Monsanto’s ally Pompeo to head the CIA: bad move, Donald

Source: NoMoreFakeNews.com
Jon Rappoport
November 19, 2016

Trump has tapped Congressman Mike Pompeo to head the CIA.

In April of 2014, Pompeo introduced the bill that would become The Dark Act, banning states from passing laws mandating GMO labeling on food. Instead, The Dark Act introduces very weak and confusing federal GMO labels. Few people will pay attention to them or even realize they’re there.

I’m sure Monsanto execs are popping a few champagne corks right now. “Hey, remember Mike Pompeo? Can you believe it? He’s the new director of the CIA. If we need an extra helping hand taking over the world’s food supply, why can’t we call on good old Mike? Ha-ha…”

Mike is also a heavy supporter of the NSA’s surveillance programs: “Congress should pass a law re-establishing collection of all metadata, and combining it with publicly available financial and lifestyle information into a comprehensive, searchable database. Legal and bureaucratic impediments to surveillance should be removed.” (The Atlantic, 11/18/16)

Here’s what Mike had to say about Edward Snowden: “[He] should be brought back from Russia and given due process, and I think the proper outcome would be that he would be given a death sentence.” (Washington Examiner, 2/11/16)

Very bad move, Donald.

Read More At: JonRappoport.wordpress.com
_______________________________________________________________
Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free emails at NoMoreFakeNews.com or OutsideTheRealityMachine.

Advertisements

“Storm of the Century” – How the Internet of Things Could Destroy Privacy

Screen Shot 2016-09-07 at 10.14.32 AM
Source: LibertyBlitzkrieg.com
Michael Krieger
September 7, 2016

As the Guardian reported, Clapper made clear that the internet of things – the many devices like thermostats, cameras and other appliances that are increasingly connected to the internet – are providing ample opportunity for intelligence agencies to spy on targets, and possibly the masses. And it’s a danger that many consumers who buy these products may be wholly unaware of.

“In the future, intelligence services might use the [internet of things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials,” Clapper told a Senate panel as part of his annual “assessment of threats” against the US. 

– From February’s post: Top U.S. Official Admits – Government Will Use “Internet of Things” to Spy on the Public

Serving as an important followup to the post above, Cory Doctorow has just penned an extremely important warning at Locust titled, The Privacy Wars Are About to Get A Whole Lot Worse. Below are the relevant passages. Please read and share with everyone you know.

As more and more companies twigged to the power of ‘‘surveillance capitalism,’’ these agreements proliferated, as did the need for them, because before long, everything was gathering data. As the Internet everted into the physical world and colonized our phones, we started to get a taste of what this would look like in the coming years. Apps that did innocuous things like turning your phone into a flashlight, or recording voice memos, or letting your kids join the dots on public domain clip-art, would come with ‘‘permissions’’ screens that required you to let them raid your phone for all the salient facts of your life: your phone number, e-mail address, SMSes and other messages, e-mail, location – everything that could be sensed or inferred about you by a device that you carried at all times and made privy to all your most sensitive moments.

When a backlash began, the app vendors and smartphone companies had a rebuttal ready: ‘‘You agreed to let us do this. We gave you notice of our privacy practices, and you consented.’’

This ‘‘notice and consent’’ model is absurd on its face, and yet it is surprisingly legally robust. As I write this in July of 2016, US federal appellate courts have just ruled on two cases that asked whether End User Licenses that no one read and no one understands and no one takes seriously are enforceable. The cases differed a little in their answer, but in both cases, the judges said that they were enforceable at least some of the time (and that violating them can be a felony!). These rulings come down as the entirety of America has been consumed with Pokémon Go fever, only to have a few killjoys like me point out that merely by installing the game, all those millions of players have ‘‘agreed’’ to forfeit their right to sue any of Pokémon’s corporate masters should the com­panies breach all that private player data. You do, however, have 30 days to opt out of this forfeiture; if Pokémon Go still exists in your timeline and you signed up for it in the past 30 days, send an e-mail to termsofservice@nianticlabs.com with the subject ‘‘Arbitra­tion Opt-out Notice’’ and include in the body ‘‘a clear declaration that you are opting out of the arbitration clause in the Pokémon Go terms of service.’’

Notice and consent is an absurd legal fiction. Jonathan A. Obar and Anne Oeldorf-Hirsch, a pair of communications professors from York University and the University of Connecticut, published a working paper in 2016 called ‘‘The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of Service Policies of Social Net­working Services.’’ The paper details how the profs gave their students, who are studying license agreements and privacy, a chance to beta-test a new social network (this service was fictitious, but the students didn’t know that). To test the network, the students had to create accounts, and were given a chance to review the service’s terms of service and privacy policy, which prominently promised to give all the users’ personal data to the NSA, and demanded the students’ first-born children in return for access to the service. As you may have gathered from the paper’s title, none of the students noticed either fact, and almost none of them even glanced at the terms of service for more than a few seconds.

Indeed, you can’t examine the terms of service you interact with in any depth – it would take more than 24 hours a day just to figure out what rights you’ve given away that day. But as terrible as notice-and-consent is, at least it pretends that people should have some say in the destiny of the data that evanescences off of their lives as they move through time, space, and information.

Continue Reading At: LibertyBlitzkrieg.com

Potential Litigation? YouTube Is Not Private and Its Censorship Is Government Policy

lawsuit
Source: TheDailyBell.com
September 5, 2016

A number of users called YouTube’s actions a threat to free speech, although the company technically isn’t bound by the First Amendment to the U.S. Constitution, since it is a business and not an arm of the government. Like Facebook, it can remove whatever content it wants to. More than anything, however, the dispute reinforces how much of our public speech and behavior is now controlled by large corporations and platforms such as Google and Facebook. – Fortune

YouTube is demonetizing videos and willing YouTube creators are expressing shock and dismay.

But why are the surprised? YouTube is part of Google and Google is part of the CIA.

The US is run by intelligence agencies that control both Congress and the Presidency. In turn, DC – and London’s City – control the relevant intel agencies and technology and information companies like Google and Facebook.

Facebook is already active in the text removal business and now YouTube is becoming more aggressive. The mainstream media response to what these “companies” are doing is that they are not part of government and can do what they wish, absent shareholder pressure.

But this isn’t true.

They are not private companies. They are government/CIA enterprises. Just look at the history of these companies.

The founders of Google apparently worked for US intel or the military before founding Google. And the CIA funded Facebook with millions when it was just a startup.

Here’s a comment on Google from the crowd-funded Insurge Intelligence site (here):

How the CIA made Google … How the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by US intelligence to retain ‘information superiority.’

The origins of this ingenious strategy trace back to a secret Pentagon-sponsored group, that for the last two decades has functioned as a bridge between the US government and elites across the business, industry, finance, corporate, and media sectors. The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the US and around the world. The results have been catastrophic: NSA mass surveillance, a permanent state of global war, and a new initiative to transform the US military into Skynet.

Facebook, like Google, is part of this process as we wrote here:

A company like Facebook is not responsible to its shareholders. If CEO Mark Zuckerberg were to stop collecting information for the CIA, he would be shoved rudely out the door or worse.

We wrote this about Facebook’s initial funding (here):

The second investment in Facebook came from an individual closely associated with the CIA. It was a huge amount for a start-up, some $12 million.

There’s probably a lawsuit here, were anyone courageous enough to pursue it. Facebook, YouTube (and ultimately Google) are surely acting on instructions of the US government when it comes to reducing and removing content that they claim is “objectionable.”

In other words, what appears to be some sort of weird business decision when it comes to YouTube is part of a larger government program.

YouTube is removing monetization from videos that have sexual content or connotations. But the sexual aspects of YouTube’s activities are merely to cover up the real reason to remove or demonetize videos, which has to do with their political content.

YouTube’s ploy is similar to David Cameron’s when he demanded that vendors ask customers for proactive signatures before providing with websites that included sexual content. There was a list of such sites, but eventually it was reported that there were a number of non-pornographic sites on the list – simply non-traditional or alternative websites that the British government wanted to make less available.

If one wanted to do more than complain, a lawsuit is an obvious possibility. These companies have been marketed publicly as primarily business enterprises when in fact they are pieces of a larger US intelligence apparatus.

Conclusion: One can therefore argue that Vloggers who have done business with YouTube have become involved under false pretenses. They thought they were contributing to a normal business, but in fact their presentations are being evaluated from the standpoint of whether or not they support the current US technocracy.

Editor’s Note: You can see a discussion of the underlying political reasons for the demonetization move now –  in the final two months of the Clinton campaign, here. (From 33 minutes on.)

Read More At: TheDailyBell.com

Amid The Hacking Spree In The USSA, China Launches A Quantum…

Green Hacking Wallpaper 2000x1332 Green, Hacking, Code

Source:GizaDeathStar.com
Dr. Joseph P. Farrell
August 22, 2016

Many readers here sent versions of the story that China launched the world’s first quantum communications satellite, and the timing could not have been more interesting. Indeed, in my opinion, China’s launch of this satellite must be viewed within the context of the hacking spree occurring in the USSA, with the recent hacks of the Democratic National Committee, the various groups connected to Darth Soros, and most recently, the NSA. In a (very greatly) oversimplified nutshell, quantum computing would rely on quantum states, rather than binary logic gates(with only two modes of handling information). In other words, at a minimum, rather than two states per node of information handling, there would be seven. Expand this idea to encryption, where entanglement of quantum information is used to transmit information, without the parameters of that entanglement to decrypt messages and communications, communications become virtually impossible to decode.

In a world that has seen how vulnerable the most “secure” servers are, from the DNC to Darth Soros being hacked, and now, even the NSA, such a satellite has huge implications:

China Launches First Quantum Satellite

Hack-proof? China launches world’s 1st quantum communications satellite

China Launches Quantum Satellite for Hack-Proof COmmunications

Now why am I putting this in the context of the hacking stories about which I speculated yesterday?

Well, for one thing, the nature of using quantum entanglement and other quantum information-processing technologies, as (poorly) outlined above, means that such communications are “hack proof”. But let’s put this in terms of intelligence and espionage, for as noted above, the problem posed by such technologies is that the old fashioned “signals intercept and decryption” techniques of number crunching and so on to crack the codes and communications of the enemy ala Britains’ Bletchley park “Ultra” operations in World War Two might fast be approaching its own kind of obsolescence. Without the encryption and decryption keys, cracking such communications becomes a super-computing nightmare. One might, just possibly invent some such technology and technique, but even then, the computing power would be extraordinary, and by the time an unauthorized “decrypt” was achieved, the information may no longer be timely or even possible to act upon.

Now, if one has been in the intelligence or espionage business, or for that matter, in the counter-intelligence business, the implications of this will be immediately evident, for it will mean that, contrary to the prognostications of yesteryear, HUMINT – human intelligence, i.e., actual human spies infiltrating an enemy’s intelligence and military to steal secrets, like quantum encryption and decryption keys – will become not less important, but hugely important. In the quantum communications world, they will become the sine qua non of intercept and decryption activity. This means, similarly, that the “intelligence advantage” will accrue to that nation or bloc that has (1) invested in such encryption and communications technologies while (2) not curtailing its HUMINT intelligence and counter-intelligence operatives, but rather, expanding them and targeting key agencies and corporations to access their software and encrypt-decrypt keys. For a nation behind the curve in the development of quantum communications…

Continue Reading At: GizaDeathStar.com
_______________________________________________________________

Profile photo of Joseph P. Farrell
Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

First The DNC, Then Darth Soros, Now It’s The…

HACKS, SNOWDEN, DARTH SOROS, AND RUSSIA
Source:GizaDeathStar.com
Dr. Joseph P. Farrell
August 21, 2016

OK… I admit it: all the recent hacks are just downright bizarre. First the Democrookery National Committee was hacked and its emails released, revealing a clear case of the DNC bending its own always-malleable “rules” to make sure Senator Sanders came nowhere near the nomination. Of  course, if he did come too close to the needed delegates (and it appears he did), then the will of the people in the so-called party of  the people can always be overturned by the Presidium’s “super-delegates”. The problem here is that the hack claims to have been done by a private group of cyber-vigilantes upset with the way things were being handled in the DNC in D.C. (that stands for District of Corruption, for all our foreign readership. And I know all the letters are probably confusing. The recitation of random letters and anagrams as if they are meaningful and decent English is an American thing, so bear with me). Then, of course, we had the hack of Darth Soros, revealing a what roiling pustules of activities the Sith Lord has been up to recently, from the Ukraine, to European refugees, and support for his young apprentice, Darthillary. (Seriously, one can almost imagine him waving his fingers and shooting bolts of blue lightning, or at the minimum, saying “These are not the emails you’re looking for.”)

Well, now you can add the Reichsicherheithauptamt… I mean, the National Security Agency(NSA), to the list of hacked groups, in these articles shared by Mr. S.D., T.M., V.T., and others:

The NSA cyber-weapon auction is a total smokescreen — here’s what’s really going on

Here’s why the supposed NSA ‘hack’ is unlike anything we’ve ever seen before

And lest we forget the bit about Darth Soros, here’s that story:

Thousands of Soros docs released by alleged Russian-backed hackers

Now, before we get to today’s HOS (high octane speculation), let’s pause and consider WWH (What We Have):

  1. Who has been hacked? The DNC, Darth Soros, and now, the NSA.
  2. Who hacked them? Well, a strange assortment of “private groups”, with the latest hack of the NSA claimed to have been done by a group calling itself “the Brokers’ Group”, after technicians for the Russian cyber-security firm Kaspersky supposedly uncovered the NSA’s front group, which was called the “Equation Group.”  (See this Zero Hedge article: MYSTERIOUS GROUP HACKS NSA)
  3. WDTW? Well, it appears TW either to influence the American election, or in the last instance, just plain ole money, in the form of Bitcoin, for their efforts.

Now, all of this brings us to our HOS of the day. Suppose, for a moment, the Russians are behind all of this, which is indeed the CO(considered opinion) of the first two linked articles:

But experts say that this is all a smokescreen for a not-so-subtle message from Moscow to Washington: Don’t mess with us.

“It’s a smokescreen, there’s nothing real about this,” John Schindler, a former NSA analyst and counterintelligence officer, told Business Insider. “This is Moscow’s way of upping the ante in the spy war, and sending a message no one can miss [which is] ‘we have you penetrated, we’ve got you by the balls, don’t push us.'”

He added: “The Russians are making a power play because they think they can right now.”

The previously-unknown Shadow Brokers created a number of social-media accounts earlier this month on Reddit, Github, Twitter, and Imgur, before announcing on August 13 its “cyber weapon auction,” which promised bidders a “full state sponsor tool set” from a hacking unit believed to be within the NSA known only as “The Equation Group.”

It released a 234-megabyte archive on various file-sharing sites with one-half being free to view and use — which numerous experts say is legitimate — while the other half was encrypted. The winner of the auction, the group said, would get the decryption key.

But an auction for hacking tools and exploits is not something that ever happens, experts say. Instead, exploits are bought and sold on the black market for hundreds of thousands and sometimes millions of dollars, in private.

There’s something else going on here, and it seems like it has nothing to do with a hacking group looking for cash.

And even Edward Snowden has joined the “Russians are Behind it” chorus:

Former NSA contractor Edward Snowden offered his opinion on the underlying message behind the “auction” in a series of tweets on Tuesday, notably pointing the finger at Russia as being behind it.

Now at one level, all this makes a great deal of sense, for after the DNC hack, party commissars were quick to point the finger of blame at Russia. That too makes sense, since the Russians know a Darthillary presidency might be more of the same neocon unipolarism we’ve seen since 9/11, on steroids. But, weighing in against this view is the fact that Darthillary expedited the shipment of refined uranium… to Russia. (And that raises questions of its own, for Russia is perfectly capable of refining uranium on its own. So was Russia acting as a middleman for someone else? Or just in a hurry to build more bombs for the inevitable showdown with the very person and her backers who expedited the sale?)  My point here, is that the “Russians did it” chorus on the DNC hack is standing on shaky bleachers.

A Russian hack of Darth Soros makes eminent sense, and even more sense, than on the DNC. Soros’ role, especially since his emails were released, in the Ukrainian mess, is well-known, as is Russia’s outlawing of NGO groups (such as Soros’). From the Russian point of view, such groups are nothing but gangs, racketeering operations, and front groups for “revolutionary” activities enjoying the protection of western law, governments, and powerful patronage. In this context, a Russian hack of the NSA to send messages also makes sense.

But what if(here’s our HOS) the meme of private groups being behind this is true after all?  What would this mean? What would the implications be? It would first mean nothing less than that someone is spending time and money to…

Continue Reading At: GizaDeathStar.com
_________________________________________________________________

Profile photo of Joseph P. Farrell
Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

Soros Got Hacked – Can You Guess What We found? #NewWorldNextWeek

Source: CorbettReport
James Corbett
August 18, 2016

Welcome to New World Next Week — the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. In this week’s episode:

Story #1: Hack Proves “Dissident” Groups, Movements Funded By Soros
http://bit.ly/2bu6TV6
“We’re stuck in the Twilight Zone.”
http://bit.ly/2bo7ZFU
Leaked Soros Memo: Refugee Crisis ‘New Normal,’ Gives ‘New Opportunities’ For Global Influence
http://bit.ly/2bCQh0Y
Meet George Soros
http://bit.ly/2bzfnfb

Story #2: ’Shadow Brokers’ Claim NSA Hack, Share Hi-Tech Hacking Tools
http://bit.ly/2bJ5E9p
Edward Snowden Points to Russia on Alleged NSA Hack
http://for.tn/2b0CKl5
James Corbett On ‘Declare Your Independence’ Radio
http://bit.ly/2bjQ6Ut
Wikipedia: MacGuffin
http://bit.ly/2be8iSb

Story #3: ”Russian” Hacker Guccifer 2.0 Publishes Complete Personal Information Of 200 Congressional Democrats
http://bit.ly/2bu7vKv
Twitter (Temporarily) Suspends Account of Guccifer 2.0, Hacker Behind DNC & DCCC Leaks
http://bit.ly/2b2lbhA
What You NEED To Know About The NSA Hack And Bitcoin Ransom
http://bit.ly/2buWgBB

#GoodNewsNextWeek: Little Free Pantries On Your Sidewalk Give Shelf-Stable Help
http://bit.ly/2bCQXDu

Who Got Us Into These Endless Wars?
http://bit.ly/2aWRpfI

Previous Episode: Imaginary BBC Detector Vans Now Scanning WiFi?
http://bit.ly/2b5FBoY

Which Is Worse: The NSA or The FDA?

A message to Wikileaks, Cryptome, Public Intelligence, and other sites that expose secrets

Does 2.25 million deaths in America, per decade, at the hands of the medical system, rate as a significant leak?

QuestionEverything2
Source: NoMoreFakeNews.com
Jon Rappoport
July 27, 2016

As my readers know, I’ve reported on a number of scandals concerning the toxicity of medical drugs, including shocking death numbers in the US.

These scandals are leaks from inside the National Security State.

If you visit Wikileaks, Cryptome, Public Intelligence, and other similar sites, how many purely medical documents do you find posted?

How many damaging leaks exposing the crimes of the medical cartel do you find?

Very, very few.

Where are the medical insiders who are liberating and passing along incriminating documentary evidence?

Some of the best exposers of political, intelligence-agency, and military crimes are way behind the curve, when it comes to medical matters.

The medical sphere, for various reasons, is far better protected than any other segment of society.

For the hundredth time, let me cite Dr. Barbara Starfield’s stunning review, “Is US health really the best in the world?” published on July 26, 2000, in the Journal of the American Medical Association.

Starfield, at the time, was working as a highly respected public health expert, at the Johns Hopkins School of Public Health.

She concluded that the US medical system kills 225,000 Americans a year. That would add up to 2.25 million deaths per decade.

Laid directly at the door of the American medical complex.

106,000 of those annual deaths, as Starfield reports, are the direct result of medical drugs.

Aside from the genocidal death toll, Starfield’s findings also imply massive fraud in all medical journals that routinely publish glowing results of clinical trials of drugs.

Such trials open the door to the marketing of drugs that kill, according to Starfield, 106,000 Americans every year. How is this possible unless deep, continuing, and abetted research fraud are the order of the day?

Indeed, Dr. Marcia Angell, the editor of New England Journal of Medicine for 20 years, wrote the following:

“It is simply no longer possible to believe much of the clinical research that is published, or to rely on the judgment of trusted physicians or authoritative medical guidelines. I take no pleasure in this conclusion, which I reached slowly and reluctantly over my two decades as an editor of The New England Journal of Medicine.” (NY Review of Books, January 15, 2009)

The FDA, of course, is the single government agency responsible for certifying drugs as safe and effective, before their public release is permitted. Yet the FDA takes absolutely no responsibility for the deaths.

Can you imagine the feeding frenzy, if, say, some leaker in the Pentagon passed along a political/military document to Wikileaks that showed the Dept. of Defense was poisoning to death, like clockwork, a hundred thousand of its own soldiers every year?

Let’s stop this insane nonsense of separating one whole set of government crimes from another, simply because the propagandized priests in the white coats are above reproach.

We’re not living in 1950 anymore, and this isn’t Kansas.

Continue Reading At: JonRappoport.wordpress.com
__________________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free emails at NoMoreFakeNews.com or OutsideTheRealityMachine.