Project reveals the Android apps that are the worst privacy violators
A screenshot of the Privacy Grade project’s website (Image credit: PrivacyGrade.org)
If you thought seemingly innocent apps like Angry Birds did not violate your privacy, you thought wrong. A new project reveals that many unexpected apps are guilty of breaching the privacy of many mobile users.
Mobile applications are fundamentally about making money for their creators, so if an app is free it still has to rake in the cash somehow. That fact leads to many apps relying on advertising to bring in that revenue.
The apps that collect revenue through advertising often share contact lists with third parties or even use the mobile user’s location to deliver targeted advertisements.
“These apps access information about a user that can be highly sensitive, such as location, contact lists and call logs, yet it often is difficult for the average user to understand how that information is being used or who it might be shared with,” Jason Hong, the leader of the new Privacy Grade project said in a press release. “Our privacy model measures the gap between people’s expectations of an app’s behavior and the app’s actual behavior.”
Privacy Grade gives Android applications grades from A+ to D based on how much information the app gathers from a user’s device and how that gathering aligns with the user’s expectations.
IEEE Spectrum states that the grading model is based on the preference ratings of 725 users on 837 free Android apps.
The project clearly and simply lays out the permissions requested by a wide range of applications and what these permissions are used for. This helps users identify when apps request permission for information that allows internal app functionality versus advertising purposes or market/customer analysis.
So far, the database does not include paid apps since the researchers believe they are much less likely to be seeking additional revenue from selling user data to third parties.
Additionally, Privacy Grade currently only covers Android apps but the researchers are currently considering adding apps on the iOS, Windows Mobile and Blackberry platforms if funding is available.
Do you use any of the apps covered by Privacy Grade? Are you surprised by the marks your favorite apps have received? Let us know by leaving a comment below, tweeting us or leaving a comment on our Facebook page.
The fact that the social networks just like the rest of the Internet have been kept under heavy surveillance by the US and its watchdogs – the NSA, CIA, FBI and a number of other Western intelligence agencies – has been repeatedly stressed by the international media. It’s clear that the United States, in flagrant violation of fundamental human rights, has created a global system of electronic espionage, that focuses on the interception and processing of personal data of users around the world that was obtained by phone tapping, short messages theft, and social network monitoring.
Following in Washington’s steps, its loyal allies are trying to do their best to snatch personal information from their citizens and foreigners by implementing various spyware tools to ensure that no one may keep secrets from the government any longer, no matter how personal they may be.
Thus, recently the UK Surveillance Tribunal, after studying claims of illegal spying activities by local intelligence services against British citizens, stated that the exchange of intercepted private information between US secret services and the Government Communications Headquarters (GCHQ) that was carried on for the last 7 years was in direct violation of UK laws, on top of the fact that these activities violated the European Convention on Human Rights. In addition, as it was reported by The Guardian, MI-5 and MI-6 illegally tapped private conversations of UK citizens with their lawyers to ensure that authorities would have an upper hand in court, which is absolutely unacceptable according to both national and international standards.
France is also trying to keep up with it’s Anglo-Saxons nneighbors by unleashing a virus codenamed Babar, which had been allowing French secret agencies to keep track of private conversations in such messengers as Skype, Yahoo Messenger and MSN. This virus was named after the famous hero of the French-Canadian animated series Babar the Elephant that had enormous ears. This particular spyware allows French spies to monitor the keyboard input along with recording voice conversations of countless users around the globe.
As it has been announced by two independent researchers – G Data Software AG (a German software company specializing in IT-security) and the American security team CyphortLabs, this spyware was created by Directorate-General for External Security – a French intelligence agency. Initially this virus was discovered back in 2009 by the Communications Security Establishment Canada (CSEC) when its agents were studying documents that had been provided by Edward Snowden. It turned out that Babar had been created to monitor Iran’s nuclear program, but France decided to put this spyware “to good use” for spying in Algeria, Greece, Spain, Norway, Canada, Côte d’Ivoire, Egypt, Turkey and many other countries.
However the Babar spyware is but a new and improved version of Evil Bunny, the virus that French secret services had been using or much longer. To modify this Bunny, French agents invited a number of young and talented hackers to work in the DGSE headquarters, located at Fort de Noisy to the northeast of Paris.
Our rights on the Internet are being assaulted on a daily basis, as the West is increasing its usage of social networks and the Internet in general to obtain private information that could serve its interests. They have been violating the fundamental rights of people around the globe time and time again, while international institutions keep silent about these facts as if they didn’t even exist. But what can countries do in a situation like this? – In this context, China can serve as a perfect example of dealing with Washington’s cunning ways.
When the US State Department closed Hotmail in China for purely political reasons, Beijing was quick to ban MSN services, which granted the country billions of dollars in fines and Washington’s assurances not to use such measures anytime again in the near future. Later on, as Washington persisted, China launched its own “Google” under the brand Baidu and, later on, it created its own YouTube, Twitter and Facebook. Which means only one thing – there are ways for soveriegn governments to fight this, but harsh steps are to be taken before that.
Welcome to 2015. We’re certainly not in Kansas anymore.
Not only is the police state here, but it is upgrading all the time.
While people are busy fighting an uphill battle with apparently rampant cases of abuse, excessive force and a misguided and failed War on Drugs, many are too far behind the times to keep up with these technologies – now being tested or used in police departments across the country.
While the use of technology in policing is nothing new, it might surprise you have far things have gone – with much of police surveillance now fully automated and integrated into wireless networks, and monitored by Homeland Security-funded fusion centers.
Reason.tv rounded up these examples of creepy, robot, privacy destroying police tactics (and it’s only just beginning):
• Smart street lights created a stir in the alternative media a few years ago, with news that Homeland Security grants were putting big brother funding on the streets quite literally. Now, they are being tested in Las Vegas. The intelligent street lights are equipped with two-way communication and monitoring devices, and may be used to record conversations on the streets, or to broadcast official messages from the authorities during an emergency, or in the midst of a crime. Apparently, they can also broadcast music. Maybe that will give them enough street cred to keep the creepy level off the radar. Paul Joseph Watson wrote:
The Intellistreets system comprises of a wireless digital infrastructure that allows street lights to be controlled remotely by means of a ubiquitous wi-fi link and a miniature computer housed inside each street light, allowing for “security, energy management, data harvesting and digital media,” according to the Illuminating Concepts website.
In terms of Homeland Security applications, each of the light poles contains a speaker system that can be used to broadcast emergency alerts, as well as a display that transmits “security levels” (presumably a similar system to the DHS’ much maligned color-coded terror alert designation), in addition to showing instructions by way of its LED video screen.
The lights also include proximity sensors that can record both pedestrian and road traffic. The video display and speaker system will also be used to transmit Minority Report-style advertising, as well as Amber Alerts and other “civic announcements”.
• Location tracking Wi-Fi is now being tested in Seattle and other locations as part of a wireless mesh network. Of course, most already know that their cell phones and computers share data with their providers, the NSA and a host of other data hungry watchers, but now the police are using boxes set up at numerous street intersections to ping and track cell phones in the area, logging location data for thousands of drivers, passengers and pedestrians that could be used to establish the whereabouts of a suspect, pursue criminals, as evidence in traffic disputes or perhaps for crowd control.
The Wi-Fi tracking devices appear as white boxes mounted on poles or street lights. The data interconnects through a wireless mesh network with existing traffic cameras, police squad vehicles, networks of cameras and other interfaces on the emerging fiber network, and a host of authorities in the region, including police, the Sheriff’s Department and the regional fusion center. Officially, the mesh network aides communication during emergency scenarios, but also functions as a roaming live-time surveillance network.
Reason.tv reports that Seattle residents been reporting wi-fi networks popping up on their cell service with the names of intersections (such as 3rd & Union) since 2013.
• Sting Ray cell phone interceptor / cell phone tower impersonator devices are now being secretly used by the FBI, local police departments and… probably other spy agencies, foreign and domestic, as well. The use of this technology remains less known than other techniques, in part because the Justice Department has pressured local law enforcement to keep hush hush about the use of this tool, even in the face of court testimony.
The best part, from a policing point of view, is the kid-in-a-candy store, fish-in-a-barrel opportunity for revealing data on everyone from suspects to innocent bystanders who may have data wanted by the authorities… now or later. No warrants need apply.
According to the Associated Press, the Obama Administration has been actively advising police departments to refuse disclosure about certain cell phone surveillance technologies, including the widely used “StingRay” device, even in routine state records requests.
Evidently, the StingRay technology allows law enforcement to “trick” cell devices into sharing identifying personal and location data with them that would ordinary be sent to communications companies and require request procedures.
Instead, police are bypassing company assistance and collecting unique information on suspects, persons of interests, and – as the AP reports – they can even “sweep up basic cellphone data from entire neighborhoods,” all without any court orders or oversight.
• See-through-radar, as used in such on the market technologies as the Range-R, allows police to see the location of all the people inside a building through the walls, again, without a warrant.
At least 50 U.S. law enforcement agencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance.
Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person’s house without first obtaining a search warrant.
Knightscope Photography Team, Creative Commons
• PoliceBots – Right now, the Knightscope K5 looks like an inept R2D2 unit, but soon people will see it as the early deployment prototype of the dangerous Robocop type units that science fiction has long warned us about.
They are scheduled to begin actual patrols in the Silicon Valley area sometime this year, and will principally be used to detect criminal activity and alert human officers… for now, of course. Later, they are supposed to be capable of crime prediction as well as prevention, but we already know that Minority Report is no-knocking at the door.
According to the Daily Mail, these bot-officers carry a number of advanced and perhaps troubling capabilities, including rapid license plate scanning and something referred to as ‘odor detection’:
The five foot tall robots have a combination of laser scanning, wheel encoders, inertial measurements, and GPS that allows fully autonomous operation and charging.
It also has odour detectors, and can even monitor air pollution as it travels around.
Using cameras they can also read up to 300 car number plates a minute, allowing them to monitor traffic.
• Drones – The use of drones is, unsurprisingly, also expanding, but the devices are become so cheap at the same time that their use is becoming accepted. Hence, police departments and law enforcement are snatching them up and making purchases that often fly under the radar of public controversy. Infinitely cheaper than helicopters and other aerial devices, drones are poised to be anywhere and everywhere that law enforcement wants eyes.
• “Eye in the Sky” – Reason.tv also included an “Eye in the Sky” HD camera mounted inside a Cessna-style aircraft that flies over a city locale for up to six hours, recording everything that takes place in the community – with options to zoom in on areas of interest in live-time and play back to review what officers weren’t focusing on.
The Atlantic reported on how the device was used secretly in Compton, California, and only revealed to the public years afterwards – kept hush hush by law enforcement to quell privacy concerns:
In a secret test of mass surveillance technology, the Los Angeles County Sheriff’s Department sent a civilian aircraft* over Compton, California, capturing high-resolution video of everything that happened inside that 10-square-mile municipality.
Compton residents weren’t told about the spying, which happened in 2012. “We literally watched all of Compton during the times that we were flying, so we could zoom in anywhere within the city of Compton and follow cars and see people,” Ross McNutt of Persistence Surveillance Systems told the Center for Investigative Reporting, which unearthed and did the first reporting on this important story. The technology he’s trying to sell to police departments all over America can stay aloft for up to six hours. Like Google Earth, it enables police to zoom in on certain areas. And like TiVo, it permits them to rewind, so that they can look back and see what happened anywhere they weren’t watching in real time.
The question is, where does it all end?
Are there any limits to how far police or government authorities will go or can go?
The Fourth Amendment seems clear enough in its intent to protect people from unwarranted searches and seizure, but it has been all but trashed and scrapped in the wake of the paranoid War on Terrorism and unparalleled mass surveillance technologies.
The problem is that there may simply be no turning back. Expectation of privacy are now as low as a fat, bald, unemployed dude hoping for a date with a supermodel. Basically, freedom is dormant and privacy is, for the time being, now all but nonexistent.
US citizens and other non-EU nationals who enter Europe will be asked to have their faces image-captured and fingerprints scanned upon arrival at a half-dozen major airports. [emphasis added]
This “biometric dragnet” is the pilot test for the EU’s new “smart borders” packages. The test portion will run March – September 2015, for starters. The commission originally proposed this package in 2013 but pulled it and began revising. While there is some opposition, the experiment is shortly underway.
The captures include fingerprint scans, iris scans and facial recognition scans for all forms of European travel – road, train, sea and air.
Of course, what’s usual for such programs – travelers can refuse…for now. But officials are letting travelers know through the media that it will become mandatory in time.
Arlanda (Sweden), Charles de Gaulle (France), Frankfurt (Germany), Lisbon (Portugal), Madrid (Spain), and Schiphol (Netherlands) are the test airports. The multi-million euro project is still in the draft stages but nevertheless, is set to go…now. The document notes:
Should traveller participation be lower than expected, there would be a high risk that the results of the tests would be biased or would not reflect reality.
A special token is expected for frequent travelers to complete journeys without the inconvenience of the future traveler to Europe…
Arlanda, Charles de Gaulle, and Madrid airports will capture facial recognition images from passengers stepping off flights. Lisbon is “tickled” – yes, tickled – to capture iris pattern scans, live at the same time as facial captures. Moving trains from Paris (Gare du Nord) and Lasi (Romania) will house border guards who will take fingerprint scans. Travelers at Lasi will be compelled for their facial images.
Again, this practice will include other modes of travel where in some areas, iris scans will be taken. For instance, iris scans will be taken from drivers (willing at first) on roads leading into border towns Udvar in Hungary and Sculeni in Romania. The article notes that “drivers should also expect live face scans in Sculeni.”
Roads leading into Kipoi Evrou in Greece and Vaalimaa in Finland will compel drivers for fingerprints. “The traveller[sic] will walk up to the border guard or be one of the first persons to be called by the border guard,” the document notes. Certain cars and buses will be “pulled aside” in a waiting area for the duration of the experiment.
Lastly, Helsinki (Finland), Port of Piraeus (Greece), Gerbourg (France), and Genova (Italy) are the seaports and ship areas participating in the data collection.
There is, of course, the assurance that all data will be depersonalised, kept local and destroyed afterward with only a limited retention period. The only data “risk” in their consideration being that certain member states won’t comply with data protection guidelines. Notably, eu-LISA is the EU agency that will manage this large-scale undertaking with systems that in current use by EU border guards and law enforcement. Reports come out July 15th and November.
The “full monty” biometric trend is likely to burgeon at U.S. airports soon, if not already – as this is a major global goal. The events of September 11 were used to justify major spending for biometric measures worldwide. Or rather, the extra push for projects that were already underway.
The package includes the Entry/Exit System (EES) and the Registered Travellers Programme (RTP).
Both rely on the collection, storage, and processing of biometric data to enhance border control checks on any non-EU national entering the EU.
EES is meant to identify and prevent people from overstaying their visas.
A witness reported to us of a promotional flight video depicting biometric scanners at Atlanta, GA International Airport. Sure enough, all the equipment was set up at the airport in the summer of 2012, but was not yet in use. Feel free to comment if you know where the airport stands currently on biometric use.
I just recently watched a TED Talk – this was the CEO of Bluebird Bio – a pharmaceutical and biotech company – talking about their work on gene therapies.
These are cures that work on the first shot – correcting your condition or augmenting your body to repair itself on the genetic level. One shot and you are cured for life – more or less – because the corrected cells then multiple, carrying the corrections on in each additional cell.
The work for now can be a bit primitive, but the technology is already drastically changing lives for the better.
It is nothing short of revolutionary – it stands to change humanity forever – and if Bluebird Bio doesn’t do it, someone else eventually will. The problem is obvious though, these cures may cost a lot to develop but once they are perfected, they cost relatively very little to produce and give to patients compared to traditional and less effective therapies. And when they are given to patients, it is a one time deal.
Realizing this prompted the CEO of Bluebird Bio to say something very questionable – claiming that by fixing a patient on the genetic level, they will from then on be producing his corporation’s drug (though not really since it is not a drug, it is corrected DNA) and while he doesn’t come right out and say it, anyone familiar with big-pharma and big-biotech’s method of operation knows that they expect you to pay for it … for life.
And so that is how big-pharma plans to continue rolling in piles of money even when technology makes it possible to permanently cure people with a single shot, by extorting people literally like a cartoon villain – demanding “1 million dollars” per life-saving shot – the subject of a previously published report titled, “Big Pharma Dangles Life and Death Over Patients’ Heads.”
There is indeed the valid argument that these treatments cost money to research and develop, and the people involved in doing so deserve to profit from them. And I agree, but guess what? The government gives these corporations millions of dollars through all sorts of grants every year so they can do just that.
Surely society would be all for giving even more money toward this sort of research – something the government should be doing instead of spending literally a trillion dollars on a single weapons system – like the F-35. But then there is the reality that greed prevails, and special interests rule.
People have got to get informed on gene therapy – it will change humanity forever and whoever controls it controls humanity’s future. That being the case, the people should be the one’s wielding it, not a handful of corporations dangling life over the heads of sick kids so they can please their investors and stay in business.
I admittedly don’t know the whole story about Bluebird – I’d hate to say they were corrupt and greedy if they were really doing everything they could within a system that is itself backwards … but it was difficult to listen to their TED Talk and not walk away feeling I’ve just been extorted. If you hold the keys to saving lives, you must unlock the door, handsomely rewarded or not. And part of being a “good guy,” is taking it upon yourself to create a better system within which life-saving research can move forward without parasitical investors demanding immense profits in return at the expense of both ethics and progress.
Are we in love with how smart we are? In America today, there are technology companies that have a much larger “cult following” than any religious organization. And there are millions upon millions of Americans that freely confess that they “believe in science”. So what does this say about us? Does it say that we have discarded ancient “superstitions” and instead have embraced logic and reason? Sadly, in most cases the truth is that we have simply traded one form of religion for another. Scientists and technology gurus have become our new high priests, and most of us blindly follow whatever they tell us. But in the end, just like with so many religious organizations, it is all about the money. Those with the money determine what the science is going to say, who the high priests are going to be, and what messages are conveyed to the public. For example, once upon a time the big tobacco companies had armies of doctors and scientists that swore up and down that smoking cigarettes was not harmful. In fact, many doctors and dentists in America once personally endorsed specific brands of cigarettes. Of course millions of Americans were getting sick and dying, but this was dismissed as “anecdotal evidence”. And over in Germany, “science” was once used to prove that the Germans were the master race. We look back in horror now, but at the time the best “science” in the world was used as justification to promote some horrible untruths. And of course the same thing is happening today. We are told over and over that “the science is settled” regarding genetically-modified food, climate change and vaccine safety, and yet those of us that think for ourselves know that isn’t the case at all. But if you do not believe in the “official story”, you don’t get to be part of the “scientific establishment”. By definition, the only people that get to be “scientific experts” are the ones that embrace the “doctrine” of those that control the big corporations, that fund the research studies at the major universities and that own the big media outlets. Everyone else is not permitted to be part of the discussion.
As I have written about previously, I spent eight years studying at public universities in the United States. And over time, I got to see where most “scientific truths” come from these days.
Most of the time, the theories that people believe are so “scientific” were simply pulled out of thin air. In other words, they were just the product of someone’s overactive imagination. In recent decades, there have been countless examples of “existing science” being overturned and rewritten when more information and evidence become available. This is because the “existing science” did not have any foundation to begin with.
And yet we continue to make the same mistake today. Instead of calling them “theories”, which is what they should do, scientists all over the world are so eager to make bold pronouncements about the wonderful new “discoveries” that they have made. These bold pronouncements are then repeated over and over and over again until they become “facts”. But of course they are not facts at all.
For instance, at one time it was a “scientific fact” that it was perfectly safe to smoke cigarettes. The following comes from a recent article by Tony Cartalucci…
It wasn’t long ago when big-tobacco had armies of “scientists” citing the latest “studies” confirming the health benefits and safety of smoking. Of course these were paid liars, not scientists, even if many of them had PhDs. And it was lies they were telling, even if mixed with shades of science.
In case you are too young to remember those days, Cartalucci included the following compilation of old tobacco ads in his article…
Hiding behind science is nothing new. Darwinists hid behind it to prop up their racism, which in fact inspired the Nazis to hide behind it to scientifically prove they were the “master race.” The Nazis, in fact, loved science, and used it with horrible precision.
At any point in history, has “science” ever had all the answers?
Of course not.
And without a doubt, someday people will look back and mock all of us for how stupid we were.
But we never stop to consider that. Instead, we are all just so proud of ourselves and our accomplishments.
Decades after Apple’s founding, we’ve grown used to referring to lovers of the company’s products as a “cult.” The devotion of customers to Apple products has long been the envy of competitors for its fanatical fervor.
It turns out that the religious intensity with which people follow the company is not entirely by accident. In a new book, “Appletopia,” author Brett Robinson examines the way that Steve Jobs drew on religious metaphors and iconography to elevate his products specifically, and technology more generally, into a kind of religion.
“The creative rhetoric around Apple’s technology has favored religious metaphors,” Robinson said in an interview. “Some of it is conscious on Apple’s part. Some of it is unconscious.”
But certainly this is less strange than what a lot of religious people do, right?
After all, there are millions upon millions of people out there that do some really strange things in the name of religion. For example, on the other side of the globe 400 men cut off their own testicles in an attempt to get closer to God.
Many would say that our worship of science and technology is evidence that we have evolved beyond our ancestors. In fact, there are some “scientific minds” that are now proclaiming that science will one day eliminate belief in God altogether. For example, the following comes from an article entitled “Will Science Someday Rule Out the Possibility of God?“…
Over the past few centuries, science can be said to have gradually chipped away at the traditional grounds for believing in God. Much of what once seemed mysterious — the existence of humanity, the life-bearing perfection of Earth, the workings of the universe — can now be explained by biology, astronomy, physics and other domains of science.
Although cosmic mysteries remain, Sean Carroll, a theoretical cosmologist at the California Institute of Technology, says there’s good reason to think science will ultimately arrive at a complete understanding of the universe that leaves no grounds for God whatsoever.
Carroll argues that God’s sphere of influence has shrunk drastically in modern times, as physics and cosmology have expanded in their ability to explain the origin and evolution of the universe. “As we learn more about the universe, there’s less and less need to look outside it for help,” he told Life’s Little Mysteries.
Personally, I find this laughable.
Darwinists have been trying to move God out of the picture for decades, but they are fighting a losing battle. Over time, more and more evidence has come out that has shot the theory of evolution full of holes. For much more on this, please see my previous article entitled “44 Reasons Why Evolution Is Just A Fairy Tale For Adults“.
And as far as whether or not God exists, this is something that I have been investigating for many, many years. My legal training has taught me to think critically and to allow the evidence to speak for itself. Over time, I came to learn that there is a vast mountain of evidence that leads to one inescapable conclusion. In the end, the overwhelming conclusion that I reached was that God is very, very real. You can find a few of my thoughts in an article entitled “Did You Know?”
So what do you think?
Does our society worship technology?
Has “science” become a god in America?
Please feel free to add to the discussion by posting a comment below…
Can you imagine a world where your home, your vehicles, your appliances and every single electronic device that you own is constantly connected to the Internet? This is not some grand vision that is being planned for some day in the future. This is something that is being systematically implemented right now. In 2015, we already have “smart homes”, vehicles that talk to one another, refrigerators that are connected to the Internet, and televisions that spy on us. Our world is becoming increasingly interconnected, and that opens up some wonderful possibilities. But there is also a downside. What if we rapidly reach a point where one must be connected to the Internet in order to function in society? Will there come a day when we can’t even do basic things such as buy, sell, get a job or open a bank account without it? And what about the potential for government abuse? Could an “Internet of Things” create a dystopian nightmare where everyone and everything will be constantly monitored and tracked by the government? That is something to think about.
Today, the Internet has become such an integral part of our lives that it is hard to remember how we ever survived without it. And with each passing year, the number of devices connected to the Internet continues to grow at an exponential rate. If you have never heard of the “Internet of Things” before, here is a little bit about it from Wikipedia…
Things, in the IoT, can refer to a wide variety of devices such as heart monitoring implants, biochip transponders on farm animals, electric clams in coastal waters, automobiles with built-in sensors, or field operation devices that assist fire-fighters in search and rescue. These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices. Current market examples include smart thermostat systems and washer/dryers that utilize wifi for remote monitoring.
But there is also a dark side to the Internet of Things. Security is a huge issue, and when that security is compromised the consequences can be absolutely horrifying. Just consider the following example…
It is a strange series of events that link two Armenian software engineers; a Shenzen, China-based webcam company; two sets of new parents in the U.S.; and an unknown creep who likes to hack baby monitors to yell obscenities at children. “Wake up, you little ****,” the hacker screamed at the top of his digital lungs last summer when a two-year-old in Houston wouldn’t stir; she happened to be deaf. A year later, a baby monitor hacker struck again yelling obscenities at a 10-month-old in Ohio.
Both families were using an Internet-connected baby monitor made by China-based Foscam. The hacker took advantage of a weakness in the camera’s software design that U.S.-based Armenian computer engineers revealed at a security conference in Amsterdam last April.
The Internet allows us to reach into the outside world from inside our homes, but it also allows the reverse to take place as well.
Do we really want to make ourselves that vulnerable?
Sadly, we live at a time when people don’t really stop to consider the downside to our exploding technological capabilities.
In fact, there are many people that are extremely eager to connect themselves to the Internet of Things.
In Sweden, there are dozens of people that have willingly had microchips implanted under the skin. They call themselves “bio-hackers”, and they embrace what they see as the coming merger between humanity and technology. The following is what one of the founders of a Sweden based bio-hacking community had to say during one recent interview…
“The technology is already happening,” says Hannes Sjoblad, one of the founders of BioNyfiken. “We are seeing a fast-growing community of people experimenting with chip implants, which allow users to quickly and easily perform a variety of everyday tasks, such as allowing access to buildings, unlocking personal devices without PIN codes and enabling read access to various types of stored data.
“I consider the take-off of this technology as another important interface-moment in the history of human-computer interaction, similar to the launches of the first windows desktop or the first touch screen. Identification by touch is innate for humans. PIN codes and passwords are not natural. And every additional device that we have to carry around to identify ourselves, be it a key fob or a swipe card, is just another item that clutters our lives.”
And of course this is happening in the United States as well…
In America, a dedicated amateur community — the “biohackers” or “grinders” — has been experimenting with implantable technology for several years. Amal Graafstra, a 38-year-old programmer and self-styled “adventure technologist”, has been inserting various types of radio-frequency identification (RFID) chips into the soft flesh between his thumbs and index fingers since 2005. The chips can be read by scanners that Graafstra has installed on the doors of his house, and also on his laptop, which gives him access with a swipe of his hand without the need for keys or passwords.
But you don’t have to have a microchip implant in order to be a part of the Internet of Things.
In fact, there are a whole host of “wearable technologies” that are currently being developed for our society.
For instance, have you heard about “OnStar for the Body” yet? It will enable medical personnel to constantly monitor your health wherever you are…
Smart, cheaper and point-of-care sensors, such as those being developed for the Nokia Sensing XCHALLENGE, will further enable the ‘Digital Checkup’ from anywhere. The world of ‘Quantified Self’ and ‘Quantified Health’ will lead to a new generation of wearable technologies partnered with Artificial Intelligence that will help decipher and make this information actionable.
And this ‘actionability’ is key. We hear the term Big Data used in various contexts; when applied to health information it will likely be the smart integration of massive data sets from the ‘Internet of things’ with the small data about your activity, mood, and other information. When properly filtered, this data set can give insights on a macro level – population health – and micro – ‘OnStar for the Body‘ with a personalized ‘check engine light’ to help identify individual problems before they further develop into expensive, difficult-to-treat or fatal conditions.
If that sounded creepy to you, this next item will probably blow you away.
According to one survey, approximately one-fourth of all professionals in the 18 to 50-year-old age bracket would like to directly connect their brains to the Internet…
According to a survey by tech giant Cisco Systems, about a fourth of professionals ages 18 to 50 would leap at the chance to get a surgical brain implant that allowed them to instantly link their thoughts to the Internet.
The study was conducted on 3,700 adults working in white-collar jobs in 15 countries.
“Assuming a company invented a brain implant that made the World Wide Web instantly accessible to their thoughts, roughly one-quarter would move forward with the operation,” the study found.
In the end, they are not going to have to force most of us to get connected to the Internet of Things.
Most of us will do it eagerly.
But most people will never even stop to consider the potential for abuse.
An Internet of Things could potentially give governments all over the world the ability to continually monitor and track the activities of everyone under their power all of the time.
“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation Internet using abundant, low-cost, and high-power computing”
Are you starting to get the picture?
They plan to use the Internet of Things to spy on all of us.
But we just can’t help ourselves. Our society has a love affair with new technology. And some of the things that are being developed right now are beyond what most of us ever dreamed was possible.
For example, Microsoft has just released a new promotional video featuring 3D holograms, smart surfaces, next-generation wearable technologies, and “fluid mobility”…
The elaborate, highly produced video shows jaw-dropping technologies like a SCUBA mask that annotates the sea with 3D holograms, a multipart bracelet that joins together to become a communications device, and interactive, flexible displays that automatically “rehydrate” with information specific to the people using them.
This video from Microsoft was posted on YouTube, and I have shared it below…
So what do you think about all of this?
Please feel free to add to the discussion by posting a comment below…
A new study proves just how invasive Monsanto’s best selling chemicals are, revealing how herbicide toxins are appearing in 75% of rain and air samples.
Take a deep breath. Thanks to the massive use of herbicides across the planet, you likely just inhaled a dose of Monsanto’s best-selling herbicide, Round Up – at least according to the latest US Geological Survey published in the journalEnviromental Toxicology and Chemistry.
The chemical ingredient used in Round Up, known as glyphosate, as well as other ‘inert’ toxic chemicals, were found in over 75% of the air and rain samples tested from Mississippi in 2007 – a large river that cuts through the middle of the US, and is the basin in which hundreds of farms’ runoff drains.
An evaluation of numerous pesticides currently used were measured through water and air samples collected from 1995 to 2007 during growing season along the Mississippi Delta agricultural region. If 75% of samples containing Round Up isn’t shocking enough, there’s more:
Round Up chemicals were prevalent, but so were 37 other toxic compounds – all present in both rain and air samples.
Glyphosate was found in 86% of air samples, and 77% of rain samples.
Seven compounds in 1995 and five in 2007 were detected in more than 50% of both air and rain samples. Atrazine, metolachlor, and propanil were detected in more than 50% of the air and rain samples in both years.
The report states that 2 million kilograms of glyphosate were applied statewide in 2007, or 55% of the total herbicide flux for that year (~129 μg/m2), leading them to state the high prevalence of glyphosate in air and water “was not surprising.”
What is surprising is that these results are not becoming widely distributed until 2015.
This estimate, if correct, reveals that there has been an ~ 18 fold increase in glyphosate concentrations in air and water samples in only 12 years (1995-2007), and likely more since the samples were taken.
This means that our bodies have been under fire with biotech toxins, not just in the food we eat, but in the air we breathe, and the water we drink, for more than a decade.
The longer the period of exposure we are subjected to, you can bet the more diseases will crop up.
These toxins have cumulative and synergistic effects with other toxicants with incalculably complex results that produce far more harm together than glyphosate alone (i.e. synergistic toxicity).
If you want to breathe a sigh of relief, you’ll have to fight biotech. It isn’t just the food they are poisoning.
On Thursday, the Washington Post and BBC publicly identified Mohammed Emwazi, a British-educated, Kuwaiti-born man in his mid 20s, as “Jihadi John,” the Islamic State frontman who executed several hostages on camera, to the world’s horror.
“We will not comment on ongoing investigations and therefore are not in a position to confirm or deny the identity of this individual,” the FBI said Thursday.
Denials aside, FBI director James Comey said months ago that they knew John’s identity.
If the FBI has in fact identified Jihadi John, the victory was, in part, a product of the FBIs growing collaboration with the Department of Defense — a relationship that will grow much more cozy in the coming years, in the black cherry tree dotted hills of Clarksburg, West Virginia.
About four hours away from Washington D.C. sits the headquarters of the FBI’s Criminal Justice Information Services Division, or CJIS, which houses the bureau’s Biometric Center of Excellence. The center is not a place so much as a program begun in 2007 that plays a key role in making use of all the biometric data that comes into the FBI’s possession. That’s every fingerprint, every image, and every phone message that anyone sends to the FBI.
“Bottom line for us … if any of our divisions, whether it be our counterterrorism division, our criminal division, if at any time during their investigations they develop biometrics … they submit it through our system,” Stephen L. Morris, assistant director of the CJIS, told Defense One at a recent conference in Washington. In terms of identifying John, he said, “I’m not going to tell you how we did it,” but added, “You have to have something to search … you can have images with faces but if you’re not capturing it in the right way, if there’s not data in that image to make a comparison, it’s just not useful.”
This, in part, is why the biometric center plays a role in bringing parties, and their biometric databases, together. The FBI’s system is called the Next Generation Identification, or NGI. It includes photos, aliases, physical characteristics and, of course, fingerprints. Today, it’s completely interoperable with the military’s Automated Biometric Identification System, or ABIS, and the Department of Homeland Security’s Automated Biometric Identification System, or IDENT. The center also works with the State Department and allied law enforcement agencies around the world. The FBI and Britain’s MI5 have been working together to identify John.
Obtaining a biometric record on a suspect to match against a terrorist video of a masked jihadi is not something done easily or robotically. It requires old school investigation, either sifting through lots of hours of collected video footage and comparing that to crime videos (such as beheadings), or going out into the field to find voice samples on suspects to match against crime videos, or both.
This is where the Defense Department’s extensive library of biometric signatures, gathered on the field in places like Iraq and Afghanistan, can play a role in future investigations. The department’s biometrically enabled watch list, or BEWL, houses more than 200,000 records.
“I can’t speak enough about our relationship with the Department of Defense. After 9/11, our mission in life changed. It was all about national security, our partnership with DHS and DOD — to say it expanded is an understatement,” Morris said at a recent biometrics conference in Washington, D.C.“Their ABIS system was connected with our system, so they have a small group of folks who are out there [in West Virginia] in charge of their system. Having them co-locate with us has been very important.”
That important relationship is about to get a lot more intimate. Later this year, the FBI is going to open a $328 million, 360,000-square foot Biometric Technology Center next to the current CJIS campus. The Defense Department will get about 40,000 square feet in the building, which will also consolidate the FBI’s biometric workers and operations. “Anything and everything we do will be run out of that building,” said Morris.
In September of last year, the FBI announced that the $1.2 billion dollar NGI system was fully operational (it was rolled out in increments over a period of years). If it works according to plan, it will provide law enforcement with a very fast and reliable sense of exactly who they are talking to, what threat that individual may pose, and what records they’ve left — fingerprints, voiceprints, etc. — in what places.
But fingerprints don’t help you catch everyone. Voice recognition played a key role in the identification of Jihadi John, according to published reports. The FBI’s biometric center site lists voice recognition as one of its key modalities, or areas of study, along with DNA and others, but fingerprints and more traditional biometric signatures make up a bulk of the records it manages.
Voice, in many ways, represents a crucial gap in biometrics collection for both the Defense Department and law enforcement. In a noisy environment it can be very hard to get a dataset to do matching against, a huge technical issue that the government is actively looking to solve.
In Iraq and Afghanistan, soldiers have compiled huge datasets of people that they have come across, including finger scans, pictures, and iris scans. Any of those can serve as a reliable red flag for a Turkish border guard, or, for that matter, a New York cop with a suspect in the chair. But they don’t do much against a villain broadcasting terror from a safely fortified mountaintop in Syria.
Some of the men fighting with ISIS today have probably left their fingerprints in a few places where Western law enforcement could pick them up and share them. Technology, by itself, won’t find those places. But, once the data is found, it can make positive identification much faster and easier, as it apparently has with ISIS’s most infamous fiend.
One does not need to have insider sources to see the unmistakable patterns emerging from the false flag attack upon Arizona’s Internet covering approximately half of the state, geographically speaking. However, insider sources are beginning to emerge. But first, let’s connect some dots. After 72 hours following the attack on commerce and communications in central and northern Arizona, there are some disturbing details beginning to emerge.
Brief Review of the Facts
In Part One, it was established the Internet cables were cut, including those controlling commerce and communications in Arizona, stretching from north of Phoenix to Flagstaff. These cables were located in a remote and hard to access area. The cables were dug up and then cut with precision through a presumably encased and very thick and sophisticated aluminum alloy covering. The perpetrators made a getaway without so much as leaving tire treads or footprints leaving investigators with nothing to go on.
It is also known that the scope of the attack is much more broad and varied than first believed. Both local reports and matching insider reports are beginning to filter in. What is curious is that the BBC and Russia Today are covering this event in greater detail than the local Arizona or American media. After reading this article, the reasons for the media blackout are about to become very apparent.
This was a very sophisticated operation in which these remotely located cables, in rough terrain were located and cut with precision. The getaway was effected without so much as leaving a clue and we are supposed to believe this was the work of “vandals”.
In Part One, it was established that this false flag attack on Arizona’s communications and commerce was the work of highly sophisticated, well-trained professionals. The location of the cables that were cut is in an extremely remote and rugged area. How did the so-called “vandals” know where to find the location? Some of the cut cables were encased in highly protective and reinforced casings. Therefore, how did they cut these cables which were designed to withstand the use of a hacksaw, which now the authorities are claiming was used? Knowing which cable to dig up from three feet deep in the ground and the prerequisite highly specialized knowledge of the function of each individual cable is important because I have been told that not all cables on the scene were “vandalized”!
Since the event began, I have literally received dozens of tips. With regard to the operational details of the attack, it is not necessary to rely on unknown sources claiming to have information. Here is what else I have learned. The cables were destroyed, and the protective casings were cut through by what is believed to be a laser. There were absolutely no clues left behind. Some present and former first responders believe that there is a chance that satellite imaging could be brought into play and very possibly the crime could be solved. Please keep in mind that President Obama announced a couple of weeks ago that DHS was taking control over all intelligence information from the NSA. If DHS does not bring this capability to bear, then we know where to start looking with regard to the origination point of this false flag attack. The fact that the investigation does, on the surface, appear to be run by the Phoenix Police Department, means that the sophistication needed to solve a crime of this complex nature will not be possible given the resources of a typical police department.
There is widespread awareness within the first responder community that this was a well-orchestrated attack and it has many people freaked out. DHS is in charge of the dissemination of media releases and information and by all reports there are many people who are not on board with what is transpiring. One of the variables that has people absolutely freaked out was that if this attack had gone one step further, critical services offered at several hospitals would have failed and many would have died as backup contingencies would have been rendered inoperable in 48 hours or less. Northern Arizona was also one step away from complete traffic chaos in both Prescott and Flagstaff. The media may not be reporting on how widespread and close to lethal this attack was, but insiders are reportedly reeling from the realization of the devastation that could have been visited upon this area. One former “first responder” told me that the entire grid is exposed and there is no way to defend every inch. Such an attack would render a city into a state of absolute panic as water, electricity and normal service (e.g. hospitals, fire departments, etc.) would be rendered inoperable.
The scope of the attack is captured in this email sent to me from Prescott, Arizona, which was in the heart of the attack zone.
Prescott, Arizona, in the heart of the false flag attack zone.
“The news media has been playing this whole event down, but my wife and I were right in the middle of it.
The media is reporting that Flagstaff’s 911 system remained up. That might have been true up in Coconino County, but 911 went down completely here in Yavapai County. Our 911 service went down along with every other feature of the landline telephone system. We could not even dial “0” to get an Operator.
On Wednesday 25 February 2015, northern Arizona experienced a complete and total breakdown of all Internet and landline telephone service. Most cell phones stopped working, too. Verizon customers still had service, but the cell towers got jammed up with everybody trying to make calls all at the same time. Some of them could only text. This went on for nearly an entire work day.
This event turned out to be a pretty good test of our response to the early stages of a “grid down’ situation.
I became aware of the outage at around 11:45 hours Wednesday. I was due to clock in to my work-from-home job at noon, so I noticed that the Internet was down. I immediately attempted to contact our cable Internet provider to report the outage, but my Centurylink landline telephone gave me nothing but a fast busy signal, both for local calls and for toll-free long distance calling.
The fact that both Centurylink and cable Internet were down at the same time (two entirely different service providers) raised the hair on the back of my neck..
We received reports of banks closing and even of grocery stores shutting their doors due to not being able to transact business without an Internet connection. People could not get cash out of the ATMs. That development does not bode well for our future well-being, if the grocery stores won’t even stay open long enough for the panic buying to begin.
Retail stores across the Verde Valley started closing up before nightfall.
A good friend of ours who works in law enforcement told me (after the Internet came back online) that there had been several fistfights at the gas stations in town. So, there was violence, but it was just boneheads fighting over gasoline…
This was just the Internet and phones, people! Our grid electric stayed on the whole time. Yet people began freaking out and resorting to violence in less than an hour.
We just simply cannot count on the majority of the people around us to act responsibly, or even rationally, once a *full* breakdown of society and services occurs. Those people are likely to completely lose their minds in less than 6 hours, judging from their response Wednesday to something as minor as the Internet and phones going down. I fully expect them to be even worse after 24, 48, and 72 hours.“
This is for your approbation. Former Green Beret and present talk show host, JR Moore, once told me that he had knowledge that a Russian team of 16 soldiers, divided into two operational squads could bring down a city the size of Phoenix (four million) in less than an hour.
The Scope of the Attack
On the surface, the attack appears to be confined to one large swath stretching due north from Phoenix to Flagstaff. However, what is unreported in the media, but what has been reported to me is that small pockets Arizona, which were nowhere near the impacted area, also experienced service interruptions at the same time. Here are some excerpts of communications that I have received in the last 48 hours.
“This is the SECOND time in a little over a month, maybe shorter, time it has happened. I live in Payson Az, and the last time they blamed it on a squirrel! Seriously, a squirrel ate through the cables?
NO one up here believes it was an animal. The banks closed last time and no atm’s, no grocery stores, cell phones, land lines or CELL phones…now how did Verizon lose service from a fiber optic eating squirrel!! Nope, this is a beta test and scary it hits us up here, there’s not much up here guys.. 2 x times in a few weeks is bizarre.. should we be more worried than most folks are up here anyway?”
Please note that Payson is over 40 miles away from the impacted area.
In the southern part of metropolitan Phoenix, there was a simultaneous outage at a local high school.
Please know that our phone lines have been working intermittently from the time that the power outage occurred this morning. We believe we should be operable from this point on. We apologize for any inconvenience this may have caused
Thank you for your understanding and patience.
Desert Vista Administration
A subsequent follow up offered an explanation as to the problem which occurred at the exact same time as the event which took down commerce and communication in central and northern Arizona.
Ahwatukee, located in the southern part of Phoenix, is over 60 miles from the attack zone.
February 25, 2015
Desert Vista Parents,
The power has been restored to Desert Vista High School. SRP tells us there was an equipment failure in the Ahwatukee area and they worked all morning to fix it.
The rest of the school day, including lunch period, will continue as normal. We know this was an inconvenience and we appreciate your continued support.
It is interesting and suspicious that Payson and this high school located in the Ahwatukee area, which are both well out of the impacted zone experienced simultaneous interruptions of service at the same time as the “main event”. Maybe we could buy into one coincidence, but two, at the same time?
What these two events suggest is that this false flag beta test had two goals: (1) To test the capability to enact a macro event by initiating widespread disruptions; and, (2) The employment of a micro attack upon a small and well-defined geographic area. In other words, the ability to pinpoint an attack upon a specific target was executed along with a widespread attack upon large infrastructure functions were carried out at the same time.
More Reports From Around the Country
Yesterday, I reported on the widespread commerce and communications attack from around the country which happened at the same time. There are still more reports coming in from around the country which point to a sophisticated and well-orchestrated attack that occurred at the same time. These emails/web messages, speak for themselves as to the widespread scope of the attack.
“It sounds like the outage was felt in areas outside AZ, FL and OK: “M” says… “My centurylink internet service was down from about 9:30 pm Wed. the 25th till around 4:00pm Thurs. the 26th . This was in the Raleigh , N.C. area.”
“I live in Panama City Beach, Fl. & tried to use my ATM at 6:10pm yesterday (11/25) and it said “Not Available”……didn’t think anything about it, but WOW !!! Now I do. Time to consider taking all funds out of the bank and go a different route.”
“Lots of military helicopter activity in Phoenix, Flagstaff and Kingman/Bullhead City area over the last 48 hours. None of the local news sources reporting on this or the fact that the outage was more widespread.”
It is clear that this sophisticated false flag beta test attack upon commerce and the communications was a site-selected nationwide test. The ability to wipe out commerce and communications in both a macro and a micro attack upon a selected portion of the grid, was put to the test.
The media blackout is stunning. The silent opposition to these events by insiders, powerless to act, is noteworthy. The danger posed to all of us if these attacks are escalated to include the entire grid are frightening.
The FCC voted yesterday to begin regulating the Internet as a public utility under a plan known as Net Neutrality. Let that sink in. The federal government will regulate the Internet in the same way the agency already regulates the telephone and cable television industries — and it calls that “neutral.” Having been denied the ability to regulate the Internet in the past because of a lack of authority, the FCC has now simply reclassified the Internet under Title II, and — voilà! — they have the authority to regulate it.
One problem with this action is that the Internet does not belong in the same category as telephones and televisions. It is “other”: It has its own category. The Internet is the most innovative, pervasive, free, and open form of communication man has ever known. Access to it is more available now than ever before, and an increasing number of people are using it as the primary method for their communications. When used properly, the Internet allows private, anonymous communication in a way that is unrivaled. But beyond that, it is also a marketplace, a research network, an alternative news source, and much, much more. And the Internet is all these things because it grew up largely unhindered by government regulation (read: interference).
With the three-to-two vote of unelected bureaucrats unaccountable to the people, that is changing. It is as sure as can be that Net Neutrality will change the Internet. As the Internet is bogged down in regulation by an agency that has no constitutional authority even to exist, let alone to regulate the Internet, the innovation that birthed and nursed the Net to youthful maturity will be replaced by concerns about compliance with regulations. Instead of answering to the concerns of consumers — as is done in a free market — ISPs (Internet Service Providers — through which a company such as Netflix provides services to Internet users) will begin focusing their attention on lobbying the FCC. The result will be an Internet that has lost its youthful energy and is mired in rules that aren’t even known yet.
The reason the rules aren’t yet known is that FCC Chairman Wheeler decided to keep them secret. He has hinted at the powers the new rules grant to the FCC, though, and they are frightening. In an op-ed piece for Wired on February 4, Wheeler wrote, “My proposal includes a general conduct rule that can be used to stop new and novel threats to the Internet. This means the action we take will be strong enough and flexible enough not only to deal with the realities of today, but also to establish ground rules for the as yet unimagined.”
What constitutes “new and novel threats to the Internet” is left to be defined later.
Perhaps as disturbing as the secrecy of the plan is the underhanded method by which it was promoted, using — ironically — the Internet itself. In the “comments” section of many online articles, activists and bots (programs that post while appearing to be real people) posted emotional and factually erroneous appeals for regulation to “save the Internet.” One example is this comment that appeared verbatim in the comments section of several stories under several different usernames:
Cable companies need to be regulated. They’re working together to prevent having to provide better service or lower prices. The internet in the US is extremely slow and over priced.
My cable/internet costs me $150/month (from Time Warner). Contrast with my other expenses:
- Gym ($11/month from Planet Fitness) - Mobile Phone ($21/month from TMobile) - Car insurance ($25/month from Insurance Panda) - Groceries ($90/month for me)
Yes, that’s correct, my gym, cellphone, car insurance, and food COMBINED cost less than my TWC bill.
This will be a win for consumers by increasing competition and expanding infrastructure. Prices drop and speed increases. Profits drop. Aww.
In many comment platforms, visitors to the site can click on a username to see other comments posted by a commenter. Several of the usernames that posted the comment above have no other comments logged. It appears those usernames were created specifically for the purpose of posting that comment.
The purported reasons for the FCC stepping up its regulation of the Internet is that ISPs were “giving preferential treatment” to some services and “discriminating” against others and “creating paid fast lanes on the Internet.” It sounds evil. It screams for relief that only Big Government can provide. Granted, some ISPs were slowing traffic to sites that provide streaming services for watching movies or downloading large files, while at the same time allowing faster connections to other sites. Also granted, most ISPs were providing faster services for consumers who pay more. But is that wrong? Does it require relief in the form of regulation?
These types of things are normal in a free market. Bandwidth is expensive to maintain, and ISPs must make decisions that are in their best interests as businesses. If some consumers are using a very large amount of the available bandwidth to download large files and stream movies and music, it means that either everything on that connection will slow down for everyone using it, or the ISP will have to increase the bandwidth, and pay for it. The choices are limited. The ISPs can “choke” the speeds to connections to those services that use the most bandwidth; they can charge extra to consumers who desire faster connections; they can raise rates across the board; or they can do a combination of the three.
Following the logic of the arguments in favor of Net Neutrality, a restaurant should charge the same price for an eight-ounce steak as for a 16-ounce steak. Just because Customer B has a bigger appetite than Customer A doesn’t mean B should pay more, goes the Net Neutrality reasoning. In a free market (one that answers to the realities of cost and profits), the restaurant would have no choice but to offer only a 12-ounce steak and charge the same price as it had for the 16-ounce steak. And that is where these new regulations begin to harm consumers. We will see fewer choices and higher prices as the ISPs focus on lobbying their regulators and passing the costs along to their customers.
Many people live in areas where the demand for high speed Internet is low and have had to suffer with slow connection speeds. They have sat in Starbucks and public libraries and used their Internet connection when they needed a faster connection. Many currently pay about $100 per month for high speed Internet and home security from Comcast because they live in areas where demand is higher. These are their choices. There is no one-size-fits-all approach, and as Big Government tries to force one, those who advocated for this are going to figure that out.
Thankfully, it is far from over. The courts can rule against Net Neutrality. Some in Congress are already talking about a bill to set it aside. A future FCC commission could reverse it.
It is a dire situation to be at the mercy of big government where something this important is concerned. It is time, as The New American’s Joe Wolverton has observed, to force “the federal beast back inside its constitutional cage.”
At approximately noon on February 25, 2015, the Internet went down in a wide swath ranging from just north of Phoenix stretching to Flagstaff, Arizona. Internet service was restored the following day around 1pm local time.
The very first reports I received about the outage, coming out of Wickenburg and Prescott, was that the ISP from Century Link went down because a car crashed into a transformer. Shortly after that, reports stated that a construction crew hit a power line causing Internet service to go down. From the Phoenix media, we now know that this was the work of “vandals” who discovered where cables, buried several feet underground,were located in the midst of rough terrain. These “vandals” subsequently cut through the Internet cables which were inches to a foot thick and this was the cause this massive outage.
The event had a crippling effect on local communities from central to northern Arizona.
-911 service and the communications of first responders were taken down.
-Point of sale debit/credit card transactions could not be initiated due to the outage.
-ATM’s did not work.
-Banks were not able to access their computers and were forced to issue paper receipts for any deposit.
-All cell phone providers were inoperable except for Verizon Wireless.
-Most cable companies were not able to carry programming (e.g. Phoenix TV stations) due to the takedown of live streaming. The same was also true for many radio stations.
In short, businesses, schools and personal lives were totally disrupted. Yet, the national coverage afforded to this major event was negligible as I discovered after calling friends and colleagues from across the country to gauge their reaction. As of yesterday afternoon, most people had not heard about this event. I am not surprised as similar events transpired in both Florida and Oklahoma, AT THE SAME TIME! Steve Quayle shared the following email with me last night which described a similar event in Oklahoma:
I just read with interest the Q Alert about phone and internet being out at mid-day from north Phoenix to Flagstaff yesterday. We dropped internet here in NW Oklahoma (outside Woodward) about mid-day yesterday as well. It happened twice, about an hour later for about 20 minutes at a time. No explanation was given by the provider (Pioneer Cellular and Internet). We have cell service, for which the data was messed up, but the towers were still operative.
About that same time, NOAA Space Weather lost data for several hours … complete blanks in their monitoring systems.
Interesting this is all going on about the same time the FCC was preparing to take over the internet.
Whatever hit Arizona on February 25th, also hit two other states at about the same time. This was a well-coordinated attack.
The Key Word of the Day Is “Vandals”
The media has been very uniform in describing this act as the work of “vandals”.
-Independent Channel 3 referred to the outage as the work of “vandals”.
-Phoenix CBS Channel 5 also used the word “vandals”.
-Phoenix Fox News, Channel 10, described this as the work of “vandals
-Phoenix NBC, Channel 12, said this Internet take down was perpetrated by “vandals”.
-Phoenix ABC, Channel 15, also used the word “vandals”.
-AZ Central, the website for the Arizona Republic used the word “vandals” to describe the origin of the attack.
-Even the BBC and Russia Today used the word “vandals”.
For those of us that have covered events such as this, we can often smell a cover-up when we see the repetitive use of a key word or phrase. In this case, the key word is “vandals”. In this instance, the implied use of the word “vandal” is designed to indicate that whomever attacked these cables, presumably owned by Century Link, were amateurs who were engaged in some kind of prank. As I investigated further, it became clear that this was a well-coordinated and well planned attack by persons with expertise related to the attack. Further, whomever did this had to have had specialized equipment to cut through these cables. The simple act of just finding where these cables also required specialized knowledge.
This was a very sophisticated operation in which these remotely located cables, in rough terrain were located and cut with precision. The getaway was effected without so much as leaving a clue and we are supposed to believe this was the work of “vandals.
My Professional Contacts Weigh-In
This was also an “in-and-out-job” which left no clues and no traces. Amateurish “vandals” with nothing better to do did not take down the Internet in the manner described. That is also the opinion of several of my contacts who would be, or would have tasked with assisting in the investigation and the restoration of service.
Nearly two decades ago, I was a Maricopa County Volunteer First Responder. I did so until DHS took control of the operation in 2002. As such, I received specialized training related to various forms of terrorist attacks and the likely response protocols to each attack. Subsequently, I developed many friendships and contacts in this business. Yesterday, I contacted a dozen of these people and I heard back from four. Two are still active and two are retired but still retain volunteer status related to their expertise. All five of us are unanimous in that this was not the work of vandals, this was an attack requiring inside information, specific training and and specialized equipment. Two of my contacts believed that this was a beta test performed by Muslim terrorists (e.g. ISIS). Two others thought this was a dry run rehearsal for a preemptive strike upon the grid on the eve of war (i.e. Russians and/or Chinese). Additionally, at briefings held by the FBI in 2005, two of the men stated that they were told if it was necessary to invoke martial law, they would take down all communications so dissidents targeted for arrest could not warn each other. Additionally, the Phoenix media is reporting that the Phoenix PD was in charge of investigating the vandalism. However, one of the four people I spoke with stated that DHS and the FBI were on the scene and were controlling the investigation. The Phoenix PD was releasing prepared media releases and were repeatedly using the word vandals.
Who’s Is Responsible?
I reside only seven miles south of the impacted area. I have learned from some locals that accessing the sight of the crime is not possible. Security personnel, without any identifying insignias, were in place and were turning unauthorized people back. I have been told that this was not a typical crime scene and until late yesterday afternoon, this had become a highly secure area.
As I contemplated the opinions of my fellow and former first responders, I have tried to determine who is correct and who was likely responsible and what was the motivation for the attack.
Grid EX II allowed Russians and Chinese military to participate in this simulated take down of the grid.
Fifteen months ago, I reported that, against all common sense, the Russians were being allowed to participate in the highly secure and classified Grid Ex II drills in November of 2013. Since this was the period of time that President Obama was attempting to justify the invasion of Syria, and Putin was threatening nuclear retaliation for doing so, I was among those who questioned the logic of allowing the Russians to learn the intricacies of power grid organization.
Nearly one month ago, I reported the depth and degree that the Obama administration had been penetrated by individuals with clear and undeniable connections to the Muslim Brotherhood along with their influence in DHS and the Fusion Threat Centers.
Two weeks ago, I reported that DHS has assumed control of all intelligence gathering information and this meant that operationalizing a mobilization effort to secretly arrest dissidents, under NDAA provisions (i.e. the Red List spoken of many times by Doug Hagmann and Steve Quayle), was now very likely based upon a hostility rating known as the “Threat Matrix Score”. I further reported that there are two programs designed to round up people who are viewed as a danger to the status quo. The two operations are labeled “Operation BOA”, as in boa constrictor, and “Operation Lightening Strike”. I have some operational details, but at this point they are still sketchy. Suffice it to say that Operation Lightening is the 3AM round up of all perceived dissident journalists and even some local politicians. This will be accomplished on a single night of terror. Operation BOA is a more deliberate process and will focus on more non-media threats such as outspoken veterans, gun rights activists, etc.Martial law will not be called martial law, it will be labeled as “Continuity of Government”. The announcement of the procedures designed to enhance the “Continuity of Government” policies will be made by a four star General from NORTHCOM. ”
“Not a matter of if, but when”.
Let’s not forget that when was Janet Napolitano was leaving DHS she warned that attack upon the grid was not a matter of if, but when.
Napolitano did not issue this warning once, but twice before leaving DHS.
“A massive and “serious” cyber attack on the U.S. homeland is coming, and a natural disaster, the likes of which the nation has never seen is also likely and on its way.”
In seeming unrelated actions, yesterday, the Obama administration enacted two more unconstitutional Obama decrees: (1) Obama is using executive actions to impose gun control on the nation, targeting the top-selling rifle in the country, the AR-15 style semi-automatic, with a ban on 5.56mm ammo on a fast track, immediately driving up the price of the bullets; (2) The FCC took complete control over the Internet (private citizen communication) yesterday. The first action is clearly a move to remove citizens ability to defend themselves against the forces of tyranny at some future date. The second move is designed to cut off the head of the Patriot movement and severely impair communications. These are both martial law related actions.
Connecting the Dots
Both Steve Quayle and I agree that we witnessing the introduction of the “Red List” strategy. What happened in Arizona, Florida and Oklahoma was a martial law preparation beta test designed to simultaneously take down communications. Why would DHS want to take down communications? When the Red List roundups begin under Operation Lightening Strike, the powers that be do not want to allow their intended round up targets to be able to warn each other. Further, the crash of the ATM’s and point of sale transactions limits one’s ability to go on the run.
How do Russians factor into this? We know from surveys done by various organization (29 Palms military base) that American troops cannot be counted on to fire upon American citizens. Therefore, the Army manuals pertaining to FEMA camps call for the use of foreign assets. This would be the Russian troops that I have repeatedly reported are in the US training on American soil for martial law implementation. Why do you think they were allowed to participate in the Grid Ex II war games?
What happened over three state region was not the actions of “vandals”. This was a highly coordinate and sophisticated attack upon certain aspects of our grid designed to take down communications and commerce. I suspect that RussianSpetsnaz were the boots on the ground for this beta test in preparation for martial law. The only question which truly remains is how far away are we from complete implementation of this operation?
Irrational faith in corporate R&D is not science, it is a modern day cult.
When money and power are involved, those standing to gain the most will say and do anything to push their agenda forward. Five centuries ago, saying and doing anything involved exploiting people’s superstitions and their faith in religion. Today, saying and doing anything means also exploiting science.
Science, engineering, and design are amongst our most practical and effective tools to make real and meaningful change. But because they are so powerful and appealing, the potential for their abuse in the wrong hands is immense. Compounding this is the naivety of those who are fascinated by science’s promise but blind to its potential abuse.
It wasn’t long ago when big-tobacco had armies of “scientists” citing the latest “studies” confirming the health benefits and safety of smoking. Of course these were paid liars, not scientists, even if many of them had PhDs. And it was lies they were telling, even if mixed with shades of science. Today, special interests have refined this practice of filtering lies and exploitation through the lens of science regarding everything from genetically modified organisms (GMOs) to the false debate on climate change, to the questionable interests behind global vaccination programs.
We live in an age when all manner of scientific knowledge—from the safety of fluoride and vaccines to the reality of climate change—faces organized and often furious opposition. Empowered by their own sources of information and their own interpretations of research, doubters have declared war on the consensus of experts.
Indeed, just as religions claimed a monopoly on morality and spirituality, National Geographic condemns those “empowered by their own sources of information” and “their own interpretations of research,” maintaining that the only truth to be found is amongst the “consensus of experts.”
The Consensus of “Experts”
The article goes on to claim:
The idea that hundreds of scientists from all over the world would collaborate on such a vast hoax is laughable—scientists love to debunk one another. It’s very clear, however, that organizations funded in part by the fossil fuel industry have deliberately tried to undermine the public’s understanding of the scientific consensus by promoting a few skeptics.
National Geographic never explains why “organizations funded in part by the fossil fuel industry” are conspiring to lie, but the notion that “scientists” would conspire to lie is “laughable.” After all, scientists work under various organizations funded by special interests as well, including immense corporate-financier interests – many of which overlap with big-oil, ironically. If the billions to be made by big-oil is motivation enough to lie and say the Earth isn’t getting warmer, aren’t the billions to be made in a “carbon credit” pyramid scheme also motivation enough to lie that it is?
Images: The “science” of smoking. Images collected by the New York Times for their article, “When Doctors, and Even Santa, Endorsed Tobacco” depict “scientific studies” assuring consumers of the safety, even benefits of smoking cigarettes commonsense told everyone else were literally killing people. Those today who think they are ahead of everyone else by parroting “scientific studies” regarding big-ag’s GMOs, big-pharma’s vaccines, and big-oil and bankers’ climate change racket are ahead of nothing. They are being duped by an old trick practiced shamelessly for at least 100 years.
A truly scientific examination of the facts would reveal that the climate always changes – that humans are most likely impacting the climate since virtually everything else does – but that also both big-oil and big-business possess enough money to buyout both sides of the climate change debate, and profit from it without actually truly understanding the climate or what humanity can do to adjust to it no matter what it does or why.
The article then states:
…evolution actually happened. Biology is incomprehensible without it. There aren’t really two sides to all these issues. Climate change is happening. Vaccines really do save lives. Being right does matter—and the science tribe has a long track record of getting things right in the end. Modern society is built on things it got right.
Evolution does happen. Biology is incomprehensible without it. The climate does change. The science of vaccines is sound. The problem that most people have with each of these topics is not honestly addressed by National Geographic. The article puts up strawmen arguments to make anyone questioning the established narrative appear exceptionally irrational, even dangerous.
Few if anyone seriously questions the theory of evolution. The moon landings are also mentioned in the article, but also are included for the sole purpose of making people questioning the matters of GMO, climate change, and vaccines seem more unreasonable and fanatical.
Besides appealing to mainstream “experts,” the article doesn’t actually address the arguments for or against each of the three latter topics. The article is essentially a long winded hit piece on people questioning the establishment and what it claims science is telling us about each of these three points of contention. It is essentially a warning against “heresy.”
The few hints included in the article however, reflecting the talking points of big-government, big-business, and big-academia, are easily dismantled with the skeptics’ arguments conveniently excluded from the article.
GMO and Natural Selection
National Geographic claims:
We’re asked to accept, for example, that it’s safe to eat food containing genetically modified organisms (GMOs) because, the experts point out, there’s no evidence that it isn’t and no reason to believe that altering genes precisely in a lab is more dangerous than altering them wholesale through traditional breeding. But to some people the very idea of transferring genes between species conjures up mad scientists running amok—and so, two centuries after Mary Shelley wrote Frankenstein, they talk about Frankenfood.
It is true. Traditional breeding has altered the genetic constitution of plants and animals we consume daily. So drastically have we altered many of the grains we consume over the centuries, many people cannot even consume them because of gluten intolerance.
Nature too alters genes through mutations and natural selection. These genetic changes can lead some species to success, and in other cases, these genetic changes can lead an entire species toward extinction. In some drastic examples, these genetic changes can lead entire ecosystems into extinction – the greatest example being the Great Oxygenation Event (one of several mass extinction events in Earth’s natural history) in which cyanobacterial filled the Earth’s atmosphere with oxygen, killing off most of the planet’s anaerobic inhabitants.
If nature can lead itself off such catastrophic cliffs with natural genetic mutations, and traditional breeding has altered our food to the point it is not edible to some, what might humans altering DNA inside organisms lead to?
Biotechnology cannot be uninvented. While it shouldn’t be feared, it should be respected. It should be understood by the greatest number of people across the widest possible social strata. The democratization of this technology means the unlocking of its potential for the greatest possible good for the greatest possible number of people, controlled by the very people who will directly benefit from it.
Until then, skepticism regarding products peddled by immense corporate monopolies jealously hording this technology caught time and time again infiltrating government regulatory bodies and running stables of “scientists” and “researchers” churning out “peer reviewed studies” sponsored by the very producers of the subject at hand is not “irrational” nor constitutes a distaste for science, but rather is simple, cautious commonsense.
The Problem isn’t Vaccines, its the Criminals and Killers Peddling Them
Commonsense also tells us that rolling up our sleeve and allowing ourselves to be injected by a substance produced by literal criminals is a demonstration of unhinged, absolute insanity.
Indeed, the manufacturers of vaccines are criminals, literally. One example is GlaxoSmithKline (GSK), an immense pharmaceutical giant based in the UK. It has been caught on at least 3 separate continents engaged in a multi-billion dollar bribery racket. In China when the police began investigating the systemic corruption driving GSK’s sales in Asia, GSK attempted to bribe the police as well.
According to the official, the company’s China subsidiary set up several internal units with code names like “operation Great Wall” and “operation soaring dragon” specifically to bribe doctors and government officials.
He also said that in 2012, as the company came under scrutiny from the authorities, Mr Reilly and two Chinese subordinates established a “crisis management team” to bribe law enforcement officers from China’s industrial and commercial administration. The goal was to convince them to stop an investigation into the company’s illegal activity, the official said.
The pharmaceutical giant has been caught in Europe, the Middle East, and the US in similar bribery rackets of equal immensity.
GSK also manufactures vaccines for diseases including hepatitis, rotavirus and HPV infections, diphtheria, tetanus, whooping cough, measles, mumps, rubella, bacterial meningitis, and influenza. The question of whether or not properly manufactured vaccines can guard against the above mentioned diseases isn’t the question, the question is why would anyone trust their health and life to a corporation engaged in global-spanning criminality?
But GSK’s bribery scandals and the fact that virtually all other mega-pharmaceutical corporations are engaged in similar practices isn’t the worst of it.
During the height of South Africa’s apartheid system, government scientists were working on vaccines that would devastate the nation’s black communities. The Economist would report in an article titled, “Dr Death and Prime Evil,” that (emphasis added):
In contrast to the conviction of Mr de Kock stands the bizarre case of Wouter Basson (pictured), a medical doctor who ran the apartheid government’s chemical and biological warfare programme. Nicknamed “Dr Death” by newspapers, he was granted immunity for many crimes because they allegedly took place outside South Africa. As Dr Death he allegedly provided cyanide capsules to soldiers, and tried to develop bacteria that would selectively kill black people, as well as vaccines to make black women infertile.
One example of this interaction involved anti-fertility work. According to documents from RRL [Roodeplaat Research Laboratories], the facility had a number of registered projects aimed at developing an anti-fertility vaccine. This was a personal project of the first managing director of RRL, Dr Daniel Goosen. Goosen, who had done research into embryo transplants, told the TRC that he and Basson had discussed the possibility of developing an anti-fertility vaccine which could be selectively administered—without the knowledge of the recipient. The intention, he said, was to administer it to black South African women without their knowledge.
Image: Dr. Basson helped develop vaccines aimed at destroying South Africa’s black communities. They were to be given to victims without their knowledge.
One wonders what sort of lies the South African media would have invented, when black women began to realize the vaccines were in fact a weapon aimed at them and their communities and began warning others not to take them. Would terms like “anti-vaxxers” have been invented, and parades of “scientists” rolled out to assure South Africans that vaccines were perfectly safe and those refusing to take them were dangerously ignorant? Would South Africa’s version of National Geographic have claimed such people were simply being irrational in the face of the unquestionable reasoning of science?
Why is National Geographic now calling people “irrational” for being suspicious of vaccines when they are created by criminal corporations and when there are recent examples of governments using vaccines as weapons against their own people?
It might also trouble readers to know that South Africa’s repressive, racist, genocidal regime at the time received significant support from the United States and many European nations. This included both political support and significant military aid.
Considering all of this, it would seem rather unreasonable to trust “the experts.”
As with GMOs, studies underwriting the safety and necessity of these vaccines are also subject to immense lobbying efforts and outright corruption and criminality. Efforts to vaccinate the entire population of the planet (7 billion and counting) with a growing number of vaccines, including boosters for those who have already received them, is worth billions upon billions. Trusting “scientists” without considering the possibility this immense fortune might skew their objectivity is folly. It is just as dangerous to be ignorant of the human condition and its corruptibility as it is to be ignorant of scientific facts regarding diseases and the benefits of vaccines.
What is the truth behind the science of vaccines? They work. They may or may not be necessary in nations whose populations have access to proper nutrition along with modern sanitation and hygiene practices. If vaccines are to be distributed, they should be manufactured and administered by interests outside of government and corporate entities, both of whom have proven beyond doubt they cannot be trusted with such a responsibility.
Climate Change Will Happen, With or Without Us
Everything from the sun, to geological processes, to constantly evolving ecosystems have an impact on the climate. There is no “normal” climate we must attempt to maintain. Millions of years before human civilization, CO2 levels and temperatures were many times higher than what they are now. During the Cretaceous period there were no ice caps and the continent of Antarctica was covered with lush temperate forests inhabited by dinosaurs.
Image: The future after anthropogenic climate change causes sea levels to rise? No, this is the Earth tens of millions of years ago when CO2 levels were 15 times higher than they are today and Antarctica was covered in temperate forests filled with dinosaurs. Climate change is going to happen with or without humanity, and instead of working on policy, we should be working on technology that will help us minimize our impact on the Earth (and our own health) and ‘weather’ the weather, no matter what it does or why.
Humanity itself has seen wild fluctuations in the climate, enduring an ice age and an exceptionally warm period during Medieval times.
The fact that the climate of the planet naturally changes, however, does not absolve humans from minimizing their impact on the planet. Beyond ending the reckless genetic contamination of the planet’s genetic heritage through the use of GMOs, the petrochemical industry and the heavily centralized consumerist paradigm that currently exists must also be dismantled, decentralized, and converted to more sustainable and healthier alternatives, not only for the planet, but for society and human beings individually.
Image: Deutsche Bank’s “CO2 Clock” meant to leverage people’s fear of anthropogenic climate change directly into billions via a “carbon credit” pyramid scheme. While big-oil makes billions off of petrochemicals destroying the environment and then denying their role in doing so, their literal bankrollers are making billions exploiting public outrage over their practices. Meanwhile, the climate may or may not be changing, with or without humans driving it, and no one is genuinely examining it because they are all entangled in this immense racket.
That should be a conclusion both sides of the current climate change debate could agree on – one doesn’t need to be a scientist to understand the impact on human health car exhaust has on the human body or the immense waste involved in manufacturing plastic trinkets in China, putting them on a ship to steam across oceans to be put onto trucks to be put into a Walmart and sit under lights burning 24 hours a day to be bought by a consumer who drove to the store and now must drive back home.
But dismantling immense oil and retail monopolies and replacing them with self-sufficient, high-tech local communities seems to be furthest from the minds of those championing urgent activism in response to climate change. Instead, they propose even more power be put into the hands of governments, banks, and corporations to create “policy.” The “policy” to no one’s surprise, leaves more power centralized in the hands of the very special interests that are truly and quantifiably destroying the environment.
Why aren’t people seeking technological rather than political solutions to address climate change? What if we mitigate humanity’s impact on the climate, and it still changes, just as it has for hundreds of millions of years before humans walked the Earth? Will “carbon credits” feed us if the world becomes incredibly cold, destroying global agriculture? Will it hold back flood waters if oceans rise despite our greatest efforts? Some how, “science” has convinced people to worry immensely about a problem but do nothing at all practical about it.
What is it about rational “science” that has people acting so irrationally?
Science as the New Religion
Hiding behind science is nothing new. Darwinists hid behind it to prop up their racism, which in fact inspired the Nazis to hide behind it to scientifically prove they were the “master race.” The Nazis, in fact, loved science, and used it with horrible precision. As mentioned before, big-tobacco used “science” to prove their products were perfectly “safe.” What precisely has convinced people today that such charades are not still playing out, more refined now than ever?
As National Geographic stated, people love their tribes. Those who have circled their wagons around “science” as their chosen dogma, are no different than the religious they believe themselves to be superior to. They have not truly and objectively looked into any of the issues they blindly support – and as National Geographic did, simply claim “it’s science!” or that “experts said!”
The arguments made for GMO, vaccines, and climate change are made by the same circle of special interests and propagated by their immense media monopolies. Little they say can be independently verified by the army of sycophants that eagerly repeat their claims. Citing a “peer reviewed study” is different than reproducing an experiment’s results oneself.
Also troubling is that following the money to see just how valid or compromised such studies might be seems not to even factor into this tribe’s calculus. Their belief that scientists are infallible and incorruptible is as naive as those who believe their respective priest classes are likewise somehow above all others morally, spiritually, and intellectually.
National Geographic’s article will undoubtedly help reinforce this new, backwards religion of “science,” while leaving real science battered, abused, and a stolen shield carried by liars as they carry out misdeeds against others. And while this new religion will swear their “science” is the only answer – all others might hear is yet another and particularly shrill voice amongst many others drowning out the voice of real reason.
When I wrote the following words almost three years ago, I was met with extreme derision and accusations of being a crazed lunatic with paranoid laced conspiracy theories. “Soon special interests, university think tanks, combined with key federal agencies, are conspiring to implement (not plan) complete control over the Internet”. Today, most people in the know are not laughing at this statement. In fact, after my recent interview with Doug Hagmann, in which Doug described how far the plans to eradicate free speech on the Internet have gone, many are very alarmed. Here is the point, yesterday’s crazy conspiracy theory is today’s bona fide threat to personal freedom and well-being.
This is the first part of a multi-part series in which clear and convincing evidence will be offered which demonstrates that extreme mind control is being presently being used on targeted Americans for harassment and experimental purposes. However, as this series will demonstrate, this technology, which is not new, is in the process of being fully integrated in the police state surveillance grid and will soon target every individual on the planet.
The first part of this series will demonstrate that the technology is real, scientifically valid and certain entities have been working with this technology for over 50 years.
The Purpose of Mind Control
Initially, I believe that the two goals of mind control were (1) profit; and, (2) control of the flow of information similar to what we see in the corporate controlled media. However, I quickly realized that I had set my sights too low in assessing target goals for these nefarious groups who are in control of this rapidly expanding technology.
It is becoming increasingly clear that ultimate goal is the complete control of every individual through mind control. The power brokers of this planet are seeking to install a police state grid which is absolute in its ability to control all thought, all emotion and consequently, all behavior. The end result will be to remove all potential opposition (i.e. free will). The purveyors of this technology are the enemy of all humanity and it is clear that they view humanity as their adversary which needs to be controlled, used and then tossed aside like some piece of garbage.
The Introduction of Societal Mind Control Techniques Utilizes Law of Incrementalism
If the government was to announce, tomorrow, that we had a month to comply with mandatory chipping, we would witness widespread civil disobedience. The paradigm shift would be too great for the government and its managing special interests to manage. However, if humanity can be nudged, bumped, then pushed, then shoved in that direction, the goal is much more doable. I would suggest what is happening in England is a nudge and a bump in the direction of ordinary people accepting the their own future consisting of micro chipping for the purposes of mind control.
All dogs in England will, as of April 2016, have to be micro-chipped as part of a British government attempt to cut the number of strays and make pet owners more responsible for their animals. The British government also states that it will cut down on the number of dog attacks against children. It seems that all controversial government programs are implemented under the umbrella of “protecting the children”. Whenever we hear the phrase ,”protecting the children,” we should become very suspicious.
According to British government reports, eight children have been killed in dog attacks in the UK since 2005, many of which happened in the home. Subsequently, Fido must be chipped to make the children safer. I am not sure how chipping dogs will make a dog bite less as this massive chipping program is based upon a laughable premise. Are the Brits to expect that escaping detection and prosecution will lead the dogs to be less aggressive? This is ludicrous. How then will chipping dogs make children or anyone else more safe? The short answer is that it will not. This is part of a conditioning process in which the Brits and soon, the Americans, will come to accept the chip for themselves. Inch by inch, a paradigm shift is a cinch.
I predict that a related headline, in a few short years will read something like this: All humans in the United States will, as of April 2020, have to be micro-chipped as part of a federal government attempt to cut down on the number crimes, especially crimes against children, committed by a growing homeless population.
Your Body and Life Does Not Belong to You
Before a population will accept chipping and other forms of potential mind control, the people must be conditioned that their body belongs to the state.
Everyday, the federal government is going to extraordinary means to condition you to the fact that you do not own and control your body. You are the property of the powers that be. Nowhere, is this more apparent than what we see at the airport as the pot bellied perverts who fill the ranks of sexual molesters at the TSA, are busy sticking their hands down our pants, groping our daughters and wives breasts and even sticking unwashed hands in our body cavities. The TSA has not stopped one terrorist event, but that is not the goal. You are the property of the elite and the government is reminding you of this every time you travel. The implementation of the TSA as an agency which routinely commits second degree sexual assault again the flying public coincides with the implementation of various electronic surveillance advances which have the potential to “mind control” and individual. And before you respond with “The TSA protects us from terrorist attacks”, let me remind you, again, that the TSA has prevented zero terror attacks since its inception.
DNA Provides An Avenue of Attack for Targeted Individuals
In the next part of this series, it will be revealed who having someone’s DNA sample for example can be used as a means for electronic harassment and mind control manipulation. In light of this, we all need to be asking why are our infants are having DNA extracted from them at birth?
The independent media has been reporting that our government will very soon be forcing all citizens to use a biometric ID to travel, to work and hold a job. The biometric information required for this form of ID is enough information to allow for the targeting of individuals using electromagnetic frequencies. The trend curve is clear, we are being conditioned to accept micro chipping. Micro chipping will prove to be the electronic collar needed to control and individual.
Where is the proof?
The Dawn of Micro-Chipped Mind Control
The most important bullfight in history.
In the 1960’s, Spanish neurologist, Jose Delgado was involved in a noteworthy bullfight. Without any real bullfighting training, he bravely stepped into the ring with a very dangerous and deadly bull. However, Delgado had a secret weapon. He had previously implanted a radio-equipped electrode which was implanted into the bull’s limbic system (i.e. emotional center of the brain) which he called “stimoceivers.” Delgado subsequently demonstrated that he could manipulate an organism’s mind and body via remote control technology. Thus, as the bull charged, an invasive electrical signal penetrated the bull’s limbic system and the bull calmly broke off the attack in mid-charge.
Delgado found that by stimulating different regions of the limbic system, which controls emotion, Delgado could also induce fear, rage and a variety of other emotions, that he was able to manipulate the type and intensity of emotional reactions. Thus, Delgado discovered the fine art of mind control.
Intrigued by his work, Delgado was invited to teach and be a guest lecturer at such prominent universities such as Harvard and Yale. However, in 1968, Delgado went to work at the Stanford Research Institute (SRI) and this is where much of his research trail grows cold. We now know that SRI was a CIA front and was connected to the MK Ultra experiments. In 1974, Delgado abruptly returned to Spain and later became an outspoken opponent of mind control and its potential for harm and misuse by totalitarian societies. Perhaps, he was not on board with the CIA and what they eventually had planned for the American people.
In cats, monkeys, bulls and even humans he repeatedly demonstrated that he could control emotion and ultimately behavior. . In one experiment, Delgado stimulated the temporal lobe of a 21-year-old epileptic woman while she was calmly playing a guitar; in response, she flew into a rage and smashed her guitar against a wall, narrowly missing a researcher’s head. Perhaps the most medically promising finding was that stimulation of a limbic region called the septum could trigger euphoria, strong enough in some cases to counteract depression and even physical pain.
Later Delgado was able to impact the hypothalamus of a cat and induce uncontrollable rage in the animal. Keep in mind that this technology is over 60 years old. One can only imagine how far this technology has come during that time.
Delgado’s famous bull fight and the angry cat are depicted in the following video.
The lesson is clear, embedded chips can turn normal people into crazed killers and it can take crazed killers and turn them into passive beings. Interestingly, the most famous graduate of the MK Ultra program was the Unabomber, Ted Kaczynski.
The Mind Control Delivery System: Project HAARP
Many are predicting that biometrics will be required to access the Internet. The fact is that some what your biometric information because this is the first step in gaining control over your mind. The main threat to humanity lies in the fact that the technology exists to control all of human behavior at one time. A reasonable person would certainly ask “how is that possible?” To answer that question, I refer the readers to Nick Begich’s website in which he details how mass electrical signals can beamed up from an array of antenna and bounced off the ionosphere in either a narrow beam covering a specific and defined geographic area, or it can be reflected back to earth in a broad beam application in which millions could be impacted by one electrical signal designed to change human behavior. We know this technology as Project HAARP.
United States Patent 5,159,703, Lowery, October 27, 1992, Silent Subliminal Presentation System, Inventors: Lowery, Oliver M. Appl. No. 458339 Filed December 28, 1989, discusses the microwave technology necessary for mind control. In this patent, we witness the move from the mind control of certain individuals who might have been programmed, which is frightening enough, to witnessing entire populations being controlled. The patent discusses the possibility of impacting millions at a time. The net effect of the technology is enhanced when there is a transducer in the body such as an embedded microchip.
Particularly revealing in the arena of mind control, is Dr. Begich’s work on voice to skull technology. In 1997, he displayed this technology for the European Parliament who promptly issued a ban on the use of the technology. Unfortunately, the technology has moved forward in recent years despite the ban.
Before you write to me and state that this could never happen, please spend 30 minutes on the Begich website, and analyze the validity of his observations. Begich has done a detailed analysis of the patents associated with HAARP, and very clear conclusions about the intent of these technologies can easily be made after examining the facts. Most awake people are aware that HAARP is a weather modification device. However, as a result of my research, I have come to the conclusion that HAARP’s biggest danger to humanity is the mind-control potential related to this technology. Sadly, Dr. Nick Begich has been warning us about this potential for 18 years and it is only now that significant numbers of researchers are starting to pay attention.
A Very Ominous Warning From the Inventor of Electromagnetic Mind Control
Jose Delgado, the reluctant pioneer of mind control technologies.
In his later years, and after working for the CIA for over 40 years in perfecting this technology, Dr. Delgado was very critical about the distinct lack of Bioethics and consumer protection with regard to these technologies. Until his death a few years ago, Delgado remained particularly critical of technologies which can change human nature. Delgado, stated the following:
“This technology has two sides, for good and for bad, and we should do what we can do to avoid the adverse consequences. We should try to prevent potentially destructive technologies from being abused by authoritarian governments to gain more power or by terrorists to wreak destruction. However, Delgado is a realist as he postulates “can you avoid knowledge? You cannot! Can you avoid technology? You cannot! Things are going to go ahead in spite of ethics, in spite of your personal ethics.”
The above quote from Delgado is a very ominous warning about how serious the subject of mind control is about to to become for every person. After researching Delgado’s past, it is clear that he felt the same about mind control as Einstein felt about the unveiling of nuclear weapons.
This article demonstrated that the right to control your individual body is under attack on a number of fronts. This article demonstrated that electromagnetic manipulation of the mind is over 50 years old. Further, it was established in this article that technologies such Project HAARP are very real threats to all people and some of the supporting governmental patents were presented as well.
The most surprising aspect of my research into this technology is not how far the technology has advanced, it centers around how easy it was to obtain information on the degree of sophistication of this technology.
As stunning as this technology appears to be, as printed in this article, what is written here is child’s play compared to what has been developed and is in the process of being integrated into the police state surveillance grid. This will be the topic of the next part in this series.
Between 2015 and 2017, the Pentagon will have the ability to decipher human voices in surveillance audio even if background noise makes the covertly recorded conversations inaudible.
This may bring to mind the surveillance audio secretly recorded through our smartphones when they are in our pockets. On or off, we know now that our conversations are being recorded by a wide array of electronic devices, and our conversations we used to consider private are actually being stored in data collection facilities like the one in Utah aptly titled the ‘Utah Data Center’.
With this multimillion dollar technology, our seemingly private conversations can be stored and analyzed by government officials even if the background noise is too much for a normal audio recording.
Newly released documents from DARPA show that they are in the third phase of their ‘RATS’ program (Robust Automatic Transcription of Speech). This information indicates that they are going to great lengths to make sure that secretly recorded conversations can be analyzed by the government.
According to the documents,“the research division of a government agency will be testing the speech activity detection algorithm to incorporate into their platform.”
The ‘platform’ is an insidious word for massive, incomprehensible surveillance grid with an unspecified endgame. This ‘platform’ opens doors up to the powers that be, infinite doors to be utilized with what we have every reason to believe is nothing but malicious intent.
According to a USA Today article“DARPA has spent $13 million on RATS. It now wants to spend another $2.4 million, contract records show, to make the final push to make the system operational by the Air Force as early as this year but by 2017. Other agencies, particularly those in the intelligence community, will also use the system once it’s operational.”
The program also seeks to recognize different languages, and filter surveillance audio by recognizing keywords. This may also imply that people in other countries will be targeted.
An important question to ask would be, how will they actually put this to use?
Will the government try to start prosecuting people in legal cases with the data collected with the surveillance grid being covertly imposed around us? Perhaps it should be phrased, when will they start using this surveillance data to incarcerate people?
We are surely all aware of the fact that smartphones, certain TV’s, and a wide variety of other devices are actually functioning microphones in a surveillance grid being set up that is apparently a high enough priority to the powers that be to be worth millions of dollars in funding.
So we all know this is happening, but why? Where is this going, how far will they go in analyzing this data and how will they utilize is to prosecute and target people who oppose the interests of the US government and their allies?
The actual plethora of potential malicious uses of this data is essential to speculate on. As activists and people concerned about the state of our society and the unchecked power of the US government and other organizations, we must think long and hard about these things. I highly recommend you do research on DARPA, and try your best to fully comprehend how this technology could be utilized against political opponents, dissidents, activists and innocent Americans.
Please share this with everyone. This info is relevant to every single person around you.
Well a couple of weeks later, and we learn that Mattel’s latest high-tech Barbie doll will bring the “internet of things” right into your child’s playpen. From the The Register:
Toymaker Mattel has unveiled a high-tech Barbie that will listen to your child, record its words, send them over the internet for processing, and talk back to your kid. It will email you, as a parent, highlights of your youngster’s conversations with the toy.
If Samsung’s spying smart TVs creeped you out, this doll may be setting off alarm bells too – so we drilled into what’s going on.
The Hello Barbie doll is developed by San Francisco startup ToyTalk, which says it has more than $31m in funding from Greylock Partners, Charles River Ventures, Khosla Ventures, True Ventures and First Round Capital, and others.
Its Wi-Fi-connected Barbie toy has a microphone, a speaker, a small embedded computer with a battery that lasts about an hour, and Wi-Fi hardware. When you press a button on her belt buckle, Barbie wakes up, asks a question, and turns on its microphone while the switch is held down.
The doll is loaded up with scripts to read, and one of these is selected depending on what the kid said. If the tyke shows an interest in a particular past-time or thing, the doll’s backend software will know to talk about that – giving the kid the impression that chatty Barbie’s a good, listening friend.
When users interact with ToyTalk, we may capture photographs or audio or video recordings (the “Recordings”) of such interactions, depending upon the particular application being used.
We may use, transcribe and store such Recordings to provide and maintain the Service, to develop, test or improve speech recognition technology and artificial intelligence algorithms, and for other research and development or internal purposes.
We may make such Recordings available to the parent account holder and permit the parent account holder to share such Recordings with third parties.
By using Hello Barbie, parents agree to these terms. It’s not clear how long the recordings stay on ToyTalk’s systems.
Recent days have been marked by a record number of news about the US and its allies trying to establish a total control over Internet users.
On February 16 researchers at Moscow-based security group Kaspersky Lab announced the discovery of an ultimate virus that has virtually affected all spheres of military and civilian computing in more than 40 countries around the world. They’ve managed to discover a piece of malware that must have been installed on vhard disks while they were still being manufactured, and due to its complexity and a certain number of features that it shares with Stuxnet, it’s safe to assume that it was created by US secret services.
On February 18 The Guardian confirmed that for the last 7 years Government Communications Headquarters had been sharing personal intelligence data en masse with America’s national security agencies, regardless of the fact that it had intercepted millions of foreign citizens conversations. The ruling of a UK court clearly suggests that these actions were illegal on top of being carried out in violation of the the European convention on human rights.
On 19 February it was announced that National Security Agency (NSA) along with its British partner in crime – the Government Communications Headquarters (GCHQ) has manged to steal encryption keys from Gemalto – the world’s largest manufacturer of SIM-cards. This allowed the above named intelligence agencies to tap any phone and intercept data from any mobile device that was using a SIM-card produced by Gemalto. This conspiracy was unveiled by The Intercept, that added that Gemalto was created nine years ago when a French company Axalto merged with Gemplus International that was operating in Luxembourg. Today Gemalto has more that 85 offices across the globe along with a total of 40 factories, that are working in close cooperation with the leading telecommunication corporations, including AT&T, Verizon and T-Mobile, along with many others. Representatives of the three above listed companies refused to comment on this scandal.
By the way, one can easily trace the German Deutsche Telekom among the customers of Gemalto group of companies. Hence it is highly unlikely that anyone would have any doubt on the involvement of US intelligence in the tapping of Angela Merkel’s mobile phone, that was uncovered back in the mid 2014. What is particularly peculiar in this situation is the decision of The Federal Attorney General of Germany to stop investigating the Chancellor tapping case as it was reported by Focus Online on the pretext of “zero possible outcome of the investigation.” Well, the claims of the same Focus Online that “Merkel now has a new cell phone that cannot be tapped.” looks ridiculous enough, since this brand “new phone” uses the same-old Gemalto SIM-card. So the NSA can spy on Madam Chancellor as long as they see fit, while the general attorney sees nothing wrong about it. Well, perhaps, Germany has finally agreed to stand in line with the citizens of other countries and their political and business elites, eager to play the role of laboratory rats in the US intelligence surveillance game.
One would be surprised to learn that Gemalto is producing up to 2 billion SIM-cards per year, along with chips for bank cards and identity cards. According to many information security experts, US intelligence agencies, due to the encryption keys they’ve stolen are able to retrieve any information from mobile devices, bank cards, e-passports.
The Wall Street Journal reported the “successes” of US intelligence agencies in retrieving information from millions of US citizens’ cell phones back in 2014. Most of the US citizens are under constant control of the security forces, due to the surveillance systems that were mounted on light aircraft and drones, that was developed by Boeing, which allows to collect private data from dozens of thousands of mobile phones. In addition to the ability to establish whereabouts of a person, that can be tracked with the accuracy to within three meters, his phone can be remotely block, while all of information stored on it can be easily stolen.
On February 20, the spokesperson for the United States Department of State Jen Psaki in her typical manner complained about how difficult it is for the US to confronts thousands of hostile attacks in cyberspace. However, she has never mentioned the above listed facts and Washington’s paranoiac desire to dominate cyberspace.
The tyrants in Nazi Germany, Stalinist Russia and Stasi Eastern Europe would have liked to easedrop on every communication and every transaction of every citizen. But in the world before the internet, smart phones, electronic medical records and digital credit card transactions, much of what happened behind closed doors remained private.
Postscript: Nothing has changed … and it will keep on getting worse and worse unless we the people stand up for our rights against those who want to takeourfreedom away.
Update: Bill Binney is the high-level NSA executive who created the agency’s mass surveillance program for digital information. A 32-year NSA veteran widely regarded as a “legend” within the agency, Binney was the senior technical director within the agency and managed thousands of NSA employees.
Binney tells Washington’s Blog:
While the spying programs that we have heard about so far deal with the “who and what” and on occasion the “why” of what people on the planet are doing, Treasuremap is the NSA/GCHQ/etc. program to acquire and follow the movements of people (objective is to follow 4 billion folks) simultaneously in near real time. So, Treasuremap gives them the “when and where” aspects of individual lives.
All in all, this gives the participating governments (primarily the Five Eyes countries) unrestricted knowledge of individual lives.
Current surveillance is far beyond an Orwellian state.
Although on a much smaller scale, we need to remember that these type of activities were some of the primary “articles of impeachment” of president Nixon.
Breakthroughs in gene therapy mean a single shot could cure you … permanently … but for a price.
Gene therapy involves identifying and replacing faulty or missing genes, or engineering augmentations for existing genes to permanently cure a wide number of conditions and illnesses ranging from cancer and diabetes, to regenerative processes like rebuilding hearts or storing sight and hearing.
A breakthrough clinical trial in 2012 saw several patients stricken with incurable leukemia put into permanent remission using gene therapy. The actual process of creating re-engineered cells taken from a patient and reintroducing them costs approximately $15,000, and such procedures are still in the experimental phase. While this cost does not include the required intensive care required to bring a patient from the brink of death back into full health, it is likely the costs in the near future will be drastically lower than current and far less effective cancer treatments are today.
The transformative power of this new technology spells the end of big pharmaceutical monopolies who wallow in billions in profits year to year, enabling them to continue dominating modern medical practice through the skewing of regulatory bodies, the stacking of academic studies, and even the expansive, global bribery of doctors and other medical practitioners to push big pharma’s products.
As gene therapy enters into mainstream medicine, big pharma has attempted to control it. In order to continue reaping the unwarranted profits, influence, and power big pharma has accumulated over the decades, they plan to compensate for the drastic drop in prices and the fact that many conditions will now be permanently curable, cutting patients off from a lifetime of dependency on big pharma’s cocktails.
Essentially, they have announced that patients will be placed essentially into lifetime debt in exchange for single treatments that will cure them – cures that will be priced at around $1 million.
Drugmakers contend that a one-time cure, even at a price of more than $1 million, would save money over the long term. But there are concerns that health insurers will balk at covering that kind of upfront cost.
The therapies do not cost $1 million, keeping big pharma a monopoly does. Reuters also includes in their article insurers demanding exorbitantly priced medications be discounted, and under pressure, big pharma was able to cut prices by as much as 50% and still stay in business.
The Solution – Decentralize Healthcare
Gene therapies are a focus of a much larger, emerging field of applied science called “synthetic biology.” Synthetic biology is the use of synthesized DNA rather than the mere cutting and pasting of it to engineer biological solutions much more precisely. There is also a dimension of greater standardization, which is being done by organizations and institutions driven by an ethos of open source information, software, and hardware.
While many institutions and corporations are involved in synthetic biology, it is not as inaccessible as biotech has thus far been. In fact, universities, high schools, and independent local “do-it-yourself” labs are engaged in practicing and contributing to the field of synthetic biology.
For those that believe big pharma is a problem, the solution is not merely vocally opposing their business models and practices, but also directly challenging them and undermining them by contributing to and building up an open synthetic biology movement.
For readers, their first step should be looking up more information online – Wikipedia is a good starting point. For those lucky enough to live near a DIYbio lab, they should stop by and see about participating in their next workshop. Universities are also involved in public outreach and may have workshops or classes available.
For those who feel they are unable to directly contribute, simply helping to raise awareness is the next best thing. The more people that understand this new emerging technology, the more voices there will be calling for it to be driven in the right direction for the right reasons.
Gene therapy and other breakthroughs driven by a greater understanding of our genome belong to everyone. That big pharma stands now before humanity, dangling life and death over our heads for an arbitrary $1 million like a cartoon-style villain, shows that we have terribly misplaced our trust and this responsibility in their hands. It is time to take it back, and do with it what should have been done long ago – use it to save lives and improve humanity, not merely feed off of it.
Over the past several years a conspiracy of silence has surrounded the implementation of the Smart Grid across the United States, perhaps with good reason. If the public were aware of what lay behind this agenda there would likely be considerable outcry and resistance.
“Smart meters”–the principal nodes of the Smart Grid network–are being installed on homes and businesses by power utilities across the United States under the legal and fiscal direction of the United States government. In December 2007 both houses of the US Congress passed and President George W. Bush signed into law the Energy Independence and Security Act (EISA).
This 310-page piece of legislation employs the dubious science of anthropogenic CO2-based climate change science to mandate an array of policies, such as fuel efficiency standards for vehicles and “green” energy initiatives. Tucked away in the final pages of this law is the description and de facto mandate for national implementation of the Smart Grid that the Bush administration promised would result in “some of the largest CO2 emission cuts in our nation’s history.”
The bill unambiguously lays out the design and intent behind the Smart Grid, including surveillance, tiered energy pricing, and energy rationing for all US households and businesses through round-the-clock monitoring of RFID-chipped “Energy Star” appliances. Congress and “other stakeholders” (presumably for-profit utilities and an array of Smart Grid technology patent holders whose lobbyists co-wrote the legislation) describe the Smart Grid’s characteristics and goals via ten provisions.
(1) Increased use of digital information and controls technology to improve reliability, security, and efficiency of the electric grid.
(2) Dynamic optimization of grid operations and resources with full cyber-security.
(3) Deployment and integration of distributed resources and generation, including renewable resources.
(4) Development and incorporation of demand response, demand-side resources, and energy efficiency resources.
(5) Deployment of “smart” technologies (real-time, automated, interactive technologies that optimize the physical operation of appliances and consumer devices) for metering, communications concerning grid operations and status, and distribution automation.
(6) Integration of “smart” appliances and consumer devices.
(7) Deployment and integration of advanced electricity storage and peak-shaving technologies, including plug-in electric and hybrid electric vehicles, and thermal-storage air conditioning.
(8) Provision to consumers of timely information and control operations.
(9) Development of standards for communication and interoperability of appliances and equipment connected to the electric grid, including the infrastructure serving the grid.
(10) Identification and lowering of unreasonable or unnecessary barriers to adoption of smart grid technologies, practices, and services [emphases added].
Less than two years after EISA’s enactment President Barack Obama directed $3.4 billion of the American Reinvestment and Recovery Act to Smart Grid development. Matching funds from the energy industry brought the total initial Smart Grid investment to $8 billion. The overall completion of the Smart Grid will cost another $330 billion. Today a majority of energy delivery throughout the US is routed to homes equipped with smart meters that monitor power consumption on a minute-to-minute basis.
As noted, the American public remains largely unaware of the numerous designs and monied interests behind the Smart Grid–not to mention how smart meters themselves pose substantial dangers to human health and privacy. This is because the plan for tiered energy pricing via wireless monitoring of household appliances has been almost entirely excluded from news media coverage since the EISA became law on December 19, 2007.
A LexisNexis search of US print news outlets for “Energy Independence and Security Act” and “Smart Grid” between the dates December 1, 2007 to January 31, 2008 yields virtually no results.
An identical LexisNexis search of such media for the dates December 1, 2007 to February 18, 2015 retrieves a total 11 print news items appearing in US dailies (seven in McClatchey Tribune papers; one article appearing in each of the following: New York Times 8/14/08,Santa Fe New Mexican, 5/12/09, Providence Journal, 2/24/11, Tampa Bay Times, 12/13/12).
Even this scant reportage scarcely begins to examine the implications of the EISA’s Smart Grid plan. The New York Times chose to confine its coverage to a 364-word article, “The 8th Annual Year in Ideas; Smart Grids.” “It’s a response to what economists would call a tragedy of the commons,” the Times explains.
[P]eople use as much energy as they are willing to pay for, without giving any thought to how their use affects the overall amount of energy available … Enter Xcel’s $100 million initiative, called SmartGridCity, a set of technologies that give both energy providers and their customers more control over power consumption … Consumers, through a Web-enabled control panel in their homes, are able to regulate their energy consumption more closely — for example, setting their A.C. system to automatically reduce power use during peak hours.
News in far more modest papers likewise resembles the promotional materials distributed by the utilities themselves. “There will soon be a time when homeowners can save electricity by having appliances automatically adjust power for peak-demand times and other periods of inactivity by a signal sent through the electrical outlet,” an article in Sunbury Pennsylvania’s Daily Item reads. “‘Right now, it’s at the infant stage,’” a power company executive observes. “‘We didn’t worry about this until two years ago. Nobody cared when electricity was five cents per kilowatt hour. People just bit the bullet and paid the bill.’”
Smart Grid Czar Patricia Hoffman
Along these lines, the Department of Energy’s Assistant Secretary for the Office of Electricity Delivery and Energy Reliability Patricia Hoffman, is charged under the EISA with federal oversight of nationwide Smart Grid implementation. In other words, Hoffman is America’s “Smart Grid Czar.” Yet despite heading up such a dubious program since 2010, she has almost entirely escaped journalistic scrutiny, having been referenced or quoted in only four US daily papers (Washington Post, 2/8/12, St. Paul Pioneer Press, 4/26/12, Palm Beach Post, 5/12/13, Pittsburgh Tribune Review 11/13/13) since her tenure began.
In an era where news media wax rhapsodic over new technologies and fall over each other to report consumer-oriented “news you can use,” the Smart Grid’s pending debut should be a major story. It’s not. Indeed, almost the entire US population remains in the dark about this major technological development that will profoundly impact their lives.
When one more closely examines the implications and realities of the federally-approved Smart Grid scheme—from the adverse health effects of electromagnetic radiation to surveillance and energy rationing—there should be little wonder why this degree of silence surrounds its implementation. Such a technocratic system would never be freely accepted if subject to an open exchange and referendum.
 “ENERGY STAR is a U.S. Environmental Protection Agency (EPA) voluntary program that helps businesses and individuals save money and protect our climate through superior energy efficiency. The ENERGY STAR program was established by EPA in 1992, under the authority of the Clean Air Act Section 103(g).” http://www.energystar.gov/about
 The word “deployment,” commonly used in government and technical plans for the Smart Grid’s launch, is a military term. From the Latin displicāre, “to scatter,” the modern definition is “[t]o distribute (persons or forces) systematically or strategically.”