Palantir & Pre-Crime

alternative news
Source: GizaDeathStar.com
Dr. Joseph P. Farrell Ph.D.
August 18, 2017

Never heard of Palantir? Well, if you’re a J.R.R. Tolkien- Lord of the Rings fan, or a fan of the movie adaptations of the fantasy trilogy, you’ll know what a “palantir” is: it is for all intents and purposes a crystal-ball that functions as a kind of communications device, allowing its users, presumably, to also see future actions.

It is also the name of a predictive program developed by Peter Thiel, and rapidly being sold to law enforcement agencies around the country, according to this article shared by Mr. R.R.T, and it’s well worth reading and pondering carefully:

Palantir: the ‘special ops’ tech giant that wields as much real-world power as Google

As the article avers, the program brings to mind Philip K. Dick’s “Department of Pre-Crime” which figured in the Tom Cruise movie, Minority Report:

Palantir, the CIA-backed startup, is Minority Report come true. It is all-powerful, yet no one knows it even exists. Palantir does not have an office, it has a “SCIF” on a back street in Palo Alto, California. SCIF stands for “sensitive compartmentalised information facility”. Palantir says its building “must be built to be resistant to attempts to access the information within. The network must be ‘airgapped’ from the public internet to prevent information leakage.”

Palantir’s defence systems include advanced biometrics and walls impenetrable to radio waves, phone signal or internet. Its data storage is blockchained: it cannot be accessed by merely sophisticated hacking, it requires digital pass codes held by dozens of independent parties, whose identities are themselves protected by blockchain.

Palantir watches everything you do and predicts what you will do next in order to stop it. As of 2013, its client list included the CIA, the FBI, the NSA, the Centre for Disease Control, the Marine Corps, the Air Force, Special Operations Command, West Point and the IRS. Up to 50% of its business is with the public sector. In-Q-Tel, the CIA’s venture arm, was an early investor.

Palantir tracks everyone from potential terrorist suspects to corporate fraudsters (Bernie Madoff was imprisoned with the help of Palantir), child traffickers and what they refer to as “subversives”. But it is all done using prediction.

In Iraq, the Pentagon used Palantir software to track patterns in roadside bomb deployment and worked out garage-door openers were being used as remote detonators by predicting it.

Palantir allowed the marines to upload DNA samples from remote locations and tap into information gathered from years of collecting fingerprints and DNA evidence, the results returned almost immediately.

Of course, all of this calls to mind Dick’s “Department of Pre-Crime” and the dangers it presents, and the article itself mentions them:

However, when Cruise’s character begins to question the morality of what he is doing, his superiors detect a threat to the entire pre-crime programme. In order to get rid of him, Cruise is framed for a murder by altering the data of his thought history. In the final showdown with his boss, it is explained to Cruise that sometimes the numbers need to lie for the greater good of society.

Minority Report is set in 2054, but Palantir is putting pre-crime into operation now. The Los Angeles Police Department has used Palantir to predict who will commit a crime by swooping Minority Report-style on suspects. Palantir calls its work with the LAPD “improving situational awareness, and responding to crime in real time”.

Ok, so where’s the high octane speculation.

Well, today I don’t have one, but I do have a high octane prediction. Christ, according to the Gospels, once warned that all evil ultimately proceeds from the heart and mind of man. This is where it begins; the evil action begins not just in a thought or a temptation, but by the individual will holding it, so to speak, to the mind’s attention, and contemplating it. From God’s point of view, in other words, while the wilful attention to an evil action may not result in the action itself, nonetheless it is the same in God’s eyes as if it had. But from the practical development of moral theology, it was long recognized that, from the human point of view, the action itself was far worse than the mere act of wilful (and pleasurable) attention to it. (Apologies for compacting so much into so little space!) With this in mind, here is the high octane prediction: the use of such programs will be justified by those wanting to impose even more surveillance on society precisely by such “theological” and “moral” appeals; after all, if Christ warned about the heart and mind of the individual as the beginning of the process of an evil action, then the best way to nip it in the bud is to convict on the basis of that beginning, regardless of the end result. It will be “sold”, as it were, as a very “Christian” or “pious” or “religious” thing to do. Technology will thus be sold as a “solution” to the old problem of theodicy; technology, not grace, will perfect mankind. Everyone must conform in their thinking… it will be the new manifestation of the “social gospel”, a tempting apple in the eye of its advocates.

And that of course, completely misses the other part of the problem, but I’ll leave that for the reader to think about…

See you on the flip side…

Read More At: GizaDeathStar.com
________________________________________________

About Dr. Joseph P. Farrell

Joseph P. Farrell has a doctorate in patristics from the University of Oxford, and pursues research in physics, alternative history and science, and “strange stuff”. His book The Giza DeathStar, for which the Giza Community is named, was published in the spring of 2002, and was his first venture into “alternative history and science”.

Advertisements

11-Year-Old Activist Warns About The Internet Of Things By “Weaponizing” A Teddy Bear


Source: ActivistPost.com
Kevin Samson
May 18, 2017

The new “smart world” that we are embarking upon as an increasing number of our computerized devices and objects become part of The Internet of Things has promised more convenience and more efficiency. And, yet, not a day seems to pass without a report about hacking.

While malware, election rigging, and corporate attacks tend to take center stage, a disturbing amount of very personal cyber invasions are also on the rise. Here is just a small sampling of articles that represent the dangerous and the downright creepy side of connecting one’s life to the Internet.

By now it should be obvious, even to a child, that we have a problem here. Well, in fact, it might just be a child who can help wake up the world to the scope of the issue.

An AFP article titled “Cyber Kid Stuns Experts Showing Toys Can Be ‘Weapons’” has gone viral. 11-year-old Reuben Paul took the stage at the World Forum cyber security conference in The Hague.

“From airplanes to automobiles, from smart phones to smart homes, anything or any toy can be part of the” Internet of Things (IOT),” he said, a small figure pacing the huge stage at the World Forum in The Hague.

“From terminators to teddy bears, anything or any toy can be weaponised.”

“IOT home appliances, things that can be used in our everyday lives, our cars, lights refrigerators, everything like this that is connected can be used and weaponised to spy on us or harm us.”

Reuben demonstrated this fact by first obtaining the numbers of audience members via their Bluetooth connection, then taking one of the numbers to hack into his toy teddy bear. The bear now became a surveillance and recording device.

 Although 11-year-old Reuben does appear to be a bona fide “cyber ninja” whiz kid, AFP‘s contention that this “stunned experts” stretches the truth a bit. Listen here to a 2012 speech given by DARPA’s Program Manager, Dr. Kathleen Fisher. Sound familiar?

Fortunately, it doesn’t appear that young Reuben is on his way to work for the dark side. Instead he is shouting from the rooftop that we are entering a very dangerous new world where the things around us become “timebombs” as he calls them. Reuben also isn’t stopping with giving speeches to the “experts”; he has formed the CyberShaolin non-profit organisation “to inform kids and adults about the dangers of cyber insecurity.” Let’s hope that Reuben will indeed spearhead a new way forward to fix what the adults in the room should have properly addressed all along.

Kevin Samson writes for Activist Post, where this article first appeared.

Georgetown Law sues NYPD for surveillance documents

Source: RT
May 7, 2017

Georgetown University’s law school has sued the NYPD after the police department failed to fully comply with its Freedom of Information Act request. The school conducted a study on the use of facial recognition in police department’s surveillance programs throughout the country. While the NYPD responded to Georgetown’s request, the university says the police department withheld pertinent information. RT’s Natasha Sweatte has the story.

US Presidents Can Grant Immunity To Snooping Spies

Sharyl Attkisson reports on methods of covert surveillance

FakeNews
Source: NoMoreFakeNews.com | JonRappoport.wordpress.com
By: Jon Rappoport
April 16, 2017

Government agents can’t legally spy on a US citizen? Do the spying in a ship outside the three-mile limit, in international waters.

This is just one way of skirting the law.

Sharyl Attkisson, former CBS investigative reporter, recently spoke with “a small group of reliable, formerly high-placed intelligence officials.” They tipped her to surveillance tactics in the arsenal of intel agencies.

Attkisson: “U.S. Presidents have the power to issue secret presidential directives that can authorize otherwise illegal acts (theoretically in the country’s best interests). These directives may come with pre-planned cover stories to be used in the event the operation is exposed, and they come with indemnity for those involved, giving them permission to lie about the operation or their involvement without fear of prosecution… The public will rarely know about such presidential directives since most who see them must sign agreements that promise nondisclosure and consent to polygraphs.”

That’s a blockbuster revelation.

Guaranteed immunity for those involved in the spying/surveillance operation (and other types of operations).

Plus permission for agents to lie about being involved.

All in the interest of “national security.” Unless it isn’t. Unless a president wants to enact revenge on a personal enemy, or commit a financial crime, or win an election, or protect a friend, or serve his elite bosses, or advance a corporate goal, or…pretty much anything.

He can act like a king.

One of Attkisson’s intelligence sources told her the following: “If the work of targeting an individual cannot be accomplished by government intel officers, it can be contracted out to third parties or to foreign parties who aren’t bound by U.S. law.”

Here’s a complete shady five-step method for spying. Attkisson:

“1. Locate a foreign target already under CIA surveillance.”

“2. Have a government agent use the foreign target’s phone and/or computer to make it look like the foreigner contacted the U.S. citizen whose communications are sought. The contacts can be benign, but they establish a record that falsely implies a relationship exists between the U.S. citizen and the foreign target.”

“3. The government agent can also mimic a communication back from the U.S. citizen to the foreign target, creating an appearance that the U.S. citizen initiated contacts. This could be favorable to justifying a warrant on the U.S. citizen later.”

“4. The U.S. citizen is now tied to the foreign entity and is now an ‘incidental’ collection target that can be surveilled in a ‘masked’ format. Although ‘masked,’ the surveilling agency knows the U.S. citizen’s identity.”

“5. If the U.S. citizen does anything that can be construed as illegal or suspicious, it’s possible the intel agency can then receive approval to surveil him directly rather than only ‘incidentally’.”

All these crooked methods and approaches to spying on US citizens are, of course, accompanied by other legal methods. And permission to pursue even the legal avenues can be obtained by hoax and fraud and special favor. Then there is the NSA, which spies on Americans as if it were a natural law, like the sun rising and setting.

The war on terror? That’s just a pretext to allow universal surveillance.
Read More At: JonRappoport.wordpress.com
_______________________________________________________________

Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.

Four easy ways to stop your cell phone from spying on you

Image: Four easy ways to stop your cell phone from spying on you
Source: NaturalNews.com
D. Samuelson
March 30, 2017

Millions of Americans bow down to their smart phone, tweeting, typing and texting their politics, social grievances, emotional explosions, insecurities, purchases, investments, health concerns, musical tastes, children’s photos, travels, food cravings, collaborations, loves, hates and just about anything else imaginable. Most users know, and may not care, that the data they share is quickly sold to high tech marketers looking to make a buck by offering the user hyper-personalized products. ?

As reported by Readynutrition.com, Wikileaks has produced proof of the CIA’s ability to “identify and exploit vulnerabilities for the purpose of secretly collecting data on individuals” from “85% of the world’s smart phones.” The common link among these devices is that they run on the Android operating system by Google. Samsung phones and Sony phones are among those mentioned, along with certain social messaging apps like Clockman, Weibo and WhatsApp.

What’s even more chilling is a report by The Intercept, which documented that the National Security Agency (NSA) targets those they want to eliminate through “cell-phone tracking technologies.” In other words, after the NSA locates the SIM card, the CIA or the U.S military sends in the drone to kill the person holding that phone.

So how can you stop being monitored and block the signals from your smart phone? It’s amazingly simple. Mylar, best defined as a “strong polyester film” that can be used for insulation and storage bags, plays an important role in attaining your privacy. It’s used in three of these four strategies shared by Readynutrtion.com.

1. Mylar bags from snacks or chips

There are lots of sizes, and these bags are everywhere. You’ll need at least three layers. To avoid the residue salt or crumbs from the food, put your phone in a zip lock bag before placing it in the mylar snack bags. You can put duct tape around all three bags and create a secure pouch.

2. Mylar blankets and ponchos

If you don’t have a few mylar blankets or ponchos in your emergency kit, it’s time to get a few, along with some organic emergency storable food. Mylar ponchos and blankets are small and packable and not too pricey. Buy an extra one and cut it as needed for your smart phone. As before, you’ll need three layers for your bag or pouch.

3. Mylar freezer bags

This will work for your laptop as well. Again, three layers for the devices.

4. Military Issue Ammunition Bag

When you find one, it’s important that the rubber gasket is secure.

Before you snuggle your phone into its tracking proof bag, make sure it’s turned on and the volume is up all the way. Wrap it securely, then hold the bag with the phone close to your ear while you call your number from another phone. Only allow 3 rings, don’t let it go to  voice mail. If your phone is securely wrapped,  you won’t hear a thing. That’s a good sign.

With the mylar protection, or the ammo can, that “continuous signal your cell phone sends out every 4 seconds” is interrupted. With this new protection, you may miss a few calls, but now you have a choice to be tracked, or not.

RELATED: For more information on privacy and surveillance, visit Privacywatch.news.

Read More At: NaturalNews.com

Sources:

ReadyNutrition.com

TheIntercept.com

YourDictionary.com

‘We’re all vulnerable’ until police disclose surveillance tech – NYC council member

Source: RT
March 1, 2017

Cutting-edge technology is used in police departments around the country with little or no public oversight. On Wednesday, New York City lawmakers introduced a bill to force the New York Police Department to disclose all high-tech surveillance equipment it uses to the public. RT America’s Trinity Chavez brings us the details.

Mainstream news is Humpty Dumpty, and he’s not coming back

Source: NoMoreFakeNews.com
Jon Rappoport
November 30, 2016

Mainstream news is a dream pretending to be real.

In 1927, Carl Jung wrote: “…the dream is the theater where the dreamer is at once scene, actor, prompter, stage manager, author, audience, and critic.”

But in the case of the news, the dream must come from an external place. It must come from The Anchor.

There must be His Voice and it must narrate (invent, fabricate) the hallucination.

In Paddy Chayefsky’s 1976 film, Network, the unhinged news anchor Howard Beale tells his audience: “We deal in illusions, man. None of it is true! But you people sit there day after day, night after night, all ages, colors, creeds. We’re all you know. You’re beginning to believe the illusions we’re spinning here. You’re beginning to think that the tube is reality and that your own lives are unreal. You do whatever the tube tells you….You even think like the tube. This is mass madness. You maniacs. In God’s name, you people are the real thing. We are the illusion…”

The news is a fabricated continuum.

The staff and crew who assemble the nightly network news understand this well. They enable smooth transitions from one story to another, backing up the anchor whose voice-rhythms intone surety. They switch from the anchor in-studio to field reporters and back; they do everything they can to eliminate technical mistakes and, above all, guard against their nemesis:

Dead air.

Seconds of nothing.

This is also what a hypnotist avoids; anything that would cut the trance.

The elite anchor, the voice that narrates reality, is the modern version of the underworld ferryman Charon, carrying a billion souls across the River Styx every night.

But now: SOMETHING HAS CHANGED.

YOU HAVE CHANGED.

You have introduced dead air into the nightly transmissions.

Are you absolutely nuts?!

If the whole show falls and crumbles, don’t you see what’ll happen?

Decentralization will happen.

Other voices will supplant the dream-narrator.

Chaos will be unleashed.

—Well, actually, decentralization is occurring right now; and the world isn’t collapsing because of it.

Something else is going on.

You’re going on.

Independent news is going on. All over the place.

Elite news is Humpty Dumpty after he fell off the wall. He’s not coming back. He’s in pieces.

Humpty was the channel for official information. He was the relay man for piped fraud. He was the government and corporate spokesman posing as the unimpeachable source of truth.

YOU were the primary reason for his fall. You deserted Humpty. You were the first wave. And now…

“All the king’s horses and all the king’s men” are trying put Humpty together again by attacking independent news as “fake.” That’s their desperate strategy. It’s not working. It’s having an opposite effect. Tell people they shouldn’t pay attention to something and should avoid it like the plague—and they’re going to search out that very thing and look into it. They’re the second wave.

And the third and the fourth.

Years ago, when I first wrote about Dr. Barbara Starfield’s stunning review on medically caused death in America (JAMA, July 26, 2000), when I reported her findings—225,000 deaths a year, 2.25 million deaths per decade—I was pushing for major media coverage. But soon I realized that was never going to happen, and it was unnecessary. Something else was going on. Independent news was building. It was taking over.

And as a result, Humpty was sitting less securely on his wall.

Humpty was committed to spreading hallucinations and he wasn’t going to stop, and this was his psychosis.

He didn’t stop. And he fell.

Independent news outlets are having double effects: they’re revealing shocking scandals and crimes; and without even trying, they’re showing that elite news is ignoring and burying that deep truth. This second effect is highly corrosive to faith in elite news.

For example, consider Russ Tice, long-time intelligence-agency veteran, who led the way in bringing to light the deeper operations of the Surveillance State. Now censored by mainstream news, Tice told Boiling Frog’s Sibel Edmonds and Peter Collins, on June 19, 2013:

RUSS TICE: “Okay. They [the NSA] went after [spied on] — and I know this because I had my hands literally on the paperwork for these sort of things — they went after [spied on] high-ranking military officers; they went after members of Congress, both Senate and the House, especially on the intelligence committees and on the armed services committees and some of the — and judicial. But they went after other ones, too. They went after lawyers and law firms. All kinds of–heaps of lawyers and law firms. They went after judges. One of the judges [Alioto] is now sitting on the Supreme Court that I had his wiretap information in my hand. Two are former FISA court judges. They went after State Department officials. They went after people in the executive service that were part of the White House–their own people. They went after antiwar groups. They went after U.S. international–U.S. companies that that do international business, you know, business around the world. They went after U.S. banking firms and financial firms that do international business. They went after NGOs that–like the Red Cross, people like that that go overseas and do humanitarian work. They went after a few antiwar civil rights groups. So, you know, don’t tell me that there’s no abuse, because I’ve had this stuff in my hand and looked at it. And in some cases, I literally was involved in the technology that was going after this stuff. And you know, when I said to [former MSNBC show host Keith] Olbermann, I said, my particular thing is high tech and you know, what’s going on is the other thing, which is the dragnet. The dragnet is what…

Continue Reading At: JonRappoport.wordpress.com
_______________________________________________________________
Jon Rappoport

The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.