Everything you search for on Google is now easily obtained by police

Image: Everything you search for on Google is now easily obtained by police
Source: NaturalNews.com
JD Heyes
March 22, 2017

If you thought that your search engine history was private, think again. It’s not. Or, at least, it may not be, depending on whether or not you’re under police investigation.

According to The Free Thought Project, a court in Minnesota has recently ruled that an entire city’s search history should be made available to police, an Orwellian first as far as anyone can tell. It may well mark the beginning of the end of Internet freedom.

Cops in Edina, Minn., were granted a warrant that requires search giant Google to provide search history information and the names of everyone in the city who utilized specific search terms between Dec. 1, 2016, and Jan. 7, 2017. (RELATED: BOMBSHELL Investigation: Google An “Information Dominance” Front For The CIA)

Now mind you, this case isn’t about a nuclear bomb plot, a planned act of terrorism, a major jewel heist or child porn. Rather, ARS Technica notes, the case is about alleged wire fraud worth less than $30,000. But if Google honors the warrant, like it probably will have to do since the warrant is a legal document issued by a valid court, that would be a horrible precedent moving forward because it could be duplicated by departments all over the country.

ARS Technica reports that police investigators are looking for an online picture of a person with the same name as a local victim of financial fraud because said image was found on a phony passport that was utilized to fool a credit union into transferring some $28,500 out of a man’s account who takes up residence in Edina. Someone faxed the fake passport to the credit union as ‘proof’ of identity under a spoofed phone number to mimic the victim’s phone, the search warrant notes.

The Free Thought Project reported further:

The ominously worded warrant makes some chilling demands — all over a small fraud case.

A Google search, the warrant application says, as reported by Ars Technica, reveals the photo used on the bogus passport. The image was not rendered on Yahoo or Bing, according to the documents. The warrant commands Google to divulge “any/all user or subscriber information”—including e-mail addresses, payment information, MAC addresses, social security numbers, dates of birth, and IP addresses—of anybody who conducted a search for the victim’s name.

What makes this warrant so worrisome, especially if Google complies with it, is that it seems to go far beyond the legal standard of probable cause. While it appears likely that something illegal may have happened, it’s obvious that most, if not all, of the people in Edina are not guilty of doing anything wrong. Granted, cops have to investigate but how can a court reasonably assume that everyone in an entire city is under suspicion, thereby satisfying the legal standard of probable cause?

That seems a stretch, to say the least.

What also seems very likely, then, is that police will obtain evidence that may implicate other criminal activity, and while you may applaud that, understand that such overly broad searches were never envisioned by our founding fathers, hence the adoption of the Fourth Amendment, which is supposed to protect against “unreasonable searches.” (RELATED: BREAKING: Police Are Now Routinely Taking Items Out Of Unlocked Cars To ‘Protect’ Citizens From Theft)

The Fourth Amendment originally enforced the notion that ‘each man’s home is his castle,’ secure from unreasonable searches and seizures of property by the government,” Cornell University Law School notes in describing the purpose of the amendment. “It protects against arbitrary arrests, and is the basis of the law regarding search warrants, stop-and-frisk, safety inspections, wiretaps, and other forms of surveillance, as well as being central to many other criminal law topics and to privacy law.”

So it seems apparent a city-wide “search” of Google records is far and away outside the scope of what is allowable under the Constitution. It’s hard to tell what is worse – that a police department would make such a request or that a court would grant it.

J.D. Heyes is a senior writer for NaturalNews.com and NewsTarget.com, as well as editor of The National Sentinel.

Read More At: NaturalNews.com

Sources:

TheFreeThoughtProject.com

ARSTechnica.com

GoodGopher.com

Information released about Google’s mishandling of public health data is horrifying

Image: Information released about Google’s mishandling of public health data is horrifying
Source: NaturalNews.com
JD Heyes
March 20, 2017

In a recent interview on Jimmy Kimmel Live, comedian and actor Tim Allen decried the data collection and surveillance of two of the world’s biggest corporations: Amazon and Google.

Saying that Amazon knows “way too much about us,” he also said this:

If the government drove down the street in a gray sedan with a camera on it, you’d be rioting, going to Washington. But if it’s white, with emojis and ‘Google’ on it, ‘Yay! You’re waving at it! They’re taking pictures of your house!

Who are these people? I wanted to put FU on the top of my house.

Allen appears to be referring to Google Maps and Google Street View, both of which contain databases of physical locations of our homes and businesses, which he rightfully intimates is a huge privacy issue. (RELATED: Google And Facebook Are The New NSA)

Well, that’s not the only database that Google maintains and, apparently, abuses. As noted by Motherboard, Google subsidiary DeepMind, an artificial intelligence firm that jumped into healthcare data storage in 2015, has been lambasted in a new report critical of the firm’s patient privacy approach regarding the UK’s National Health Service (NHS).

“DeepMind had not built a piece of healthcare software in its entire existence, and so, to have it just be walked over to by physicians and have an entire hospital’s worth of identifiable patient data given to them on trust seems a bit much to me,” report co-author Hal Hodson told Motherboard.

At issue, Hodson found, were a number of occasions where DeepMind compromised personally identifiable information (PII) on millions of patients.

In July 2015 physicians with Great Britain’s public hospital system requested that DeepMind create software using patient data supplied to it by the NHS. Around four months later, the PII on 1.6 million patients found its way to third-party servers within firms processing data for DeepMind’s software development project supposedly tied to patients at risk of acute kidney problems.

An April 2016 probe by Hodson, who was employed by New Scientist at the time, found that DeepMind had much more access to patient data than the company had revealed publicly. The firm was handling data and other information related to patients with HIV, who had suffered through drug overdoses and women who had gotten abortions dating back five years.

Hodson wrote in his academic report that it was only after a New Science article revealed as much “that any public conversation occurred about the nature, extent, and limits of the DeepMind-Royal Free data transfer.”

He concluded in his paper that the fact that DeepMind actually obtained access to more data than it claimed should serve as a warning.

“By doing so badly at the start, it will be harder for them going forward, but I also think potentially it’s good,” Hodson told Motherboard. “There’s now a lot more scrutiny, people are paying more attention to this stuff.” (RELATED: WATCH OUT: Google Is Recording Everything You Search And Say)

How much data does Google have, exactly? Apparently enough that it fronts as a data hub for the CIA, as noted by Mike Adams, the Health Ranger, in February:

One of the fascinating things that’s happening as a side effect of Natural News being blacklisted by Google is that thousands of people are contacting us with information about the hidden history of Google. As we are coming to discover, Google isn’t an innocent, friendly search engine created to help humanity… it’s actually an extension of the deep state that seeks to dominate and enslave all of humanity.

He noted a separate report by Insurge Intelligence which found that the CIA essentially made Google by funding, nurturing and incubating it as a means of dominating the world through control of information. The search giant was apparently seeded with money from both the CIA and the NSA, “merely the first among a plethora of private sector start-ups co-opted by U.S. intelligence to retain ‘information superiority,’” the investigative journalism project reported.

J.D. Heyes is a senior writer for NaturalNews.com and NewsTarget.com, as well as editor of The National Sentinel.

Read More At: NaturalNews.com

Sources:

PrivacyWatch.news

Medium.com

Motherboard.Vice.com

TheNationalSentinel.com

What Is The Deep State? James Corbett on Financial Survival

Source: TheCorbettReport
James Corbett
March 20, 2017

SHOW NOTES AND MP3 AUDIO: https://www.corbettreport.com/?p=22193

James Corbett joins Alfred Adask for his bi-monthly appearance on Financial Survival. This time they discuss the #Vault7 documents, the surveillance state and the deep state. What is the deep state? Who are its members? How does it operate? Find out in this in-depth conversation.

New Bill Allows Genetic Testing of Employees – #NewWorldNextWeek

Source: TheCorbettReport | MediaMonarchy
James Corbett | James Evan Pilatto
March 16, 2017

Welcome to New World Next Week – the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. This week:

Story #1: To Cut Climate Money, Fake Right Has To Find Where Fake Left Stashed It
http://bit.ly/2n2mJ1q
Judith Curry Explains Climate Modeling to the Layman
http://bit.ly/2n2h4Zr
EPA Deputy Accused Of Working With Monsanto To Kill Cancer Study
http://bit.ly/2nqDh4d
Monsatan On Trial For Roundup Cancer
http://bit.ly/2mvyLNc

Story #2: New Bill Would Let Companies Force Workers To Get Genetic Tests, Share Results
http://bit.ly/2mM7bgf

Story #3: Need a Pothole Fixed? Maybe a Portland Anarchist Can Help!
http://bit.ly/2mRRbuQ

CIA planned on hacking cars to murder people with “undetectable assassinations”

CIA Spying
Source: NaturalNews.com
Jayson Veley
March 10, 2017

The measure of any successful society is the level of trust that is maintained between those in positions of power and the people. When the government and its various agencies are disciplined and transparent, then the country thrives. On the contrary, when that power is abused and the laws are ignored, the people’s trust, and the country as a whole, collapses.

In America, the people are justifiably growing more and more weary of the government. Secret meetings and backroom deals have practically become commonplace, and corruption has reached unprecedented levels. Take the IRS scandal for example, where the Internal Revenue Service was caught explicitly targeting conservative organizations and denying them tax-exempt status. This was not only a blatant example of corruption and federal overreach, but also a devastating blow to the trust level between the people and the government.

Similarly, in 2013, Edward Snowden famously revealed the unconstitutional spying and surveillance that was taking place within the National Security Agency. At first, the NSA attempted to cover their tracks by telling the public that the data collection only involved phone numbers and email addresses, not the actual content of those emails or phone conversations. It was soon revealed, however, that this was not true.

And so it goes.

In their latest information dump, WikiLeaks has revealed that the CIA was allegedly planning to carry out assassinations by hacking into cars and trucks. (RELATED: Read what a CIA whistleblower said about climate engineering and vaccine damage). The hacking is made possible by utilizing the phone’s geolocation software to gain control over the vehicle’s control system. WikiLeaks claims that the Central Intelligence Agency has been participating in a global hacking initiative involving the United States and European nations.

WikiLeaks alleges that the CIA was “looking at infecting the vehicle control systems used by modern cars and trucks” so that they could carry out secretive and “nearly undetectable assassinations.” They claim that “infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.” These phones include both iPhones and Android devices.

After the CIA obtains this information, Wikileaks claims, it could then “bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the ‘smart’ phones that they run on and collecting audio and message traffic before encryption is applied.”

In addition to the hacking of vehicles, WikiLeaks also claims that the Central Intelligence Agency is capable of gaining control over Microsoft Windows users and Smart TVs.

WikiLeaks has dubbed the information stolen from the CIA as “Vault 7,” the contents of which will gradually be revealed to the public over the next few weeks. As you may recall, a similar method was used when WikiLeaks released the information regarding the DNC and John Podesta, Hillary Clinton’s campaign manager. Shockingly, the thousands of pages of information that have already been released account for only 1 percent of the total information inside Vault 7.

In response to all of the information that has already been released and will continue to be released over the coming weeks, the CIA has reportedly stated that it has “no comment” on the matter. Further, the spy agency explained, “The CIA’s mission is to aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries. It is CIA’s job to be innovative, cutting-edge, and the first line of defense in protecting this country from enemies abroad. America deserves nothing less.”

There is no telling what will further be revealed about the CIA, but based on what we have already learned from the hacking organization WikiLeaks, much of it will most certainly be damning.

Read More At: NatuarlNews.com

Sources

Mirror.co.uk

Breitbart.com

DailyCaller.com

Spies Tell Lies, Spying Is Lying

Privacy

Source: NoMoreFakeNews.com | JonRappoport.wordpress.com
Jon Rappoport
March 9, 2017

In recent articles, I’ve highlighted items from the latest WikiLeaks data-dump of CIA files. For example:

The CIA’s use of other nations’ hacking tools, in order to give the impression that, when the CIA hacks into secret areas, it looks like other nations did the hacking.

All this is SOP for the CIA and intelligence agencies around the world.

Spies tell lies. A day without lying is a day without joy.

Spies play chess. “Well, when we leak THIS information to the press, they’ll emphasize the source of the leak (of course we know it’s a fake source we’ve chosen). But when we leak THAT information, the press will emphasize the content of the leak—which is what we want them to do in that case.”

Naïve people are shocked that the CIA could have fabricated the whole “Russia hacked the US election” story. But this is what the CIA does. This is another day at the office.

On the other hand, Russian intelligence could have hacked (influenced) the US election. And to put a further twist on it, Russia could have made that move, anticipating that US intelligence would discover it and go public with it. And then Russia would covertly launch a planned campaign to ridicule the CIA for claiming such an “absurdity.”

During the Cold War, several important KGB spies defected to the US. The CIA then proceeded to vet them, to find out whether they were genuine, or were sent here to seed the CIA with disinformation. As you can imagine, the whole business developed severe problems.

For example: “All right, yes, the KGB sent me to America to confuse you. But now I’m telling you the truth. I’m giving you actual secrets. And I want to stay here. I don’t want to go home. If I go home, the KGB will vet me to see whether I actually gave you real secrets…”

CIA: “Maybe we can triple this Russian. He’s now on our side, we think. So we send him back, claiming we couldn’t get anything useful out of him. But now he’s ours. So we give him a bunch of lies to tell his bosses about us, the CIA…”

In the end, nobody on either side knows what’s going on. But they play the game anyway.

The CIA is a reality-creator and a reality-destroyer. They pick and choose what to do in each situation. But it would be folly to imagine Agency people always do brilliant work. They mis-estimate blowback. They fail to handle blowback. They try to pick an outside scapegoat on whom to blame the blowback. They try to limit the blowback by defaming, discrediting, blackmailing, or killing people.

They rewrite history. They change sequences of events. They invent events that never happened. They blame people who don’t even exist. They present themselves as bumblers, to hide their more intelligent operations. They hold forums designed to show their work as superficial information-gathering, as if they were little more than a think-tank. They pretend to cooperate with Congress, while they spy on Congress.

Meanwhile, the press pretends to hold an innocent and respectful view of the CIA, dutifully reporting every piece of information that comes their way from the Agency. “Today, the CIA disclosed…” Disclosed? Or fabricated?

The CIA is perhaps the biggest fake news operation in the world. It exhales fake news as matter of course.

So naturally, it attracts men and women who have a bias in favor of fabricating. “Do…

Read More At: JonRappoport.wordpress.com
_______________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

Spy Ops: Yes, your smart TV really is spying on you: Leaked docs reveal CIA secretly turned Samsung TVs into microphones that spy on your conversations

Image: Yes, your smart TV really is spying on you: Leaked docs reveal CIA secretly turned Samsung TVs into microphones that spy on your conversations
Source: NaturalNews.com
J.D. Heyes
March 9, 2017

For years Deep State insiders and others familiar with the federal government’s spy agencies have been sounding the alarm about the development of technology that enables constant, real-time electronic surveillance of anyone, anywhere, anytime (President Donald Trump, something to consider as you delve into who ordered it against you and why.)

Now, thanks to another whistleblower following in the footsteps for former NSA contractor Edward Snowden, WikiLeaks has provided the proof that these insiders weren’t kooks or conspiracy theorists – they were spot-on. (RELATED: Is Your TV Spying On You? For Millions Of Viewers, The Answer Is YES!)

According to a treasure trove of newly released documents known collectively as “Vault 7” in the “Year Zero” series, not only does the CIA conduct improper electronic surveillance, it does through using technology that can tap into smart TVs, iPhones, Android devices, and other wireless handheld technology.

“The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but ‘Weeping Angel,’ developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization,” said a press release from WikiLeaks.

“The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake-Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake-Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server,” it added.

So in other words, even if you’ve turned your TV and devices “off,” the CIA’s technology, via wireless connections, can still transform them into listening devices, which records conversations and data and sends them to a remote CIA server for later downloading and analysis.

The government’s spy agencies, then, can literally steal any and all data they want, thereby giving them the power to create false narratives, phony email traffic, fake communiques and anything else they want in an effort to blackmail or destroy anyone they choose.

A journalist getting too close to Deep State activities? No problem – the CIA has the ability to bug their homes remotely, through smart devices, or steal their data and other information that may incriminate them, forcing them into silence.

A politician who opposes expansion of the Deep State’s power? No problem – just a few months’ worth of bugging his or her devices, and the nation’s premier spy agency has all it needs to coerce said problematic politician into playing ball.

“The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones,” said the Wikileaks press release. “Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications, as well as covertly activate the phone’s camera and microphone.” (RELATED: Amazon Echo devices spy on you in your own home… police are now trying to acquire those recordings.)

And even though iPhone held a minority share (14.5 percent) of the global market, a specialized CIA unit within the agency’s Mobile Development Branch produced malware that infects, controls and then extracts data from iPhones and other Apple products that are running iOS, like iPads and, presumably, iMacs and Macbook Pro laptops.

A similar unit is said to have targeted Google’s Android devices, which runs the vast majority of the world’s smart phones (about 85 percent, roughly).

“’Year Zero’ shows that as of 2016 the CIA had 24 ‘weaponized’ Android ‘zero days’ which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors,” said the press release.

“These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the ‘smart’ phones that they run on and collecting audio and message traffic before encryption is applied.”

Feel violated yet? You should.

Read More at: NaturalNews.com
__________________________________________________________

J.D. Heyes is a senior writer for NaturalNews.com and NewsTarget.com, as well as editor of The National Sentinel.

Sources:

WikiLeaks.org

NaturalNews.com

Newstarget.com