Whether you are abreast of public events or choose to wisely operate in a more disconnected state these days, there have been some interesting events and developments in recent times that really affect the majority of humanity. Something you should look to get across no matter your approach to operating in the reality. Some really important stuff related to Facebook, Amazon and the other Tech Giants that affect our world on a massive fundamental scale, requires a bit of transparency which we really want to get out to you asap. This is aside from Andrew’s live shows and the Saturday release structure occurring so far this year.
Hence, why the title ‘SPECIAL RELEASE’ has been employed. We’re not going to over use this theme, but it will be something we look at going forth for important events. What we will be releasing first are separate ‘SPECIAL RELEASE’ videos on Facebook and Amazon. We will e-mail you with details on the second release related to Amazon, AI, Its Masterful Social Engineering and Donald Trump’s Antitrust efforts in the not too distant future. They will be short focused segments easier to explore and absorb.
These first two are taken from a recording of approx 2.5hrs on April the 6th 2018. Another was done on April the 10th of a similar length. Though they are both in the fires of creation at the moment. After these two special releases we’re looking to offer 5 parts 20-30min videos of the broader deeper total conversation, with others likely to follow. Their overall scope being a focused look at ‘Artificial Intelligence Influence in Society’.
We hope to offer you a foundation of clarity as to what is occurring at present. So keep an eye out for these with a bit of a heads up.
So, sit back. Put the tray tables into their upright position and buckle your seatbelt. Get ready to ride the streams of truth now related to Artificial Intelligence. See a layer of this reality previously never seen.
Economist and Author, Wayne Jett, joins the program to provide a summary of the latest messages coming from MegaAnon and Qanon. His latest post on his website ClassicalCapital.com contains a broad summary of the information that has been shared over the past months and what it means to the country and the world. Based on Jett’s extensive historical research and economics experience, he provides an overview hard to match.
We don’t want to become robot extensions for the corrupt Silicon Valley boy kings so we came up with a citizens’ solution. This is not some pie-in-the-sky solution. This is something we can do to free humanity. Please educate and inform others.
Notices: Unless marked otherwise, American Intelligence Media (AIM), Aim4Truth.org and Patriots4truth.org copyright claims are waived. Reproduction is permitted with or without attribution. This content and its links may contain opinion. As with all opinion, it should not be relied upon without independent verification. Think for yourself. Fair Use is relied upon for all content. For educational purposes only. No claims are made to the properties of third parties.
Note: IMPORTANT HUMAN RIGHTS ISSUE: PLEASE READ LINKS BELOW the video, PLEASE SCROLL ALL THE WAY DOWN
This week the media began demonizing anyone who used critical thinking skills by asking questions about the alleged students, mainly the crisis actors at the Florida shooting. Emotional hysteria is literally blinding people to the fact these shootings are part of massive gov’t psychological operation called the CRISIS INDUSTRY.
Until I saw Debi’s EYE OPENING report below, I had no idea exactly how extensive and well planned these events are. Right down to websites that offer staging services and crisis actors, even actors dressed jihadist to fake a beheading.
I realize there a lot of newly awakened people who haven’t been down the research rabbit hole long enough to understand all the details behind ‘The Anatomy of a False Flag’. These events are staged to play on our emotions, blinding our critical thinking skills.
I NO LONGER PLAY PARTISAN POLITIC’S. Am not Democrat, Republican or Indenpendent and have removed my energy and consent from ‘the system of domination and control’ called party politics.
My perspective is VERY similar to Debi’s. As an Independent Journalist her eyes opened wide after covering Bernie Sanders on the campaign trail, where she saw the corruption on both sides of the aisle and has washed her hands of politics. We’re both simply trying to share the truth and are asking people to put their emotions aside and exercise CRITICAL THINKING SKILLS.
Now, those of us asking people to use critical thinking are being demonized because we care enough about the truth AND human lives to point out the anomaly’s and discrepency’s from the media.
PLEASE READ THE LINKS BELOW…then please listen to this extremely important message with an open heart and open mind. Here Debi does an outstanding job researching the crisis industry, providing evidence with further follow-up links below and in explaining the importance behind all of us getting on the same page and putting our political differences aside before the bars come down around us. Much love and mahalo….Annette
LINKS LINKS and MORE VIDEO LINKS: Be sure to scroll all the way through!
Police use blanks – scare/training “I thought it was a drill because they told us you will have police officers whoa re going to be firing blanks like scare us, get us like, you know, trained for this. So no one took it seriously until I heard like screaming, the worst screaming you will ever hear. It was awful like major heart stop beating and… http://edition.cnn.com/TRANSCRIPTS/18…
‘I assumed it was a code red drill, they told us earlier in the day in the day we were going to be having a code red drill, I assumed it was blanks: (THINK about that, they were setting up a simulated event, how did the kid waltz in with police on site staging an event): http://home.suddenlink.net/front_cont…
Multiple students all report (in MAINSTREAM MEDIA interviews NOT Alex Jones) that they were told a drill was going to be conducted. One girl said she was told they would hear screams, another stated that they were going to use blanks. Got that. Students are reporting a SIMULATED event of this type was PLANNED and they were they were going to do things to make it seem real (screams, blank). https://www.youtube.com/watch?time_co…
It was recently revealed that the world’s largest security firm G4S, who had employed the man named in the Orlando pulse nightclub shooting, Omar Mateen – is a client of the mass casualty staging company called CrisisCast. (this is Vanessa Beely’s site) http://21stcenturywire.com/2016/06/18…
Note: Following the Parkland mass terror event, the media is weaponizing information to divide us so the PTB can have their NWO. Ultimately, this is not a gun grab – if they can get enough people to go along with the gun control agenda – it’s a PEOPLE GRAB.
It’s important that we drop labels like left/right/libtard/repuke/Dem/Dep and come together as One People, without borders and belief systems that divide us. Uniting with tolerance is key to stopping a full blown police state and the slamming of the bars around what little sovereignty remains.
Here’s an outstanding synopsis of the steep, slippery slope we’ve arrived at and how they’re using the FL shooting to enact sweeping legislation that goes way beyond ‘gun control’ – that’s just the shiny object they dangle before us, while preparing to rob us blind of our Constitutional Rights and what little freedom remains for the individual and society at large.
Now cops want the right to arrest us for ‘thought crimes’ under the guises of mental illness? That’s aiming for a big people grab….Debi begins around 5:55, the last half of her commentary is outstanding in scope and it’s wide reaching perspective on what’s unfolding with the ruling elite who don’t subscribe to political party’s, only their unholy agenda’s. Weaving thru so much deception gets tricky, critical thinking and analysis of the facts at hand is key in understanding the crossroads we’ve reached at the intersection of a Full Blown Police State where anyone of us could be held indefinitely in detention, without habius corpus or the right to legal defense for sharing our truth, facts and perspective on the criminal kakistocracy that hold the reigns of power in America – and around the world.
Be sure to check out the links below, Debi did a outstanding job investigating this story!
LINKS – Click SHOW MORE FOR FULL LIST: Go to my twitter feed for the links on Florida Shooting research by alternative sources CNN transcript with student who says a drill was planned with blanks: http://edition.cnn.com/TRANSCRIPTS/18…
Note: Wow! This lady does her homework! I’ve been smelling rats in the woodpile on some of this indictment stuff…saw the alleged Nevada indictments doc yesterday and noticed that it wasn’t signed, had no seal, the language that wasn’t legaleaze et al. Denise knocks this one out of the ball park!
While it appears things are going down, we have to be very careful to avoid all the disinformation and hype circulating the alternative. We’re in treacherous, deep state waters, extreme discernment is advised. Nothing is ever as it seems behind the Wizards Curtain, hopefully what we’re witnessing is the curtains being town down on the Grand Illusion and the bad actors are being escorted off the stage.
Reading suppressed news (?!?) from original documents in Nevada filed Dec. 22, 2017. (Original FALSE documents, that is, designed to embarrass and discredit the gullible, being promoted by liars.)
One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.
By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.
Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. Here is one illustrative list of tactics from the latest GCHQ document we’re publishing today:
Other tactics aimed at individuals are listed here, under the revealing title “discredit a target”:
Then there are the tactics used to destroy companies the agency targets:
GCHQ describes the purpose of JTRIG in starkly clear terms: “using online techniques to make something happen in the real or cyber world,” including “information ops (influence or disruption).”
Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends.
The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
No matter your views on Anonymous, “hacktivists” or garden-variety criminals, it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption. There is a strong argument to make, as Jay Leiderman demonstrated in the Guardian in the context of the Paypal 14 hacktivist persecution, that the “denial of service” tactics used by hacktivists result in (at most) trivial damage (far less than the cyber-warfare tactics favored by the US and UK) and are far more akin to the type of political protest protected by the First Amendment.
The broader point is that, far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats. As Anonymous expert Gabriella Coleman of McGill University told me, “targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs, resulting in the stifling of legitimate dissent.” Pointing to this study she published, Professor Coleman vehemently contested the assertion that “there is anything terrorist/violent in their actions.”
Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups.
Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).
But these GCHQ documents are the first to prove that a major western government is using some of the most controversial techniques to disseminate deception online and harm the reputations of targets. Under the tactics they use, the state is deliberately spreading lies on the internet about whichever individuals it targets, including the use of what GCHQ itself calls “false flag operations” and emails to people’s families and friends. Who would possibly trust a government to exercise these powers at all, let alone do so in secret, with virtually no oversight, and outside of any cognizable legal framework?
Then there is the use of psychology and other social sciences to not only understand, but shape and control, how online activism and discourse unfolds. Today’s newly published document touts the work of GCHQ’s “Human Science Operations Cell,” devoted to “online human intelligence” and “strategic influence and disruption”:
Under the title “Online Covert Action”, the document details a variety of means to engage in “influence and info ops” as well as “disruption and computer net attack,” while dissecting how human beings can be manipulated using “leaders,” “trust,” “obedience” and “compliance”:
The documents lay out theories of how humans interact with one another, particularly online, and then attempt to identify ways to influence the outcomes – or “game” it:
We submitted numerous questions to GCHQ, including: (1) Does GCHQ in fact engage in “false flag operations” where material is posted to the Internet and falsely attributed to someone else?; (2) Does GCHQ engage in efforts to influence or manipulate political discourse online?; and (3) Does GCHQ’s mandate include targeting common criminals (such as boiler room operators), or only foreign threats?
As usual, they ignored those questions and opted instead to send their vague and nonresponsive boilerplate: “It is a longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All our operational processes rigorously support this position.”
These agencies’ refusal to “comment on intelligence matters” – meaning: talk at all about anything and everything they do – is precisely why whistleblowing is so urgent, the journalism that supports it so clearly in the public interest, and the increasingly unhinged attacks by these agencies so easy to understand. Claims that government agencies are infiltrating online communities and engaging in “false flag operations” to discredit targets are often dismissed as conspiracy theories, but these documents leave no doubt they are doing precisely that.
Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
In the first hour, UFO researcher and experiencer Darryl Anka discussed two UFO sightings that he says led to his channeling of the extraterrestrial entity known as ‘’Bashar.” Investigative reporter Linda Moulton Howe of Earthfiles discussed the release of JFK records. She described the background of the CIA head Allen Dulles, who was fired by Kennedy in November of 1961. She said that Dulles was also the head of the secretive MJ-12 group, which reportedly had control of all UFO information, including public disinformation as well as back-engineering of captured alien technology.
Coast To Coast AM – November 21, 2017 UFOs & JFK with Linda Moulton Howe
While we’ve carefully documented the dynamics in play behind Trump’s decision to end the CIA’s covert Syria program, as well as the corresponding fury this immediately unleashed among the usual hawkish DC policy wonks, new information on what specifically impacted the president’s thinking has emerged.
Thomas Joscelyn, a Middle East analyst for the Foundation for Defense of Democracies, explains in the August edition of The Weekly Standard:
Earlier this year, President Donald Trump was shown a disturbing video of Syrian rebels beheading a child near the city of Aleppo. It had caused a minor stir in the press as the fighters belonged to the Nour al-Din al-Zenki Movement, a group that had been supported by the CIA as part of its rebel aid program.
The footage is haunting. Five bearded men smirk as they surround a boy in the back of a pickup truck. One of them holds the boy’s head with a tight grip on his hair while another mockingly slaps his face. Then, one of them uses a knife to saw the child’s head off and holds it up in the air like a trophy. It is a scene reminiscent of the Islamic State’s snuff videos, except this wasn’t the work of Abu Bakr al-Baghdadi’s men. The murderers were supposed to be the good guys: our allies.
Trump pressed his most senior intelligence advisers, asking the basic question of how the CIA could have a relationship with a group that beheads a child and then uploads the video to the internet. He wasn’t satisfied with any of the responses:
Trump wanted to know why the United States had backed Zenki if its members are extremists. The issue was discussed at length with senior intelligence officials, and no good answers were forthcoming, according to people familiar with the conversations. After learning more worrisome details about the CIA’s ghost war in Syria—including that U.S.-backed rebels had often fought alongside extremists, among them al Qaeda’s arm in the country—the president decided to end the program altogether.
Screenshot of the horrific video of a CIA-backed Syrian group beheading a boy named Abdullah Issa.
At the time the beheading video surfaced (July 2016), many in the American public naturally wanted answers, but the story never really picked up much momentum in the media. As Joscelyn describes, it caused nothing more than “a minor stir in the press.” The State Department seemed merely satisfied that the group responsible, Harakat Nour al-Din al-Zenki, claimed to have arrested the men that committed the gruesome crime, though nothing more was known. Absurdly, a US government spokesperson expressed hope that the child-beheading group would “comply with obligations under the law of armed conflict.”
The only press agencies that publicly and consistently challenged the State Department at the time were RT News and the Associated Press, yet even these attempts didn’t get picked up beyond the confines of the State Department’s daily briefing. When the AP’s Matt Lee initially questioned spokesman Mark Toner as to whether Zenki would continue to receive any level of US assistance, Toner casually replied “it would give us pause” – which left Lee taken aback.
Meanwhile, it wasn’t just the US government which had aided Zenki, but as fighting in Aleppo raged it became a favored group among both the mainstream media and prominent think tank pundits. One of the UK’s major broadcasters (Channel 4) even went so far as to attempt to delete and hide its prior online content which sought to normalize the beheaders as “moderate” and heroic once news of the video got out.
Among think tankers, Zenki’s most prominent public supporter, frequently presenting the terror group as actually representative of Syria’s “secular” and supposedly democracy-promoting armed opposition (even after the beheading video emerged), was Charles Lister. Lister was finally confronted not by mainstream media, but by AlterNet’s Max Blumenthal at a DC event held by the (largely Gulf funded) Atlantic Council.
Only by the time of this January 2017 public forum, and after being persistently questioned, did Lister awkwardly back off his previous enthusiastic promotion of Zenki:
We can imagine that Trump saw other things beyond the shocking Zenki beheading video which made him fully realize the utter criminality of the CIA program (Thomas Joscelyn further emphasizes that Trump came to understand the full scope of CIA cooperation with al-Qaeda in Syria).
The only question that remains is who in the CIA or Obama-era State Department should be prosecuted first?
The House of Saud is in crisis as MBS consolidates his hold on the kingdom and prepares to transform Saudi Arabia in his image. But what is behind the purge, and how does it relate to the future of the world monetary system. Join James for a classic Corbett Report debriefing on the Saudi purge and the rise of the petroyuan.
UFO Seekers received unending questions about Tom DeLonge’s supposed UFO Investigation Company, To the Stars Academy. George Knapp announced that that Tom DeLonge’s brand new company was completed dedicated to researching and investigating UFOs which sent the UFO community into an uproar. We decided to source the George Knapp story, yet could not find any evidence whatsoever to back up Knapp’s announcement made on TV. We also received questions about investing in To The Stars Academy, so we dig into the SEC Filings and financials. What we find, is crazy!
ABOUT US: UFO Investigators in the field sky-watching 365 days a year. UFO Seekers investigates UFO sightings, aliens, black projects, and military installations in an attempt to document UFO evidence. Our exclusive content is posted through this YouTube channel. We publish 100% unique content filmed by us. We are 100% self-funded. No actors, no film crew, no re-takes, and no setup scenarios. Tim Doyle – Investigator Tracey Sue – Researcher Submit your UFO SIGHTING video/pictures: http://ufoseekers.com/submit Visit our website to see more: WEBSITE: http://www.ufoseekers.com OFFICIAL STORE: http://www.ufoseekers.com/shop
In a rush this week, we have Ole Dammegard back to break down the latest tragedy, the Route 91 Harvest Festival shooting. Of course, because of Ole’s continued work dissecting false flags and terror events, he is one of the first to recognize elements at play that seem to follow the same template – a template that suggests these are highly planned and coordinated events, rather than the work of random, unmotivated, lone attackers. Our deepest sympathies to anyone who has experienced pain and loss due to such an event. To me, digging deeper into things that seem suspicious and inconsistent with media reports, is the best and most honorable thing we can do, short of going back in time. I know if I died in one of these situations, the last thing I’d want is for it to be a false flag situation that isn’t properly investigated. That said, what you’re getting here is a conversation about elements that don’t seem to add up, or contain strange symbolism/foreshadowing. We also discuss the major alternative theories and motivations. This is largely a synthesis of what we’re seeing so far, all alleged, and not everything can be fully vetted at this time. All we can do is examine it, and try our best to seek the truth. This isn’t fear porn. This isn’t capitalizing on a tragedy. Ole’s website: https://www.lightonconspiracies.com/
In the internet era, consumers seem increasingly resigned to giving up fundamental aspects of their privacy for convenience in using their phones and computers, and have grudgingly accepted that being monitored by corporations and even governments is just a fact of modern life.
In fact, internet users in the United States have fewer privacy protections than those in other countries. In April, Congress voted to allow internet service providers to collect and sell their customers’ browsing data. By contrast, the European Union hit Google this summer with a $2.7 billion antitrust fine.
GAZETTE: After whistleblower Edward Snowden’s revelations concerning the National Security Agency’s (NSA) mass surveillance operation in 2013, how much has the government landscape in this field changed?
SCHNEIER: Snowden’s revelations made people aware of what was happening, but little changed as a result. The USA Freedom Act resulted in some minor changes in one particular government data-collection program. The NSA’s data collection hasn’t changed; the laws limiting what the NSA can do haven’t changed; the technology that permits them to do it hasn’t changed. It’s pretty much the same.
GAZETTE: Should consumers be alarmed by this?
SCHNEIER: People should be alarmed, both as consumers and as citizens. But today, what we care about is very dependent on what is in the news at the moment, and right now surveillance is not in the news. It was not an issue in the 2016 election, and by and large isn’t something that legislators are willing to make a stand on. Snowden told his story, Congress passed a new law in response, and people moved on.
GAZETTE: What about corporate surveillance? How pervasive is it?
SCHNEIER: Surveillance is the business model of the internet. Everyone is under constant surveillance by many companies, ranging from social networks like Facebook to cellphone providers. This data is collected, compiled, analyzed, and used to try to sell us stuff. Personalized advertising is how these companies make money, and is why so much of the internet is free to users. We’re the product, not the customer.
GAZETTE: Should they be stopped?
SCHNEIER: That’s a philosophical question. Personally, I think that in many cases the answer is yes. It’s a question of how much manipulation we allow in our society. Right now, the answer is basically anything goes. It wasn’t always this way. In the 1970s, Congress passed a law to make a particular form of subliminal advertising illegal because it was believed to be morally wrong. That advertising technique is child’s play compared to the kind of personalized manipulation that companies do today. The legal question is whether this kind of cyber-manipulation is an unfair and deceptive business practice, and, if so, can the Federal Trade Commission step in and prohibit a lot of these practices.
GAZETTE: Why doesn’t the commission do that? Why is this intrusion happening, and nobody does anything about it?
SCHNEIER: We’re living in a world of low government effectiveness, and there the prevailing neo-liberal idea is that companies should be free to do what they want. Our system is optimized for companies that do everything that is legal to maximize profits, with little nod to morality. Shoshana Zuboff, professor at the Harvard Business School, invented the term “surveillance capitalism” to describe what’s happening. It’s very profitable, and it feeds off the natural property of computers to produce data about what they are doing. For example, cellphones need to know where everyone is so they can deliver phone calls. As a result, they are ubiquitous surveillance devices beyond the wildest dreams of Cold War East Germany.
GAZETTE: But Google and Facebook face more restrictions in Europe than in the United States. Why is that?
SCHNEIER: Europe has more stringent privacy regulations than the United States. In general, Americans tend to mistrust government and trust corporations. Europeans tend to trust government and mistrust corporations. The result is that there are more controls over government surveillance in the U.S. than in Europe. On the other hand, Europe constrains its corporations to a much greater degree than the U.S. does. U.S. law has a hands-off way of treating internet companies. Computerized systems, for example, are exempt from many normal product-liability laws. This was originally done out of the fear of stifling innovation.
“Google knows quite a lot about all of us. No one ever lies to a search engine. I used to say that Google knows more about me than my wife does, but that doesn’t go far enough. Google knows me even better, because Google has perfect memory in a way that people don’t.” —Bruce Schneier,cybersecurity expert
GAZETTE: It seems that U.S. customers are resigned to the idea of giving up their privacy in exchange for using Google and Facebook for free. What’s your view on this?
SCHNEIER: The survey data is mixed. Consumers are concerned about their privacy and don’t like companies knowing their intimate secrets. But they feel powerless and are often resigned to the privacy invasions because they don’t have any real choice. People need to own credit cards, carry cellphones, and have email addresses and social media accounts. That’s what it takes to be a fully functioning human being in the early 21st century. This is why we need the government to step in.
GAZETTE: You’re one of the most well-known cybersecurity experts in the world. What do you do to protect your privacy online?
SCHNEIER: I don’t have any secret techniques. I do the same things everyone else does, and I make the same tradeoffs that everybody else does. I bank online. I shop online. I carry a cellphone, and it’s always turned on. I use credit cards and have airline frequent flier accounts. Perhaps the weirdest thing about my internet behavior is that I’m not on any social media platforms. That might make me a freak, but honestly it’s good for my productivity. In general, security experts aren’t paranoid; we just have a better understanding of the trade-offs we’re doing. Like everybody else, we regularly give up privacy for convenience. We just do it knowingly and consciously.
GAZETTE: What else do you do to protect your privacy online? Do you use encryption for your email?
SCHNEIER: I have come to the conclusion that email is fundamentally insecurable. If I want to have a secure online conversation, I use an encrypted chat application like Signal. By and large, email security is out of our control. For example, I don’t use Gmail because I don’t want Google having all my email. But last time I checked, Google has half of my email because you all use Gmail.
GAZETTE: What does Google know about you?
SCHNEIER: Google’s not saying because they know it would freak people out. But think about it, Google knows quite a lot about all of us. No one ever lies to a search engine. I used to say that Google knows more about me than my wife does, but that doesn’t go far enough. Google knows me even better, because Google has perfect memory in a way that people don’t.
GAZETTE: Is Google the “Big Brother?”
SCHNEIER: “Big Brother” in the Orwellian sense meant big government. That’s not Google, and that’s not even the NSA. What we have is many “Little Brothers”: Google, Facebook, Verizon, etc. They have enormous amounts of data on everybody, and they want to monetize it. They don’t want to respect your privacy.
GAZETTE: In your book “Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World,” you recommend a few strategies for people to protect their privacy online. Which one is the most effective?
SCHNEIER: Unfortunately, we live in a world where most of our data is out of our control. It’s in the cloud, stored by companies that may not have our best interests at heart. So, while there are technical strategies people can employ to protect their privacy, they’re mostly around the edges. The best recommendation I have for people is to get involved in the political process. The best thing we can do as consumers and citizens is to make this a political issue. Force our legislators to change the rules.
Opting out doesn’t work. It’s nonsense to tell people not to carry a credit card or not to have an email address. And “buyer beware” is putting too much onus on the individual. People don’t test their food for pathogens or their airlines for safety. The government does it. But the government has failed in protecting consumers from internet companies and social media giants. But this will come around. The only effective way to control big corporations is through big government. My hope is that technologists also get involved in the political process — in government, in think-tanks, universities, and so on. That’s where the real change will happen. I tend to be short-term pessimistic and long-term optimistic. I don’t think this will do society in. This is not the first time we’ve seen technological changes that threaten to undermine society, and it won’t be the last.
This interview has been edited for length and clarity.
Wi-Fi routers typically sit in dusty corners of homes and offices, quietly transmitting internet accessibility to computers, tablets and phones in its immediate vicinity. However, these unpretentious devices are a goldmine for hackers – and were specifically targeted by the US Central Intelligence Agency, the latest Wikileaks release has revealed.
This time, the documents contain detailed information on the CIA’s router hacking “toolkit” — and how the Agency sought to leverage common vulnerabilities in routers sold by companies such as D-Link and Linksys. The techniques range from hacking network passwords to rewriting device firmware to remotely monitor traffic flowing across a target’s network.
While few may have stopped to consider a router’s attractiveness to a hacker, in truth the devices are an obviously attractive entry point — routers typically aren’t equipped with interfaces beyond on/off and reset buttons, and have no means of alerting users they have been compromised.
A router could be hacked for years, with a user’s every online action tracked and recorded, without anyone being any the wiser.
The CIA’s router-hacking approach begins with a tool — “Claymore” — which scans a network to identify devices and then launches two exploiters — “Tomato” and “Surfside” — the former is noted to target vulnerabilities in at least two routers sold by D-Link and Linksys, and steals those devices’ administrative passwords. Moreover, the documents state at least two other routers sold by Linksys could be targeted with “Tomato” after a mere few weeks of development.
“Surfside” is left largely unexplained, though the documents hint it may abuse a protocol called Universal Plug and Play. Oft dubbed UPNP, and embedded in around 7,000 different devices — including routers, printers, media players and smart TVs — tech security experts have long-warned it poses a potential risk.
As the documents date back to early 2016, it’s unclear whether D-Link or Linksys have identified and/or rectified these vulnerabilities — however, routers are difficult to manually update, and given their ubiquity, providers are reluctant to dispatch professional staff to do so, instead obliging consumers to do so themselves. Any vulnerability in a router can be left to smolder for years before correction, if at all — and the aforementioned lack of a “warning” system alerting users to threats, ala antivirus software, means users may never discover if their device is vulnerable.
Another means of access mentioned in the papers is the failure of users to change default admin passwords — often, individuals are simply unaware there is an admin password, and it can be amended. This likewise offers unbridled access to the contents of an individual’s router — after access, a hacker or CIA agent could then install custom firmware (the CIA’s is called Flytrap) on the router monitor a target’s browsing, strip SSL encryption from webpages visited, and even inject other exploits into their traffic, designed to offer access directly to the target’s PC or phone. Yet another piece of software, CherryTree, serves as a command-and-control system, allowing operators to monitor and update infected network devices from a browser-based interface called CherryWeb.
Nonetheless, while acknowledging the exposures are “alarming,” Matthew Hickey, Founder of Hacker House, isn’t shocked the CIA would target routers.
“The information security community has been warning about this risk since 2005, if not before. Still, while technically adept users likely won’t be impacted by the technique, it does potentially mean the CIA can access millions of web histories — and there’s the prospect of it easily being misused and abused in surveillance operations. The only Godsend is the CIA wouldn’t be able to do this remotely or in bulk — they need to be in the nearby vicinity of a router network to access it, from a car or van or similar,” Mr. Hickey told Sputnik.
Ultimately, given the evident insecurities ingrained in average Wi-Fi routers, it’s perhaps unsurprising the world’s most well-financed spying group has exploited them — and maybe still does. Wikileaks’ latest revelations serve as a palpable reminder to net users to update their routers regularly, and change their default admin passwords. Otherwise, potentially no private, internet-equipped home is safe from US surveillance.
Another Thursday…another Fadernight with Jon Rappoport and his No More Fake News Room Live…and tonight he tackles MK Ultra and Project Mockingbird, the CIA and how they are still running today…followed by open lines…
If terrorist incidents are always tied back to shadowy groups linked to Al Qaeda or ISIS, an online, independent media might connect those dots to show how Al Qaeda and ISIS were literally created, fostered, funded, trained and equipped by the UK government, the US government and their allies across the world as a tool in their quest of dominance of the Middle East and control of their domestic population. But such a story can only be told on a free and open internet, where independent voices continue to reach the masses and inform them of the truth about these terror groups.
Ed. Note: IMPORTANT: Think you’re impervious to A.I.? Do you beLIEve you can’t be subjected to mind control? Think again. Look around, there are a lot of people blindly following memes and movements, while completely ignoring major Red Flags arising ‘with the story’.
Right now there are way too many people on the tracks, with blindfolds on and their fingers in their ears singing “lalalalalalalalala” while a freight train bears down on them. They remind me of people who get hit by cars while crossing the street because they’re engrossed in their cell phone and not paying attention to the world around them.
Here’s some exceptional investigative reporting from Truthstream exposing the patent that allows technology to synchronize the human energy field with artificial intelligence…
THIS is important, please listen-up – this is how our favorite talking heads get corrupted and controlled by AI driven, information tech. Then once you’re entrained to the material, you’re next…Ever notice how some information has an addictive quality to it.
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.
These ancient artifacts have the ability to rock the foundations of civilisation, religion and history to their very core. The strange and amazing secrets of the past are just a heavily guarded government vault away. This is a detailed study of how and why government agencies have, for decades, taken a clandestine and profound interest in numerous archaeological, historical and religious puzzles.
Investigates the abiding interest of American (and British) military and civilian intelligence agencies in anomalous ancient artefacts and megalithic sites representing exotic technology that can be utilized, primarily, for military purposes, and which may threaten with rewriting history as we know it. Needless to emphasize, an equal measure of attention has been devoted to certain researchers and their hypotheses.