FCC hides net neutrality complaints after calling for public comment

Source: RT
August 23, 2017

The Federal Communications Commission has received more than 47,000 complaints concerning the planned elimination of net neutrality rules. Despite a Freedom of Information Act request, they have refused to release the requests. Net neutrality campaign director Katy Anderson of Open Media joins RT America’s Anya Parampil to discuss the harm that the FCC’s proposals could cause.

Advertisements

China Breaks Entanglement Record & Some High Octane Suspicions

Banksters
Source: GizaDeathStar.com
Dr. Joseph P. Farrell Ph.D.
June 26, 2017

If you’ve been following the development of crypto-currencies, cyber-security, quantum entanglement, or financial clearing, you’ll want to take notice of these articles shared by Mr. T.M. and Mr. J.K., for China has crossed another threshold on the path toward satellite-based quantum entanglement communications systems, and therefore, toward a much more secure means of financial clearing:

Breakthrough: Entangled photons transmitted more than 1,200 km

China Shatters “Spooky Action at a Distance” Record, Preps for Quantum Internet

Note that this was achieved in satellite-to-ground communications, an important “proof-of-concept” demonstration. The goal of course is to use entanglement as a basis of secure – almost uncrackable or unhackable communications. While it’s still a long way from “sub-space communications” on the old Star Trek series, the use of lasers in the communication has now set a record of the receipt of entangled photons to 1200 km, or approximately 745 miles. The next steps in the technology tree will be to demonstrate (1) satellite to satellite transmission at large distance, then (2) satellite to satellite to satellite and/or ground, and then to begin to increase the amount of data to the point that it would resemble the data carrying capacity that financial clearing networks need: stability of transmission, minimal loss, and ultimately, secure and “unhackable” transmission is the goal, for these are essential to a stable financial clearing system in the 21st century.

That is China’s real goal: to emplace such a system, and thereby, to outflank the US-SWIFT system of financial clearing.

This in turn will require the ability to defend those satellites from ground based and orbital platforms (and a similar capability is required for the US, and anyone else with large space-based asset commitments: France, Japan, Germany, the UK, India, Russia, and so on). In other words, space weaponization is coming, and it will be multi-polar in nature, unless unforeseen events or developments nudge things in the opposite direction.

But as I read this article, a new though occurred to me, and I want to share it today by way of some high octane speculations, or rather, high octane questions or suspicions. I’ve been covering stories such as this on this website for some time now, and over time, I’ve begun to notice a pattern emerging. Perhaps I am mistaken, and noticing a “pattern” that really isn’t there, simply on account of my “selection bias” or the “selection bias” of the many people of this community who are kind enough to notice stories and articles and pass them along to me. The pattern is this: that in all such stories of quantum satellites and entanglement experiments, or “entanglement distance” records, the story seems to be about China. And this raises the question: are the other space powers completely overwhelmed? Are they not performing such experiments? And if not, why not? And if they are, where are the stories about them? In short, I cannot imagine that the USA, the UK, France or so on, are about to concede to China the sole monopoly on space-based quantum entanglement communications systems, yet, we see virtually no stories about such systems in development by those countries.

More importantly, I have a “suspicion” – a suspicion only, since I’ve not seen anything to suggest real evidence – that this is all very deliberate. We are told, of course, that entanglement and quantum computing systems would be virtually unhackable. But I have to wonder if, in the laboratories of agencies like DARPA (the Diabolically Apocalyptic Research Projects Agency, as we refer to it here, following a suggestion of Mr. J.B.), they are already into second generation experiments on this phenomenon and technology, and if, perhaps they have found, or at least, theorized about, ways around it.

See you on the flip side…

Read More At: GizaDeathStar.com
________________________________________________

About Dr. Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

The Gutenberg Revolutions

Source: CorbettReportExtras
June 20, 2017

The Gutenberg press was the catalyst for the Renaissance and the Reformation, but it shaped what we communicated as much as how we communicated. What, then, to make of the electronic global village of our modern Gutenberg revolution? Are we on the cusp of a new Renaissance, or will this technology only further degrade a culture already in decline? The promise of the Internet: Library of Alexandria or Library of Babel?

Amazon Echo devices can be exploited by hackers to steal your bank account information

Image: Amazon Echo devices can be exploited by hackers to steal your bank account information

Source: NaturalNews.com
Jayson Veley
June 16, 2017

While it may be convenient to walk into your home and turn the lights on by simply saying “Alexa” or “Ok Google,” a security expert has warned that devices like the Amazon Echo could pose a serious security risk. “If hackers find a way to compromise these devices in our homes, they could have it recording all of the time and you wouldn’t necessarily know,” explained cyber security expert Dr. Jason Nurse. “They could hear you discussing your holiday plans, so they know when you are away and could burgle you. They may hear you buying something on the phone, giving away your credit card details.”

Nurse’s comments came during a recent speech at the Cheltenham Science Festival. The cyber security expert explained that he is so concerned about the potential privacy risks that come with the use of devices like the Amazon Echo that he refuses to keep electronic assistants of any kind in his home.

But despite the fact that your banking information is put in jeopardy every time you turn on your Amazon Echo, the gadget is more popular than ever. With the ability to answer virtually any question you have, pick up commands even in a noisy room, track online shopping and even lower the thermostat, it’s easy to see why devices like the Amazon Echo are being used by millions of people across the country. But still, some are concerned that such gadgets are inviting electronic spies right into their living rooms.

“If there’s something private you want to say, the first thing you should do is mute the device… or turn it off,” Dr. Nurse advises. “You should think twice about what you say in front of these devices.” Dr. Nurse went on to explain that “someone else in your home may say the wake word without your knowledge and start it recording while you are discussing something private or sensitive.”

In the case of the Amazon Echo, the “wake word” is “Alexa,” and in the case of Google Home, the “wake word” is “Ok Google.”

Although an Amazon spokesperson claimed that they take customer privacy very seriously, this isn’t the first time that the electronic commerce company has been surrounded by controversy. Back in April, Natural News reported on the potential privacy risks concerning the Echo Look, a $199 device recently released by Amazon that has the ability to watch you get dressed in your own bedroom. Even though the original purpose of the Echo Look was to give you recommendations on what to wear, many people are concerned that it could secretly record you during some of your most intimate moments.

With technology advancing at an astonishing rate and new devices coming out every year that once were only imaginable in science fiction films, our everyday lives are becoming more and more simplistic. We used to have no choice but to drive our own cars from point A to point B; now we have the option of purchasing a car that is able to drive itself. We used to have to walk into a dark house and feel around blindly for the light switch; now all we have to do is say “Alexa, turn on the lights.” Without question, life is much more convenient than it was even just five years ago.

But just because it is more convenient doesn’t mean it’s safer. As a matter of fact, one could argue that with the invention of devices like the Amazon Echo, people are more at risk of experiencing some type of privacy violation, whether it’s a video recording taken of you while you get dressed or a hacker stealing your banking information. That is why it is up to companies like Amazon and Google to continue looking for ways to protect the privacy rights of their customers, while simultaneously putting new products on the market.

Read More At: NaturalNews.com

Sources:

Dailymail.co.uk

NaturalNews.com

CNN #FakeNews Amanpour Challenged to Interview Aleppo Boy’s Father – #NewWorldNextWeek

Source: CorbettReport | MediaMonarchy
June 16, 2017

Welcome to New World Next Week — the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. In this week’s episode:

Story #1: Amanpour Challenged To Interview “Aleppo Boy” She Exploited For War Propaganda http://bit.ly/2t4pqQN

MintPress Meets The Father Of Iconic Aleppo Boy, Who Says Media Lied About His Son http://bit.ly/2skcKaz

Wikipedia: Christiane Amanpour http://bit.ly/2ryniio

Complete 9/11 Timeline: Christiane Amanpour http://bit.ly/2ru8eqL

Wikipedia: James P. Rubin http://bit.ly/2toWqCJ

Hillary Clinton Email Archive: Secretary Clinton’s Interview With Christiane Amanpour http://bit.ly/2suRY94

Story #2: Young People Hit Tokyo’s Streets To Protest “Anti-Conspiracy Bill” http://bit.ly/2sdl9us

Update: Japan Enacts Broad Anti-Conspiracy Law http://s.nikkei.com/2ryJrwJ

Expert Disputes Japan Government Claim That Conspiracy Bill Needed To Ratify U.N. Treaty Related To 2020 Olympics http://bit.ly/2rtXPeA

Conspiracy Theory Becomes Frightening Reality For Japan http://bit.ly/2ru2cGH

Story #3: “We’re Not Monsters” – Ontario Township Defends Shuttering Girl’s Lemonade Stand 🍋💰 http://bit.ly/2ryk6Ds

6 Illicit Lemonade Stands Towns Had to Shut Down http://bit.ly/2rj6U60

NWNW Update: Chimpanzees Aren’t People, Don’t Have Right For Habeas Corpus http://bit.ly/2s3MYqH

NWNW Update: Germany’s Merkel Says Digital World Needs Global Rules http://bit.ly/2ryeg4W

FCC to reverse net neutrality policy

Source: RT
April 28, 2017

Federal Communication Commission Chair Ajit Pai announced he will begin the process of reversing net neutrality rules put in place during the Obama administration. David Christopher of internet-user rights group OpenMedia joins RT America’s Ashlee Banks to discuss the ramifications this will have on internet users.

WikiLeaks Vault 7 Reveals CIA Can Disguise Hacks, Malware As Russian Or Chinese


Source: ActivistPost.com
Matt Agorist
March 31, 2017

Moments ago, WikiLeaks released another set of data from the Vault 7 CIA documents which, believe it or not, paints an even more ominous picture of the world’s most unscrupulous spy agency. The latest leak consists of 676 source code files from the CIA’s anti-forensic “Marble” framework — which allows the CIA to covertly create malware, trojans, and hacking attacks — while attributing them to foreign entities.

With each release from these Vault 7 leaks, it becomes more apparent that everything we thought the CIA might get in this 1984-esque world — they already have.

According to WikiLeaks, Marble is able to hide or cloak their virus signature by “by hiding (“obfuscating”) text fragments used in CIA malware from visual inspection. This is the digital equivalent of a specialized CIA tool to place covers over the English language text on U.S. produced weapons systems before giving them to insurgents secretly backed by the CIA.”

Marble is “[D]esigned to allow for flexible and easy-to-use obfuscation” as “string obfuscation algorithms (especially those that are unique) are often used to link malware to a specific developer or development shop.”

Over the course of the last 4 months, the deep state has claimed — without evidence — that Russia has interfered in US elections. With this technology, the CIA could theoretically present the evidence it needs to “prove” Russian meddling.

According to WikiLeaks, this blame game is possible due to the fact that the source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, — but there are other possibilities, such as hiding fake error messages.

According to Marble, the CIA could create a virus that would potentially devastate entire systems — and then blame it on anyone they want.

As Leak of Nations reports, in the second batch of ‘Vault 7’ documents, WikiLeaks released a user guide for Sonic Screwdriver – an implant on the Apple Thunderbolt-to-USB converter that allows code to be booted onto an attached device, even if the device is password-protected.

What this means is that the CIA can infect the firmware of Macs at the core of the system with a trojan horse. Having a proverbial ocean of computers to choose from, the CIA could then pick one of those infected computers, launch an attack, use Marble to cover it up and blame it on whomever they wish.

It is no wonder Ubuntu founder Mark Shuttleworth called this “a trojan horse of monumental proportions.”

For now, however, the only one to be caught hacking US elections is the Department of Homeland Security. As the Free Thought Project previously reported, the Department of Homeland Security, under the Obama administration, attempted to hack the Indiana State electoral system nearly 15,000 times.

Prior to the hacks in Indiana, it was the State of Georgia to expose DHS meddling in their elections.

While these…

Read More At: ActivistPost.com