FCC hides net neutrality complaints after calling for public comment

Source: RT
August 23, 2017

The Federal Communications Commission has received more than 47,000 complaints concerning the planned elimination of net neutrality rules. Despite a Freedom of Information Act request, they have refused to release the requests. Net neutrality campaign director Katy Anderson of Open Media joins RT America’s Anya Parampil to discuss the harm that the FCC’s proposals could cause.

Net Neutrality Shocker! – Verizon Admits To Throttling Video In Violation Of Net Neutrality Rules

Verizon admits to throttling video in violation of net neutrality rules
Source: RT
July 22, 2017

Verizon wireless customers have noticed their video streaming being throttled when testing their speeds on Netflix and YouTube. The telecom giant later confirmed that video streaming speeds were being temporarily capped.

In a statement provided to Ars Technica, Verizon claimed users were experiencing lower speeds due to a temporary test they were conducting on a new video optimization system.

“We’ve been doing network testing over the past few days to optimize the performance of video applications on our network,” a Verizon spokesperson told Ars. “The testing should be completed shortly.”

Customers who tested their data speeds on fast.com, which runs from Netflix’s servers, found Verizon’s LTE network was capped at around 10 Mbps.

Multiple users on Reddit also reported that their data appeared to be capped on Netflix. Users at Howard Forums said the cap was being applied to YouTube as well as Netflix.

A representative from the company said that caps were applied across the board to all video applications on the Verizon Wireless network.

“We are constantly testing the network,” a representative told the Verge. “It’s what we do, to optimize performance for our customers. The test was across the board, and did not target any individual applications.”

However, when users compared fast.com with other speed tests, they found drastic differences in speed while using the same Verizon network.

Users who tested their speed using a virtual private network (VPN), which hides which sites they were visiting, also noticed that they had much higher speeds.

The Verizon representative also said, “The consumer video experience should have been unaffected by the test, since 1080p video is HD quality and looks great at 10 [Mpbs].”

While it is true that many users would not be able to notice a difference, those who tether their phones to other devices could experience lower quality video. Netflix also said that Ultra HD quality video may require 25 Mbps, but only for non-mobile devices.

In the past, Netflix has throttled their own video stream in order to help users stay under their data caps. However, they recently changed their policy to allow users to choose different quality settings on mobile devices. Now, Netflix allows users to adjust data usage settings, which includes an “unlimited” option that “may use 1 GB per 20 minutes or more depending on your device and network speeds.”

When Verizon first announced its unlimited streaming plan in February, they told Ars Technica that they “deliver whatever the content provider gives us,” adding that they “don’t manipulate the data.”

According to Verizon’s website, those with an unlimited plan should not be throttled until they reach 22BG of data in a month, and even then, they should only experience throttling if their network is congested.

Internet service providers (ISP) like Verizon are subject to Title II regulations under the Federal Communications Commission (FCC), which requires them to treat all traffic equally. The current head of the FCC has called for net neutrality rules to be rolled back, which would allow Verizon to prioritize or manipulate traffic to any site or application.

Read More At: RT.com

Domestic Abuse: A Smart Device Called the Police


Source: TheDailyBell.com
July 14, 2017

This article is not about fear. This article is about common sense.

Last week, we discussed the internet of things, and how smart devices could be used to literally know more about us than we know about ourselves.

This is not some distant future dystopia we are talking about. It is already happening.

A smart device in a home called the police during a domestic violence incident.

It appears to have been a reaction by the device to the abuser yelling at his girlfriend, “Did you call the sheriffs?” The device heard “Call the sheriffs,” and did so.

A SWAT team arrived at the home and after negotiating for hours, they were able to take Barros into custody. Police tell ABC News that the man’s girlfriend was injured but did not need to visit a hospital. The couple’s daughter was safe and unharmed.

“The unexpected use of this new technology to contact emergency services has possibly helped save a life,” Bernalillo County Sheriff Manuel Gonzales III said in a statement.

It’s hard to look at this as big brother ruining lives; after all, the guy was abusing his girlfriend in front of their daughter. Constant spying has entered the mainstream media as a good thing. Look at all the benefits of having nowhere to hide; the scum of the earth who abuse their girlfriends will be caught and locked up.

But there are a lot of crimes out there, and not all of them harm others. In fact, chances are we all break multiple laws on a daily basis. So if the government knows about every law you break, they could certainly choose to overlook them. If they also know however that you legally reduced your taxes to almost nothing, or that you have a legal foreign bank account, well then maybe they have some incentive to snag you.

Al Capone was never arrested for murder, racketeering, or selling alcohol. He was arrested for tax evasion. If they want you, they can find a way to get you. They have been doing it since Capone’s time.

What if it had been another illicit activity that was recorded by the smart device? What if it had been a victimless crime? Would the police have come if they heard people talking about growing 25 marijuana plants in the basement?

The media will point to the “success stories” of locking up the bad guys with this technology. They will not highlight the people who are nabbed for code violations, renting out a room illegally, or hate speech.

In some ways, this problem has an easy solution; simply do not use devices that will spy on you.

But in another sense, that is not so simple. Even most cell phones these days are constantly recording your conversations. Is the only solution becoming hermits?

Are we willing and able as consumers to demand that type of privacy? Comment with your thoughts on how you have dealt with this problem in your own life.

Read More At: TheDailyBell.com

And Another Thing: Chase Was Hit Before July 4th Too…


Source: GizaDeathStar.com
Dr. Joseph P. Farrell Ph.D.
July 14, 2017

Yesterday, I blogged about the silver “flash crash” of July 7, and earlier this week, about the NASDAQ flash crash, but, just in case you might have thought these were nothing but accidental “glitches” from the “coincidence” side of the glitch family, rather from the esteemed branch of the family of deliberately planned glitches, it looks as if things might be leaning definitely to the “deliberate action” side of the equation, according to this article shared, once again, by Mr. G.B.:

Nationwide outage hits Chase bank customers before 4th of July

Chase’s system went down coast to coast, but what’s very intriguing here is the suggestion that Chase might have been dealing with its own glitches, which it was calling “improvements”:

A message on the Chase website explained to customers that the outages were due to the bank “making a few improvements”according to the Cleveland Plain Dealer.

The bank said customers would not be able to access their information or schedule bill payments or transfers.

However, customers reported that entire branches had been shut down Monday, while others complained they were unable to pay their rent and bills, withdraw money from ATM’s, or even access their information over the phone or in person.

Now, as you might have guessed, I have all sorts of wild and crazy high octane speculations running through my head reading this, not the least of which is the thought that “two is coincidence, three is a conspiracy.” On my view that these types of events are the results of some systematic probing of financial cyber-architecture vulnerabilities, then targeting the NASDAQ, a commodities market, and Chase Manhattan, a large international bank, makes a lot of sense.

But that’s not the only thing running through my head, so let’s speculate on the very end of the twig, where the weight of speculation far exceeds the amount of evidence to prop it up.

Let’s posit a hypothetical bank, say, Deutsche-Manhattan-Cheese Banco dei Flaschi di Cesspool, and let’s say that, just before the beginning of August, when the entire country of France goes on vacation holiday, Deutsche-Manhattan-Cheese Banco dei Flaschi di Cesspool announces in the Toulouse Daily Whistle, that it is going to shut down its systems to make improvements just before the next holiday, stranding thousands of Frenchmen at their ATMs and keeping Paris unusually populated for the month of August. That’s quite an improvement, for during this period of being “down,” one might – just as a kind of hypothetical high octane speculation – be able to access the funds that its depositors could not access, and via a variety of cutouts, fronts, and so on, be able to place gobs of trades, make huge amounts of money, keep it all off the books (remember, the system is down – just before the holidays – to make “improvements”), trigger various flash crashes in various markets, and perhaps even target specific equities to be re-evaluated because of the reset when the circuit breakers kick in and halt all the trading.

But of course, nothing like that could ever happen, because we all know that big international mega-banks like Deutsche-Manhattan-Cheese Banco dei Flaschi di Cesspool are cleaner than a Wall Street toilet.

And thank goodness too, because I was beginning to lose my faith in crony finance crapitalism.

See you on the slip side…

Read More At: GizaDeathStar.com
________________________________________________

About Dr. Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

China Breaks Entanglement Record & Some High Octane Suspicions

Banksters
Source: GizaDeathStar.com
Dr. Joseph P. Farrell Ph.D.
June 26, 2017

If you’ve been following the development of crypto-currencies, cyber-security, quantum entanglement, or financial clearing, you’ll want to take notice of these articles shared by Mr. T.M. and Mr. J.K., for China has crossed another threshold on the path toward satellite-based quantum entanglement communications systems, and therefore, toward a much more secure means of financial clearing:

Breakthrough: Entangled photons transmitted more than 1,200 km

China Shatters “Spooky Action at a Distance” Record, Preps for Quantum Internet

Note that this was achieved in satellite-to-ground communications, an important “proof-of-concept” demonstration. The goal of course is to use entanglement as a basis of secure – almost uncrackable or unhackable communications. While it’s still a long way from “sub-space communications” on the old Star Trek series, the use of lasers in the communication has now set a record of the receipt of entangled photons to 1200 km, or approximately 745 miles. The next steps in the technology tree will be to demonstrate (1) satellite to satellite transmission at large distance, then (2) satellite to satellite to satellite and/or ground, and then to begin to increase the amount of data to the point that it would resemble the data carrying capacity that financial clearing networks need: stability of transmission, minimal loss, and ultimately, secure and “unhackable” transmission is the goal, for these are essential to a stable financial clearing system in the 21st century.

That is China’s real goal: to emplace such a system, and thereby, to outflank the US-SWIFT system of financial clearing.

This in turn will require the ability to defend those satellites from ground based and orbital platforms (and a similar capability is required for the US, and anyone else with large space-based asset commitments: France, Japan, Germany, the UK, India, Russia, and so on). In other words, space weaponization is coming, and it will be multi-polar in nature, unless unforeseen events or developments nudge things in the opposite direction.

But as I read this article, a new though occurred to me, and I want to share it today by way of some high octane speculations, or rather, high octane questions or suspicions. I’ve been covering stories such as this on this website for some time now, and over time, I’ve begun to notice a pattern emerging. Perhaps I am mistaken, and noticing a “pattern” that really isn’t there, simply on account of my “selection bias” or the “selection bias” of the many people of this community who are kind enough to notice stories and articles and pass them along to me. The pattern is this: that in all such stories of quantum satellites and entanglement experiments, or “entanglement distance” records, the story seems to be about China. And this raises the question: are the other space powers completely overwhelmed? Are they not performing such experiments? And if not, why not? And if they are, where are the stories about them? In short, I cannot imagine that the USA, the UK, France or so on, are about to concede to China the sole monopoly on space-based quantum entanglement communications systems, yet, we see virtually no stories about such systems in development by those countries.

More importantly, I have a “suspicion” – a suspicion only, since I’ve not seen anything to suggest real evidence – that this is all very deliberate. We are told, of course, that entanglement and quantum computing systems would be virtually unhackable. But I have to wonder if, in the laboratories of agencies like DARPA (the Diabolically Apocalyptic Research Projects Agency, as we refer to it here, following a suggestion of Mr. J.B.), they are already into second generation experiments on this phenomenon and technology, and if, perhaps they have found, or at least, theorized about, ways around it.

See you on the flip side…

Read More At: GizaDeathStar.com
________________________________________________

About Dr. Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

The Gutenberg Revolutions

Source: CorbettReportExtras
June 20, 2017

The Gutenberg press was the catalyst for the Renaissance and the Reformation, but it shaped what we communicated as much as how we communicated. What, then, to make of the electronic global village of our modern Gutenberg revolution? Are we on the cusp of a new Renaissance, or will this technology only further degrade a culture already in decline? The promise of the Internet: Library of Alexandria or Library of Babel?

Amazon Echo devices can be exploited by hackers to steal your bank account information

Image: Amazon Echo devices can be exploited by hackers to steal your bank account information

Source: NaturalNews.com
Jayson Veley
June 16, 2017

While it may be convenient to walk into your home and turn the lights on by simply saying “Alexa” or “Ok Google,” a security expert has warned that devices like the Amazon Echo could pose a serious security risk. “If hackers find a way to compromise these devices in our homes, they could have it recording all of the time and you wouldn’t necessarily know,” explained cyber security expert Dr. Jason Nurse. “They could hear you discussing your holiday plans, so they know when you are away and could burgle you. They may hear you buying something on the phone, giving away your credit card details.”

Nurse’s comments came during a recent speech at the Cheltenham Science Festival. The cyber security expert explained that he is so concerned about the potential privacy risks that come with the use of devices like the Amazon Echo that he refuses to keep electronic assistants of any kind in his home.

But despite the fact that your banking information is put in jeopardy every time you turn on your Amazon Echo, the gadget is more popular than ever. With the ability to answer virtually any question you have, pick up commands even in a noisy room, track online shopping and even lower the thermostat, it’s easy to see why devices like the Amazon Echo are being used by millions of people across the country. But still, some are concerned that such gadgets are inviting electronic spies right into their living rooms.

“If there’s something private you want to say, the first thing you should do is mute the device… or turn it off,” Dr. Nurse advises. “You should think twice about what you say in front of these devices.” Dr. Nurse went on to explain that “someone else in your home may say the wake word without your knowledge and start it recording while you are discussing something private or sensitive.”

In the case of the Amazon Echo, the “wake word” is “Alexa,” and in the case of Google Home, the “wake word” is “Ok Google.”

Although an Amazon spokesperson claimed that they take customer privacy very seriously, this isn’t the first time that the electronic commerce company has been surrounded by controversy. Back in April, Natural News reported on the potential privacy risks concerning the Echo Look, a $199 device recently released by Amazon that has the ability to watch you get dressed in your own bedroom. Even though the original purpose of the Echo Look was to give you recommendations on what to wear, many people are concerned that it could secretly record you during some of your most intimate moments.

With technology advancing at an astonishing rate and new devices coming out every year that once were only imaginable in science fiction films, our everyday lives are becoming more and more simplistic. We used to have no choice but to drive our own cars from point A to point B; now we have the option of purchasing a car that is able to drive itself. We used to have to walk into a dark house and feel around blindly for the light switch; now all we have to do is say “Alexa, turn on the lights.” Without question, life is much more convenient than it was even just five years ago.

But just because it is more convenient doesn’t mean it’s safer. As a matter of fact, one could argue that with the invention of devices like the Amazon Echo, people are more at risk of experiencing some type of privacy violation, whether it’s a video recording taken of you while you get dressed or a hacker stealing your banking information. That is why it is up to companies like Amazon and Google to continue looking for ways to protect the privacy rights of their customers, while simultaneously putting new products on the market.

Read More At: NaturalNews.com

Sources:

Dailymail.co.uk

NaturalNews.com

CNN #FakeNews Amanpour Challenged to Interview Aleppo Boy’s Father – #NewWorldNextWeek

Source: CorbettReport | MediaMonarchy
June 16, 2017

Welcome to New World Next Week — the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. In this week’s episode:

Story #1: Amanpour Challenged To Interview “Aleppo Boy” She Exploited For War Propaganda http://bit.ly/2t4pqQN

MintPress Meets The Father Of Iconic Aleppo Boy, Who Says Media Lied About His Son http://bit.ly/2skcKaz

Wikipedia: Christiane Amanpour http://bit.ly/2ryniio

Complete 9/11 Timeline: Christiane Amanpour http://bit.ly/2ru8eqL

Wikipedia: James P. Rubin http://bit.ly/2toWqCJ

Hillary Clinton Email Archive: Secretary Clinton’s Interview With Christiane Amanpour http://bit.ly/2suRY94

Story #2: Young People Hit Tokyo’s Streets To Protest “Anti-Conspiracy Bill” http://bit.ly/2sdl9us

Update: Japan Enacts Broad Anti-Conspiracy Law http://s.nikkei.com/2ryJrwJ

Expert Disputes Japan Government Claim That Conspiracy Bill Needed To Ratify U.N. Treaty Related To 2020 Olympics http://bit.ly/2rtXPeA

Conspiracy Theory Becomes Frightening Reality For Japan http://bit.ly/2ru2cGH

Story #3: “We’re Not Monsters” – Ontario Township Defends Shuttering Girl’s Lemonade Stand 🍋💰 http://bit.ly/2ryk6Ds

6 Illicit Lemonade Stands Towns Had to Shut Down http://bit.ly/2rj6U60

NWNW Update: Chimpanzees Aren’t People, Don’t Have Right For Habeas Corpus http://bit.ly/2s3MYqH

NWNW Update: Germany’s Merkel Says Digital World Needs Global Rules http://bit.ly/2ryeg4W

How Precious Metals Can Help Protect Your Wealth From Hackers


Source: ActivistPost.com
June 14, 2017
Stefan Gleason

Could your wealth be hacked? It’s a threat most investors overlook. But they do so at their own peril.

If elections can be hacked, then so can bank and brokerage accounts, as well as any online platforms for digital currencies.

More than five months into Donald Trump’s presidency, the “Russia hacked the election” conspiracy theories still won’t go away. They’re expanding to also implicate Russian hackers for meddling in elections in France and elsewhere. The latest Russian hacking story centers on Qatar.

According to the Guardian, “An investigation by the FBI has concluded that Russian hackers were responsible for sending out fake messages from the Qatari government, sparking the Gulf’s biggest diplomatic crisis in decades.”

The Russian government has repeatedly denied involvement in these hacking campaigns. Regardless of whether the news about Russian hackers is fake, the threat of cyber attacks is very real.

In recent months, major e-mail providers and e-commerce sites have been hit by hackers. They often take customers’ information and try to sell it on the dark web.

Think Bitcoins are “hack proof” due to cryptography? Think again. Tens of millions of dollars worth of the crypto-currency have been digitally stolen by hackers. The biggest heists hit Bitcoin exchanges Mt. Gox and Bitfinex. More recently, South Korean Bitcoin exchange Yapizon was hacked out of more than $5 million.

Electronic Banking Is Vulnerable to Hackers

Electronic banking and brokerage institutions are also vulnerable. A rogue government, a group of terrorists, or even a lone mischievous teenager could potentially crash markets by unleashing a debilitating computer virus or breaking into networks that undergird the financial system.

The worst-case scenario for the digital economy would be an electro-magnetic pulse (EMP) attack. An EMP could be triggered by an extreme solar flare or a nuclear detonation. In the event of an electro-magnetic pulse, large-scale economic disruptions could unfold as the power grid goes down and computer systems get fried.

If the Internet goes dark, then so does Bitcoin and other digital platforms. No online banking. Your ATM card may no longer work. A national “bank holiday” may have to be declared as a physical cash shortage sends the economy reverting to barter transactions.

Granted, this is an extreme scenario. But you don’t have to take extreme measures in order to protect yourself from it.

Reducing Your Vulnerability to Cyber Attacks: Simple Steps You Can Take

One of the most important steps to take to boost your resilience to digital threats is to hold tangible assets that aren’t dependent on, or connected to, the internet. Physical precious metals are a time-tested form of unhackable money.

Virtual ownership of metals in the form of futures, options, or exchange-traded products will leave you vulnerable to any of the major threats to the financial grid.

The upshot to owning low-premium bullion products you can hold in your hand is that it costs you nothing extra to obtain the protection and utility that physical metals provide.

We’re not suggesting that you pull everything out of your bank accounts and close all your credit cards – for now, they remain a convenience most of us won’t want to do without in our daily lives. (And we’re not saying to steer completely clear of cryptocurrencies either.)

But you can and should take steps to make your accounts at least somewhat more secure:

  • Close any dormant accounts that you no longer use.
  • Keep paper records, including statements, from accounts you access online.
  • Strengthen your passwords by lengthening them or using a password manager.
  • Avoid storing sensitive information directly on cell phones or other commonly stolen/ hacked devices.
  • Check your credit report regularly for signs of identity theft.
  • Install anti-virus software on your devices and keep it up to date.

For the portion of your wealth you want to secure in physical, off-the-grid metal, make sure you keep it far removed from the banking system. That means not storing your precious metals in a bank safe-deposit box that could be raided or rendered inaccessible during a financial crisis.

Keep at least some portion of your gold and silver stash stored in a home safe for immediate accessibility at all times. And keep quiet about it! Your neighbors don’t need to know all about your pure silver bars or your shiny gold Krugerrands.

For the portion of your precious metals holdings you don’t want to keep at home, opt for a secure bullion storage facility such as Money Metals Depository.

MMD only uses physically segregated storage which ensures your metals aren’t pooled or co-mingled with those of other customers.

Even as new and potentially bigger cyber threats emerge, you can rest comfortably knowing much of your wealth is beyond the reach of hackers. That peace of mind is difficult to put a price on. Fortunately, it’s not difficult to obtain. Rotating wealth out of financial assets and into hard assets is as easy as writing a check to a reputable bullion dealer such as Money Metals Exchange.

Read More At: ActivistPost.com

Stefan Gleason is President of Money Metals Exchange, the national precious metals company named 2015 “Dealer of the Year” in the United States by an independent global ratings group. A graduate of the University of Florida, Gleason is a seasoned business leader, investor, political strategist, and grassroots activist. Gleason has frequently appeared on national television networks such as CNN, FoxNews, and CNBC, and his writings have appeared in hundreds of publications such as the Wall Street Journal, TheStreet.com, Seeking Alpha, Detroit News, Washington Times, and National Review.

The S.M.A.R.T Psy-op Consumers Don’t Recognize

BigBrother
Source: ActivistPost.com
Catherine Frompovich & Contributing researcher Kerri Ellen Wilder
June 9, 2017

“Smart” is really S.M.A.R.T., an engineering acronym for Specific – Measurable – Achievable – Relevant – Time-based. The reality that ultimately will evolve from this psy-op is a dystopian future destructive of dignity and freedom. Your liberty, your privacy, and the American way of life are on sale right now for electric dollars. The Internet of Things (IoT) and 5G are being represented and presented as the harbingers of a global utopia. They are, in fact, nothing short of a Faustian bargain of illusory promises many will live to regret when all their individual freedoms are forfeited for technology.

The “smart” meme and techno world stretches back to the 1930s when M. King Hubbert authored his  “Technocracy Study Course,” which developed  technocracy’s principles for the distribution of energy resources, as well as the monitoring and measurement of all of energy’s outputs.

Five of Hubbert’s seven requirements necessary for Technocracy’s implementation are listed below; think of them in terms of AMI smart meter technology being forced on the global population.

  1. Register on a continuous 24 hour-per-hour-day basis the total net conversion of energy.
  2. By means of the registration of energy converted and consumed, make possible a balanced load.
  3. Provide a continuous inventory of all production and consumption.
  4. Provide a specific registration of the type, kind, etc., of all goods and services, where produced and where used.
  5. Provide specific registration of the consumption of each individual, plus a record and description of the individual.

Number 5 is implemented by and with the algorithm Onzo® [1].  Conversely and legally, smart meter data mining probably does not pass constitutional muster!

According to Chris Turner, Esq., Allison Grande published the article “Meter Data Needs Privacy Protection, 7th Circ. Told,” at Law360 March 2, 2017. Attorney Turner provides some quotes from that article:

A pair of privacy groups are urging the Seventh Circuit to find that the Fourth Amendment protects data generated by smart meters, arguing that the granular details produced by these increasingly prominent readers are “far more intimate” than cumulative information collected periodically from more traditional analog meters.

“Whereas analog meters provide a single monthly measurement of cumulative household energy use, smart meters — by measuring energy use at much shorter intervals; here, every 15 minutes — provide information regarding not only how much energy was used, but also the time at which it was used,” the groups wrote. “Smart meters thus not only generate far more data every month than analog meters — here 2,880 meter readings in a 30-day month compared to just one — but the data includes an entirely new variable, i.e., time.”

The time component is essential, the groups argued, because it allows a detailed picture to be painted of what’s going on inside a home, including how and when residents are using electricity and when they are home, sleeping, taking a shower or how they are cooking dinner.

“As a result of this time granularity, smart meter data — even in ‘aggregate’ form — constitutes intimate information regarding a person or family’s private, in-home activities,” the groups said.

Americans reasonably expect details of their private, in-home activities to remain private, and U.S. Supreme Court case law — including the 2001 ruling in Kyllo v. U.S., which held that raw thermal imaging data revealing “the relative heat of various rooms  in the home” constituted “intimate details” regarding the interior of the home protected under the Fourth Amendment — supports the conclusion that smart meter data is entitled to heightened privacy protections, the groups argued…

Of course, the technology to do these things did not exist in the 1930s; today it does, and the keystone device to accomplish the above five requirements is called a smart meter. Americans of the 1930s actually debated—and rejected—these ideas as antithetical to Constitutional Republicanism.

But while America politically rejected Technocracy, Technocracy’s tenets found fertile fields in which to germinate—in National Socialist Germany. I won’t dwell on the crimes of Nazi Germany, many of which could never have been carried out, certainly to the degree they were, without Hitler’s army of technocrats.

What the PA PUC, the seven PA EDCs retrofitting smart meters and harassing those who refuse, and what the federal Department of Energy hope to institute is a modern-day Technocracy. In order to build a national Smart Grid, and ultimately a worldwide Smart Grid, the technocrats are determined to place a smart meter in every residence and business globally. No electric consumer is to be left behind. Or it might be better phrased, “No one can be permitted to escape Technocracy’s control.”

The Nazis of the 1930s well understood what American technocrats were trying to do. While they didn’t buy into the exact system American technocrats were developing, they did comprehend the obsession with absolute control of electric power. The Nazis called the American Technocrats’ system of energy credits, “electric dollars.

The above SMART technology memes eerily bring to mind something discussed about two thousand years ago; some say it is apocryphal, others claim it’s prophecy.  However you want to define it, it certainly has signature fingerprints of the next technocracy meme to be forced upon us: Microchip implants [2-3].

Revelation 13. 16-18

And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name…and his number is Six hundred three score and six.

How about making purchases with a wave of your hand! [4-5]

Currently in the mad world of corporate-influence and oft-run mandates ruling our lives [vaccines and smart meters], I can only imagine the problems that will occur with a totally-implemented technocracy.  I’m constantly running into folks complaining about computers and how they’ve made life more frustrating and difficult, not easier and certainly unsafe regarding information.  Really!

The United States has morphed from thirteen British colonies into a democratic republic, to a currently fascist-run Corporatocracy heading toward its final, in my opinion, new world order meme: technocracy.

Doesn’t all this really sound like a psy-op?

Read More At: ActivistPost.com
__________________________________________________________________________

References:

[1] http://www.activistpost.com/2017/03/onzo-possibly-utility-customers-worst-friend.html
[2] http://www.cbsnews.com/news/microchips-privacy-implants-biohacking/
[3] http://nypost.com/2017/04/03/bosses-are-already-tracking-employees-with-microchip-implants/
[4] http://www.smh.com.au/digital-life/digital-life-news/chip-implants-beneath-the-skin-bring-a-new-meaning-to-pay-wave-20150528-ghbq71.htm
[5] http://www.businessinsider.com/microchip-implants-in-healthy-people-2014-7

Catherine J Frompovich (website) is a retired natural nutritionist who earned advanced degrees in Nutrition and Holistic Health Sciences, Certification in Orthomolecular Theory and Practice plus Paralegal Studies. Her work has been published in national and airline magazines since the early 1980s. Catherine authored numerous books on health issues along with co-authoring papers and monographs with physicians, nurses, and holistic healthcare professionals. She has been a consumer healthcare researcher 35 years and counting.

Catherine’s latest book, published October 4, 2013, is Vaccination Voodoo, What YOU Don’t Know About Vaccines, available on Amazon.com.

Her 2012 book A Cancer Answer, Holistic BREAST Cancer Management, A Guide to Effective & Non-Toxic Treatments, is available on Amazon.com and as a Kindle eBook.

Two of Catherine’s more recent books on Amazon.com are Our Chemical Lives And The Hijacking Of Our DNA, A Probe Into What’s Probably Making Us Sick (2009) and Lord, How Can I Make It Through Grieving My Loss, An Inspirational Guide Through the Grieving Process (2008)

Catherine’s NEW book: Eat To Beat Disease, Foods Medicinal Qualities ©2016 Catherine J Frompovich is now available