Everything you search for on Google is now easily obtained by police

Image: Everything you search for on Google is now easily obtained by police
Source: NaturalNews.com
JD Heyes
March 22, 2017

If you thought that your search engine history was private, think again. It’s not. Or, at least, it may not be, depending on whether or not you’re under police investigation.

According to The Free Thought Project, a court in Minnesota has recently ruled that an entire city’s search history should be made available to police, an Orwellian first as far as anyone can tell. It may well mark the beginning of the end of Internet freedom.

Cops in Edina, Minn., were granted a warrant that requires search giant Google to provide search history information and the names of everyone in the city who utilized specific search terms between Dec. 1, 2016, and Jan. 7, 2017. (RELATED: BOMBSHELL Investigation: Google An “Information Dominance” Front For The CIA)

Now mind you, this case isn’t about a nuclear bomb plot, a planned act of terrorism, a major jewel heist or child porn. Rather, ARS Technica notes, the case is about alleged wire fraud worth less than $30,000. But if Google honors the warrant, like it probably will have to do since the warrant is a legal document issued by a valid court, that would be a horrible precedent moving forward because it could be duplicated by departments all over the country.

ARS Technica reports that police investigators are looking for an online picture of a person with the same name as a local victim of financial fraud because said image was found on a phony passport that was utilized to fool a credit union into transferring some $28,500 out of a man’s account who takes up residence in Edina. Someone faxed the fake passport to the credit union as ‘proof’ of identity under a spoofed phone number to mimic the victim’s phone, the search warrant notes.

The Free Thought Project reported further:

The ominously worded warrant makes some chilling demands — all over a small fraud case.

A Google search, the warrant application says, as reported by Ars Technica, reveals the photo used on the bogus passport. The image was not rendered on Yahoo or Bing, according to the documents. The warrant commands Google to divulge “any/all user or subscriber information”—including e-mail addresses, payment information, MAC addresses, social security numbers, dates of birth, and IP addresses—of anybody who conducted a search for the victim’s name.

What makes this warrant so worrisome, especially if Google complies with it, is that it seems to go far beyond the legal standard of probable cause. While it appears likely that something illegal may have happened, it’s obvious that most, if not all, of the people in Edina are not guilty of doing anything wrong. Granted, cops have to investigate but how can a court reasonably assume that everyone in an entire city is under suspicion, thereby satisfying the legal standard of probable cause?

That seems a stretch, to say the least.

What also seems very likely, then, is that police will obtain evidence that may implicate other criminal activity, and while you may applaud that, understand that such overly broad searches were never envisioned by our founding fathers, hence the adoption of the Fourth Amendment, which is supposed to protect against “unreasonable searches.” (RELATED: BREAKING: Police Are Now Routinely Taking Items Out Of Unlocked Cars To ‘Protect’ Citizens From Theft)

The Fourth Amendment originally enforced the notion that ‘each man’s home is his castle,’ secure from unreasonable searches and seizures of property by the government,” Cornell University Law School notes in describing the purpose of the amendment. “It protects against arbitrary arrests, and is the basis of the law regarding search warrants, stop-and-frisk, safety inspections, wiretaps, and other forms of surveillance, as well as being central to many other criminal law topics and to privacy law.”

So it seems apparent a city-wide “search” of Google records is far and away outside the scope of what is allowable under the Constitution. It’s hard to tell what is worse – that a police department would make such a request or that a court would grant it.

J.D. Heyes is a senior writer for NaturalNews.com and NewsTarget.com, as well as editor of The National Sentinel.

Read More At: NaturalNews.com

Sources:

TheFreeThoughtProject.com

ARSTechnica.com

GoodGopher.com

New Bill Allows Genetic Testing of Employees – #NewWorldNextWeek

Source: TheCorbettReport | MediaMonarchy
James Corbett | James Evan Pilatto
March 16, 2017

Welcome to New World Next Week – the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. This week:

Story #1: To Cut Climate Money, Fake Right Has To Find Where Fake Left Stashed It
http://bit.ly/2n2mJ1q
Judith Curry Explains Climate Modeling to the Layman
http://bit.ly/2n2h4Zr
EPA Deputy Accused Of Working With Monsanto To Kill Cancer Study
http://bit.ly/2nqDh4d
Monsatan On Trial For Roundup Cancer
http://bit.ly/2mvyLNc

Story #2: New Bill Would Let Companies Force Workers To Get Genetic Tests, Share Results
http://bit.ly/2mM7bgf

Story #3: Need a Pothole Fixed? Maybe a Portland Anarchist Can Help!
http://bit.ly/2mRRbuQ

CIA planned on hacking cars to murder people with “undetectable assassinations”

CIA Spying
Source: NaturalNews.com
Jayson Veley
March 10, 2017

The measure of any successful society is the level of trust that is maintained between those in positions of power and the people. When the government and its various agencies are disciplined and transparent, then the country thrives. On the contrary, when that power is abused and the laws are ignored, the people’s trust, and the country as a whole, collapses.

In America, the people are justifiably growing more and more weary of the government. Secret meetings and backroom deals have practically become commonplace, and corruption has reached unprecedented levels. Take the IRS scandal for example, where the Internal Revenue Service was caught explicitly targeting conservative organizations and denying them tax-exempt status. This was not only a blatant example of corruption and federal overreach, but also a devastating blow to the trust level between the people and the government.

Similarly, in 2013, Edward Snowden famously revealed the unconstitutional spying and surveillance that was taking place within the National Security Agency. At first, the NSA attempted to cover their tracks by telling the public that the data collection only involved phone numbers and email addresses, not the actual content of those emails or phone conversations. It was soon revealed, however, that this was not true.

And so it goes.

In their latest information dump, WikiLeaks has revealed that the CIA was allegedly planning to carry out assassinations by hacking into cars and trucks. (RELATED: Read what a CIA whistleblower said about climate engineering and vaccine damage). The hacking is made possible by utilizing the phone’s geolocation software to gain control over the vehicle’s control system. WikiLeaks claims that the Central Intelligence Agency has been participating in a global hacking initiative involving the United States and European nations.

WikiLeaks alleges that the CIA was “looking at infecting the vehicle control systems used by modern cars and trucks” so that they could carry out secretive and “nearly undetectable assassinations.” They claim that “infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.” These phones include both iPhones and Android devices.

After the CIA obtains this information, Wikileaks claims, it could then “bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the ‘smart’ phones that they run on and collecting audio and message traffic before encryption is applied.”

In addition to the hacking of vehicles, WikiLeaks also claims that the Central Intelligence Agency is capable of gaining control over Microsoft Windows users and Smart TVs.

WikiLeaks has dubbed the information stolen from the CIA as “Vault 7,” the contents of which will gradually be revealed to the public over the next few weeks. As you may recall, a similar method was used when WikiLeaks released the information regarding the DNC and John Podesta, Hillary Clinton’s campaign manager. Shockingly, the thousands of pages of information that have already been released account for only 1 percent of the total information inside Vault 7.

In response to all of the information that has already been released and will continue to be released over the coming weeks, the CIA has reportedly stated that it has “no comment” on the matter. Further, the spy agency explained, “The CIA’s mission is to aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries. It is CIA’s job to be innovative, cutting-edge, and the first line of defense in protecting this country from enemies abroad. America deserves nothing less.”

There is no telling what will further be revealed about the CIA, but based on what we have already learned from the hacking organization WikiLeaks, much of it will most certainly be damning.

Read More At: NatuarlNews.com

Sources

Mirror.co.uk

Breitbart.com

DailyCaller.com

Spy Ops: Yes, your smart TV really is spying on you: Leaked docs reveal CIA secretly turned Samsung TVs into microphones that spy on your conversations

Image: Yes, your smart TV really is spying on you: Leaked docs reveal CIA secretly turned Samsung TVs into microphones that spy on your conversations
Source: NaturalNews.com
J.D. Heyes
March 9, 2017

For years Deep State insiders and others familiar with the federal government’s spy agencies have been sounding the alarm about the development of technology that enables constant, real-time electronic surveillance of anyone, anywhere, anytime (President Donald Trump, something to consider as you delve into who ordered it against you and why.)

Now, thanks to another whistleblower following in the footsteps for former NSA contractor Edward Snowden, WikiLeaks has provided the proof that these insiders weren’t kooks or conspiracy theorists – they were spot-on. (RELATED: Is Your TV Spying On You? For Millions Of Viewers, The Answer Is YES!)

According to a treasure trove of newly released documents known collectively as “Vault 7” in the “Year Zero” series, not only does the CIA conduct improper electronic surveillance, it does through using technology that can tap into smart TVs, iPhones, Android devices, and other wireless handheld technology.

“The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but ‘Weeping Angel,’ developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization,” said a press release from WikiLeaks.

“The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server,” it added.

So in other words, even if you’ve turned your TV and devices “off,” the CIA’s technology, via wireless connections, can still transform them into listening devices, which records conversations and data and sends them to a remote CIA server for later downloading and analysis.

The government’s spy agencies, then, can literally steal any and all data they want, thereby giving them the power to create false narratives, phony email traffic, fake communiques and anything else they want in an effort to blackmail or destroy anyone they choose.

A journalist getting too close to Deep State activities? No problem – the CIA has the ability to bug their homes remotely, through smart devices, or steal their data and other information that may incriminate them, forcing them into silence.

A politician who opposes expansion of the Deep State’s power? No problem – just a few months’ worth of bugging his or her devices, and the nation’s premier spy agency has all it needs to coerce said problematic politician into playing ball.

“The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones,” said the Wikileaks press release. “Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications, as well as covertly activate the phone’s camera and microphone.” (RELATED: Amazon Echo devices spy on you in your own home… police are now trying to acquire those recordings.)

And even though iPhone held a minority share (14.5 percent) of the global market, a specialized CIA unit within the agency’s Mobile Development Branch produced malware that infects, controls and then extracts data from iPhones and other Apple products that are running iOS, like iPads and, presumably, iMacs and Macbook Pro laptops.

A similar unit is said to have targeted Google’s Android devices, which runs the vast majority of the world’s smart phones (about 85 percent, roughly).

“’Year Zero’ shows that as of 2016 the CIA had 24 ‘weaponized’ Android ‘zero days’ which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors,” said the press release.

“These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the ‘smart’ phones that they run on and collecting audio and message traffic before encryption is applied.”

Feel violated yet? You should.

Read More at: NaturalNews.com
__________________________________________________________

J.D. Heyes is a senior writer for NaturalNews.com and NewsTarget.com, as well as editor of The National Sentinel.

Sources:

WikiLeaks.org

NaturalNews.com

Newstarget.com

Trust CIA Hackers Who Hack France’s Election Campaign?

fakenews
Source: NoMoreFakeNews.com | JonRappoport.wordpress.com
Jon Rappoport
March 7, 2017

If a chronic thief and a liar and a con artist told you what other thieves were doing, would believe him?

Perhaps if you were crazy.

The CIA states that Russia hacked the US election campaign in order to sway the vote to Trump.

In my previous article, I mentioned how, according to the latest WikiLeaks CIA data dump, the CIA can fabricate, yes, fabricate the “fingerprints” of Russian government hackers and create the false impression that Russians hacked the US presidential campaign of 2016.

But there’s more.

Commenting on its CIA data dump, WikiLeaks also describes a wide-ranging CIA espionage plan to infiltrate the candidates running in the 2012 French presidential election. These are, of course, the same CIA thieves who assure us that Russia interfered in the 2016 US election campaign. CIA credibility? Zero. Who has time to try to sort out when the liars might not be lying?

WikiLeaks, Press Release, 16 February, 2017: “All major French political parties were targeted for infiltration by the CIA’s human (‘HUMINT’) and electronic (‘SIGINT’) spies in the seven months leading up to France’s 2012 presidential election. The revelations are contained within three CIA tasking orders published today by WikiLeaks as context for its forth coming CIA Vault 7 series. Named specifically as targets are the French Socialist Party (PS), the National Front (FN) and Union for a Popular Movement (UMP) together with current President Francois Hollande, then President Nicolas Sarkozy, current round one presidential front runner Marine Le Pen, and former presidential candidates Martine Aubry and Dominique Strauss-Khan.”

“The CIA assessed that President Sarkozy’s party was not assured re-election. Specific tasking concerning his party included obtaining the ‘Strategic Election Plans’ of the Union for a Popular Movement (UMP); schisms or alliances developing in the UMP elite; private UMP reactions to Sarkozy’s campaign stratagies; discussions within the UMP on any ‘perceived vulnerabilities to maintaining power’ after the election; efforts to change the party’s ideological mission; and discussions about Sarkozy’s support for the UMP and ‘the value he places on the continuation of the party’s dominance’. Specific instructions tasked CIA officers to discover Sarkozy’s private deliberations ‘on the other candidates’ as well as how he interacted with his advisors. Sarkozy’s earlier self-identification as ‘Sarkozy the American’ did not protect him from US espionage in the 2012 election or during his presidency.”

There is much more, but you get the idea.

The mass media choose to regard statements from the CIA as holy and sacred when those statements support a favored agenda. But this is on a par with accepting the word of a confidential informant whose entire history involves twisting and bending and painting over and stepping on the truth.

It’s fake news spelled out in flaming letters in the sky.

Most mainstream reporters who rise high enough on the food chain eventually operate, when a story demands it, as CIA assets, whether they know it or not.

The most successful of those reporters are chronic liars themselves. They know they represent, when necessary, the CIA; and at the same time, they don’t know it. They choose to turn on and off their knowledge of what they’re doing.

Over the past 34 years of working as an independent freelance journalist, I’ve occasionally spoken off the record with these newspaper and broadcast denizens. The first inclination is to write them off as schizoid personalities. But that’s not accurate. They’re slithering creatures. They’re consciously working the angles. Like any hustler, they take a certain amount of enjoyment from running their psychological shell games.

In this, they fit quite well with CIA operatives. Brothers under the skin.

A wink and a nod, a nudge and a wink.

Their version of the good life.

Read More At: JonRappoport.wordpress.com
_______________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

These Photos Prove That the End of Privacy Is Already Here

end of privacy

Source: TheMindUnleashed.com
Anna LeMind
March 5, 2017

Do you really think you have privacy in today’s world? If you do, then a social experiment conducted by a Russian student may make you reconsider.

Nowadays, it’s a common thing to share one’s private photos on social media. I believe that it’s difficult to find a person who has never taken a selfie or hasn’t shared any details of their private life online. Moreover, those who choose to stay away from this selfie craze may even be considered some kind of weirdos. It’s not “normal” anymore to keep your life for yourself – you are supposed to share your experiences with the illusory world of digital “friends.”

These phenomena of modern society inspired Russian photography and art student Egor Tsvetkov to conduct a thought-provoking social experiment titled “Your face is big data”.

For the purpose of the experiment, he took photos of 100 random people on the Moscow subway. Egor says that the majority of them didn’t even notice that he was taking pictures of them – most of them just stared at their smartphone screens and didn’t pay any attention to what was going on around. Among other things, this kind of reaction sparked his interest.

However, the best part came when Egor ran the photos through a facial recognition application called “FindFace” that he created himself. The goal was to test whether the app could use photos to successfully identify random people on the social network “Vkontakte” (“InTouch”), which, in fact, is more popular in Russia than Facebook.

As a result, Egor found out that the app was working perfectly and managed to identify 70% of photographed people on the social network!

See the results for yourself:

end of privacy

end of privacy

end of privacy

end of privacy

end of privacy

end of privacy

end of privacy

As you can see in the images above, people look really different in the photos Egor took and those shared online. It makes sense why – people usually upload only those pictures that show themselves in the best light. No one wants to look ugly or unhappy in a photo available online. Modern apps also help with this and can fix even the worst pictures to make the person look more attractive than they really are. After all, most people don’t care to show their true self on social media – they seek to present a “perfect” image of themselves.

This social experiment is another reminder that there is no such thing as privacy in the modern world. As for the consequences of this, you can guess what could potentially happen in the future, with the further progress of technology. Identifying someone by photo is no longer a privilege of secret services and police. Any person with basic computer skills can do a basic research online and discover tons of information about someone else (which they willingly shared online).

“My project is a clear illustration of the future that awaits us if we continue to discover ourselves on the Internet to the extent that we do today,” Egor said.

So next time you want to upload a selfie or share something personal on Facebook, remember this social experiment and think twice 😉

Read More At: TheMindUnleashed.com

Image credit: Egor Tsvetkov

Creepy teddy bear caught leaking kids’ private conversations online

Image: Creepy teddy bear caught leaking kids’ private conversations online
Source: NaturalNews.com
Thomas Dishaw
March 2, 2017

Spiral Toys, the manufacturer of the SmartToy line CloudPets, left more than 800,000 customer credentials, as well as two million message recordings, totally exposed online for anyone to see and listen to. Some hackers went so far as to lock accounts and hold them for ransom.

The internet-connected Teddy Bear allows kids to communicate with far away friends and relatives without having to give them their own phone, though parents do have to download the CloudPets App to a phone or tablet to connect the bear. Messages can be sent and received from anywhere in the world. Unfortunately, the database used by Spiral Toys wasn’t behind a firewall or password protected, which made it easy to find using Shodan, a search engine that exposes unprotected websites and servers to hackers. The attack occurred between Christmas of last year and at least until the first week of January, and according to Motherboard at least two security researchers and likely malicious hackers were able to get into the system. In fact, at the beginning of January, CloudPets’ data was overwritten twice, according to researchers. (RELATED: Get all the news the media is trying to hide form you at Censored.news)

Those able to hack the system can now access more than 800,000 emails and passwords. Troy Hunt, a security researcher that analyzed the CloudsPets data, says a majority of the passwords were very weak and easy to crack. To make matters worse, Spiral Toys has yet to notify victims or disclose the breach even though it has been nearly two months since it happened. Jason Pagel, a student in a workshop that Hunt taught last week, and a father to a 6-year-old girl, found out about the breach through Hunt. “My bigger concern is that someone may be able to use this information to send inappropriate messages to my 6-year-old daughter,” Pagel told Motherboard via email. “[My parents] certainly won’t be sending any more messages to their granddaughter through this. And while I doubt we will throw the toy away, it’s effectively been reduced to a way-overpriced stuffed animal.”

This breach mirrors the concerns that caused Germany not only to ban but destroy the SmartToy “My Friend Cayla” after regulators decided that the doll posed a significant threat to the privacy of its citizens. Aside from it being exposed that the information Cayla records is sent to a company that makes voice recognition software, this toys software can be easily hacked as well. Security researcher Ken Munro from Pen Test Partners has identified some vital flaws in the software. By his account, Ken, or any hacker for that matter, can get into Cayla’s system to modify commands as well as change vocabulary. And just like CloudPets, Cayla also operates via a Bluetooth system which means strangers could potentially connect with both toys and communicate with your child.

The Consumer Privacy Project, a Washington nonprofit that advocates for consumer privacy, as well as many other privacy groups, have filed a complaint with the Federal Trade Commission about Cayla and other SmartToys. Ideally, they’d like to see the toys taken off the shelves in the United States, as they have been in Germany and some other European countries.

Read More at: NaturalNews.com

Sources:

Mirror.uk

NPR.org

Motherboard.com