FCC hides net neutrality complaints after calling for public comment

Source: RT
August 23, 2017

The Federal Communications Commission has received more than 47,000 complaints concerning the planned elimination of net neutrality rules. Despite a Freedom of Information Act request, they have refused to release the requests. Net neutrality campaign director Katy Anderson of Open Media joins RT America’s Anya Parampil to discuss the harm that the FCC’s proposals could cause.

China Breaks Entanglement Record & Some High Octane Suspicions

Banksters
Source: GizaDeathStar.com
Dr. Joseph P. Farrell Ph.D.
June 26, 2017

If you’ve been following the development of crypto-currencies, cyber-security, quantum entanglement, or financial clearing, you’ll want to take notice of these articles shared by Mr. T.M. and Mr. J.K., for China has crossed another threshold on the path toward satellite-based quantum entanglement communications systems, and therefore, toward a much more secure means of financial clearing:

Breakthrough: Entangled photons transmitted more than 1,200 km

China Shatters “Spooky Action at a Distance” Record, Preps for Quantum Internet

Note that this was achieved in satellite-to-ground communications, an important “proof-of-concept” demonstration. The goal of course is to use entanglement as a basis of secure – almost uncrackable or unhackable communications. While it’s still a long way from “sub-space communications” on the old Star Trek series, the use of lasers in the communication has now set a record of the receipt of entangled photons to 1200 km, or approximately 745 miles. The next steps in the technology tree will be to demonstrate (1) satellite to satellite transmission at large distance, then (2) satellite to satellite to satellite and/or ground, and then to begin to increase the amount of data to the point that it would resemble the data carrying capacity that financial clearing networks need: stability of transmission, minimal loss, and ultimately, secure and “unhackable” transmission is the goal, for these are essential to a stable financial clearing system in the 21st century.

That is China’s real goal: to emplace such a system, and thereby, to outflank the US-SWIFT system of financial clearing.

This in turn will require the ability to defend those satellites from ground based and orbital platforms (and a similar capability is required for the US, and anyone else with large space-based asset commitments: France, Japan, Germany, the UK, India, Russia, and so on). In other words, space weaponization is coming, and it will be multi-polar in nature, unless unforeseen events or developments nudge things in the opposite direction.

But as I read this article, a new though occurred to me, and I want to share it today by way of some high octane speculations, or rather, high octane questions or suspicions. I’ve been covering stories such as this on this website for some time now, and over time, I’ve begun to notice a pattern emerging. Perhaps I am mistaken, and noticing a “pattern” that really isn’t there, simply on account of my “selection bias” or the “selection bias” of the many people of this community who are kind enough to notice stories and articles and pass them along to me. The pattern is this: that in all such stories of quantum satellites and entanglement experiments, or “entanglement distance” records, the story seems to be about China. And this raises the question: are the other space powers completely overwhelmed? Are they not performing such experiments? And if not, why not? And if they are, where are the stories about them? In short, I cannot imagine that the USA, the UK, France or so on, are about to concede to China the sole monopoly on space-based quantum entanglement communications systems, yet, we see virtually no stories about such systems in development by those countries.

More importantly, I have a “suspicion” – a suspicion only, since I’ve not seen anything to suggest real evidence – that this is all very deliberate. We are told, of course, that entanglement and quantum computing systems would be virtually unhackable. But I have to wonder if, in the laboratories of agencies like DARPA (the Diabolically Apocalyptic Research Projects Agency, as we refer to it here, following a suggestion of Mr. J.B.), they are already into second generation experiments on this phenomenon and technology, and if, perhaps they have found, or at least, theorized about, ways around it.

See you on the flip side…

Read More At: GizaDeathStar.com
________________________________________________

About Dr. Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

The Gutenberg Revolutions

Source: CorbettReportExtras
June 20, 2017

The Gutenberg press was the catalyst for the Renaissance and the Reformation, but it shaped what we communicated as much as how we communicated. What, then, to make of the electronic global village of our modern Gutenberg revolution? Are we on the cusp of a new Renaissance, or will this technology only further degrade a culture already in decline? The promise of the Internet: Library of Alexandria or Library of Babel?

Amazon Echo devices can be exploited by hackers to steal your bank account information

Image: Amazon Echo devices can be exploited by hackers to steal your bank account information

Source: NaturalNews.com
Jayson Veley
June 16, 2017

While it may be convenient to walk into your home and turn the lights on by simply saying “Alexa” or “Ok Google,” a security expert has warned that devices like the Amazon Echo could pose a serious security risk. “If hackers find a way to compromise these devices in our homes, they could have it recording all of the time and you wouldn’t necessarily know,” explained cyber security expert Dr. Jason Nurse. “They could hear you discussing your holiday plans, so they know when you are away and could burgle you. They may hear you buying something on the phone, giving away your credit card details.”

Nurse’s comments came during a recent speech at the Cheltenham Science Festival. The cyber security expert explained that he is so concerned about the potential privacy risks that come with the use of devices like the Amazon Echo that he refuses to keep electronic assistants of any kind in his home.

But despite the fact that your banking information is put in jeopardy every time you turn on your Amazon Echo, the gadget is more popular than ever. With the ability to answer virtually any question you have, pick up commands even in a noisy room, track online shopping and even lower the thermostat, it’s easy to see why devices like the Amazon Echo are being used by millions of people across the country. But still, some are concerned that such gadgets are inviting electronic spies right into their living rooms.

“If there’s something private you want to say, the first thing you should do is mute the device… or turn it off,” Dr. Nurse advises. “You should think twice about what you say in front of these devices.” Dr. Nurse went on to explain that “someone else in your home may say the wake word without your knowledge and start it recording while you are discussing something private or sensitive.”

In the case of the Amazon Echo, the “wake word” is “Alexa,” and in the case of Google Home, the “wake word” is “Ok Google.”

Although an Amazon spokesperson claimed that they take customer privacy very seriously, this isn’t the first time that the electronic commerce company has been surrounded by controversy. Back in April, Natural News reported on the potential privacy risks concerning the Echo Look, a $199 device recently released by Amazon that has the ability to watch you get dressed in your own bedroom. Even though the original purpose of the Echo Look was to give you recommendations on what to wear, many people are concerned that it could secretly record you during some of your most intimate moments.

With technology advancing at an astonishing rate and new devices coming out every year that once were only imaginable in science fiction films, our everyday lives are becoming more and more simplistic. We used to have no choice but to drive our own cars from point A to point B; now we have the option of purchasing a car that is able to drive itself. We used to have to walk into a dark house and feel around blindly for the light switch; now all we have to do is say “Alexa, turn on the lights.” Without question, life is much more convenient than it was even just five years ago.

But just because it is more convenient doesn’t mean it’s safer. As a matter of fact, one could argue that with the invention of devices like the Amazon Echo, people are more at risk of experiencing some type of privacy violation, whether it’s a video recording taken of you while you get dressed or a hacker stealing your banking information. That is why it is up to companies like Amazon and Google to continue looking for ways to protect the privacy rights of their customers, while simultaneously putting new products on the market.

Read More At: NaturalNews.com

Sources:

Dailymail.co.uk

NaturalNews.com

CNN #FakeNews Amanpour Challenged to Interview Aleppo Boy’s Father – #NewWorldNextWeek

Source: CorbettReport | MediaMonarchy
June 16, 2017

Welcome to New World Next Week — the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. In this week’s episode:

Story #1: Amanpour Challenged To Interview “Aleppo Boy” She Exploited For War Propaganda http://bit.ly/2t4pqQN

MintPress Meets The Father Of Iconic Aleppo Boy, Who Says Media Lied About His Son http://bit.ly/2skcKaz

Wikipedia: Christiane Amanpour http://bit.ly/2ryniio

Complete 9/11 Timeline: Christiane Amanpour http://bit.ly/2ru8eqL

Wikipedia: James P. Rubin http://bit.ly/2toWqCJ

Hillary Clinton Email Archive: Secretary Clinton’s Interview With Christiane Amanpour http://bit.ly/2suRY94

Story #2: Young People Hit Tokyo’s Streets To Protest “Anti-Conspiracy Bill” http://bit.ly/2sdl9us

Update: Japan Enacts Broad Anti-Conspiracy Law http://s.nikkei.com/2ryJrwJ

Expert Disputes Japan Government Claim That Conspiracy Bill Needed To Ratify U.N. Treaty Related To 2020 Olympics http://bit.ly/2rtXPeA

Conspiracy Theory Becomes Frightening Reality For Japan http://bit.ly/2ru2cGH

Story #3: “We’re Not Monsters” – Ontario Township Defends Shuttering Girl’s Lemonade Stand 🍋💰 http://bit.ly/2ryk6Ds

6 Illicit Lemonade Stands Towns Had to Shut Down http://bit.ly/2rj6U60

NWNW Update: Chimpanzees Aren’t People, Don’t Have Right For Habeas Corpus http://bit.ly/2s3MYqH

NWNW Update: Germany’s Merkel Says Digital World Needs Global Rules http://bit.ly/2ryeg4W

FCC to reverse net neutrality policy

Source: RT
April 28, 2017

Federal Communication Commission Chair Ajit Pai announced he will begin the process of reversing net neutrality rules put in place during the Obama administration. David Christopher of internet-user rights group OpenMedia joins RT America’s Ashlee Banks to discuss the ramifications this will have on internet users.

WikiLeaks Vault 7 Reveals CIA Can Disguise Hacks, Malware As Russian Or Chinese


Source: ActivistPost.com
Matt Agorist
March 31, 2017

Moments ago, WikiLeaks released another set of data from the Vault 7 CIA documents which, believe it or not, paints an even more ominous picture of the world’s most unscrupulous spy agency. The latest leak consists of 676 source code files from the CIA’s anti-forensic “Marble” framework — which allows the CIA to covertly create malware, trojans, and hacking attacks — while attributing them to foreign entities.

With each release from these Vault 7 leaks, it becomes more apparent that everything we thought the CIA might get in this 1984-esque world — they already have.

According to WikiLeaks, Marble is able to hide or cloak their virus signature by “by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivalent of a specialized CIA tool to place covers over the English language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.”

Marble is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.”

Over the course of the last 4 months, the deep state has claimed — without evidence — that Russia has interfered in US elections. With this technology, the CIA could theoretically present the evidence it needs to “prove” Russian meddling.

According to WikiLeaks, this blame game is possible due to the fact that the source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

According to Marble, the CIA could create a virus that would potentially devastate entire systems — and then blame it on anyone they want.

As Leak of Nations reports, in the second batch of ‘Vault 7’ documents, WikiLeaks released a user guide for Sonic Screwdriver – an implant on the Apple Thunderbolt-to-USB converter that allows code to be booted onto an attached device, even if the device is password-protected.

What this means is that the CIA can infect the firmware of Macs at the core of the system with a trojan horse. Having a proverbial ocean of computers to choose from, the CIA could then pick one of those infected computers, launch an attack, use Marble to cover it up and blame it on whomever they wish.

It is no wonder Ubuntu founder Mark Shuttleworth called this “a trojan horse of monumental proportions.”

For now, however, the only one to be caught hacking US elections is the Department of Homeland Security. As the Free Thought Project previously reported, the Department of Homeland Security, under the Obama administration, attempted to hack the Indiana State electoral system nearly 15,000 times.

Prior to the hacks in Indiana, it was the State of Georgia to expose DHS meddling in their elections.

While these…

Read More At: ActivistPost.com

Teenager gang-raped on Facebook Live, crime goes unreported

Source:  RT
March 23, 2017

Chicago police are searching for a group of men who reportedly gang-raped a 15-year-old girl and livestreamed it on Facebook. Dozens of people watched the horrific assault happen on Facebook Live on Sunday but did not report it to authorities. RT America’s Simone Del Rosario joins Ashlee Banks to discuss the details.

Google’s Trust Contacts app tracks your location, travel history and shares it even without your phone powered on

Image: Google’s Trust Contacts app tracks your location, travel history and shares it even without your phone powered onSource: NaturalNews.com
D. Samuelson
December 11, 2016

Androidcentral.com is thrilled that Google’s new Trust Contacts app is going to make everyone “safe” by giving your friends and family, or anyone who requests the info, your location at any time. You can say no, but if you don’t respond, the location will be shared, even if your phone is off. How convenient.

This “keeping you safe” rationale is the same rationale that pharmaceutical giant Merck uses to market its dangerous and occasionally deadly HPV vaccination, Gardasil, which is supposed to keep your 11 and 12 year-old daughters – and sons -“safe” from HPV, cervical cancer or genital warts. Homeland Security was built to keep us “safe.”  The war on terror is about keeping Americans “safe” from terror. The war on poverty was supposed to keep folks “safe from poverty. The war on drugs was supposed to keep people “safe” from drugs.

Whenever you hear about a technology, a war, or a big pharma chemical developed with the goal of “keeping you safe,” it’s doublespeak with a dark agenda. The surveillance state encroaches our every move, along with abundant poverty, terror and pharmaceutical drugs. So now, by utilizing the free nifty Google Trust Contacts app for your worried “closest friends and family members,” or whomever may be hacking in, everybody is going to feel so much safer. How warm and fuzzy of them.

This Google app also shares other details. Your trusted contacts, or those posing as trusted contacts, can also be privy to your phone’s battery level as well as have access to all the places you’ve been, even if your phone is off. These surveillance techniques may seem trendy – and even necessary to the techies. Besides, it’s just an integral part of the new smart world we are being trained to jump head first into. Millions, maybe billions, don’t give much thought to the  transactions, locations, phone calls, contacts, emails, tweets, texts, chats, pictures, medical records, tax returns, internet searches and a thousand other activities that once were private and protected  – could now easily be subject to digital manipulated and used against them.

Wired reports that former Google CEO Eric Schmidt, now executive Chairman of the parent company Alphabet, was tapped in early 2016 to advise the Pentagon about”rapid prototyping, iterative product development, business analytics, mobile apps, and the cloud.” That sounds a bit like a double safe, doesn’t it?

Read More At: NaturalNews.com

Sources:

AndroidCentral.com

VacTruth.com

Cdc.gov

Science.NaturalNews.com

Wired.com

YouTube.com

Deutsche Well: Cyber Attacks On Russian Financial Institutions…

Source: GizaDeathStar.com
Dr. Joseph P. Farrell
December 8, 2016

While everything else has been going on, it seems that Russian financial institutions were again under cyber-attack according to this story that appeared in the English-language service of Deutsche Welle (carried also on AP and Reuters), in this story shared by Mr. M.M.:

Russia repels cyber attack on financial systems: FSB

This comes after a TASS story by Yuri Smityuk that appeared on Dec. 2:

Russian banks expect a powerful cyber attack and prepared to repel them

What caught my attention, however, was the Deutsche Welle story, and these items:

Russia’s security agency thwarted a cyber attack aimed at destabilizing the country’s financial system, according to the agency’s statement Friday.

The Federal Security Service (FSB), said unnamed attackers planned to flood Russian social networks with comments and send mass text messages with false comments warning of the imminent collapse of major banks and financial systems in the country.

The FSB received information on “plans by foreign secret services to carry out large-scale cyberattacks from December 5,” it said in a statement.

It said the attacks would originate from computer servers in the Netherlands owned by Ukrainian company BlazingFast, based in Kiev.
(Emphasis added)

Then, later in the story, we find this piece of confusing information:

Two people in Ukraine, believed to be in control of the 900,000 hacked devices that formed the massive “AVALANCHE” botnet, were arrested as part of a series of police raids in 10 countries, German authorities announced on Thursday. German leaders hinted at Russian involvement.

The leader is left with the lingering impression that the Ukrainian attack mentioned in the fourth paragraph of the article is the same network that had two of its leaders arrested in the 10-country international raid, which Germany is maintaining had Russian involvement, leading to the possibility that Russia staged an attack on itself, and blamed it on hackers in Kiev, The Ukraine.

In today’s world, anything is possible of course.

However, in this case, I don’t think that scenario is at all plausible. There’s another high octane scenario that I think lurks in between the lines of those first four paragraphs. For the sake of argument, let’s accept the FSB’s (Federalnaya Sluzhba Bezopaznosti Rossiyskoi Federatsii, Federal Security Service of the Russian Federation) explanation here at face value, namely, that the attacks originated in the Ukrainian company BlazingFast, through servers in the Netherlands. For the Ukraine to launch a cyber-attack on Russian banks and its banking system – even through a corporate cats paw, on its own is absurd. It would only fuel the tensions between the Ukraine and Russia, and hand Mr. Putin yet another talking point on the whole western-instigated mess there. Meanwhile, Germany was strongly hinting that Russia was behind the attacks:

Continue Reading At: GizaDeathStar.com
_____________________________________________________________

Profile photo of Joseph P. Farrell

About Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.