The House of Saud is in crisis as MBS consolidates his hold on the kingdom and prepares to transform Saudi Arabia in his image. But what is behind the purge, and how does it relate to the future of the world monetary system. Join James for a classic Corbett Report debriefing on the Saudi purge and the rise of the petroyuan.
SHOW NOTES AND MP3: https://www.corbettreport.com/?p=25008
CAN YOU FEEL IT? Big things are happening – and NONE of it would be occurring if Hillary Clinton was in the White House. Rats are being rounded up.
Note: Aside from agenda based problem-reaction-solution memes, from my observations False Flag events serve two main purposes…they’re enormous energy harvesting events, the time people invest into ‘sleuthing like Sherlock’ is incredible. They also harvest emotions like anger, fear, frustration and a feeling of powerlessness. Additionally, they’re a diversion – there’s always something else more important happening in left field ‘they’ don’t want us to see.
In addition to Melissa and Aarons feedback, the coup in Saudi Arabia and the Uranium One scandal are huge…
Please help support us on Patreon, read our goals here: https://www.patreon.com/truthstreammedia Truthstream Can Be Found Here: Website: http://TruthstreamMedia.com Minds: @InformedDissent (Join here! https://tinyurl.com/y8voad27 … we’re going to dump Facebook soon.) FB: http://Facebook.com/TruthstreamMedia Twitter: @TruthstreamNews DONATE: http://bit.ly/2aTBeeF Amazon Affiliate Link (help support TSM with every Amazon purchase, no cost to you!): http://amzn.to/2aTARRx Newsletter: http://eepurl.com/bbxcWX ~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~ Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.
Note: There appears to be a lot of movement and shifting behind the Wizards Curtain, lets hope these Tweets are from a credible source – time will tell.
Fyi…The title isn’t mine, it’s the video producer. If the Tweets are true, this is definitely one of the most important posts yet….
According to The National Association for Amateur Radio (ARRL), elements of the US Department of Defense (DOD) will simulate a “communications interoperability” training exercise across the United States on November 04-06. The announcement released on October 24 has not been widely distributed to the media, because the drill is simulating a total grid collapse and could spark public fear. “This exercise will begin with a national massive coronal mass ejection event which will impact the national power grid as well as all forms of traditional communication, including landline telephone, cellphone, satellite, and Internet connectivity,” Army MARS Program Manager Paul English, WD8DBY, explained in an announcement.
Please Visit Our Facebook Resources:
Solar Shutdown: https://www.facebook.com/SolarShutdown/
Comet C/2017 K2 – Panstarrs: https://www.facebook.com/OppenheimerR…
Plasma Geology: https://www.facebook.com/Plasma-Geolo…
Oppenheimer Ranch Project: An experiment in high alpine sustainability. https://www.facebook.com/oppenheimerr… Please SUBSCRIBE to our channel if you enjoyed the content. Share this video with like-minded individuals.
“The illusion of freedom will continue for as long as it’s profitable to continue the illusion. At the point where the illusion becomes too expensive to maintain, they will take down the scenery, move the tables and chairs out of the way, then they will pull back the curtains and you will see the brick wall at the back of the theater.” – Frank Zappa ”
Who controls the past controls the future, who controls the present controls the past.” – George Orwell
When the tyrant has disposed of foreign enemies by conquest or treaty and there is nothing to fear from them, then he is always stirring up some war or other, in order that the people may require a leader. – Plato
“I would rather have questions that can’t be answered than answers that can’t be questioned.” – Richard Feynman
“I have lived on the lip of insanity, wanting to know reasons, knocking on a door. It opens. I’ve been knocking from the inside.” – Rumi
Universal Law/sovereign law trumps all others.
1. No man or woman, in or out of government shall initiate force, threat of force or fraud against my life and property and, any and all contracts Im a party to not giving full disclosure to me whether signed by me or not are void at my discretion.
2. I may use force in self-defense against anyone that violates Law
3. There shall be no exceptions to Law 1 and 2.
TURN OFF YOUR TELEVISION!
THROW AWAY YOUR SMART PHONE!
Max Igan – Surviving the Matrix – Episode 313 – American Voice Radio, October 27th, 2017 – http://thecrowhouse.com
Support The Crowhouse: https://www.patreon.com/maxigan?ty=h
Note: This is one of the strangest health story’s to surface in quite some time. Was this guy being mind controlled, or is he simply a psychopath? This is a twisted affair which is still shrouded in mystery.
That said, there’s nothing to fear. “IF” – big if – the Black Plague spreads, or if you need to travel to Africa simply stock up on Thieves Oil. It was used by thieves during the Black Plague to avoid contracting the disease while they robbed the dead and dying. When questioned by a judge about how they avoided catching the plague, testimony revealed they wore scarves doused with Thieves Oil over their nose and mouth, which apparently prevented transmission and boosted immune function. Strange times indeed, be safe…blessings!
(C)2017 http://www.POTRBLOG.com Is Virulent Black Death Outbreak Tied To Admitted Gay Fetish-Murder Triangle Plague Researcher? The highly unusual outbreak of airborne Pneumonic Plague in Madagascar may be manmade and of higher threat to humanity than might otherwise be expected. In an August tweet the PORTBLOG team warned about the potential for an outbreak of Pneumonic Plague tied to the arrest one of the world’s top Pneumonic Plague researcher’s as the mastermind behind a truly bizarre gay fetish murder triangle. Fast forward two months, and a highly unusual Pneumonic Plague outbreak is underway in Madagascar, and it has been declared at risk of spreading internationally via air travel.
Here is what we know about the guy who might be behind this unusual outbreak:
(1) He admitted he recently traveled to Madagascar
(2) He was appointed to lead Pneumonic Plague research at the Pasteur Institute in Paris
(3) French Authorities strangely killed his security clearance to handle BioWeapons
(4) He returned to the USA and apparently masterminded a Fetish Murder Ritual with a stranger to murder multiple people, including himself and his coconspirator.
(5) His apparent profile fits the type of person who would engage in a Bioterror murder.
(6) He researched and engineered virulent forms of airborne Plague bacteria in his lab
(7) The time frame is right for him to have seeded Pneumonic Plague in Madagascar (8) A highly unusually airborne outbreak of Pneumonic Plague has occurred in Madagascar
(9) Since his arrest Wyndham Lathem admitted that: ‘he’s not the person people thought he was’. None of this proves that Wyndham Lathem is behind the outbreak, but it is coincidence enough that prudent persons might make preparations for a Global outbreak much like the World Bank just did yesterday (10/24).
Source info at http://pissinontheroses.blogspot.com/…
Note: Facebook shoots itself in the foot! This move, if implemented globally will drive more people away from FB’s corrupted social media platform. Have recently noticed a steep decline in referrals from FB and that many people have disappeared from some of the larger groups. Another sign of the times….
The posts will now only be shown in a separate tab called ‘Explore Feed,’ which was officially unveiled last week. The test is only active for people in Sri Lanka, Bolivia, Slovakia, Serbia, Guatemala, and Cambodia. Facebook confirmed the test on Monday, which was first spotted by Slovakian journalist Filip Struharik.
Some of the top Facebook pages in Slovakia lost as much as two-thirds to three-fourths of their reach due to the change, according to Facebook-owned analytics tool CrowdTangle.
Stories from publishers and businesses are being transferred from the main feed to the Explore Feed, while the main feed is reserved for posts from friends and family.
It may end up with publishers having to pay Facebook to promote their stories so that people can see them.
Facebook’s News Feed VP Adam Mosseri wrote about the test, saying: “We currently have no plans to roll this test out further.”
Mosseri also tweeted about the length of time the test will take.
According to Mosseri, “The goal of this test is to understand if people prefer to have separate places for personal and public content. We will hear what people say about the experience to understand if it’s an idea worth pursuing any further… As with all tests we run, we may learn new things that lead to additional tests in the coming months so we can better understand what works best for people and publishers.”
Facebook has been known to make dramatic changes in their algorithms that affect referral traffic and reach for publishers. Just last year, it changed how the News Feed works, prioritizing posts shared by family and friends over content shared by publishers.
Ed. Note: The Tweets didn’t copy, click here for tweets
Former Assistant HUD Secretary and Wall Street Investment Banker, Catherine Austin Fitts of the Solari Report, has recently provided compelling evidence that $21 trillion US Dollars was created out of thin air and then stolen by the DOD/Pentagon. That’s $65,000 for every American! Do you believe her? Where do you think the money was spent? 1) https://solari.com/blog/dod-and-hud-m… 2) https://missingmoney.solari.com/ Jason Burack of Wall St for Main St forget to mention during his X22 Report Spotlight Interview on Wednesday that $6.5 Trillion US Dollars was unaccounted for according to a Reuters report last year in August 2016 http://www.zerohedge.com/news/2016-08…. Jason’s X22 Report Spotlight Interview released yesterday: https://youtu.be/DhfoPUoDOGs But, that $6.5 trillion number is tiny (but still massive overall) compared to the new number Catherine Austin Fitts claims was created out of thin air and then stolen. Catherine Austin Fitts speaks to Alex Jones on Infowars about the $21 trillion https://youtu.be/nhwVMlDVJII Please visit the Wall St for Main St website here: http://www.wallstformainst.com/
In a rush this week, we have Ole Dammegard back to break down the latest tragedy, the Route 91 Harvest Festival shooting. Of course, because of Ole’s continued work dissecting false flags and terror events, he is one of the first to recognize elements at play that seem to follow the same template – a template that suggests these are highly planned and coordinated events, rather than the work of random, unmotivated, lone attackers. Our deepest sympathies to anyone who has experienced pain and loss due to such an event. To me, digging deeper into things that seem suspicious and inconsistent with media reports, is the best and most honorable thing we can do, short of going back in time. I know if I died in one of these situations, the last thing I’d want is for it to be a false flag situation that isn’t properly investigated. That said, what you’re getting here is a conversation about elements that don’t seem to add up, or contain strange symbolism/foreshadowing. We also discuss the major alternative theories and motivations. This is largely a synthesis of what we’re seeing so far, all alleged, and not everything can be fully vetted at this time. All we can do is examine it, and try our best to seek the truth. This isn’t fear porn. This isn’t capitalizing on a tragedy. Ole’s website: https://www.lightonconspiracies.com/
False flag operations analyzed as a distinctively modern phenomena, post WWI; the planet being stolen by a transnational corporate financial class; ideological false flags including religions and nationalism; the propaganda spectrum including cultural values, educational system and news media; a war of corporate cultural control and imposition of a global police state; US Psychological Operations Manual; white, grey and black PSYOPs; regime change and color revolutions; NGOs; characteristics of a false flag.
‘Surveillance is the business model of the internet,’ Berkman and Belfer fellow says
In the internet era, consumers seem increasingly resigned to giving up fundamental aspects of their privacy for convenience in using their phones and computers, and have grudgingly accepted that being monitored by corporations and even governments is just a fact of modern life.
In fact, internet users in the United States have fewer privacy protections than those in other countries. In April, Congress voted to allow internet service providers to collect and sell their customers’ browsing data. By contrast, the European Union hit Google this summer with a $2.7 billion antitrust fine.
To assess the internet landscape, the Gazette interviewed cybersecurity expert Bruce Schneier, a fellow with the Berkman Klein Center for Internet & Society and the Belfer Center for Science and International Affairs at Harvard Kennedy School. Schneier talked about government and corporate surveillance, and about what concerned users can do to protect their privacy.
GAZETTE: After whistleblower Edward Snowden’s revelations concerning the National Security Agency’s (NSA) mass surveillance operation in 2013, how much has the government landscape in this field changed?
SCHNEIER: Snowden’s revelations made people aware of what was happening, but little changed as a result. The USA Freedom Act resulted in some minor changes in one particular government data-collection program. The NSA’s data collection hasn’t changed; the laws limiting what the NSA can do haven’t changed; the technology that permits them to do it hasn’t changed. It’s pretty much the same.
GAZETTE: Should consumers be alarmed by this?
SCHNEIER: People should be alarmed, both as consumers and as citizens. But today, what we care about is very dependent on what is in the news at the moment, and right now surveillance is not in the news. It was not an issue in the 2016 election, and by and large isn’t something that legislators are willing to make a stand on. Snowden told his story, Congress passed a new law in response, and people moved on.
GAZETTE: What about corporate surveillance? How pervasive is it?
SCHNEIER: Surveillance is the business model of the internet. Everyone is under constant surveillance by many companies, ranging from social networks like Facebook to cellphone providers. This data is collected, compiled, analyzed, and used to try to sell us stuff. Personalized advertising is how these companies make money, and is why so much of the internet is free to users. We’re the product, not the customer.
GAZETTE: Should they be stopped?
SCHNEIER: That’s a philosophical question. Personally, I think that in many cases the answer is yes. It’s a question of how much manipulation we allow in our society. Right now, the answer is basically anything goes. It wasn’t always this way. In the 1970s, Congress passed a law to make a particular form of subliminal advertising illegal because it was believed to be morally wrong. That advertising technique is child’s play compared to the kind of personalized manipulation that companies do today. The legal question is whether this kind of cyber-manipulation is an unfair and deceptive business practice, and, if so, can the Federal Trade Commission step in and prohibit a lot of these practices.
GAZETTE: Why doesn’t the commission do that? Why is this intrusion happening, and nobody does anything about it?
SCHNEIER: We’re living in a world of low government effectiveness, and there the prevailing neo-liberal idea is that companies should be free to do what they want. Our system is optimized for companies that do everything that is legal to maximize profits, with little nod to morality. Shoshana Zuboff, professor at the Harvard Business School, invented the term “surveillance capitalism” to describe what’s happening. It’s very profitable, and it feeds off the natural property of computers to produce data about what they are doing. For example, cellphones need to know where everyone is so they can deliver phone calls. As a result, they are ubiquitous surveillance devices beyond the wildest dreams of Cold War East Germany.
GAZETTE: But Google and Facebook face more restrictions in Europe than in the United States. Why is that?
SCHNEIER: Europe has more stringent privacy regulations than the United States. In general, Americans tend to mistrust government and trust corporations. Europeans tend to trust government and mistrust corporations. The result is that there are more controls over government surveillance in the U.S. than in Europe. On the other hand, Europe constrains its corporations to a much greater degree than the U.S. does. U.S. law has a hands-off way of treating internet companies. Computerized systems, for example, are exempt from many normal product-liability laws. This was originally done out of the fear of stifling innovation.
“Google knows quite a lot about all of us. No one ever lies to a search engine. I used to say that Google knows more about me than my wife does, but that doesn’t go far enough. Google knows me even better, because Google has perfect memory in a way that people don’t.”
—Bruce Schneier,cybersecurity expert
GAZETTE: It seems that U.S. customers are resigned to the idea of giving up their privacy in exchange for using Google and Facebook for free. What’s your view on this?
SCHNEIER: The survey data is mixed. Consumers are concerned about their privacy and don’t like companies knowing their intimate secrets. But they feel powerless and are often resigned to the privacy invasions because they don’t have any real choice. People need to own credit cards, carry cellphones, and have email addresses and social media accounts. That’s what it takes to be a fully functioning human being in the early 21st century. This is why we need the government to step in.
GAZETTE: You’re one of the most well-known cybersecurity experts in the world. What do you do to protect your privacy online?
SCHNEIER: I don’t have any secret techniques. I do the same things everyone else does, and I make the same tradeoffs that everybody else does. I bank online. I shop online. I carry a cellphone, and it’s always turned on. I use credit cards and have airline frequent flier accounts. Perhaps the weirdest thing about my internet behavior is that I’m not on any social media platforms. That might make me a freak, but honestly it’s good for my productivity. In general, security experts aren’t paranoid; we just have a better understanding of the trade-offs we’re doing. Like everybody else, we regularly give up privacy for convenience. We just do it knowingly and consciously.
GAZETTE: What else do you do to protect your privacy online? Do you use encryption for your email?
SCHNEIER: I have come to the conclusion that email is fundamentally insecurable. If I want to have a secure online conversation, I use an encrypted chat application like Signal. By and large, email security is out of our control. For example, I don’t use Gmail because I don’t want Google having all my email. But last time I checked, Google has half of my email because you all use Gmail.
GAZETTE: What does Google know about you?
SCHNEIER: Google’s not saying because they know it would freak people out. But think about it, Google knows quite a lot about all of us. No one ever lies to a search engine. I used to say that Google knows more about me than my wife does, but that doesn’t go far enough. Google knows me even better, because Google has perfect memory in a way that people don’t.
GAZETTE: Is Google the “Big Brother?”
SCHNEIER: “Big Brother” in the Orwellian sense meant big government. That’s not Google, and that’s not even the NSA. What we have is many “Little Brothers”: Google, Facebook, Verizon, etc. They have enormous amounts of data on everybody, and they want to monetize it. They don’t want to respect your privacy.
GAZETTE: In your book “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World,” you recommend a few strategies for people to protect their privacy online. Which one is the most effective?
SCHNEIER: Unfortunately, we live in a world where most of our data is out of our control. It’s in the cloud, stored by companies that may not have our best interests at heart. So, while there are technical strategies people can employ to protect their privacy, they’re mostly around the edges. The best recommendation I have for people is to get involved in the political process. The best thing we can do as consumers and citizens is to make this a political issue. Force our legislators to change the rules.
Opting out doesn’t work. It’s nonsense to tell people not to carry a credit card or not to have an email address. And “buyer beware” is putting too much onus on the individual. People don’t test their food for pathogens or their airlines for safety. The government does it. But the government has failed in protecting consumers from internet companies and social media giants. But this will come around. The only effective way to control big corporations is through big government. My hope is that technologists also get involved in the political process — in government, in think-tanks, universities, and so on. That’s where the real change will happen. I tend to be short-term pessimistic and long-term optimistic. I don’t think this will do society in. This is not the first time we’ve seen technological changes that threaten to undermine society, and it won’t be the last.
This interview has been edited for length and clarity.
UPDATE at 4:13pm ET: Arkema originally reported that there were two explosions at its Crosby facility. Law enforcement authorities have since said that there were no explosions. The company’s CEO has said that there is “noxious” smoke coming from the facility. This story will continue to be updated to reflect the ongoing situation.
The French company that says its Houston-area chemical plant is spewing “noxious” smoke and may explode successfully pressed federal regulators to delay new regulations designed to improve safety procedures at chemical plants, according to federal records reviewed by International Business Times. The rules, which were set to go into effect this year, were halted by the Trump administration after a furious lobbying campaign by plant owner Arkema and its affiliated trade association, the American Chemistry Council, which represents a chemical industry that has poured tens of millions of dollars into federal elections.
The effort to stop the chemical plant safety rules was backed by top Texas Republican lawmakers, who have received big campaign donations from chemical industry donors.
Representatives from Arkema Americas and the American Chemistry Council did not immediately respond to requests for comment.
In 2013, a West, Texas, chemical plant explosion killed 15 people, prompting the Obama administration to try to raise chemical plant safety standards (investigators later found the explosion was caused deliberately). In an executive order that year, President Obama proposed an overhaul of the Environmental Protection Agency’s Risk Management Program with the goal of increasing safety and transparency at chemical plants by strengthening existing regulations. The EPA said the enhanced rules would “seek to improve chemical process safety, assist local emergency authorities in planning for and responding to accidents, and improve public awareness of chemical hazards at regulated source.”
Arkema has six production plants in Texas and has received more than $8.7 million worth of taxpayer subsidies from the state. Arkema’s Crosby plant — which OSHA fined more than $90,000 for ten “serious” violations earlier this year and has spewedsmoke in Crosby — appears to be covered under the existing EPA rules because of the kinds of chemicals it uses. While Texas Republican Gov. Greg Abbott has given chemical companies legal cover to hide the locations of their EPA-regulated chemicals, the Associated Press reports that the imperiled Arkema facility houses large amounts of toxic sulfur dioxide and flammable methylpropen, which required Arkema to submit a risk management plan to the agency — and which would have subjected the company to the strengthened safety rules.
However, those rules — which would have taken effect on March 14 — were blocked by EPA administrator Scott Pruitt. The move was a big win for the chemical industry that has spent more than $100 million supporting federal lawmakers since 2008. Among those who have received more than $100,000 from the industry are powerful Texas lawmakers including Sen. John Cornyn (R), Rep. Joe Barton (R), Rep. Pete Olson (R), Rep. Gene Green (D), Rep. Pete Sessions (R) and Rep. Kevin Brady (R).
“Will Likely Add Significant New Costs”
Documents reviewed by IBT show that Pruitt’s announcement followed a lobbying campaign by Arkema and its colleagues in the chemical industry.
In May of 2016, Arkema sent a letter to the EPA criticizing the proposed rule. One part of the letter said the rule’s requirement of independent risk management audits “will likely add significant new costs and burdens to the corporate audit process.” The company also took issue with the rule’s “Safer Technology and Alternatives Analysis” (STAA) requirements.
Those provisions would have required that companies consider using “inherently safer technology” that would encourage companies to “substitute less hazardous substances” and encourage firms to “simplify covered processes in order to make accidental releases less likely or the impacts of such releases less severe.”
“The additional requirement for STAA would be burdensome because there is no consensus methodology, definitions or standards for STAA,” the company told the agency. “Knowledge of ‘inherently safer technologies’ can vary greatly depending on the process being examined and the knowledge and expertise of the team performing the analysis. As a result, implementation of STAA would likely be inconsistent across companies.”
Federal records reviewed by IBT show that Arkema specifically lobbied on the chemical safety rules. In the first quarter of 2017, as the Trump administration was reviewing the rule, federal records show the company was lobbying on “EPA chemical regulations, including Significant New Use Rules and the Significant New Alternatives Policy program and EPA Risk Management Program regulations.” The records show the company directly lobbied the EPA and the White House on the issue. In the second quarter, federal records show Arkema lobbying the EPA and the National Economic Council on “EPA risk management program regulations.”
Of Arkema’s six production plants in Texas, five, including the Crosby plant, are near the coast and in the Houston area, raising the prospect of additional explosions due to flooding. The town of Beaumont, where there is a taxpayer-subsidized Arkema plant, has experienced severe flooding. Another plant is located in Houston, and two more, in nearby Pasadena, sit right on the Trinity Bay; one of these plants took in nearly $5 million in subsidies.
Arkema Push To Stop Rules Gets Boost From Its Lobbying Group & From Texas Republicans
In its letter to the EPA, Arkema noted that it is a member of the American Chemistry Council — a powerful lobbying group that has delivered $1.6 million of campaign donations to federal lawmakers since 2010. That Arkema-backed group helped spearhead the effort to block the EPA’s chemical plant safety rule. In January, the council was one of 21 groups that sent a letter to congressional leaders asserting that the new rule’s costs were not worth the alleged safety benefits.
“The lack of identifiable and quantifiable benefits stands in stark contrast to the clear costs associated with this rule,” said the letter. “Whether it be the requirement of third-party auditor participation that will reduce the pool of qualified auditors, changing well-established audit procedures already designed to maximize safety effectiveness, or imposing ineffective requirements to consider ‘inherently safer technology/design,’ the final rule includes a litany of costly changes that have not been shown to increase safety.”
The push to persuade the Trump administration to block the chemical plant safety rules was bolstered by an American Chemistry Council-backed resolution introduced on February 1 by Republican Rep. Markwayne Mullin of Oklahoma.
Among the 65 co-sponsors of the measure to block the rules were 10 members of the Texas Congressional delegation, including five who represent Houston area districts: Brian Babin (TX-36), whose district encompasses Crosby, where the Arkema plant lies; Michael McCaul (R-10), chairman of the House Committee on Homeland Security, whose district sits northwest of Houston; John Culberson (R-7), whose district covers part of Houston; Randy Weber (R-14), who represents a coastal district just outside of Houston; Blake Farenthold (R-27), a representative whose coastal district lies southwest of Houston. Other co-sponsors include Louie Gohmert (R-1), vice chair of the House Committee on Natural Resources, and Lamar Smith (R-21), chair of the House Committee on Science, Space and Technology who has challenged climate science. Weber and Babin are also members of that committee.
The Texas lawmakers who sponsored Mullin’s bill to block the chemical plant safety regulations have received more than $652,000 from the chemical industry, according to data from the Center for Responsive Politics. Federal contribution data show the American Chemistry Council specifically has delivered more than $160,000 to the entire Texas congressional delegation since 2008, with top recipients including Gene Green ($20,288), Olson ($18,999), McCaul, who co-sponsored the Mullin bill, ($13,500), Barton ($16,500) and Sen. Ted Cruz ($15,000). Babin and Weber, who also co-sponsored the bill, each received $3,000 from Arkema. The National Institute on Money In State Politics reports that the American Chemistry Council has given more to federal lawmakers in Texas than lawmakers in any other state.
In 2017, after Mullin bill was moving through Congress, the American Chemistry Council directly lobbied the EPA — along with the U.S. House and Senate, the Department of the Interior, the Office of Management and Budget and the Department of Agriculture — on the resolution on behalf of Arkema and its many other corporate sponsors. In a May 2017 letter to the EPA, the American Chemistry Council advocated that the implementation of the safety rule be delayed for “at least eighteen months” — until February 19, 2019, arguing that the current rule would be too expensive for its members such as Arkema to implement.
“The Final Rule raises significant security concerns and compliance issues that will harm ACC members and others in the regulated community,” the trade association wrote to the EPA. “Certain provisions, such as the requirement to audit ‘each covered process’ in a facility’s compliance audit, impose costly and burdensome obligations on facilities.”
That headline on the tile for this video is from Scientific American. Not only are they pretending this is suddenly a question now, but they’re acting like they don’t know the answer, like it’s somehow up for debate.
Support us on Patreon, read our goals here: https://www.patreon.com/truthstreammedia
Truthstream Can Be Found Here:
Minds: @InformedDissent (Join here! https://tinyurl.com/y8voad27 … we’re going to dump Facebook soon.)
Amazon Affiliate Link (help support TSM with every Amazon purchase, no cost to you!): http://amzn.to/2aTARRx
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.
SHOW NOTES AND MP3: https://www.corbettreport.com/?p=406
They walk among us. On the outside. they’re just like you and me, but on the inside they are unfeeling automatons who care only for themselves. They are the psychopaths, and they are in control of our governments, our corporations, our military and all of the positions of power. Join us this week on The Corbett Report as we delve into Political Ponerology, a diagnosis of our politicians and a brief look at the bigger picture.
Welcome to New World Next Week — the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. In this week’s episode:
Story #1: Tweeters Blocked By Trump Sue, Claiming @RealDonaldTrump Is Public Forum
PDF: 25 Page Lawsuit By The Knight First Amendment Institute
Blocking Someone On Twitter Is Not A First Amendment Violation
Meet The People Who Battle To Be The Top Reply To A Trump Tweet
Replying To Trump Tweet A Strange Internet Experience You Should Try
First Reply To Trump Tweet Is Prime Media Space
Story #2: US Government on Verge of Reading Minds
PDF: “Predicting the Brain Activation Pattern Associated With the Propositional Content of a Sentence: Modeling Neural Representations of Events and States”
Top Silicon Valley Exec Developing Telepathic Mind Control Technology
Former Google[X] Exec Building High-Tech Hat To Make Telepathy Possible In 8 Years
DARPA Gives $65M to Brain Implant Program for Super Soldier Project
The Brain Chip Cometh
Story #3: Norway’s “Voluntary” Tax Plan Brings In Just $1,325
Max Igan – Surviving the Matrix – Episode 297 – American Voice Radio, June 16th, 2017 – http://thecrowhouse.com
Support The Crowhouse: https://www.patreon.com/maxigan?ty=h
Liz Crokin Interview
Wi-Fi routers typically sit in dusty corners of homes and offices, quietly transmitting internet accessibility to computers, tablets and phones in its immediate vicinity. However, these unpretentious devices are a goldmine for hackers – and were specifically targeted by the US Central Intelligence Agency, the latest Wikileaks release has revealed.
The release is the latest instalment of Wikileaks’ “Vault7” series, which the group has been drip-feeding to the public since March. Previous trickles have revealed CIA attempts to hack office computers, televisions and phones, among many other shock exposures.
This time, the documents contain detailed information on the CIA’s router hacking “toolkit” — and how the Agency sought to leverage common vulnerabilities in routers sold by companies such as D-Link and Linksys. The techniques range from hacking network passwords to rewriting device firmware to remotely monitor traffic flowing across a target’s network.
While few may have stopped to consider a router’s attractiveness to a hacker, in truth the devices are an obviously attractive entry point — routers typically aren’t equipped with interfaces beyond on/off and reset buttons, and have no means of alerting users they have been compromised.
A router could be hacked for years, with a user’s every online action tracked and recorded, without anyone being any the wiser.
The CIA’s router-hacking approach begins with a tool — “Claymore” — which scans a network to identify devices and then launches two exploiters — “Tomato” and “Surfside” — the former is noted to target vulnerabilities in at least two routers sold by D-Link and Linksys, and steals those devices’ administrative passwords. Moreover, the documents state at least two other routers sold by Linksys could be targeted with “Tomato” after a mere few weeks of development.
“Surfside” is left largely unexplained, though the documents hint it may abuse a protocol called Universal Plug and Play. Oft dubbed UPNP, and embedded in around 7,000 different devices — including routers, printers, media players and smart TVs — tech security experts have long-warned it poses a potential risk.
As the documents date back to early 2016, it’s unclear whether D-Link or Linksys have identified and/or rectified these vulnerabilities — however, routers are difficult to manually update, and given their ubiquity, providers are reluctant to dispatch professional staff to do so, instead obliging consumers to do so themselves. Any vulnerability in a router can be left to smolder for years before correction, if at all — and the aforementioned lack of a “warning” system alerting users to threats, ala antivirus software, means users may never discover if their device is vulnerable.
Another means of access mentioned in the papers is the failure of users to change default admin passwords — often, individuals are simply unaware there is an admin password, and it can be amended. This likewise offers unbridled access to the contents of an individual’s router — after access, a hacker or CIA agent could then install custom firmware (the CIA’s is called Flytrap) on the router monitor a target’s browsing, strip SSL encryption from webpages visited, and even inject other exploits into their traffic, designed to offer access directly to the target’s PC or phone. Yet another piece of software, CherryTree, serves as a command-and-control system, allowing operators to monitor and update infected network devices from a browser-based interface called CherryWeb.
Nonetheless, while acknowledging the exposures are “alarming,” Matthew Hickey, Founder of Hacker House, isn’t shocked the CIA would target routers.
“The information security community has been warning about this risk since 2005, if not before. Still, while technically adept users likely won’t be impacted by the technique, it does potentially mean the CIA can access millions of web histories — and there’s the prospect of it easily being misused and abused in surveillance operations. The only Godsend is the CIA wouldn’t be able to do this remotely or in bulk — they need to be in the nearby vicinity of a router network to access it, from a car or van or similar,” Mr. Hickey told Sputnik.
Ultimately, given the evident insecurities ingrained in average Wi-Fi routers, it’s perhaps unsurprising the world’s most well-financed spying group has exploited them — and maybe still does. Wikileaks’ latest revelations serve as a palpable reminder to net users to update their routers regularly, and change their default admin passwords. Otherwise, potentially no private, internet-equipped home is safe from US surveillance.