: National Detention, Targeted Killing and Spying Cases

Indefinite detention, targeted killing and warrantless wiretapping are hot issues in the courts this week. Here’s the latest:
  • INDEFINITE DETENTION // The National Defense Authorization Act (NDAA) of 2012 provision that allows the government to indefinitely detain US citizens without charge or trial is once again in effect, after a Second Circuit Court overturned Judge Katherine Forrest’s permanent injunction against Section 1021 (b)(2). The fight over the widely-despised authority appears to be far from over. Read more.

UPDATE: Chris Hedges, one of the plaintiffs in the NDAA indefinite detention lawsuit, spoke with live stream journalist Tim Pool at Occupy Wall Street on Monday, September 17 about his case and the Obama administration’s appeal. Hedges put forward the thesis that the Obama administration may already be holding US citizens without due process — otherwise they wouldn’t have acted so quickly to overturn Forrest’s permanent injunction. The administration doesn’t want to be held in contempt, Hedges said, and so immediately moved to appeal her verdict. Note: This was filmed before the court overturned Forrest’s injunction, so it’s obsolete in that sense.

Watch:

  • TARGETED KILLING // Can the federal government talk publicly about its targeted killing drone program on television, in interviews with journalists, and before audiences of hundreds, and then turn around and deny the existence of the program in court to ensure that the public remains in the dark about its legal justifications for pursuing it? The ACLU says ‘no’:
The American Civil Liberties Union will be in federal appeals court Thursday to argue that the CIA cannot deny the existence of the government’s targeted killing program and refuse to respond to Freedom of Information Act requests about the program while officials continue to make public statements about it.
The ACLU’s FOIA request, filed in January 2010, seeks to learn when, where and against whom drone strikes can be authorized, and how the U.S. ensures compliance with international laws relating to extrajudicial killings.
“The notion that the CIA’s targeted killing program is a secret is nothing short of absurd,” said ACLU Deputy Legal Director Jameel Jaffer, who will argue the case before a three-judge panel of the D.C. Circuit Appeals Court. “For more than two years, senior officials have been making claims about the program both on the record and off. They’ve claimed that the program is effective, lawful and closely supervised. If they can make these claims, there is no reason why they should not be required to respond to requests under the Freedom of Information Act.”
Read more about the case here.
  • WARRANTLESS SPYING // A 2005 class action lawsuit brought by AT&T customers who say the NSA illegally spied on their communications is slowly winding itself through the court system. In 2008, Congress immunized AT&T and other telecoms from lawsuits related to companies turning over customer information to the NSA, but the government still faces a number of challenges to the warrantless spying program, among them the AT&T class action suit. A judge first threw the case out in 2010, claiming that the plaintiffs didn’t have standing to bring the lawsuit because they couldn’t prove they were spied on. Another court reversed that decision a year later, instructing the court to look at whether the state secrets privilege bars the court from considering the case at all — regardless of whether there’s evidence of spying or not. As a result, the main plaintiff in the case, Carolyn Jewel, filed for summary judgment in July, providing the court with testimony from NSA whistleblowers and former AT&T employees to prove the existence of vacuum style, dragnet surveillance. The NSA makes some contradictory and utterly confusing arguments about why the plaintiffs shouldn’t have a right to challenge its spying programs. From Courthouse News:

The government has amply demonstrated in the DNI and NSA public and classified declarations that disclosure of the privileged information reasonably could be expected to cause exceptionally grave damage to national security,” a 48-page memorandum states. “The disclosure of information concerning whether plaintiffs have been subject to alleged NSA intelligence activity would necessarily reveal NSA intelligence sources and methods, including whether certain intelligence collection activities existed and the nature of any such activity. The disclosure of whether specific individuals were targets of alleged NSA activities would also reveal who is subject to investigative interest – helping that person to evade surveillance – or who is not – thereby revealing the scope of intelligence activities as well as the existence of secure channels for communication.

But those statements thoroughly contradict something else the government says:

The DNI explains that, as the government has previously indicated, the NSA’s collection of content of communications under the now inoperative TSP was directed at international communications in which a participant is reasonably believed to be associated with al Qaeda or an affiliate terrorist organization, and thus plaintiffs’ allegation that the NSA has indiscriminately collected the content of millions of communications sent or received by people inside the United States after 9/11 under the TSP is false.

The national security establishment first tells the public that it cannot disclose who is and who is not a target of its surveillance programs because doing so would tip off the bad guys, and then goes on to say that the program “was directed at…al Qaeda[.]” In other words, the government will readily admit that al Qaeda and “affiliate terrorist organization[s]” are targets of its surveillance programs, but it can’t acknowledge whether or not non-terrorist US citizens are also targets of that program because disclosure of whether non-terrorist US citizens are being spied on without constitutional protections would “cause exceptionally grave harm to national security.” As BoingBoing observed: the NSA says it can’t tell us if it is spying on us because “REASONS.”

  • WARRANTLESS SPYING // The ACLU has its own warrantless wiretapping lawsuit in the works to challenge the constitutionality of the FISA Amendments Act of 2008, and the government has thrown up similar roadblocks to prevent the case from being heard on the merits. Here’s the ACLU answer to the government’s claims that our clients — journalists, human rights workers and academics — don’t have a right to bring the lawsuit:
The government’s insistence that plaintiffs cannot establish standing without proving the certainty of surveillance is at bottom not a standing argument but a bid for a kind of immunity. This is because its proposed standard is one that neither plaintiffs nor anyone else will ever be able to meet—not because the surveillance they fear will never take place but because they will be unaware of it when it does…
The government theory of standing would render real injuries nonjusticiable and insulate the government’s surveillance activities from meaningful judicial review.
More than forty years ago, when surveillance technology was comparatively primitive, this Court recognized that “few threats to liberty exist which are greater than that posed by the use of eavesdropping devices” … and it cautioned that the threat to core democratic rights was especially pronounced where surveillance authority was exercised in the service of national security…. To accept the government’s theory of standing would be to accept that the courts are powerless to address the threat presented by surveillance authorities exercised in secret, and powerless to protect Americans’ most fundamental rights against the encroachment of increasingly sophisticated and intrusive forms of government power.
Read more about the ACLU’s challenge, which will go before the Supreme Court in late October to decide the standing issue once and for all. Just last week the House passed a reauthorization of the FISA Amendments Act, which would extend the law through December 31, 2017. Read the brief in the ACLU’s challenge, Clapper v. Amnesty, et al., here.
Proof Smart Meters Are Being Used to Spy On Us

Proof Smart Meters Are Being Used to Spy On Us

IF you have ever wondered if your smart meter is being used to spy on you, well now there is proof that governments and private organisations are using data collected from smart meters to spy on you.

Information about power usage, which can be used to identify when a home is being occupied, is being shared with third parties of which includes government agencies, private organisations and off-shore data processing centres.

This unethical breach of privacy was discovered on the website of one of Australia’s largest electricity retailer, Origin Energy.

Electricity customers, who sign up for an online service that provides the account holder with detailed information about their electricity usage, are unwillingly agreeing to share their private information with third parties.

A 496 word Privacy/Consent policy form explicitly states that customers who wish to sign up for the service that provides them with information about their electricity usage, must agree that the following organisations have access to their private data:

  • Government authorities
  • Electricity installers
  • Mail houses
  • Data processing analysts
  • IT service providers
  • Smart energy technology providers
  • Debt collection agencies
  • Credit reporting agencies

A spokesperson for the electricity company (Origin Energy) responsible for this revelation was recently quoted as saying “the additional information requested about each household adds to the richness of the Origin Smart experience” (Source: The Age).

One private organisation that is being given personal information of Origin Energy customers is Tendril, a self-described consumer engagement application and services provider and an organisation that believes smart grids can help fight climate change.

Alarmingly, Tendril’s own website doesn’t explicitly state how it uses data gathered by its clients and for what purposes the data can and cannot be used for.

What implication this has for Australian residents is unknown.

There has been an overwhelming opposition to the roll-out and installation of smart meters around the world.

Smart Meter opt-out coalitions are present in almost all major municipalities that have smart meters present. Unfortunately, in many municipalities an opt-put option is not available.

The author (Andrew Puhanic) was forced to have a smart meter installed on his property, with the only notice given about the installation being a letter informing the ‘month’ that the smart meter would be installed.

The greatest concern with smart meter data being shared with third parties is the fact that the third-party organisation could easily identify (over time) a pattern of when you do and do not use electricity.

This information could fall into the wrong hands and could be used to determine when your home is un-occupied.

In Australia, the erosion of privacy was escalated further by a new proposal to force internet and telephone companies to retain customer records for more than two years. For more information about this proposal, click here.

Households that are forced to have smart meters installed must be assured that the information their electricity company collects is not shared with third parties.

Ultimately, smart meters are designed to collect information about household electricity usage and now there is proof that electricity companies are openly sharing information collected by smart meters.

Written by Andrew Puhanic

Keeping the Government Out of Your Smartphone

Keeping the Government Out of Your Smartphone

Smartphones can be a cop’s best friend. They are packed with private information like emails, text messages, photos, and calling history. Unsurprisingly, law enforcement agencies now routinely seize and search phones. This occurs at traffic stops, during raids of a target’s home or office, and during interrogations and stops at the U.S. border. These searches are frequently conducted without any court order.

Several courts around the country have blessed such searches, and so as a practical matter, if the police seize your phone, there isn’t much you can do after the fact to keep your data out of their hands.

However, just because the courts have permitted law enforcement agencies to search seized smartphones, doesn’t mean that you—the person whose data is sitting on that device—have any obligation to make it easy for them.

Screen unlock patterns are not your friend

The Android mobile operating system includes the capability to lock the screen of the device when it isn’t being used. Android supports three unlock authentication methods: a visual pattern, a numeric PIN, and an alphanumeric password.

The pattern-based screen unlock is probably good enough to keep a sibling or inquisitive spouse out of your phone (providing they haven’t seen you enter the pattern, and there isn’t a smudge trail from a previous unlock that has been left behind). However, the pattern-based unlock method is by no means sufficient to stop law enforcement agencies.

After five incorrect attempts to enter the screen unlock pattern, Android will reveal a “forgot pattern?” button, which provides the user with an alternate way method of gaining access: By entering the Google account email address and password that is already associated with the device (for email and the App Market, for example). After the user has incorrectly attempted to unlock the screen unlock pattern 20 times, the device will lock itself until the user enters a correct username/password.

What this means is that if provided a valid username/password pair by Google, law enforcement agencies can gain access to an Android device that is protected with a screen unlock pattern. As I understand it, this assistance takes the form of two password changes: one to a new password that Google shares with law enforcement, followed by another that Google does not share with the police. This second password change takes place sometime after law enforcement agents have bypassed the screen unlock, which prevents the government from having ongoing access to new email messages and other Google account-protected content that would otherwise automatically sync to the device.

Anticipatory warrants

As The Wall Street Journal recently reported, Google was served with a search warrant earlier this year compelling the company to assist agents from the FBI in unlocking an Android phone seized from a pimp. According to the Journal, Google refused to comply with the warrant. The Journal did not reveal why Google refused, merely that the warrant had been filed with the court with a handwritten note by a FBI agent stating, “no property was obtained as Google Legal refused to provide the requested information.”

It is my understanding, based on discussions with individuals who are familiar with Google’s law enforcement procedures, that the company will provide assistance to law enforcement agencies seeking to bypass screen unlock patterns, provided that the cops get the right kind of court order. The company insists on an anticipatory warrant, which the Supreme Court has defined as “a warrant based upon an affidavit showing probable cause that at some future time, but not presently, certain evidence of crime will be located at a specific place.”

Although a regular search warrant might be sufficient to authorize the police to search a laptop or other computer, the always-connected nature of smartphones means that they will continue to receive new email messages and other communications after they have been seized and searched by the police. It is my understanding that Google insists on an anticipatory warrant in order to cover emails or other communications that might sync during the period between when the phone is unlocked by the police and the completion of the imaging process (which is when the police copy all of the data off of the phone onto another storage medium).

Presumably, had the FBI obtained an anticipatory warrant in the case that the Wall Street Journal wrote about, the company would have assisted the government in its attempts to unlock the target’s phone.

Praise for Google

The fact that Google can, in some circumstances, provide the government access to data on a locked Android phone should not be taken as evidence that Google is designing government backdoors into its software. If anything, it is a solid example of the fact that when presented with a choice between usability and security, most large companies offering services to the general public tend to lean towards usability (for example, Apple and Dropbox can provide law enforcement agencies access to users’ data stored with their respective cloud storage services).

The existence of the screen unlock pattern bypass is likely there because a large number of consumers forget their screen unlock patterns. Many of those users are probably glad that Google lets them restore access to their device (and any data on it), rather than forcing them to perform a factory reset whenever they forget their password.

However, as soon as Google provides a feature to consumers to restore access to their locked devices, the company can be forced to provide law enforcement agencies access to that same functionality. As the old saying goes, “If you build it, they will come.”

In spite of the fact that Google has prioritized usability over security, Google’s legal team has clearly put their customers’ privacy first.

First, the company has insisted on a stricter form of court order than a plain-vanilla search warrant, and then refused to provide assistance to law enforcement agencies that seek assistance without the right kind of order.
Second, by providing the government access to the Android device via a (temporary) change to the users’ Gmail password, Google has ensured that the target of the surveillance receives an automatic email notice that their password has been changed. Although the email they receive won’t make it explicit that the government has been granted access to their mobile device, it will still serve as a hint to the target that something fishy has happened.
Third, by changing the user’s password a second time, Google has prevented the government from having ongoing, real-time access to the surveillance target’s emails. There is, I believe, no law requiring Google to take this last step—Google has done it to protect the privacy of the user, and to deny the government what would otherwise be an indefinite email wiretap not approved by the courts.

For real protection you need full-disk encryption

Of the three screen lock methods available on Android (pattern, PIN, password), Google only offers a username/password based bypass for the pattern lock. If you’d rather that the police not be able to gain access to your device this way (and are comfortable with the risk of losing your data if you are locked out of your phone), I recommend not using a pattern-based screen lock, and instead using a PIN or password.

However, it’s important to understand that while locking the screen of your device with a PIN or password is a good first step towards security, it is not sufficient to protect your data. Commercially available forensic analysis tools can be used to directly copy all data off of a device and onto external media. To prevent against such forensic imaging, it is important to encrypt data stored on a device.

Since version 3.0 (Honeycomb) of the OS, Android has included support for full disk encryption, but it is not enabled by default. If you want to keep your data safe, enabling this feature is a must.

Unfortunately, Android currently uses the same PIN or password for both the screen unlock and to decrypt the disk. This design decision makes it extremely likely that users will pick a short PIN or password, since they will probably have to enter their screen unlock dozens of time each day. Entering a 16-character password before making a phone call or obtaining GPS directions is too great of a usability burden to place on most users.

Using a shorter letter/number PIN or password might be good enough for a screen unlock, but disk encryption passwords must be much, much longer to be able to withstand brute force attacks. Case in point: A tool released at the Defcon hacker conference this summer can crack the disk encryption of Android devices that are protected with 4-6 digit numeric PINs in a matter of seconds.

Hopefully, Google’s engineers will at some point add new functionality to Android to let you use a different PIN/password for the screen unlock and full disk encryption. In the meantime, users who have rooted their device can download a third-party app that will allow you to choose a different (and hopefully much longer) password for disk encryption.

What about Apple?

The recent Wall Street Journal story on Google also raises important questions about the phone unlocking assistance Apple can provide to law enforcement agencies. An Apple spokesperson told the Journal that the company “won’t release any personal information without a search warrant, and we never share anyone’s passcode. If a court orders us to retrieve data from an iPhone, we do it ourselves. We never let anyone else unlock a customer’s iPhone.”

The quote from Apple’s spokesperson confirms what others have hinted at for some time: that the company will unlock phones and extract data from them for the police. For example, an anonymous law enforcement source told CNET earlier this year that Apple has for at least three years helped police to bypass the lock code on iPhones seized during criminal investigations.

Unfortunately, we do not know the technical specifics of how Apple retrieves data from locked iPhones. It isn’t clear if they are brute-forcing short numeric lock codes, or if there exists a backdoor in iOS that the company can use to bypass the encryption. Until more is known, the only useful advice I can offer is to disable the “Simple Passcode” feature in iOS and instead use a long, alpha-numeric passcode.

By Chris Soghoian, Principal Technologist and Senior Policy Analyst, ACLU Speech, Privacy and Technology Project at 11:48am

TheIntelHub Radio: Max Maverick Guest Appearance on the Bob Tuskin Show

TheIntelHub Radio: Max Maverick Guest Appearance on the Bob Tuskin Show

Topics of Discussion:

Police State Build Up
Surveillance Technology
Life After Martial Law
Elite Globalist Agenda
Specific Solutions for Humanity

CLICK TO LISTEN LIVE

Bob Tuskin

An eternal student of economics, science and the arts. His radio career began at age 15, then with 911 as the backdrop, his activist side began to emerge. An organic gardener, a radio show host and activist, he seeks a higher form of wisdom and works hard to ensure a better place for his children’s children.

Seeking an end to the current slavery-based system in which we live, his solutions based understanding is an important asset. As an active! activist, and with the skills of grammar, logic and rhetoric, the Trivium, in hand, Tuskin often speaks in front of city commissions, the environmental protection agency and others in the pursuit of 911 justice, to promote awareness of geo-engineering and other topics.

Never pollyannaish and never afraid to speak his mind, with Bob Tuskin the truth shall be told. Bob will also be running for his local sheriffs office.

The Bob Tuskin Show is live Monday through Friday 8 to 10pm est.

The Bob Tuskin Radio Show  affiliates:

Full Spectrum Dominance: Totalitarian Democracy in the New World Order

Full Spectrum Dominance: Totalitarian Democracy in the New World Order

Book Description
Publication Date: May 12, 2009
For the faction controlling the Pentagon, the military industry, and the oil industry, the Cold War never ended. They engineered an incredible plan to grab total control of the planet, of land, sea, air, space, outer space and cyberspace. Continuing ‘below the radar,’ they created a global network of military bases and conflicts to advance the long-term goal of Full Spectrum Dominance. Methods included control of propaganda, use of NGOs for regime change, Color Revolutions to advance NATO eastwards, and a vast array of psychological and economic warfare techniques. They even used ‘save the gorilla’ organizations in Africa to secretly run arms in to create wars for raw materials. It was all part of a Revolution in Military Affairs, as they termed it. The events of September 11, 2001 would allow an American President to declare a worldwide War on Terror, on an enemy who was everywhere, and nowhere. 9/11 justified the Patriot Act, the very act that destroyed Americans’ Constitutional freedoms in the name of security. This book gives a disturbing look at the strategy of Full Spectrum Dominance, at what is behind a strategy that could lead us into a horrific nuclear war in the very near future, and at the very least, to a world at continuous war.
Seeds of Destruction: The Hidden Agenda of… by William F. Engdahl
4.3 out of 5 stars (28)
$16.47
A Century of War: : Anglo-American Oil Poli… by F. William Engdahl
5.0 out of 5 stars (1)
$24.95
Gods of Money: Wall Street and the Death of... by F. William Engdahl
5.0 out of 5 stars (1)
$21.33
They Own It All (Including You)!: By Means o… by Ronald MacDonald
4.8 out of 5 stars (38)
$14.96 Next
——————————————————————————–

Editorial Reviews
About the Author
F. William Engdahl is author of the international best-selling book on oil and geopolitics, A Century of War: Anglo-American Politics and the New World Order. He is a widely discussed analyst of current political and economic developments whose articles have appeared in numerous newspapers and magazines and well-known international websites. His book, ‘Seeds of Destruction: The Hidden Agenda Behind Genetic Manipulation,’ deals with agribusiness and the attempt to control world food supply and thereby populations. He may be reached at his website, www.engdahl.oilgeopolitics.net –This text refers to an alternate Paperback edition.

——————————————————————————–
Product Details
Paperback: 268 pages
Publisher: Third Millennium Press (May 12, 2009)
Language: English
ISBN-10: 0979560861
ISBN-13: 978-0979560866
Product Dimensions: 8.9 x 5.9 x 0.6 inches
Shipping Weight: 5.6 ounces
Average Customer Review: 4.7 out of 5 stars See all reviews (15 customer reviews)
Amazon Best Sellers Rank: #1,109,639 in Books (See Top 100 in Books)
5.0 out of 5 stars Urgent and Essential Reading, June 21, 2009
By Margot L. White “M. Lachlan White”
(REAL NAME) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
FULL SPECTRUM DOMINANCE is a rare and essential book — one that orients readers quickly and deeply to the world we live in, and how we arrived here. William Engdahl presents the historical background of policy making and decision analysis that explains how the United States arrived at its present “mission” in the world. The value of Engdahl’s brilliant book is not only that it familiarizes American readers with a history that is not usually revealed to us, but it also guides us through the many overt and covert tactics employed by the US for regime change– primarily via the Pentagon and its nefarious weapons contractors, but also through various think tanks and foundations with innocuous names disingenuously referring to “democracy” and “freedom.” The “full spectrum” of tactics and deceptions and tricks — both violent and non-violent — is revealed here. Needless to say, this book falls within the honorable tradition of political histories that blow the cover off America’s much vaunted pretense and propaganda about serving the cause of “freedom” and “democracy” around the world! It is the only book available today that covers ALL of this, with ample quotations and documents from the architects of US policies, in just 250 well written pages. FULL SPECTRUM DOMINANCE is unique in presenting the evolution of CIA tactics, ranging from its crude “coups” of yesteryear (as in Iran and Guatemala) to its current — and perhaps more insidious — use of “non-violent” electronically manipulated technological “crowd control” via cell phones and (as is currently evident on the streets of Tehran) Twitter. If Americans are woefully ignorant of the full range and dangerous extremes of American violence around the world, of American interventions into and manipulations of other countries’ elections and environments and economics, then there is no longer any excuse for such ignorance. FULL SPECTRUM DOMINANCE is a “must read.” To understand pipeline politics, the critical importance of Eurasia to US defense contractors, read this book. To understand how and why America has become such a rapacious and violent empire with bases all over the world and tens of thousands of agents provocateurs doing its dirty work from Tibet to Tehran, manipulating elections, staging phony “revolutions” to surround Russia with hostile Made-in-USA regimes, propping up American-trained puppets or fomenting chaos from Myanmar to Congo and from Ukraine to Iran — read this book! Help other customers find the most helpful reviews
Was this review helpful to you? Yes No Report abuse | Permalink
Comment Comment (1)
5.0 out of 5 stars Essential reading, June 1, 2009
By Lori “The Rogue Reader Mom” (Arizona) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
F W Engdahl has succeeded again at the difficult task of explaining the complexities of how our world really works and how we got to this frightful point in world affairs.
An exacting researcher, Mr. Engdahl, with his latest book, has taken on the task of sorting out the USA’s real intentions as it pertains to the rest of the world. In connecting the dots he takes us on a journey of clarity and comprehension regarding the aggressive path our nation is on as it builds the American Empire.
To follow Mr. Engdahl’s logical explanations of why we do what we do to the rest of the world is to come to the realization that the US may not be the ‘good guys’ we think we are and the rest of the world may have plenty of reasons to be wary of the US.
A sobering examination of our real past and current policies towards Russia, China, Europe, the Middle East and the rest of world community, ‘full spectrum dominance’, as the Pentagon calls it, is a strong-arm policy of control over the rest of the world that is leading us down a disastrous path towards a possible world war. We can’t solve our world’s problems until we properly identify them. Mr. Engdahl has done that in superb fashion.
5.0 out of 5 stars A book everyone needs to read!, July 1, 2009
By William Fetty “Kamakazi” (Sweden)
(REAL NAME) This review is from: Full Spectrum Dominance: Totalitarian Democracy in the New World Order (Paperback)
Engdahl’s books are at the very top of my list of books I recommend to people who want to know what is happening geopolitically in the world, but more importantly WHY things are happening!
Engdahl, though an academic scholar and very well educated with years of experince has once again written a book that anyone can understand and which reads like a great documentary film, much due to the fact that Engdahl is also a journalist, historian and economic researcher!
Full Spectrum Dominance picks up where his first book on the subject “A Century Of War:Anglo-American oil politics and the new world order” ends.
Engdahl once again leads us through the matrix of anglo-american foreign policy and their century old agenda of literal world domination through brute force and covert non-violent means. The evil and criminal actions of the anglo-american empire throughout the 20th century which has now spilled over in to the new millenium are presented in great detail and just like Engdahls previous books makes for a page turner. Once again I cannot recommend this book enough! Read it!

http://www.amazon.com/exec/obidos/ASIN/0979560861/ref=nosim/cryptogoncom-20

Why can’t you say “Tavistock” on Godlike Productions?

Why can’t you say “Tavistock” on Godlike Productions?

I’ve been hearing rumours for a few months now that Godlike Productions has a “banned words” list that will result in you being blocked from reading the website should you decide to use one.

While I fully expect certain keywords to result in you unable to make a posting on the site, but I have never heard of a site that bans you 100% for using said words.

As well, there are only 2 keywords that I know that are blocked… “Alex Jones” and “Tavistock”.   Thinking this may just be an urban legend, I wanted to put it to the test.

I opened up my browser and headed over to Godlike Productions.  To ensure that I wasn’t already banned (which does happen sometimes) I commented on a few posts.

Then I spy a post from the form administrator.  The admin goes by the name “Trinity” and is one of the 2 main administrators.  The post was entitled “A Heart Felt Thank You To All Participants On This Website!” where Trinity thanks the visitors of GLP.

Thinking that this would be a perfect place to test my theory, I typed in the following comment:

“I never knew it would be so much fun hanging with the guys from Tavistock”

And then hit the submit button.   The screen flashed and suddenly I was greeted with the following message:

SORRY – YOUR IP ADDRESS <REMOVED FOR PRIVACY> HAS BEEN BANNED FROM VIEWING THIS WEBSITE

If you have an upgraded account you are immune to bans while logged in. Please log in now to browse the site.

If you have a free account you may also log in now and upgrade your account to get immunity from bans.
If you still don’t have an account you may create an account now and then upgrade it to get past bans (and get access to other exclusive features).

Thank you for not stalking!

So why would GLP be banning people for using the words Tavistock?   Mind control and culture creation are big subjects in the alternative media and Tavistock is at the head of those operations.

Is this just a way for GLP to create buzz in the community?  If you ban certain words, like Tavistock, the visitors of the forums will spread that all around the Internet while calling you disinformation.

Unfortunately, Google doesn’t see “truth or false”.  They only see that links are being feed back into GLP, thus GLP must be popular.  Now Google will rank GLP pages higher because they have more “authority” due to the back-links.

Thinking this was all a bit strange, I decided to see if I could find out who owns GLP and then I could maybe gauge if they are brilliant marketers or full on COINTELPRO.

A Dark Rabbit Hole full of Vipers

As I’ve done with most of my investigations, I started this one without a conclusion in my head.   I really wanted to believe that this was just some smart viral marketing campaign by GLP to help bring in hits and advertising dollars.  But what I found made me really nervous.

So nervous, in fact, that I’m considering not publishing this article as I write it.   Sticking your nose at Intelligence Operations can make you ended up hanging yourself with your hands tied behind your back, but I must continue on.   The people have the right to know.

After some digging, and lots and lots of web-speculation, I believe I may have the answer on who actually owns GLP.

Come to find out Trinity’s real name is Jason Lucas and is located in Shalimar, Florida.  Jason is one of the principal people behind a company known as “C2 Media” which is a spyware company.  This was proven by the following documents submitted to the FTC on a presentation by Mr. Lucas regarding spyware.

FTC Public Workshop: “Monitoring Software On Your PC: Spyware, Adware, And Other Software” April 19, 2004

Not long after, it seems Mr. Lucas was drafted by the US intelligence community and became Deputy Director of  a “data mining” for the Department of Defense’s Joint Task force.

In fact, the more you dig on Mr. Lucas and his business partner, Alex Shamash, you can see they are involved in all the “dirty” technologies on the Internet (aka Spyware, Adware, Malware, etc).

You can trace C2 Media (and their offset company Lop.com, who is well known for their massive spyware campaigns) by just searching through older computer magazines online.

If you want to know more about Jason Lucas and Alex Shamash, please read this article.

The Dark Conclusion

It is the users choice on what sites they visit, but they should be informed of what those sites are monitoring.

In fact, here at Conspiracy HQ, you can easily see our “Privacy Policy” by clicking the link in the top menu bar.   We do use cookies to help personalize the users experience, but everything tracked is 100% anonymous.

GLP on the other hand immediately does a port scan of your computer when you connect to their website.  This gives the operators plenty of information about you, your computer and what software or holes in security you may have.

Why would a site that is so entrenched in the alternative media track your moves, scan your computer and know exactly who you are when you connect to their site?

COINTELPRO… that is the only reason.

by Rob Daven, ConspiracyHQ.com

 

Oh and then there’s this little gem…  via http://pastebin.com/yDNuBEzC

Hello all:

I am Jason Anthony Lucas, and am the owner and administrator of a website: godlikeproductions.com

I was born April 10, 1974. Roughly a decade or so ago, I used a business model that installed spyware on hundreds of thousands, perhaps millions, of computers around the world. It was extremely difficult for the average user to get rid of this software, and many people, including well-known computing magazines deemed my software as malware.

By selling the information the software gleaned from unsuspecting individual’s computers, I and my partners made a lot of money. I became rich by most standards, and was able to retire in my early 30’s. Fearing that the spyware might face legal challenges, I sent letters to the Federal Trade Commission, attempting to delineate the software, from spyware/malware. It was clear that the software was indeed spyware/malware, in that it transmitted information from people’s computers without their knowledge to my clients – and I was paid handsomely. Of course, I atempted to convince the FTC otherwise.

Around this time I was looking for ways to spend some of my money, so I bought a website, now commonly known as GLP. I played on peoples’ fears and desires – fears of conspiracies, and desires to be part of a community, as millions of people disassociate from the real world and interpersonal relationships, and are only able to function in a detached, virtual world. By marketing my product toward these two demographics (I’m good at marketing), I have now turned my website into a money making venture, by convincing otherwise intelligent people, to pay me money to have an avatar on my forum, and thereby obtain a “personality” of sorts – something they are unable to do successfully in the real world.

In 2006, my girlfriend at that time, graduated from Cooley law school on January 22. Though still single, we together purchased her childhood home from her parents. On January 30, 2006 her parents provided us a warranty deed to the property, and we signed a mortgage for $535,920 on the same day. I paid off the mortgage in full 13 months later, on March 12, 2007.

We did not marry until March 31, 2007. She put up with my shenanigans such as business dealings with pornographic websites and GLP, as it supplied a steady income stream, in addition to my already acquired wealth. Quite honestly though, things fell apart quite rapidly as my now wife was already pregnant with our daughter when we married. I’m sure my wife expected a “normal” life for us and especially her daughter-to-be; but I’ll admit that my shortcomings proved too much for the relationship. By August 20, 2007, I was kicked out of the house, divorce proceedings had begun, and I legally relinquished the house back to my soon-to-be ex-wife, as I already had another home in my possession; this is still the house I live in to this day. As you can see, my marriage lasted only a few months. My ex-wife was, by this time, living with her parents and the baby. The house I bought back in 2006 (from her parents, and near the ocean) was put up for sale some years ago, and is unoccupied and still for sale to this day. I invested ~ $300,000 of custom work in the house. This means I have roughly $835,000 into the house, but my current asking price is only $585,500.

As part of the divorce legal settlement, my ex-wife deeded the house I bought from her parents, back to me on February 9, 2008. I immediately had the house placed in the Jason A. Lucas Revocable Trust on February 28, 2008. My Successor Trustee is my sister, and I added another trustee, but will not name him yet, as he and I have some business dealings which may put our freedom in jeopardy. My divorce was finalized (recorded) on July 3, 2008.

I’m writing this as an introspective – a catharsis of the mind. Looking back, I’ve been quite an asshole much of my life. My parents divorced when I was 14, and in a little unusual move, my mom had my sister and my surnames changed from my father’s name, back to her maiden name. I am no stranger to the legal system – I have been to court for writing bad checks, my divorce, I sued my next door neighbor and lost (my attorney actually quit on me while in court!), and of course, my various business dealings.

Now that you know some of my history, I’ll open up as to how I feel about myself. I would rather liken my failed life resulting from a Napoleonic Complex (literally). I am of short stature, my parents divorced while I was an early teenager, and found I could use my marketing skills to install spyware onto perhaps millions of computers, and made a lot of money early in life.

With money comes some degree of a feeling of power. I grew up, and remain in the Fort Walton/Shalimar/Freeport area. I devolved into a small little world of hatred and mistrust, all-the-while using my money as influence and threats (mainly lawsuits) against anyone I fear who might enter my encampment of personal failure. I am a known alcoholic, but beat my breast with bravado because I have money. However, possessions, money, and alcohol are all I really have now, along with some degree of notoriety because of my website, but also fueled by the myths bestowed upon me by an unknowing and foolish public. They have built me up to be this figure of intrigue and allure, with all the stories of government spying/psy-ops, etc. None of this is true, of course.

I know I am a pathetic 38 year old tiny man (literally), who has money, no friends (other than the virtual variety), and am a failure as a husband and father. I could make better use of my time, i.e., instead of devoting untold hours and energy to a website, bravado, and alcohol… if I instead heaped all that energy on my daughter, she might actually have a more normal life of two loving, yet separate parents. By way of default, I’d have to say I am more of a hands-off dad, thinking that money and possessions will make my daughter happy.

Imagine having a father with enough monetary wealth to retire in his mid-thirties, and has the ability to spend much of his free time with you, playing, going to parks, museums, the beach, telling bedtime stories, taking you to school, helping with homework, etc.; yet he chooses instead to be on a computer playing macho-man, and drinking. Kind of sad for her… and me.

Which is why, I think, that all the attention I get from the interwebz just goes to feed my insatiable desire to feel powerful, all the while recognizing that in fact, I am a failure as a human.

The public, however, continues my mythical status, and assures a steady stream of income by paying me to have avatars on my website, and buying me (through “donations”) a telescope costing more than $35,000 (that’s just the instrument and mount).

One could assert that my alcohol-driven rants and lifestyle lends itself to being an unfit father, and generally loathsome human. I have turned to alcohol to drown my sorrows, and I currently have no desire to refrain from imbibing. My ego cannot let go.

I have had professional therapists say I need to disconnect from the virtual world in which I live. I’ll agree with that, and as a result, I’d like to request the following by those who care about me and GLP:

I am wealthy, and do not need additional money. For this reason, I am requesting that all of you, paying members or donators, stop sending money or donations. This will only enable my self-destructing lifestyle, and I need to heal before causing my ultimate demise.

So please, STOP sending me money. I’ll still be around, and maybe someday, can turn my life around.

Sincerely,

Jason Anthony Lucas
4571 State Highway 20 East
Freeport, Florida 32439
(private road is Plantation Lane)

If you’d like to see the telescope on the property, just copy/paste the following into Google Earth:
30 29 00 N 86 03 39 W

http://www.imagebam.com/image/abe729222041835.jpg
http://www.imagebam.com/image/98bdc6222041836.jpg
http://www.imagebam.com/image/3dcab7222041837.jpg
http://www.imagebam.com/image/526121222042273.jpg

http://www.ftc.gov/os/comments/spyware/040312lucas.pdf
http://www.ftc.gov/os/comments/spyware/040414lucas2.pdf

Divorce announcement:
http://www.pcnh-d.net/archives/2008/DailyNews/2008_Jul_4/c3.pdf

Since I’m coming clean, I will soon be giving an explanation of my involvement in spyware/malware, how I tried to pass it off legally as adware, along with the business model and business partners and their connections to me.

1 Billion Invested: FBI Launches Facial Recognition Project

1 Billion Invested: FBI Launches Facial Recognition Project

The Next Generation Identification programme will include a nationwide database of criminal faces and other biometrics

“FACE recognition is ‘now’,” declared Alessandro Acquisti of Carnegie Mellon University in Pittsburgh in a testimony before the US Senate in July.

It certainly seems that way. As part of an update to the national fingerprint database, the FBI has begun rolling out facial recognition to identify criminals.

It will form part of the bureau’s long-awaited, $1 billion Next Generation Identification (NGI) programme, which will also add biometrics such as iris scans, DNA analysis and voice identification to the toolkit. A handful of states began uploading their photos as part of a pilot programme this February and it is expected to be rolled out nationwide by 2014. In addition to scanning mugshots for a match, FBI officials have indicated that they are keen to track a suspect by picking out their face in a crowd.

Another application would be the reverse: images of a person of interest from security cameras or public photos uploaded onto the internet could be compared against a national repository of images held by the FBI. An algorithm would perform an automatic search and return a list of potential hits for an officer to sort through and use as possible leads for an investigation.

Ideally, such technological advancements will allow law enforcement to identify criminals more accurately and lead to quicker arrests. But privacy advocates are worried by the broad scope of the FBI’s plans. They are concerned that people with no criminal record who are caught on camera alongside a person of interest could end up in a federal database, or be subject to unwarranted surveillance.

The FBI’s Jerome Pender told the Senate in July that the searchable photo database used in the pilot studies only includes mugshots of known criminals. But it’s unclear from the NGI’s privacy statement whether that will remain the case once the entire system is up and running or if civilian photos might be added, says attorney Jennifer Lynch of the Electronic Frontier Foundation. The FBI was unable to answer New Scientist‘s questions before the magazine went to press.

The FBI hasn’t shared details of the algorithms it is using, but its technology could be very accurate if applied to photographs taken in controlled situations such as passport photos or police shots.

Tests in 2010 showed that the best algorithms can pick someone out in a pool of 1.6 million mugshots 92 per cent of the time. It’s possible to match a mugshot to a photo of a person who isn’t looking at the camera too. Algorithms such as one developed by Marios Savvides’s lab at Carnegie Mellon can analyse features of a front and side view set of mugshots, create a 3D model of the face, rotate it as much as 70 degrees to match the angle of the face in the photo, and then match the new 2D image with a fairly high degree of accuracy. The most difficult faces to match are those in low light. Merging photos from visible and infrared spectra can sharpen these images, but infrared cameras are still very expensive.

Of course, it is easier to match up posed images and the FBI has already partnered with issuers of state drivers’ licences for photo comparison. Jay Stanley of the American Civil Liberties Union urges caution: “Once you start plugging this into the FBI database, it becomes tantamount to a national photographic database.”

SOURCE: NewScientist

RAP NEWS 15: Big Brother is WWWatching You

RAP NEWS 15: Big Brother is WWWatching You

Big Brother is WWWatching

   Written by Giordano Nanni & Hugo Farrant
Welcome back, netizens, to this newest edition in
Juice media’s series of Rap News journalism with me, Robert Foster:
this evening we’re actively delving in depth
to facts which affect all of us who dwell on this internet and we’ve got to
give a special welcome to all the ladies and a-gents,
from the NSA, ASIO, MI5: glad you’re listening in;
Because today’s show is
all about surveillance and how it’s spreading from the streets into our modems
As we speak, laws are being tacitly written in
to implement ways of controlling the expanse of this internet,
to keep us safe, we’re told; but from whom?
And will this place ever be the same if these plans go through?
To find out, we connect with our first guest to comment on the matter
we’re live at the Pentopticon with General Baxter,
General – Son! – Good to have you back again with us
explain why the State is spying on us? – My Fellow Oceanians,
As you know, we’ve always been at war with Eurasia…
or is it Eastasia? Either way, it’s war ‘n we need division to wage it!
but now the proles are connecting online bypassing these
illusory divisions of race, religion and nationality…
– Sounds grand to me… – It’s a catastrophe!
Centuries of hard work are being undone, profits are vanishing
And it’s due to the internet, it’s empowering humanity
we need to get this SNAFU under control; rapidly.
– How? – Behold the latest weapon in the War of Terror
our greatest invention since nine eleven
guaranteed to keep us free and safe forever
i give you The Surveillance State, ladies and generals.
Our secret wires log your key style
monitor every single number on your speed dial
rewind straight to your position with facial recognition,
and pinpoint you within point oh-three of a mile!
we’ve put eyes everywhere without consulting you,
keeping you safe, whether or not you want us to.
Soon there’ll be no freedoms left for threatening.
Then we’ll have won the war! Take that Terrorism!
– Brilliant, thank you General, we now interview
Our resident guru, Terence Moonseed, for a different view
– Greetings. – How does this situation look?
– I have one word for you, Robert: doubleplusungood!
The world populace of seven point four billion are all heading in
the direction of Orwellian totalitarian oblivion
My voice is hoarse yelling about Stellar Winds cold chilling em
And TrapWire weaving through the world wide web we all dwelling in
Face it: the all-seeing eye’s in all of our Facebooks like a virus
and in these Eye-phones, with Siri, or should I say “Iris”.
And next in line is RFID devices and mind chips
triggered by Chemtrails the planes spray the sky with.
This time it’s too far: check out the base they’re building in Utah
where they’ll be storing all ya data for over a century; it’s Fubar!
And under the outback is an entire tunnel of wires,
an ECHELON base called Pine Gap, to hijack our Mother Gaia.
– Hey, maybe your mother’s gayer! – Boo hoo!
Why don’t you just kill yourself like most of your troops do!
– That’s it, now you’re on the Cast Iron list
– Hang on, General, why weren’t we informed about this?
– Sorry we didn’t tell you about our grand plan before,
it was meant to be a surprise, under wraps and in store.
But some spoilsports had to go and ruin it for all
by blowin’ whistles, in spite of the damn law.
– Bill Binney and Thomas Drake are Trailblazers for leaking these tactics…
– Hey, civil-liberty fagtivists… err, activists:
this is all legal: anything we do now actually is!
– How did… – You can’t question my authorit-ah, thanks to this.
– And that shit’s global, people! in Australia it’s now legal
for the government to store all SMS’s, searches and emails…
Australians, it’s taking place under your nose
unless you wake up, all your data are belong to ASIO.
– Come on! everyone knows: you can trust the government now
If you’ve got nothing to hide, you got nothing to worry about
– That might be the case with things that are happening now,
because most people agree with most of the laws that are being handed down.
But once the Illuminati reveal their agenda for you
this surveillance will enforce laws you no longer consent to,
but by then it’ll be too late to protest too
and anything you’ve ever said, typed or browsed can and will be used against you.
– I’m confused, so what should we do then?
– What should we do? Nothing! this is all an illusion,
It’s just a ride, a delusion, the matrix, the Maya deceiving us.
– Ah, you hippies really make our job so much easier…
– Sorry to interrupt but we’re picking up
a signal from beyond the space-time continuum
Quick, switch on the Juice Channelling Portal…..
…………….Wait……. is that…… George Orwell?!
– Good day to you – Wow …what do we owe this honour to?
– I tried to warn you noobs, but I see you are actually fools
or else you thought this was an instruction manual.
– Yes, ahem… so can you advise us? What would you have us do?
– An open and universal internet is the most effective tool you have
to address the issues that afflict the world at hand
therefore, protecting it is the most essential task that stands
before your generation – I think I understand… – hush, man
You must not lose the internet. Heed this mantra:
‘who controls the Internet, controls the data
and who controls the data, controls the future’
– We’re losing you – I leave you with a tool to use…
– An onion? – Don’t be simple, Robert, this is but a simile
It stands for ‘Tor’ – Tor? – Google it! It’s for anonimity:
this onion router open network helps considerably against tyrranny
But its abilities only work if all you f***kers use it consistently
and even if you don’t use it, run it so its force swells.
– Thanks, Mr. Orwell – From now on call me: George Torwell
if we’d had such tools when I wrote this, well
It would’ve been so much simpler to tell Big Brother to go f**k himself,
the motherf***king, c***-sucking piece of sh[…]
– Thanks, George Torwell, for manifesting direct from this
memory hole of history, to impress on us these messages.
We’re told we need safety; which is precious, yes,
but can a society that can enforce all its laws ever progress?
Hindsight shows that many figures guilty of “thought-crime”
turned out to be luminaries and heroes, before their time.
But if a surveillance state had reigned then in this form and design
Just think of all the progress we may’ve all been denied:
Could lobbies for women’s or gay rights have appeared and thrived
Would revolutionary ideals have materialised
Would science have pioneered or even survived,
If every word had been monitored by thought police and spies?
Big Brother brings chilling effects, freezing our collective hopes
he doesn’t protect our safety, but protects the status quo,
and threatens this internet, the one channel yet uncontrolled
whose openness we are now called upon to effect and uphold.

 

http://www.thejuicemedia.com

Juice Rap News: Episode 15 – Big Brother is WWWatching You. September 2012 rocks around with some crucial developments in the ongoing struggle over the future of the internet. Will it remain the one open frequency where humanity can bypass filters and barriers; or become the greatest spying machine ever imagined? The future is being decided as we type. Across Oceania, States have been erecting and installing measures to legalise the watching, tracking and storage of data of party-members and proles alike. If they proceed, will this place ever be the same? Join our plucky host Robert Foster as he conducts an incisive analysis of the situation at hand. Joining him are newly appointed Thought Police General at the Pentopticon, Darth O’Brien Baxter, and a surprisingly lucid Terence Winston Moonseed. Once again, in the midst of this Grand Human Experiment, we are forced to ask tough questions about our future. Will it involve a free internet which will continue to revolutionise the way the world communicates with itself? Or is our picture of the future a Boot stamping on this Human InterFace forever?

Written & created by Giordano Nanni & Hugo Farrant – on Wurundjeri Land in Melbourne, Australia.

– SUPPORT the creation of new episodes of Juice Rap News,
a show which relies on private donations: http://thejuicemedia.com/donate

– CONNECT with us:
* Website: http://thejuicemedia.com
* Twitter: http://twitter.com/juicerapnews
* Farcebook: https://www.facebook.com/rapnews

– DOWNLOAD:
* FREE MP3: http://www.reverbnation.com/artist/downloads/603938
* LYRICS available here: http://thejuicemedia.com/video/lyrics
* Download TOR: https://www.torproject.org

– CREDITS:
* MAIN BEAT Produced by the Goat Beats http://www.thegoatbeats.com
* ORCHESTRATION & George-Orwell theme by Adrian Sergovich
* ARTWORK by Zoe Tame of http://visualtonic.com.au for images and website wizardry!
* EFFECTS & ANIMATIONS by Jonas Schweizer (See his work: http://www.indiegogo.com/CaribbeanNewcomer)
* PROPS: Thanks to Zoe Umlaut of Umlautronics for constructing the Juice Channeling Portal, worryingly close to spec. And to Gilles Gundermann for sourcing awesome Orwellian props.
* CAPTIONS: Merci to Koolfy from la Quadrature du Net, for creating English Captions.
* Thanks to Dave Abbott for technical advice; and deep gratitude to Lucy & Caitlin for all the ongoing support (and patience).

– TRANSLATIONS: If you would like to translate this episode into your language, please contact us via our website http://thejuicemedia.com/contact/ to obtain the SRT file.

– FURTHER READING & LINKS:

* TOR PROJECT: https://www.torproject.org/about/overview.html.en

* NATIONAL SECURITY INQUIRY (Australia):
http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representati…

* PIRATE PARTY (Australia) submission to the National Security Inquiry:
http://pirateparty.org.au/2012/08/24/pirate-party-releases-national-security-…
Pirate Party petition on #natsecinquiry: http://pirateparty.org.au/natsecinquiry-petition/

* Great article by Richard Falkvinge, ÒIf you have nothing to hide, you have nothing to fearÓ:
http://falkvinge.net/2012/07/19/debunking-the-dangerous-nothing-to-hide-nothi…

* INTERNET ACTIVISM: We highly recommend checking out this great video-interview with Julian Assange (WikiLeaks), Jacob Appelbaum (Tor Project), Jeremie Zimmerman (La Quadrature du Net) and Andy Muller-Maguhn (Chaos Computer Club): assange.rt.com/cypherpunks-episode-eight-full-version-pt1

Category:

News & Politics

Hacked Intel Email: NYPD Involved in “Damn Right Felonious Activity”

Hacked Intel Email: NYPD Involved in “Damn Right Felonious Activity”

The New York City Police Department (NYPD) really has gone rogue; at least that’s what a high-level FBI official believes.

Among the 5 million emails the group Anonymous hacked from the servers of private intelligence firm Stratfor in February, one seems to not only confirm the controversial NYPD surveillance activities uncovered by the Associated Press, but hints at even worse civil liberties violations not yet disclosed. Anonymous later turned the emails over to WikiLeaks, with which Truthout has entered into an investigative partnership.

I keep telling you, you and I are going to laugh and raise a beer one day, when everything Intel (NYPD’s Intelligence Division) has been involved in during the last 10 years comes out – it always eventually comes out. They are going to make [former FBI Director J. Edgar] Hoover, COINTEL, Red Squads, etc look like rank amatures [sic] compared to some of the damn right felonious activity, and violations of US citizen’s rights they have been engaged in.

The description of alleged NYPD excesses was leveled by an unnamed FBI “senior official” in late November 2011, in an email sent to Fred Burton, vice president for intelligence at the Austin, Texas-based Stratfor and former deputy chief of the counterterrorism division at the State Department. Burton  then sent the official’s email to what appears to be a listserv known as the “Alpha List.”

Burton did not identify the senior FBI official in the email he sent to the listserv. He describes him as a “close personal friend,” and claims he “taught him everything that he knows.” He also instructs members of the listserv not to publish the contents of the email and to use it only for background.

Stratfor, in a statement released after some of the emails were made public, said some of the emails “may be forged or altered to include inaccuracies; some may be authentic” but “having had our property stolen, we will not be victimized twice by submitting to questioning about them.”

What’s particularly stunning about the FBI senior official’s description of NYPD Intelligence Division activities, is how he connects them to previous instances when his own agency bent and broke the law in pursuit of intelligence on perceived enemies of the state throughout the 20th century – and concludes the NYPD Intelligence Division’s violations are worse. As Pulitzer Prize-winning author and former New York Times reporter Tim Weiner writes in his new book, “Enemies: A History of the FBI,” the Bureau has been “America’s closest counterpart” to a secret police.

In the email, Burton queried the FBI official to gain a better understanding of why the FBI declined to get involved with a case involving an alleged “lone wolf” terrorist and al-Qaeda sympathizer named Jose Pimentel, a 27-year-old American of Dominican descent, accused of trying to build three pipe bombs to detonate in New York City.

The FBI official responded by describing some turf and relationship issues between NYPD intelligence officials and NYPD and FBI investigators on New York City’s Joint Terrorism Task Force. It appears the FBI senior official was responding to a news story about Pimentel’s arrest published by the far-right leaning Newsmax, headlined “FBI- NYPD Tensions Highlighted in Terror Case,” which was attached to an email Stratfor analysts had sent around the office.

 There are two issues with this case (off the record of course).

One is the source (confidential informant) was a nightmare and was completely driving the investigation. The only money, planning, materials etc the bad guy got was from … the source. The source was such a maron [sic], he smoked dope with the bad guy while wearing an NYPD body recorder – I heard in open source [sic] yesterday btw [by the way], he is going to be charged with drug possession based on the tape. Ought to go over very nicely when he testifies against the bad guy, don’t you think?

Issue two is that the real rub is between NYPD Intel, [Intelligence Division] and NYPD – JTTF [Joint Terrorism Task Force], not the FBI per se. The NYPD JTTF guys are in total sync with the Bureau and the rest of the partners who make up the JTTF – I understand there are something like 100 NYPD dics [detectives] assigned to the JTTF. NYPD Intel (Cohen, et al) on the other hand, are completely running their own pass patterns. They hate their brother NYPD dics on the JTTF and are trying to undermine them at every turn. They are also listening to [former CIA official David] Cohen [the head of NYPD’s Intelligence Division] who, near as anybody can tell, never had to make a criminal case or testify in court.

Joint Terrorism Task Forces are FBI-led counterterrorism investigative units that combine federal, state and local law enforcement in an effort to detect and investigate terrorist activity and prevent attacks before they occur. Originally created in the 1980s, the creation of JTTFs nationwide was accelerated after 9-11. Currently, 104 JTTFs operate nationwide and are considered one of the most important assets in the federal government’s muscular counterterrorism architecture.

After reviewing the Stratfor email thread for Truthout, Michael German, senior policy counsel at the American Civil Liberties Union’s Washington Legislative Office and a former FBI agent who infiltrated white supremacist terrorist organizations, described the FBI official’s criticism of the NYPD’s intelligence as “doubly ironic.”

“The FBI has engaged in widespread spying on the Muslim American community as well, including counting mosques and mapping Muslim neighborhoods, infiltrating mosques with informants, and using the guise of community outreach to spy on Muslim religious and advocacy organizations,” German told Truthout. “But more critically, because the FBI is charged with enforcing the civil rights laws in this country, including violations under color of law.

“This agent suggests the FBI knew the NYPD Intelligence agents were involved in widespread ‘felonious’ activity in violation of Americans’ civil rights, yet the FBI does not appear to have opened a civil rights investigation or done anything to stop this illegal activity.  Our laws are designed to apply equally to protect all of us, including to protect us from illegal police activity. When the FBI abdicates this responsibility, all Americans suffer.”

Responding to the background information from the FBI senior official, Sean Noonan, a “tactical analyst” with Stratfor, wrote in an email sent to the “Alpha List,” “The point that the divide is within NYPD is contradictory to how they would like present it. [sic]. The way the pro-NYPD stories cover it is that NYPD CT/Intel [counterterrorism/intelligence] has successfully gained influence within the JTTF, almost to the point of having infiltrated it.”

German, however, tells Truthout that the rift between the NYPD’s intelligence analysts and NYPD investigators assigned to the FBI’s JTTF, as revealed by the senior FBI official’s email, is consistent with his experience.

“Criminal investigators, like those assigned to the JTTFs, typically find information produced by these intelligence analysts to be useless, whether they’re NYPD intelligence or FBI intelligence,” he said.

And no matter how bad the mutual acrimony between NYPD intelligence analysts and New York City’s JTTF has gotten, German isn’t surprised that the FBI has declined to investigate allegations of the NYPD Intelligence Division breaking the law.

“The FBI didn’t open investigations when it discovered other government agencies engaging in torture and illegal wiretapping either,” he said.

But eventually, the senior FBI official predicts in his email to Burton, the extent of NYPD’s alleged crimes will be revealed.

“As Rush Limbaugh likes to say, ‘don’t doubt me on this,'” he wrote at the end of his correspondence.

 

Matthew Harwood

Matthew Harwood is a journalist in Washington, DC, and a frequent contributor to the Guardian’s Comment is Free. His writing has appeared in The Washington Monthly, Progress Magazine (U.K.) as well as online at Columbia Journalism Review, CommonDreams, and Alternet. He is currently working on a book about evangelical Christian rhetoric and aggressive US foreign policy. You can follow Matt on Twitter @mharwood31.

Jason Leopold

Jason Leopold is lead investigative reporter of Truthout. He is the author of the Los Angeles Times bestseller, News Junkie, a memoir. Visit jasonleopold.com for a preview. His most recent investigative report, “From Hopeful Immigrant to FBI Informant: The Inside Story of the Other Abu Zubaidah,” is now available as an ebook. Follow Jason on Twitter: @JasonLeopold.

 

SOURCE: TruthOut

EX-SPY ANDREA DAVISON SET-UP BY BRITISH GOVERNMENT – IS SHE WITH JULIAN ASSANGE?

EX-SPY ANDREA DAVISON SET-UP BY BRITISH GOVERNMENT – IS SHE WITH JULIAN ASSANGE?

Andrea Davison who risked her life to expose arms to Iraq and pedophillia in England and Wales has been wrongly convicted  by the British Government.
Like activists and whistleblowers before her  she was targeted by the State for political reasons. The State spent an estimated 1 millions pounds and 2.5 years pursuing an older  lady,  who even given what she was convicted of had harmed no-one at all.  She is belived to  have been providing intelligene to Julian Assanges network before she was arrested as the Mastermind in an international fraud  early January 2010.

Claiming Andrea  was  the Head of a criminal network  gave  the Derby Police  headed by DC Stephen Winnard  the excuse to search her home  in North Wales.   This was a ploy   to sieze from her thousands of documents on arms to Iraq and Iran  and  documents which  name pedophiles in the police and the government.  They also wanted to silence  a   lady who, working secretly with the press,  had all but brought down the last Conservative Government.

The prosecution Barrister Felicity Gerry who claims to be a Human Rights Barrister set-up Andrea in collusion with  Derby Police officers.   It is believed that the Derby and Nottingham police blackmailed Gerry because of the Mark Kennedy  Ratcliff  power station case.

Gerry who knew that Mark Kennedy was an undercover cop lied to the Court.  If it were not for  undercover cop Mark Stone/Kennedy  coming clean and admitting he had set up the Ratcliff  Power Station Activists then  all the innocent activists   would have been convicted and jailed.

see Daily Mail http://www.dailymail.co.uk/news/article-1345707/Undercover-policeman-Mark-Kennedy-Case-collapses-offers-evidence-defence.html

Felicity Gerry  did not care what lies she told  to get the activists convicted because she was already embroiled  deeply in corruption and easily blackmailed.   She lives in Bedford with her husband and three children and is known to be involved with paedophiles.  How much the Derby police know about her activities is unclear  but Gerry is often chosen to Defend paedophiles

A body  was set-up to investigate  the Mark Kennedy affair  and her role .  Gerry then  lied to the commission saying she knew nothing about her witness Mark Kennedy  being an undercover cop.  If she had not lied she  would have been given a long   prison sentence.
So it was easy for the Derby Fraud Squad to blackmail Gerry into setting up the innocent older lady  Andrea Davison.

The Solicitors Garstangs  of London were appointed by the Court against Andrea’s will  and they failed to call any of her defence witnesses or present her volumes evidence proving her innocence to the jury.  Important evidence to prove her innocence had been seized by the Police and they failed to make disclosure of this.   The jury were not told about the thousands of documents on arms to Iraq that were seized  by the police or the numerous Human Rights abuses Andrea had suffered at the hands of the Police and the State.

In August of the  year of her arrest in January 2010  her friend and neighbour  ‘spy in a bag’  Gareth Williams was murdered in London by the same people who are  out to silence  Andrea.

Even after persecuting Andrea for nearly three years  they  could not find any evidence that she has caused anyone any loss, or had harmed anyone and there was no complainant.  For example one of the crimes she  received a 2 and a half year sentence for was stealing a passport from the passport office. This was her own passport which she paid for. The passport office had put a 6 instead of an O in her date of birth and she has  not complained.   How could a jury convict someone of theft for stealing their own passport?  they should have realised the police were clutching at straws and had no real evidence against her if they were forced  to charge her with stealing her own passport.

She is  now  seeking Political asylum  the same as Julian Assange  and believed to be  in  Ecuador  or in the Embassy.

I escaped Palestine to come to a country the world believes has a just and fair legal system only to find it is a country of deep hypocrisy where the innocent are set-up by the State who have endless resources to silence  those who tell the truth,

#OpBigBrother – EMERGENCY ALERT ABOUT WORLDWIDE SURVEILLANCE FROM ANONYMOUS

#OpBigBrother – EMERGENCY ALERT ABOUT WORLDWIDE SURVEILLANCE FROM ANONYMOUS

For years Anonymous worked hard to protect our world and its peoples.

NOW LISTEN CAREFULLY,
This is an ALERT ABOUT SURVEILLANCE.

Privacy of the people all over the world is suffering more and more outrages. We should not tolerate it. Cameras are everywhere even in our sky, and robots are used to gather and treat information collected through Internet spying.

If Governments and corporations reach their goal to use network surveillance technologies to take control of our world, they will clear Freedom from both the real life and the Internet. That means Anonymous won’t be able to continue helping humanity.
They plan to destroy each form of protest including Anonymous. That means that Anonymous members will be tracked and neutralized if we do not unite against surveillance.

The population is not ready to understand and help us, we need to join the biggest fight ever seen on Anonymous era and use every means necessary to expose truth.

Let the HIVE begins the strongest online and offline worldwide protest ever seen in the history of humanity. They showed they had no limits, we will show our power goes well beyond.

Worldwide governments, evil corporations time of summations is over.

We are Anonymous, we are not numbers, united as one, divided by zero.
Wordwide union will shutdown BigBrother.
That fight will lead us to triumph or to perish.
This is a time trial. WE ACT OR WE FALL.

We are Anonymous,
We are Legion
We do not forgive
We do not forget
Expect us !

=======================================================
Join us on irc.anonops.pro/6697 SSL chan #OpBigBrother

Follow us on twitter : https://twitter.com/OpBigBrother

PAD : https://pad.riseup.net/p/MMhJshLWd6AV

Pre-Crime Software Moves One Step Closer to Reality

Pre-Crime Software Moves One Step Closer to Reality

The era of Big Data is upon us. Major corporations in the areas of advertising, social media, defense contracting, and computing are forming partnerships with government agencies to compile virtual dossiers on all humans.

This data integration initiative is taking place across the board in our largest federal agencies and departments as part of an Office of Science and Technology outline (PDF) that includes a $200 million upfront investment, as well as a $250 million annual investment by military departments into human-computer interaction.

The $200 million in the Obama program will be spread among the National Institutes of Health, Department of Defense, National Science Foundation, the Department of Energy, the U.S. Geological survey, and DARPA to see that the information they collect will move quickly “from data to decisions.”

Seeing the vast potential of Big Data management and applications, Oblong Industries – the actual creator of the software that appeared in the movie Minority Report, (known by its propriety name g-speak) – is now offering a commercial version in the marketplace. An AFP article posted at Raw Story is quick to point out that the software has been stripped of its “pre-crime” detection analytics. But should this blanket dismissal by a mainstream news agency be comforting in light of stated U.S. government goals that seek to turn science fiction into science reality?

John P. Holdren, Obama’s science czar, and author of the controversial eugenics tome, Ecoscience, is one of those directing the solution to the data overload problem. This alone should force us to be hyper-vigilant.

We also know that the NSA is constructing a massive new $2 billion data center that aims to expand its spy activities by September, 2013:

A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks.

(…)

Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital ‘pocket litter. It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration… (Source)

The FBI has recently announced that facial recognition will be coming to a state near you:

Recently-released documents show that the FBI has been working since late 2011 with four states—Michigan, Hawaii, Maryland, and possibly Oregon—to ramp up the Next Generation Identification (NGI) Facial Recognition Program. When the program is fully deployed in 2014, the FBI expects its facial recognition database will contain at least 12 million “searchable frontal photos.” (p. 6) (Source)

While Oblong Industries claims to have disabled the analytics portion of the software that could be used in pre-crime screening taken right from the Minority Report film, they state that private companies and law enforcement agencies could certainly augment their scaled-back version by introducing their own analytics.

Furthermore, the earlier-mentioned AFP article downplays the significance of the software by stating that “Oblong currently has no government customers in the United States or abroad but offers itself as ‘a core technology provider.'”

However, two of Oblong’s current clients are Boeing – the world’s second largest defense contractor and drone specialists; and #12 General Electric – specialists in electronic warfare components and military communication systems. Their combined annual sales are more than $35 billion, which makes it quite likely that new technology will be embraced and proliferated. (Source)

Oblong’s own website states that their company “works with Global Fortune 500 companies, government agencies, and universities to develop custom g‑speak solutions.” Their application areas include:

  • financial services
  • network operations centers
  • logistics and supply-chain management
  • military and intelligence
  • automotive
  • natural resource exploration
  • data mining and analytics
  • bioinformatics
  • trade shows and theatrical presentations
  • medical imaging
  • consumer electronics interfaces

(Source: Oblong Industries “Client Solutions”)

To reinforce the obvious, Oblong’s Chief Executive, Kwin Kramer, has stated flatly that, “We think law enforcement and intelligence are big data users and we think our technology is the leader.”

It is also worth noting that the g-speak “Minority Report” technology was developed at MIT and has been 30 years in the making. MIT has quite a storied history of connections to intelligence agencies; the CIA having actually started the Massachusetts Institute of Technology Center for International Studies (MIT-CIS) in 1950. (Source)

The implied connections are in plain view on MIT’s own website: http://web.mit.edu/policies/14/14.5.html

And Orwell smiles.
Until recently, we might have held out hope that it was the vastness of data collection that was the weakest point for potential tyrants, as it was nearly impossible to sift through, manage, and apply all of it. With the birth of Big Data applications that are literally coming straight from science fiction, however, we might do well to accept the possibility of a truly dystopian reality descending upon us even faster than the speed of thought.

For a glimpse into the cool sales pitch behind Oblong Industries’ Big Data management software, please view the following video. While we should keep an open mind to how advancements in computer tech can be exciting and rewarding, while offering novel ways of human interaction, it is most important to ensure that these technologies are not hoarded by governments and elites who have a clear history of negatively impacting true human development, as well as freedom of movement, expression and self-determination.

 

ByNicholas West

SOURCE: ActivistPost.com

 

TRAPWIRE: Wikileaks Drops a Surveillance Bombshell – Widescale Facial Recognition & Behavior Pattern Mapping

TRAPWIRE: Wikileaks Drops a Surveillance Bombshell – Widescale Facial Recognition & Behavior Pattern Mapping

Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.

Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it’s the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation’s ties are assumed to go deeper than even documented.

The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.

Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails.

On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning.

Mr. Ferguson and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote on Twitter that the DDoS attacks flooding the WikiLeaks server were reported to be dropping upwards of 40 gigabytes of traffic per second on the site.

According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be “analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.”

In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.” Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces.

What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf).

“Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.”

In a 2005 interview with The Entrepreneur Center, Abraxas founder Richard “Hollis” Helms said his signature product:

“can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” He calls it “a proprietary technology designed to protect critical national infrastructure from a terrorist attack by detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack is executed,” and that, “The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push information out to local law authorities automatically.”

An internal email from early 2011 included in the Global Intelligence Files has Stratfor’s Burton allegedly saying the program can be used to “[walk] back and track the suspects from the get go w/facial recognition software.”

Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the “See Something, Say Something” program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well.

In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes, “God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.” Files on USASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the past eleven months.

News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the government’s Trailblazer Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas.

SOURCE: RT.com

 

NOW FOR THE RAW LEAKS:

http://privatepaste.com/c56f6848d2/trapwireCentralizedDatabaseMGMGrandLinkedSystemEtc – centralized database, vegas hotels, linked sites, etc

http://privatepaste.com/e5b7f4a21d/trapwireNYC – NYC circa 2010

http://privatepaste.com/a9bc9274ea/trapwireAustin – Austin

http://privatepaste.com/04eaef4343/trapwireEveryHVTUSCANUK – note the last paragraph

http://privatepaste.com/90198aa545/trapwireTexasBorder – Texas border circa 2009

http://privatepaste.com/568f0a512a/trapwireWalkTheCatBack – Talking about images to analyze and walking the cat back

http://privatepaste.com/318e0e652b/trapwireHVTCitizens – Trapwire for certain citizens that are important, but not USSS important

http://privatepaste.com/670091f5b0/trapwireLondonStockExchange – London Stock Exchange

http://privatepaste.com/b62ceaf254/trapwireNYCDCVegasLondonOttawaLA – NYC, DC, Vegas, London, Ottawa, LA

http://privatepaste.com/fba46e24ca/trapwireAustinDPSAllocated1Point8M – 1.8M for trapwire & equipment from Austin DPS

http://privatepaste.com/caf299c230/trapwireOnDesksOfUSSSMI5LAPDRCMPNYPD – trapwire on the desks of USSS CP, MI5, RCMP, LAPD CT, NYPD CT

http://privatepaste.com/5a71bac416/trapwireDCMetroNationalParkPoliceEtc – trapwire DC metro, National Park Police, etc

http://privatepaste.com/e6031c14f6/trapwireLAPD – trapwire LAPD as a prototype

http://privatepaste.com/febefa287f/trapwirePentagonArmyUSMCNavy – trapwire Army, Pentagon, USMC, Navy

http://privatepaste.com/58a60bff35/trapwireNSIFBIFtMeadeSevenYears – Trapwire 7 years circa 2011, National SAR Initiative (NSI), FBIs eGuardian, Ft. Meade, etc

http://privatepaste.com/f7b7ac02ab/trapwireAmtrackDHSFusionCenters – Amtrack, DHS fusion centers, DC Metro

http://privatepaste.com/7add918e4c/trapwireBehaviorPatternsToIdentifySurveillance – “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.

http://privatepaste.com/d503851f0c/trapwireSalesforceGoogleDHSInstitute – salesforce, google, DHS institute

http://privatepaste.com/626712c0fa/trapwireNigerianPresidentialPalace – Nigerian Presidential Palace

http://privatepaste.com/bf0a0abf67/trapwireScotlandYardDowningWhiteHouseWalMartDell – Scotland Yard, 10 Downing St, White House, Wal-Mart, Dell

 

Smart Meters Getting Removed Due to Heath Effects

Smart Meters Getting Removed Due to Heath Effects

UPDATE, Nov. 3, 2011: Glendale CA resident also has ‘smart’ meter replaced with analog meter by utility GWP. Video: http://www.youtube.com/watch?v=T_jT3-36KRg

SANTA CRUZ, CA—Just as PG&E enters the final phase of its deployment of wireless “smart” meters in California, the largest of the state’s Investor Owned Utilities (IOU’s) has reversed course, quietly beginning to replace the ‘smart’ meters of those reporting health impacts with the old trusty analog version.  Consumer rights and health groups immediately seized on the news, demanding that millions of Californians unhappy with their new wireless meters get their analogs returned immediately at no cost.

‘Smart’ meters are new wireless utility meters being installed as part of the “smart” grid initiative, spearheaded by technology firms and backed by the Obama administration and the Department of Energy.  Promises ranging from lower utility bills to enhanced renewable generation capacity have failed to materialize, with widespread reports of higher bills, privacy violations, fires and explosions, and commonly reported health impacts such as headaches, nausea, tinnitus, and heart problems associated with powerful wireless transmissions.   Widely disparate political groups- from members of the Green Party to the Tea Party and Occupy protesters have attacked the program, and dozens of grassroots organizations have sprouted up over the past several months to fight what they call an undemocratic, unconstitutional and dangerous assault on people in their own homes and neighborhoods.  Dozens of people have been detained or arrested for peaceful civil disobedience and even simply speaking out against deployments.

In California, more than 47 cities and counties have demanded a halt to installation, and a dozen local governments have passed laws prohibiting the controversial technology. [2]The ‘smart’ meter issue has further angered a public already seething at the utilities over repeated gas explosions, safety breaches at nuclear reactors, and an increasingly extortionate rate structure.  Word of California’s ‘smart’ meter nightmare has spread across the country and around the world, prompting some utilities to place smart meter plans on hold, and recently Nevada’s PUC to call for investigations into the health effects and other smart meter problems.

Now in a dramatic turnaround that could signal the beginning of a widespread recall of wireless ‘smart’ meters, on October 28th PG&E re-installed a classic spinning disc analog meter on the home of Santa Cruz, CA resident Caitlin Phillips, who had been suffering headaches and other symptoms from her ‘smart’ meter.   The move comes in response to verbal directives from the California Public Utilities Commission President Michael Peevey, who recently told members of the public that the utility “will provide for you to go back to the analog meter if that’s your choice.”  The CPUC has been slow to respond to thousands of ordinary citizens reporting health effects from the new meters.

When a Wellington Energy installer (contracted with PG&E) came to install a smart meter at her home, Caitlin asked the installer to get off her property and not install, because of what a neighbor had told her about possible health damage and privacy violations.   “When I returned home later, I discovered a smart meter on my house.   That night I awoke to severe anxiety, headache, and buzzing in my teeth, and realized the new smart meter was on the other side of the wall from my bed.”  Caitlin reported her experience to PG&E and the CPUC, who both declined to rectify the situation.  When the symptoms persisted, Caitlin sought the assistance of the Scotts Valley based group Stop Smart Meters! who provided an analog meter and referred her to a professional who could help her remove her ‘smart’ meter.  As soon as the analog was installed, Caitlin’s symptoms disappeared.

Frustrated and outraged about her treatment by the utility and the PUC, Caitlin travelled to San Francisco to speak at a commission meeting on Oct. 20th.   About a week later, PG&E crews were at her house replacing her temporary analog meter with a brand new official PG&E analog meter.  This is believed to be the first time PG&E have willingly replaced an analog meter on the home of someone suffering from health effects.

An “opt-out” proceeding overseen by an Administrative Law Judge is underway at the CA Public Utilities Commission, yet those suffering (in some cases severe) health impacts have been stuck in limbo as utilities refuse to remove the harmful meters upon request- until now.

“There are hundreds of thousands- if not millions- of people suffering in their homes from forced ‘smart’ meter radiation,” said Joshua Hart, Director of the grassroots organization Stop Smart Meters!  “The utilities and PUC’s must respond promptly to all requests that analogs be returned.  The alternative is that people will increasingly turn to independent professionals to remove unwanted ‘smart’ meters from their homes, a reasonable action we assert is within our legal rights. Protecting your family’s health is not tampering.”

PG&E and other utilities have also been responding to health complaints by replacing wireless ‘smart’ meters with digital meters that are “wireless-ready.”  These digital meters have been associated with health problems from “dirty electricity” frequencies that pass into a home via the electrical wiring.  These “trojan horse” meters have been roundly rejected by those who report continuing health impacts after installation. Susan Brinchman, Director of San Diego based Center for Electrosmog Prevention. said “At this point, the burden of responsibility is on the utilities to demonstrate that any new meter they want to install on our homes is safe.  Communities have the right to retain analog meters at no extra charge.  Period.”

Video Interview of Caitlin on KION News: [Warning: this news site crashes some browsers]: http://www.kionrightnow.com/story/15936211/santa-cruz-woman-fights-smartmeter-wins

SOURCE: StopSmartMeters.org

 

August 3, 2012 – DCMX Radio: Re-cap Week’s Alternative News, Intro to CyberWar: Viruses, Hacking, & Black Security Breaches, Protecting Your Computer, Securing Your Internet Connection & Maintaining Privacy Online

August 3, 2012 – DCMX Radio: Re-cap Week’s Alternative News, Intro to CyberWar: Viruses, Hacking, & Black Security Breaches, Protecting Your Computer, Securing Your Internet Connection & Maintaining Privacy Online

Cyber Security Industry Explosion, Intelligence Spying, Data-mining, Black-Hats, White-Hats, Gray-Hats abound. Alphabet Agencies, Corrupt Globalist Corporations exploiting your info. Micro Tutorial on Protecting Your Computer, Securing Your Internet Connection, Maintaining ‘some’ Privacy Online


Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You

14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You

Most of us don’t think much about it, but the truth is that people are being watched, tracked and monitored more today than at any other time in human history. The explosive growth of technology in recent years has given governments, spy agencies and big corporations monitoring tools that the despots and dictators of the past could only dream of.

Previous generations never had to deal with “pre-crime” surveillance cameras that use body language to spot criminals or unmanned drones watching them from far above. Previous generations would have never even dreamed that street lights and refrigerators might be spying on them. Many of the incredibly creepy surveillance technologies that you are about to read about are likely to absolutely astound you. We are rapidly heading toward a world where there will be no such thing as privacy anymore. Big Brother is becoming all-pervasive, and thousands of new technologies are currently being developed that will make it even easier to spy on you. The world is changing at a breathtaking pace, and a lot of the changes are definitely not for the better.

The following are 14 incredibly creepy surveillance technologies that Big Brother will be using to watch you….

#1 “Pre-Crime” Surveillance Cameras

A company known as BRS Labs has developed “pre-crime” surveillance cameras that can supposedly determine if you are a terrorist or a criminal even before you commit a crime.

Does that sound insane?

Well, authorities are taking this technology quite seriously. In fact, dozens of these cameras are being installed at major transportation hubs in San Francisco….

In its latest project BRS Labs is to install its devices on the transport system in San Francisco, which includes buses, trams and subways.

The company says will put them in 12 stations with up to 22 cameras in each, bringing the total number to 288.

The cameras will be able to track up to 150 people at a time in real time and will gradually build up a ‘memory’ of suspicious behaviour to work out what is suspicious.

#2 Capturing Fingerprints From 20 Feet Away

Can you imagine someone reading your fingerprints from 20 feet away without you ever knowing it?

This kind of technology is actually already here according to POPSCI….

Gaining access to your gym or office building could soon be as simple as waving a hand at the front door. A Hunsville, Ala.-based company called IDair is developing a system that can scan and identify a fingerprint from nearly 20 feet away. Coupled with other biometrics, it could soon allow security systems to grant or deny access from a distance, without requiring users to stop and scan a fingerprint, swipe an ID card, or otherwise lose a moment dealing with technology.

Currently IDair’s primary customer is the military, but the startup wants to open up commercially to any business or enterprise that wants to put a layer of security between its facilities and the larger world. A gym chain is already beta testing the system (no more using your roommate’s gym ID to get in a free workout), and IDair’s founder says that at some point his technology could enable purchases to be made biometrically, using fingerprints and irises as unique identifiers rather than credit card numbers and data embedded in magnetic strips or RFID chips.

#3 Mobile Backscatter Vans

Police all over America will soon be driving around in unmarked vans looking inside your cars and even under your clothes using the same “pornoscanner” technology currently being utilized by the TSA at U.S. airports….

American cops are set to join the US military in deploying American Science & Engineering’s Z Backscatter Vans, or mobile backscatter radiation x-rays. These are what TSA officials call “the amazing radioactive genital viewer,” now seen in airports around America, ionizing the private parts of children, the elderly, and you (yes you).

These pornoscannerwagons will look like regular anonymous vans, and will cruise America’s streets, indiscriminately peering through the cars (and clothes) of anyone in range of its mighty isotope-cannon. But don’t worry, it’s not a violation of privacy. As AS&E’s vice president of marketing Joe Reiss sez, “From a privacy standpoint, I’m hard-pressed to see what the concern or objection could be.”

You can see a YouTube video presentation about this new technology right here.

#4 Hijacking Your Mind

The U.S. military literally wants to be able to hijack your mind. The theory is that this would enable U.S. forces to non-violently convince terrorists not to be terrorists anymore. But obviously the potential for abuse with this kind of technology is extraordinary. The following is from a recent article by Dick Pelletier….

The Pentagon’s Defense Advanced Research Projects Agency (DARPA) wants to understand the science behind what makes people violent, and then find ways to hijack their minds by implanting false, but believable stories in their brains, with hopes of evoking peaceful thoughts: We’re friends, not enemies.

Critics say this raises ethical issues such as those addressed in the 1971 sci-fi movie, A Clockwork Orange, which attempted to change people’s minds so that they didn’t want to kill anymore.

Advocates, however, believe that placing new plausible narratives directly into the minds of radicals, insurgents, and terrorists, could transform enemies into kinder, gentler citizens, craving friendship.

Scientists have known for some time that narratives; an account of a sequence of events that are usually in chronological order; hold powerful sway over the human mind, shaping a person’s notion of groups and identities; even inspiring them to commit violence. See DARPA proposal request HERE.

#5 Unmanned Drones In U.S. Airspace

Law enforcement agencies all over the United States are starting to use unmanned drones to spy on us, and the Department of Homeland Security is aggressively seeking to expand the use of such drones by local authorities….

The Department of Homeland Security has launched a program to “facilitate and accelerate the adoption” of small, unmanned drones by police and other public safety agencies, an effort that an agency official admitted faces “a very big hurdle having to do with privacy.”

The $4 million Air-based Technologies Program, which will test and evaluate small, unmanned aircraft systems, is designed to be a “middleman” between drone manufacturers and first-responder agencies “before they jump into the pool,” said John Appleby, a manager in the DHS Science and Technology Directorate’s division of borders and maritime security.

The fact that very few Americans seem concerned about this development says a lot about where we are as a nation. The EPA is already using drones to spy on cattle ranchers in Nebraska and Iowa. Will we eventually get to a point where we all just consider it to be “normal” to have surveillance drones flying above our heads constantly?

#6 Law Enforcement Using Your Own Cell Phone To Spy On You

Although this is not new technology, law enforcement authorities are using our own cell phones to spy on us more extensively than ever before as a recent Wired article described….

Mobile carriers responded to a staggering 1.3 million law enforcement requests last year for subscriber information, including text messages and phone location data, according to data provided to Congress.

A single “request” can involve information about hundreds of customers. So ultimately the number of Americans affected by this could reach into “the tens of millions” each year….

The number of Americans affected each year by the growing use of mobile phone data by law enforcement could reach into the tens of millions, as a single request could ensnare dozens or even hundreds of people. Law enforcement has been asking for so-called “cell tower dumps” in which carriers disclose all phone numbers that connected to a given tower during a certain period of time.

So, for instance, if police wanted to try to find a person who broke a store window at an Occupy protest, it could get the phone numbers and identifying data of all protestors with mobile phones in the vicinity at the time — and use that data for other purposes.

Perhaps you should not be using your cell phone so much anyway. After all, there are more than 500 studies that show that cell phone radiation is harmful to humans.

#7 Biometric Databases

All over the globe, governments are developing massive biometric databases of their citizens. Just check out what is going on in India….

In the last two years, over 200 million Indian nationals have had their fingerprints and photographs taken and irises scanned, and given a unique 12-digit number that should identify them everywhere and to everyone.

This is only the beginning, and the goal is to do the same with the entire population (1.2 billion), so that poorer Indians can finally prove their existence and identity when needed for getting documents, getting help from the government, and opening bank and other accounts.

This immense task needs a database that can contain over 12 billion fingerprints, 1.2 billion photographs, and 2.4 billion iris scans, can be queried from diverse devices connected to the Internet, and can return accurate results in an extremely short time.

#8 RFID Microchips

In a previous article, I detailed how the U.S. military is seeking to develop technology that would enable it to monitor the health of our soldiers and improve their performance in battle using RFID microchips.

Most Americans don’t realize this, but RFID microchips are steadily becoming part of the very fabric of our lives. Many of your credit cards and debit cards contain them. Many Americans use security cards that contain RFID microchips at work. In some parts of the country it is now mandatory to inject an RFID microchip into your pet.

Now, one school system down in Texas actually plans to start using RFID microchips to track the movements of their students….

Northside Independent School District plans to track students next year on two of its campuses using technology implanted in their student identification cards in a trial that could eventually include all 112 of its schools and all of its nearly 100,000 students.

District officials said the Radio Frequency Identification System (RFID) tags would improve safety by allowing them to locate students — and count them more accurately at the beginning of the school day to help offset cuts in state funding, which is partly based on attendance.

#9 Automated License Plate Readers

In a previous article, I quoted a Washington Post piece that talked about how automated license plate readers are being used to track the movements of a vehicle from the time that it enters Washington D.C. to the time that it leaves….

More than 250 cameras in the District and its suburbs scan license plates in real time, helping police pinpoint stolen cars and fleeing killers. But the program quietly has expanded beyond what anyone had imagined even a few years ago.

With virtually no public debate, police agencies have begun storing the information from the cameras, building databases that document the travels of millions of vehicles.

Nowhere is that more prevalent than in the District, which has more than one plate-reader per square mile, the highest concentration in the nation. Police in the Washington suburbs have dozens of them as well, and local agencies plan to add many more in coming months, creating a comprehensive dragnet that will include all the approaches into the District.

#10 Face Reading Software

Can computers tell what you are thinking just by looking at your face?

Don’t laugh.

Such technology is actually being actively developed. The following is from a recent NewScientist article….

IF THE computers we stare at all day could read our faces, they would probably know us better than anyone.

That vision may not be so far off. Researchers at the Massachusetts Institute of Technology’s Media Lab are developing software that can read the feelings behind facial expressions. In some cases, the computers outperform people. The software could lead to empathetic devices and is being used to evaluate and develop better adverts.

#11 Data Mining

The government is not the only one that is spying on you. The truth is that a whole host of very large corporations are gathering every shred of information about you that they possibly can and selling that information for profit. It is called “data mining“, and it is an industry that has absolutely exploded in recent years.

One very large corporation known as Acxiom actually compiles information on more than 190 million people in the U.S. alone….

The company fits into a category called database marketing. It started in 1969 as an outfit called Demographics Inc., using phone books and other notably low-tech tools, as well as one computer, to amass information on voters and consumers for direct marketing. Almost 40 years later, Acxiom has detailed entries for more than 190 million people and 126 million households in the U.S., and about 500 million active consumers worldwide. More than 23,000 servers in Conway, just north of Little Rock, collect and analyze more than 50 trillion data ‘transactions’ a year.

#12 Street Lights Spying On Us?

Did you ever consider that street lights could be spying on you?

Well, it is actually happening. New high tech street lights that can actually watch what you do and listen to what you are saying are being installed in some major U.S. cities. The following is from a recent article by Paul Joseph Watson for Infowars.com….

Federally-funded high-tech street lights now being installed in American cities are not only set to aid the DHS in making “security announcements” and acting as talking surveillance cameras, they are also capable of “recording conversations,” bringing the potential privacy threat posed by ‘Intellistreets’ to a whole new level.

#13 Automated ISP Monitoring Of Your Internet Activity

As I have written about before, nothing you do on the Internet is private. However, Internet Service Providers and the entertainment industry are now taking Internet monitoring to a whole new level….

If you download potentially copyrighted software, videos or music, your Internet service provider (ISP) has been watching, and they’re coming for you.

Specifically, they’re coming for you on Thursday, July 12.

That’s the date when the nation’s largest ISPs will all voluntarily implement a new anti-piracy plan that will engage network operators in the largest digital spying scheme in history, and see some users’ bandwidth completely cut off until they sign an agreement saying they will not download copyrighted materials.

Word of the start date has been largely kept secret since ISPs announced their plans last June. The deal was brokered by the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA), and coordinated by the Obama Administration.

Spying On Us Through Our Appliances

Could the government one day use your refrigerator to spy on you?

Don’t laugh.

That is exactly what CIA Director David Petraeus says is coming….

Petraeus says that web-connected gadgets will ‘transform’ the art of spying – allowing spies to monitor people automatically without planting bugs, breaking and entering or even donning a tuxedo to infiltrate a dinner party.

‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,’ said Petraeus.

‘Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters – all connected to the next-generation internet using abundant, low-cost, and high-power computing.’

Petraeus was speaking to a venture capital firm about new technologies which aim to add processors and web connections to previously ‘dumb’ home appliances such as fridges, ovens and lighting systems.

For many more ways that Big Brother is spying on you, please see these articles….

Every Breath You Take, Every Move You Make – 14 New Ways That The Government Is Watching You

30 Signs That The United States Of America Is Being Turned Into A Giant Prison

The things that I have written about above are just the things that they admit to.

There are also many “black box technologies” being developed out there that the public does not even know about yet.

So how far will all of this go?

Has Big Brother already gone way too far?

Please feel free to post a comment with your opinion below….

Source: The American Dream