While most Americans languish in their very own exceedingly self-important version of active denial as to the disturbing state of affairs coming at light speed upon the earth, very soon no amount of alcohol, Facebook, prescription drugs or shopping will be able to hide the Rothschild banksters long-planned extermination plan for humanity.
Their TV mind control tool is full of tales of “nice dragons”, unicorns, vampires, zombies, and cannibalism. Their social engineering DARPA-net platforms continue to encourage separatism, narcissism, and identity politics division among the human race.
Steve Quayle tells us that the anti-diluvian giants of the Book of Enoch –the original cannibals – are awakening under the Antarctic ice. The Vatican has set up a powerful south-facing telescope in Arizona which it calls Lucifer, at a time when even NASA is admitting the possibility that Planet X (Nibiru) may be approaching the South Pole. The City of London Freemasons, ever-beholden to their fallen angel Lucifer, continue to concentrate wealth, fine-tune time-tested mind control methods and progress towards a trans-human future.
Amidst a smog of geoengineered barium (BA) and aluminum (AL) (=BAAL), 5G is being slowly rolled out in Europe and the US, often hidden in street lamps and powered by Crown Agent General Electric’s LED lighting. The psychopath Rothschild tool Elon Musk continues to launch 5G-enabling satellites via his Space X monopoly. From the current 2,000 in orbit, the plan is to put 20,000 up by 2021. Once these satellites are deployed there will be no escaping the 5G grid.
Simultaneously, his Neuralink firm works to hook the human brain to the DARPA-net for the coming “Internet of everything”, which includes you. Another Musk tentacle tunnels under cities like Los Angeles & Chicago under the guise of building high-speed rail, though to many it looks more like a frenzy to build underground infrastructure for the elite for when Nibiru comes calling and those the elite call “zombies” (the rest of us) are forced to stay above ground to endure the consequences of what these conjurers of darkness are about to attract to the earth with their fear-driven neurosis.
Meanwhile, the Rothschild military and police force, cloaked in the uniforms of the Stars & Stripes to ensure prostration by the zombies, nears its wet dream of full-spectrum dominance via the “savior” Trump’s new Space Defense force and it’s mastery of electromagnetic frequencies as weapons.
Their own version of Active Denial is operational and involves directed millimeter waves that will burn the skin of protestors in three seconds. These are the same waves used in the 5G system which will use your increasingly BAAL-conductive body as an antenna, so it doesn’t take much imagination to see how Active Denial (positive/negative duality as a friend pointed out) could take on a much broader meaning involving the withholding of food, shelter, and livelihood to those who refuse the accept… well, let’s just spit it out… the microchip Mark of the Beast.
Few will refuse since the 5G grid will be capable of putting emotions and thoughts into the minds of humans. Docility will be at the forefront of these according to the operational plans.
Only those with a strong faith and an even stronger frontal lobe will survive this onslaught. We will find ourselves in a sea of active denial borderline evil sheeple. Learn to go against the flow. Resist conformity. Swim against the tide. Salvage those closest to you, though they may resist your attempts to protect them.
This ain’t gonna’ be pretty, but those who make it through will constitute a new culture emerging from the ashes based on the ancient natural law values of faith, love, wisdom, and compassion.
Facebook is planning to announce a new home assistant device called “Portal” with a controversial facial recognition camera, Cheddar reported.
This is significant because not even Amazon’s Echo or Google’s own Smart Home device has a facial recognition camera built in.
Recently embroiled in scandals the past few months, Facebook has been facing blowback from allowing its users’ data to be shared with political consultation firm Cambridge Analytica and other firms like it.
Shockingly, Facebook further admitted other privacy violations when they said in April that it scans its users’ photos and links posted on the social media giant and will review text you send if something is flagged.
Despite this, Facebook plans on introducing a video chat on Portal that will use facial recognition to tag users and follow them around the room.
Although, according to the report, the device will have a privacy shutter to disable the camera’s tracking; but the facial recognition camera may just be the biggest mistake for the company.
Recent polls in the United States have shown that Americans don’t trust Facebook to protect their personal information, so why would they trust them with a facial recognition camera?
Portal is expected to come in two variants: small and large screen sizes for $300 and $400 respectively, according to the report.
This comes as more and more facial recognition cameras are being pushed into society, with Amazon helping law enforcement with its Facial Rekogntion software, DHS wanting to use it for border control, and the Olympics wanting to use the tech for security.
An incredibly worrying trend is taking place.
Even retail is pushing for the technology as an anti-theft mechanism to be introduced in a number of stores using biometric facial recognition software FaceFirst to build a database of shoplifters, as Activist Postreported.
We are entering the Minority Report; there is no going back after this technology is public and citizens are indoctrinated that it’s “for their safety.”
At that point, we are officially trading liberty and privacy for security. As Benjamin Franklin said, “Those who would give up essential Liberty, to purchase a little temporary Safety, deserve neither Liberty nor Safety.”
However, there are key problems with the technology mismatching faces. As an example recently, the American Civil Liberties Union of Northern California tested Amazon’s facial Rekognition software and the program erroneously and hilariously identified 28 members of Congress as people who have been arrested for crimes. But that’s far from the only instance where the technology has failed to correctly identify a person.
Facebook’s Portal will further the agenda by pushing this flawed technology into the public for wide-scale acceptance. One has to wonder if Facebook would then work with law enforcement to identify individuals. It’s a known fact that Facebook has handed data to governments worldwide.
It’s a scary prospect allowing a company that originally had money flowing in from the CIA’s venture capital arm, In-Q-Tel, to put facial recognition and a direct audio/video device in one’s home.
Even if they don’t help law enforcement or intelligence agencies they will abuse the technology. This reminds me of the time former CIA Director David Petraeus said: “we will spy on you through your dishwasher.”
Former U.S. director of national intelligence James Clapper reiterated that statement in 2016 when he said:
In the future, intelligence services might use the [internet of things] for identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials.
While this isn’t a dishwasher, it’s an IoT (Internet Of Things) device. The prospect is the same: abusing a voice-activated device to record audio and spy. Having access to a voice device or camera is one thing, but being able to have facial recognition is a different story.
An Amazon patent, filed in June 12, 2017, reveals a massive conspiracy to spy on you using a “voice sniffer algorithm.” If approved by the U.S. Patent and Trademark Office, this artificial intelligence can be embedded inside Amazon devices, including the Amazon Alexa.
The “voice sniffer algorithm” would take advantage of the microphones already built into Amazon devices. The technology would permit Alexa and other Amazon devices to listen to your conversations in real-time to identify “trigger words” that can give the tech giant insight into your personal life. The AI spy tech will learn about your personality, interests, purchasing habits, or glean any useful detail about your private life.
The “trigger words” from your private conversations could then be sent to third parties so any organization can target market their products to you. The third parties could include political organizations that want to motivate you to action or manipulate you otherwise. The data could even be used by law enforcement agencies to determine who might commit a crime in the future. The “voice sniffer algorithm” will help law enforcement closely watch a perceived threat to society.
Words from your private conversations could be used against you, leading to arrest or imprisonment. Law enforcement could use the data to identify “threats,” while abiding by red flag laws that are used to disarm citizens who are considered “mentally ill” or a threat to family and friends. The technology could lead to the targeting of specific belief systems that are a threat to industries. The widespread analysis of private conversation could be used to suggest mental illness and force psychiatric drugs on people.
The technology, dubbed by Amazon as “Keyword Determinations From Conversational Data” is an expansion of home surveillance, an arrogant and creepy maneuver by Big Tech to know everything about your private life. Tech analyst Daniel Burrus from Burrus Research Associates, Inc. said Amazon is “building a personality profile on the user.”
“The more words they collect, the more the company gets to know you,” he told ABC News. Amazon will be able to use your private conversation for financial gain and “draw disturbing inferences about households.”
Amazon wants to know how many times you flush the toilet, how many times you have sex, what you teach your kids, when you are going on vacation, what your political views are, etc., etc. The more words they collect, the more they can predict your purchasing habits, the places you frequent, your medical concerns, the firearms you possess, your vaccination status, the people you associate with, and the causes you support. The patent reveals that your data could be used to target market to your friends and family, when they are looking to purchase a gift for you.
Tech analyst Daniel Ives, with GBH Insights, told ABC News: “This further builds on Alexa and more data intelligence and analysis through voice that is a major initiative for Amazon. This algorithm would possibly feed from Alexa into the rest of the Amazon consumer flywheel, ultimately helping drive purchasing and buying behavior of Prime members.
The artificial intelligence is designed to analyze keywords that reveal your motivations on the topics you converse about. Keywords such as “prefer” “dislike” “love” and “bought” can give insight into the audio analysis, revealing your true feelings. The patent proudly states that these “identified keywords can be stored and/or transmitted to an appropriate location accessible to entities such as advertisers or content providers who can use the keywords to attempt to select or customize the content that is likely relevant to the user.” Combined with voice recognition, these devices will know exactly who is saying what, while judging your level of passion or disinterest.
According to the patent application, any keywords extracted for the user can be sent to content providers across multiple networks, including the Internet, a local area network (LAN), or a cellular network. The patent boasts that the technology could be used in any conventional cellular phone, tablet computer, desktop computer, personal media player, e-book reader, or video game system. By recognizing “key words” the artificial intelligence will more efficiently record the content of your private conversations to create a personality profile on you and to better use your information against you.
Stay up-to-date with Big Tech’s role in the surveillance state at PrivacyWatch.News.
5G speed, for people who must download a whole season of their favorite show in two seconds:
“It’s the next (fifth) generation of cellular technology which promises to greatly enhance the speed, coverage and responsiveness of wireless networks. How fast are we talking about? Think 10 to 100 times speedier than your typical cellular connection, and even faster than anything you can get with a physical fiber-optic cable going into your house. (You’ll be able to download a season’s worth of ‘Stranger Things’ in seconds.)” [CNET.com]
Lunatic 5G installation of small transmitters packed close together every few hundred feet:
“The next big thing in cellular technology, 5G, will bring lightning-fast wireless Internet — and thousands of antenna-topped poles to many neighborhoods where cell towers have long been banned.”
“Wireless companies are asking Congress and state lawmakers to make it easier to install the poles by preempting local zoning laws that often restrict them, particularly near homes. The lobbying efforts have alarmed local officials across the country. They say they need to ensure that their communities do not end up with unsightly poles cluttering sidewalks, roadsides and the edges of front yards.”
“They also are hearing from residents worried about possible long-term health risks. Until now, much of the cell equipment that emits radio-frequency energy has been housed on large towers typically kept hundreds of feet from homes [also harmful to health]. The new ‘small cell’ technology uses far more antennas and transmitters that are smaller and lower-powered, but clustered closer together and lower to the ground.” [The Washington Post]
I keep hammering on this 5G issue, because it contains the blueprint of a future only elite madmen want.
For the rest of us, it’s a catastrophe in the making.
I’ve covered the extreme health dangers of 5G in another article. Here, I want to flesh out the hidden agenda.
A few decades ago, a movement was started to create an interconnected power grid for the whole planet. We were told this would be the only way to avoid wasting huge amounts of electricity and, voila, bring all nations and all people into a modern 21st century.
But now, it’s a different story, a classic bait and switch. The bait was the promise of One Grid for all. The switch is what 5G will bring us:
100 billion or more NEW devices online, all connected to the Internet and the Cloud. What could be more wasteful? What could be more ridiculous? This is the opposite of sane energy use.
Who really cares whether his 5G-connected refrigerator keeps track of the food items inside it and orders new items when the supply dwindles? Who has to have a 5G driverless car that takes him to work? Who must have a 5G stove that senses what is being cooked and sets the temperature for four minutes? Who lives and who dies if a washing machine doesn’t measure how much soap is stored inside and doesn’t order new soap? Who is demanding a hundred devices in his home that spy on him and record his actions?
With 5G, the ultimate goal is: every device in every home that uses energy will be “its own computer,” and the planetary grid will connect ALL these devices to a monitoring and regulating Energy Authority.
As Patrick Wood details in his classic, Technocracy Rising, that worldwide Energy Authority was the dream of the men who launched the Technocracy movement, in America, in the 1930s.
They set out the key requirements—which weren’t technically possible then, but are quite doable now: continuous real-time measuring of both energy production and energy use from one end of the planet to the other…
So that both energy production and energy consumption could be controlled. “For the good of all,” of course.
5G is the technology for making this happen.
“We’re promising a stunning long-range future of ‘automatic homes’, where everything is done for you. But really, that’s the cover story. Ultimately, we want to be able to measure every unit of energy used by every device in every home—and through AI, regulate how much energy we will let every individual consume, moment to moment. We control energy. We are the energy masters. If you want to run and operate and dominate the world, you control its energy.”
Terms and projects like smart grid, smart meters, sustainability, Agenda 21, smart cities, climate change—all this is Technocratic planning and justification for Rule through Energy.
The beginning of an actual rational plan for energy would start this way: DUMP 5G. Dump the whole plan of installing small transmitter-cells on buildings and homes and trees and lampposts and fences all over the planet. Forget it. Don’t bring 100 billion new devices online. Aside from the extreme health dangers, it’s ridiculously expensive. It’s on the order of saying we need thousand-foot robots standing on sidewalks washing the windows of office buildings.
If some movie star wants to install 30 generators on his property and have engineers build him an automatic home, where he can sit back, flip a switch, and have three androids carry him into his bathtub and wash him and dry him, fine. But planning a smart city? Who voted for that? Who gave informed consent? Nobody.
A global Energy Authority, of course, is going to decide that a small African country needs to be given much more energy, while Germany or France or the US will have to sacrifice energy for the cause of social justice. But this is yet another con, because you won’t see government cleaning up the contaminated water supplies of that small African country, or installing modern sanitation, or curtailing the forced movement of populations into poverty-stricken cities, or reclaiming vast farm land stolen by mega-corporations and giving that land back to local farmers.
The whole hidden purpose of an Energy Authority is control.
And because the Authority is Globalist and Technocratic, it aims to lower energy use in industrial nations and help wreck their economies, making it much easier to move in and take over those countries.
Having said all this, there are gaps in our knowledge about 5G. For example, who in his right mind would propose a wireless system that relies on many, many, many cells/transmitters placed closely to each other, all over the world?
This system would be far more vulnerable to physical disruption than the present 4G.
You can find many articles that claim the US military must have 5G for their most advanced planes—and for their developing AI-controlled weapons. How does that work? Where will all the transmitter/cells be placed on the ground and in the air?? Something is missing here. Is there another version of 5G we’re not being told about? Is geoengineering of the atmosphere the means for tuning up space so 5G signals can be passed along without cells/transmitters?
Part of the US obsession to bring 5G online quickly stems from competition with China, which at the moment is in the lead on developing and exporting the technology. “If China has it, we have to have it sooner and better.” This attitude sidesteps the issue of why we must have 5G in the first place.
And now there are reports that the US government is considering a plan to build the whole 5G network itself—rather than leaving the job to corporations. Of course, a few favored companies (like Google) would be chosen by the government in a non-bid situation to provide VERY significant help. If such a plan were to launch, we would have a very tight club at the top of the communications and energy pyramid. And that club would maximize 5G to expand already-saturated surveillance of populations.
Wouldn’t you—if you had nothing better to do than control the world?
(To read about Jon’s mega-collection, The Matrix Revealed, click here.)
Jon Rappoport
The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.
Max Igan from Thecrowhouse.com returns to SGT Report to discuss the nature of reality and the rollout of the 5g Beast system. The goal of the 5g rollout is to create the internet of things, a nightmarish total control grid where just about everything you can imagine will be chipped and tracked, including you.
Max says, “The internet of things and the smart grid is blanket control of everything, monitoring of everybody, and underneath that is also the very real possibility of the weaponization of the airwaves because 5g technology is what they use for microwave cannons and active denial systems.”
Senior Lecturer in Biology, Brunel University London
Aug 7, 2017
Creating a huge global network connecting billions of individuals might be one of humanity’s greatest achievements to date, but microbes beat us to it by more than three billion years. These tiny single-celled organisms aren’t just responsible for all life on Earth. They also have their own versions of the World Wide Web and the Internet of Things. Here’s how they work.
Much like our own cells, microbes treat pieces of DNA as coded messages. These messages contain information for assembling proteins into molecular machines that can solve specific problems, such as repairing the cell. But microbes don’t just get these messages from their own DNA. They also swallow pieces of DNA from their dead relatives or exchange them with living mates.
These DNA pieces are then incorporated into their genomes, which are like computers overseeing the work of the entire protein machinery. In this way, the tiny microbe is a flexible learning machine that intelligently searches for resources in its environment. If one protein machine doesn’t work, the microbe tries another one. Trial and error solve all the problems.
But microbes are too small to act on their own. Instead, they form societies. Microbes have been living as giant colonies, containing trillions of members, from the dawn of life. These colonies have even left behind mineral structures known as stromatolites. These are microbial metropolises, frozen in time like Pompeii, that provide evidence of life from billions of years ago.
Microbial metropolis.Shutterstock
Microbial colonies are constantly learning and adapting. They emerged in the oceans and gradually conquered the land – and at the heart of their exploration strategy was information exchange. As we’ve seen, individual members communicate by exchanging chemical messages in a highly coordinated fashion. In this way, microbial society effectively constructs a collective “mind”.
This collective mind directs pieces of software, written in DNA code, back and forth between trillions of microbes with a single aim: to fully explore the local environment for resources using protein machines.
When resources are exhausted in one place, microbial expedition forces advance to find new lands of plenty. They transmit their discoveries back to base using different kinds of chemical signals, calling for microbial society to transform from settlers to colonisers.
In this way, microbes eventually conquered the entire planet, creating a global microbial network that resembles our own World Wide Web but using biocehmical signals instead of electronic digital ones. In theory, a signal emitted in waters around the South Pole could effectively travel fast to waters around the North Pole.
Internet of living things
The similarities with human technology don’t stop there. Scientists and engineers are now working on expanding our own information network into the Internet of Things, integrating all manner of devices by equipping them with microchips to sense and communicate. Your fridge will be able to alert you when it is out of milk. Your house will be able to tell you when it is being burgled.
Microbes built their version of the Internet of Things a long time ago. We can call it the “Internet of Living Things”, although it’s more often known as the biosphere. Every organism on the planet is linked in this complex network that depends on microbes for its survival.
More than a billion years ago, one microbe found its way inside another microbe that became its host. These two microbes became a symbiotic hybrid known as the eukaryotic cell, the basis for most of the lifeforms we are commonly familiar with today. All plants and animals are descended from this microbial merger and so they contain the biological “plug-in” software that connects them to the Internet of Living Things.
Microbial chimeras.Shutterstock
For example, humans are designed in a way that means we cannot function without the trillions of microbes inside our bodies (our microbiome) that help us do things like digest food and develop immunity to germs. We are so overwhelmed by microbes that we imprint personal microbial signatures on every surface we touch.
The Internet of Living Things is a neat and beautifully functioning system. Plants and animals live on the ecological waste created by microbes. While to microbes, all plants and animals are, as author Howard Bloom puts it, “mere cattle on whose flesh they dine”, whose bodies will be digested and recycled one day.
Microbes are even potential cosmic tourists. If humans travel into deep space, our microbes will travel with us. The Internet of Living Things may have a long cosmic reach.
The paradox is that we still perceive microbes as inferior organisms. The reality is that microbes are the invisible and intelligent rulers of the biosphere. Their global biomass exceeds our own. They are the original inventors of the information-based society. Our internet is merely a by-product of the microbial information game initiated three billion years ago.
Albeit creepy and not exactly preferred, it is incredible that a smart speaker potentially saved someone’s life.
Credit: Google
While there’s something disconcerting about having Big Brother listening in on family feuds, there is something to be said about smart devices alerting the police when simple arguments turn into domestic disputes. The latter is what occurred at a resident in New Mexico earlier this week, and authorities believe it may have played a life-saving role.
ABC Newsreports that Eduardo Barros was house-sitting with his girlfriend and her daughter on Sunday in Tijeras when the couple got into an argument and the altercation turned physical. According to Bernalillo County Sheriff Department’s spokesperson, Deputy Felicia Romero, Barros wielded a firearm and threatened to kill his girlfriend. A nearby smart speaker, which was hooked up to a surround sound system, recorded him saying: “Did you call the sheriffs?” Because the smart speaker recognized it as a command, it then called 911.
Not long after the call was made, deputies arrived at the scene and removed the woman and her daughter from the residence. The woman reportedly sustained injuries from the argument but was not taken to the hospital. Romero told the press that the woman’s daughter was not injured. A SWAT team was also deployed to the home where Barros was taken into custody after an hours-long stand-off.
“The unexpected use of this new technology to contact emergency services has possibly helped save a life. This amazing technology definitely helped save a mother and her child from a very violent situation,” Bernalillo County Sheriff Manuel Gonzales III said in a statement.
Barros is now facing charges of possession of a firearm or destructive device by a felon, aggravated battery against a household member, aggravated assault against a household member and false imprisonment, according to court documents. This was determined after Barros appeared in court and a judge determined there was probable cause for his arrest. Barros will be held without bond until a hearing date is set for him and is presently being represented by a public defender. He has not yet entered a plea, says the court.
Generally speaking, conspiracy theories form where there is a vacuum of verifiable facts associated with a controversial, usually tragic event. The concept has evolved over the years and is a part of our popular culture. There are legions of conspiracy theorists and “truthers” who have devoted their lives to certain theories, and there are legions of skeptics who have devoted their lives to debunking those theories. All the while, conspiracy theories of every stripe and variety festoon the footnotes of history. Even the origin of the phrase itself is subject to conspiracy theory, as some researchers have argued that the CIA invented and promulgated the term in order to marginalize fringe thinkers and neutralize investigations. The internet has obviously had a profound effect on conspiracy theories, simultaneously helping and hurting the cause. While a world of information is at people’s fingertips, so too are alternate worlds of manufactured propaganda. While the Internet may appear to be a democratized, unfiltered path toward facts and truth, it is easily manipulated. Powerful corporations pay a lot of money to have their dirty laundry buried in the search results underneath contrived puff pieces.With nearly the entire mainstream media apparatus at their disposal, the government is a maestro at this practice. As we learned from so-called Operation Mockingbird — a conspiracy theory fact discussed in my first post on the subject, “Conspiracy Theories That Turned Out to Be True,” — hundreds, if not thousands of news organizations have been conscripted into working with the CIA to support pro-government narratives. That was in the 1960s. One can only imagine how vast the network is now. Not to mention the fact that a single proprietary algorithm owned by Google dictates the vast majority of the population’s exposure to a subject. In Part 1, I noted that the list had been meticulously whittled down to focus only on conspiracies that have been irrefutably proven to be fact. There are hundreds of conspiracy theories I think are likely to be true that are not on this list because there simply isn’t enough hard evidence yet to confirm it 100%. I also aimed for a good mixture of old conspiracies and new conspiracies. With groups like Wikileaks and Anonymous out there, the last decade has witnessed a dam burst of new data and documents. Thanks to intrepid journalists, whistleblowers, hacktivists, and leakers, the human race continues to tear down the wall of lies erected by the corporatocracy.
Without further ado, let’s get to it….ten more conspiracy theories we can start calling conspiracy facts.
1. Operation Ajax, the CIA’s Iranian Coup
In Iran it was called 28 Mordad coup; the United Kingdom contributed under the name Operation Boot. However you refer to it, Operation Ajax was an Iranian coup that in 1953 deposed the democratically elected Muhammad Mossadeq and reinstalled the monarchical power of Shah Mohammed Reza Pahlavi. The primary cause of the coup was Mossadeq’s attempt to nationalize the Iran’s oil fields, which threatened the oil profits of Britain’s Anglo-Persian Oil Company (AIOC). The U.S. — in addition to protecting its ally’s petroleum monopoly — viewed Mossadeq’s move as communist aggression and therefore helped plan the return to power of one the world’s more insidious dictators, the shah. Operation Ajax resulted almost directly in 1979 Iranian revolution that created an anti-West Islamic republic led by the Ayatollah Khomeini.
Though it was long considered an open secret, the U.S. government kept the truth behind Operation Ajax concealed from the American people until very recently. The CIA declassified various documents on the 60th anniversary of the coup.
Because of the recent declassification, much information relevant to this CIA-sponsored coup is now available in the CIA’s archives.
In describing Operation Ajax, the CIA itself has become rather oddly self-reflective:
“The world has paid a heavy price for the lack of democracy in most of the Middle East. Operation Ajax taught tyrants and aspiring tyrants that the world’s most powerful governments were willing to tolerate limitless oppression as long as oppressive regimes were friendly to the West and to Western oil companies. That helped tilt the political balance in a vast region away from freedom and toward dictatorship.”
In a recent interview on Democracy Now, Bernie Sanders remarked to Amy Goodman that this seminal chapter in the history of U.S./Middle East relations is almost entirely ignored by mainstream media. “Have you seen many shows about that on NBC?” he asked the crowd.
2. “Nayirah,” the False Pretext for the first Gulf War
It’s now commonly believed that the second Iraq War was sold to the American people — and their congressional representatives — based on an elaborate web of lies and manipulated intelligence. What is less commonly known is that the first Iraq War came about in a very similar fashion. While, surprisingly, there is broad agreement that “Operation Desert Storm” was a worthwhile war, many people overlook the role of a fifteen-year-old girl named “Nayirah,” whose 1990 testimony to the Congressional Human Rights Caucus is credited with cementing the idea of Iraqi war crimes in the American popular consciousness. Nayirah testified to having witnessed Iraqi troops tearing babies from their incubators in Kuwaiti hospitals and leaving them to die on the floor. It’s a profoundly disturbing image….and one that was entirely fictitious.
After a lengthy investigation, Amnesty International and other independent watchdog groups discovered that the situation described by Nayirah was fabricated by a PR firm named Hill & Knowlton (the largest in the world at this time), which was hired by the group Citizens for a Free Kuwait in order to create propaganda that would galvanize pro-war sentiment. The man overseeing the campaign was Bush political confidante Craig Fuller. This was a massive project utilizing 119 H&K executives in 12 offices across the United States and even involved casting Nayirah, who turned out to be Nayirah al-Sabah, daughter of Saud bin Nasir Al-Sabah, Kuwaiti ambassador to the United States. The Justice Department, which could have investigated the entire effort under the Foreign Agents Registration Act, turned a blind eye, allowing the Bush administration to pull off a massive “Wag the Dog”-style ideological false flag. Others call it “atrocity propaganda,” a form of psyop (psychological operation).
The “Nayirah” story is just another example of the government falsifying a narrative in order to manipulate the public into supporting war. This kind of psychological propaganda continued all through the second Iraq War and the War on Terror. Just recently, it was revealed that the Pentagon paid PR firm Bell Pottinger $540 million to create fake terrorist videos in Iraq.
3. Operation Paperclip
Originally called Operation Overcast, Operation Paperclip was the codename of the secret American plan to conscript Nazi scientists into U.S. intelligence services at the end of World War II. This ushered in and shielded about 1,500 Germans, including some engineers and technicians. Ostensibly, the purpose of this redeployment by the Joint Intelligence Objectives Agency (JIOA) was to prevent Nazi scientific intelligence from helping reconstitute a new German government; it was also a tactic meant to ensure the Soviet Union didn’t acquire any new technology.
Whatever strategic mindset might have lived inside Operation Paperclip, at its core, the project gave American identities to some of the most ruthless war criminals the world has ever seen.
According to Ynet, the new Nazi CIA scientists helped develop chemical weapons for the U.S. and worked alongside American scientists to develop LSD, which the CIA viewed as a ‘truth serum.’
4. Operation Gladio: Anti-Communist False Flags in Italy
Operation Gladio was the post-World War II love-child of a CIA/NATO/M16 plot to battle communism in Italy. The operation lasted two decades and used CIA-created “stay behind” networks as part of a “Strategy of Tension” that coordinated multiple terrorist attacks from the late 1960s to the early 1980s. Authorities blamed these attacks on Marxists and other left-wing political opponents in order to stigmatize and condemn communism. The operation involved multiple bombings that killed hundreds of innocent people, including children. The most notable attack was the August 2, 1980, bombing of the Bologna train station, which killed 85 people.
In an Anti-Media piece written about five confirmed false flag operations (which includes Operation Gladio, I wrote:
“How do we know about Operation Gladio in spite of its incredibly clandestine nature? There are two principle sources. One, the investigations of Italian judge Felice Casson, whose presentation was so compelling it forced Italian Prime Minister Giulio Andreotti to confirm Gladio’s existence. The second source is testimony from an actual Gladio operative, Vincenzo Vinciguerra, who is serving a life sentence for murder. In a 1990 interview with the Guardian, Vincenzo stated that Gladio was designed to psychologically coerce the Italian public to rely on the state for security.”
Operation Gladio is a textbook modern “false flag.” It used terror and violence to discredit an ideology (communism). And to think, this came at a time before the internet when the CIA didn’t have a fully entrenched mainstream media to trumpet, echo, and build consensus around every little nuance (though they were working on it with COINTELPRO and Operation Mockingbird). Nowadays, the CIA has multinational propaganda machines — the news networks — to make sure all terrorist attacks fit into the carefully scripted narrative that manufactures consent around our wars for oil, natural gas, and other resources.
5. Government uses insect and rodent drones to spy
It’s somewhat of a cliche to jokingly refer to a surrounding insect or bird as a clandestine spy deployed by the government to watch you. While we lack certain specifics on the ubiquity of the technology, we know definitively that the government has the technology to surveil citizens using insects and other small animals, and they use this technology in military applications.
There is some evidence to suggest that insect drones are used domestically to spy on citizens. In 2007, this theory conspiracy theory took shape when anti-war protesters reported strange buzzing insects. Written off as tin foil material, officials dismissed the suggestion that the government used insect drones to spy. Multiple witnesses reported erratic dragonfly-type objects hovering in the sky. The very next year, the U.S. Air Force announced their intended use of insect-sized spies ‘as tiny as bumblebees’ to infiltrate buildings in order to ‘photograph, record, and even attack insurgents and terrorists.‘ The government has come clean about its use of drones to spy on American citizens, so it’s difficult to believe they wouldn’t have at least tried insect drones.
While we can’t say with 100% certainty that there are insect drones spying on American citizens, though it’s exceedingly likely, what is irrefutable is the use of micro air vehicles (MAVs) and “spy animals” as war-time tools. DARPA launched its Stealthy Insect Sensor Project in 1999 as an effort to deputize bees as bomb locators in war zones. This was just the first phase in an ongoing project. In her book The Pentagon’s Brain: An Uncensored History of DARPA, America’s Top Secret Military Research Agency, journalist Annie Jacobsen revealed that the agency’s near-future trajectory is to introduce “biohybrids” — part animal, part machine cyborgs — into the United States’ military arsenal.
“DARPA has already succeeded in creating a rat that will be steered by remote control by implanting an electrode in its brain.
“And it’s done the same thing with a moth which is really remarkable because the scientists implanted the electrodes in the pupa stage of the moth when it was still a worm! And then it transformed into having wings, and those tiny little micro-sensors transformed with the moth and the DARPA scientists were able to steer that moth.”
6. CIA assassinations and coups in foreign countries
When operatives for the Democratic Party claim the 2016 United States presidential election was tampered with by a foreign entity, it’s hard not to cringe at the irony. Firstly, they’ve presented no evidence, except to claim that government intelligence agencies believe it to be true. Sorry, that’s not actually evidence. That’s like the police saying they have DNA evidence but never actually scientifically presenting it in court. It’s kind of unnerving that we even have to point that out. Secondly, our own government and intelligence agencies, namely the CIA, have actively and aggressively subverted countless foreign elections over the last century and, in some cases, have outright funded the assassinations of candidates.
This subject could easily fill a multi-volume book, and countless authors have worked over the years to uncover the role of the CIA in foreign coups. Using every tool in their arsenal — including white, grey, and black psychological operations, counterinsurgencies, and brutal coups aimed at repressing and destroying radically democratic candidates — the CIA has subverted the “will of the people” across the world.
The most commonly noted instances of the CIA meddling in foreign elections and governments include the following: South Korea (late-1940s); Italy (1948-mid-1970s); Guatemala (1954); Congo (1960), Dominican Republic (1961), South Vietnam (1963), Brazil (1964); Uruguay (1969); Bolivia (1971); Chile (1970-1973); Argentina (1976); Australia (1975); El Salvador (1980); Iran (late-1970s); Grenada (1983) Haiti (1986); Panama (1990) Nicaragua (1990); Czechoslovakia (1990); Peru (1990-2000) Yugoslavia (2000). This is but a small sampling of countries where even mainstream news outlets and, in many cases, the CIA itself, admits calamitous U.S. involvement. There are literally dozens more and, of course, this is restricting the conversation to soft coups — otherwise, we could certainly include the complete military decimation of Iraq, Afghanistan, Libya, and other Middle Eastern countries during the War on Terror, as well as the myriad imperial wars against perceived communist threats.
‘A foreign government hacked and subverted our election!’
The irony is thick with this one. Payback’s a bitch…..which, of course, isn’t giving our intelligence agencies, who have proven themselves to be pathological liars, the benefit of the doubt regarding their claims of Russian collusion during the 2016 presidential election. It’s just to kind of say…..you reap the harvest you have sown. When you look at the track record of the United States government, it’s a wonder the average citizen is safe traveling abroad.
7. Mainstream media is the propaganda branch of the State Department
People have long accused the media of being a proxy branch of the State Department, a highly sophisticated and well-produced form of manufactured consensus and controlled opposition all rolled into one. In ostensibly democratic nations, a free and independent press is of paramount importance. But in the U.S., we find a cohesion of the state and corporate news networks that do not constitute ‘state-run media’ in the traditional sense — but it’s close.
Our first solid documentation that the media is an echo chamber for the government came with the disclosure of what has come to be called Operation Mockingbird. This nefarious and far-reaching conspiracy was documented in Part 1 and involved the CIA essentially conscripting journalists, American news agencies, and major broadcasters to become domestic propagandists and spies. Eventually, this CIA/media symbiosis included journalists from all the top news organizations. Literally, thousands of people were involved.
This infiltration of the American media and press took place during the 1950s, at the start of the Cold War, and was carried out under the auspices of fighting communism. The CIA began to restrict its use of journalists in the Operation Mockingbird program in 1976, but many people believe it has since transmogrified into something far more powerful, nefarious, and ubiquitous today. We’re still in the early stages of proving to the masses that mainstream media is little more than a mouthpiece and propaganda machine for the government and its various agencies, but the evidence is accumulating.
During the 2016 presidential election, Wikileaks exposed a number of disturbing revelations showing collusion between the media and political operatives. This included collusion between the media, the Democratic National Committee, and the Hillary Clinton campaign. But it wasn’t just about swaying the election. New revelations showed that the government actively infiltrates powerful media corporations in order to shape their content and narratives. One of the best examples of this was the State Department’s role in affecting a CBS 60 Minutes interview with Julian Assange.
A more comprehensive list of examples of the Orwellian symbiotic relationship between the press and the government can be found here.
Perhaps the most disturbing recent addition to this chapter was the “Countering Disinformation Act” that President Obama slipped into the National Defense Authorization Act (NDAA) on Christmas Eve of last year. In the context of the still-festering narrative of foreign interference in the 2016 presidential election, the act’s putative goal was to fight “fake news,” which many believe is actually a campaign to silence and dismantle alternative media on the Internet.
In order to accomplish this, the government is establishing a Global Engagement Center for managing disinformation and propaganda. Since we already know our government routinely performs psychological operations (psyops, or as they’ve been recently rebranded, Military Information Support Operations [MISO]), it should come as no surprise that manipulating the civilian population is a permanent goal. In fact, in the 2013 National Defense Authorization Act, the government formally legalized the use of psyops on U.S. citizens. So how does this Global Engagement Center factor in?
The new law states:
“The Center is authorized to provide grants or contracts of financial support to civil society groups, media content providers, nongovernmental organizations, federally funded research and development centers, private companies, or academic institutions for the following purposes:
To support local independent media who are best placed to refute foreign disinformation and manipulation in their own communities.
To collect and store examples in print, online, and social media, disinformation, misinformation, and propaganda directed at the United States and its allies and partners.
To analyze and report on tactics, techniques, and procedures of foreign information warfare with respect to disinformation, misinformation, and propaganda.
To support efforts by the Center to counter efforts by foreign entities to use disinformation, misinformation, and propaganda to influence the policies and social and political stability of the United States and United States allies and partner nations.”
While it may not immediately strike one as sinister, this codification of repressing journalists and voices the government deems to be disinformation while creating an even more centralized infrastructure to control “fact-based narratives” in the media should be highly alarming to anyone who cares about a free press. It would seem that while the State already has a steel grip on corporate news networks, they are struggling to control the influence of online independent media. This new law may be the start of this century’s Operation Mockingbird — a new full-scale infiltration of the local news and a war against anti-establishment narratives on the Internet. This is already taking the form of algorithmic censorship through Facebook and Google, as well as a weaponization of the “fake news” narrative.
8. The Deep State (or the conspiracy theory formerly known as The New World Order)
“For decades, extreme ideologies on both the left and the right have clashed over the conspiratorial concept of a shadowy secret government often called the New World Order pulling the strings on the world’s heads of state and captains of industry.
“The phrase New World Order is largely derided as a sophomoric conspiracy theory entertained by minds that lack the sophistication necessary to understand the nuances of geopolitics. But it turns out the core idea — one of deep and overarching collusion between Wall Street and government with a globalist agenda — is operational in what a number of insiders call the “Deep State.”
In the wake of the 2016 election, the concept of the Deep State has grown into somewhat of a common phrase in the lexicon of alternative media theorists, crossing political boundaries and resonating across the ideological spectrum. Everyone from alt-left socialists to alt-righters now agrees there is an unelected cabal of elite neo-conservative corporatists and crony lawmakers running the geopolitical show.
Because it’s such a complex subject and permeates so many different academic, economic, and state apparatuses, it’s virtually impossible to issue a single, simple definition of the Deep State. If I were to hazard one, I would call it “the nexus of Wall Street and the national security state — a relationship where elected and unelected figures join forces to consolidate power and serve vested interests.” But even that is vague. We could also call it “the failure of our visible constitutional government and the cross-fertilization of corporatism with the globalist war on terror.”
Former Republican congressional aide Mike Lofgren gets more specific with who is involved:
“It is a hybrid of national security and law enforcement agencies: the Department of Defense, the Department of State, the Department of Homeland Security, the Central Intelligence Agency and the Justice Department. I also include the Department of the Treasury because of its jurisdiction over financial flows, its enforcement of international sanctions and its organic symbiosis with Wall Street.”
In his writing, Lofgren emphasized the role of FISA international surveillance courts. This was confirmed in a very interesting way when President Donald Trump accused former President Obama of tapping his phones, a charge Obama aides deflected by saying that if such a warrant had been issued, it would have been done through a FISA court. This shows how presidents are able to skirt the constitution by outsourcing surveillance requests. It also shows the interconnectedness of these agencies.
However you want to describe it, it’s the natural conclusion of Operation Mockingbird and most certainly a reality that the elites would have rather kept under the radar. Fortunately for the people of the Earth, revelations from Wikileaks and other whistleblowers have, over the last couple decades, made it abundantly clear that the Deep State (the New World Order) not only exists, but also that it’s far more sinister and powerful than early conspiracy theorists could have ever imagined.
9. CIA used psychics to infiltrate the Soviet Union during Cold War
It’s a plot in a science fiction movie or TV show we’ve all seen: a psychic being leveraged by a law enforcement agency to track down a criminal. The concept of a government psychic program was popularized by the film The Men Who Stare at Goats, which lampooned the mythical STARGATE program supposedly run by the CIA. Most people scoffed at the reality of this and considered it a wacky conspiracy theory, but a recently declassified trove of hundreds of thousands of CIA files finally confirmed not only that psychics are regularly used by police and other law enforcement agencies, but also that the government actually weaponized psychics during the Cold War to try to infiltrate the Soviet Union and gain information.
The documents, made publicly available thanks to the activist group Muckrock, confirm there were top-secret CIA and Defense Department programs to use remote viewing to infiltrate Soviet military installments. There were also programs developing ways to engage in “psychic warfare,” including the development of a “psychic shield” to block Soviet psychics.
10. CIA monitors U.S. citizens via their smart devices
Early in 2017, the organization Wikileaks began releasing their first post-2016 election cables with a series of explosive data dumps regarding the CIA’s cyber hacking abilities and exploits. It is called Vault 7. Updated serially in “Year Zero,” “Dark Matter,” “Marble,” “Grasshopper,” “HIVE,” “Weeping Angel,” and “Scribbles,” the documents show the unprecedented collection of cyber vulnerabilities, exploits, and hacking abilities consolidated within the agency that many believe constitute wide-ranging breaches of civil liberties.
Chief among these breaches is domestic surveillance and extrajudicial cyberhacking, which the Wikileaks documents confirm are taking place in an abundance of forms. The Vault 7 documents confirm that: The CIA can break into Android and iPhone handsets and all kinds of computers; the agency has the ability to hack into Apple iPhones and Android smartphones and actually assume full remote control of the device; the CIA can access consumer smart TVs to listen in on surrounding conversations; the agency looked into ways to hack into cars and crash them, allowing ‘nearly undetectable assassinations’ (an assertion that may be relevant to the Michael Hastings case); the CIA concealed vulnerabilities that could be exploited by hackers from other countries or governments.
This is just the beginning. Early in the release, Julian Assange said the documents released represented only a tiny fraction of the total data that was forthcoming. Wikileaks’ episodic data dumps on the CIA’s cyber hacking programs are nothing less than stunning. The establishment’s reaction to the ongoing releases verifies how big of a deal they are. One congressman went so far as to refer to Julian Assange and his whistleblowing outfit as a “foreign terrorist organization.” This isn’t new or unexpected, as the group’s slow but inexorable drips of revelations about government malfeasance continue to confound and disturb private citizens, consumer rights activists, tech companies, and international leaders alike.
Conclusion
Of course, not all conspiracy theories are true. In fact, there are hundreds, even thousands, that have been roundly debunked. Unfortunately, there are those who seek to lie and invent fictions for monetary gain and fame. Disinformation, propaganda, and dishonesty exist at all levels of society.
However, sometimes conspiracy theories turn out to be true. Therefore, it’s worth assessing them, even if their claims appear wholly outlandish. Especially if their claims appear wholly outlandish.
The conspiracy theory is a tool in a larger tool kit used by those who wish to decode the grossly imperfect and fluid narrative describing our world. When investigated responsibly, conspiracy theories function as part of a conceptual spectrum of analysis with which we can investigate government and corporate abuses of power and the manufacturing of ‘consensus reality.’ In the 21st century, when the very transmission of information can be considered criminal, being a responsible conspiracy theorist just means you practice due diligence and hunger for the truth.
Another major cyberattack, another wave of articles telling you how to protect your data has me thinking about European ruins. Those medieval fortresses and castles had walls ten feet thick made of solid stone; they were guarded by mean, heavily armored, men. The barbarians got in anyway.
At the time, those invasions felt like the end of the world. But life goes on. Today’s Europeans live in houses and apartment buildings that, compared to castles of the Middle Ages, have no security at all. Yet: no raping, no pillaging. People are fine.
Security is overrated.
The ransomware attack that crippled targets as diverse as FedEx and British hospitals reminds me of something that we rarely talk about even though it’s useful wisdom: A possession that is so valuable that you have to spend a lot of money and psychic bandwidth to protect it often feels like more of a burden than a boon.
You hear it all the time: Change your passwords often. Use different passwords for different accounts. Install File Vault. Use encrypted communications apps. At what point do we throw up our hands, change all our passwords to “password” and tell malicious hackers to come on in, do your worse?
I owned a brand-new car once. I loved the look and the smell but hated the anxiety. What if some jerk dented it? Sure enough, within a week and the odometer reading in the low three digits, another motorist scratched the bumper while pulling out of a parallel parking space. I was so determined to restore the newness that I paid $800 for a new bumper. Which got scratched too. That was 13 years, 200,000 miles and a lot of dings ago. Still drive the same car. I don’t care about dents.
I’m liberated.
The Buddha taught that material attachments bring misery. He was right. During the 1980s crack epidemic addicts stole car stereos to finance their fixes. To avoid smashed windows, New Yorkers took to posting “No Radio” signs on their cars.
But the really smart drivers’ signs read “Door unlocked, no radio.” It worked.
Hackers, we’re told, are ruining the Internet. I say our reaction to hack attacks has ruined it. It’s like 9/11. Three thousand people died. But attacking Afghanistan and Iraq killed more than a million. We should have sucked it up instead.
Security often destroys the very thing it’s supposed to protect. Take the TSA — please! Increased airport security measures after 9/11 have made flying so unpleasant that Americans are driving more instead. Meanwhile, “civil aviation” flights out of small airports — which have no or minimal security screenings — are increasingly popular. So are trains — no X-ray machines at the train station, either. Get rid of TSA checkpoints at the airport, let people walk their loved ones to the gate so they can wave goodbye, and I bet more people would fly in spite of the risk.
It’s not just government. Individuals obsess over security to the point that it makes the thing they’re protecting useless.
For my 12th birthday my dad gave me a 10-speed road bicycle. I still have that Azuki. It weighs a ton but it runs great. It’s worth maybe $20.
Bike theft is rife in Berkeley and Manhattan, but I tooled around both places on that banana yellow relic of the Ford Administration without fear of anything but the shame of absorbing insults from kids on the street. I often didn’t bother to lock up my beater. Never had a problem.
In my early 40s and feeling flush, I dropped $2400 on a royal blue Greg LeMond racing bike. Terrified that my prize possession might get stolen, I only ride it to destinations I deem ridiculously safe or where I’ll only have to leave it outside for a few minutes. So I hardly use it. I’m an idiot.
Nice things are, well, nice to have. But they’re also a pain in the ass. In college one of my girlfriends (who I am not suggesting was a “thing,” obviously, and whom equally obviously I never thought I “had” in any ownership-y sense) had dazzling big blue eyes and golden blonde hair down to her waist and was so striking that guys literally walked into lampposts while gawking at her. Being seen with her was great for my ego. But every outing entailed a risk of violence as dudes catcalled and wolf-whistled; chivalry (and my girlfriend) dictated that I couldn’t ignore all of them. I sometimes suggested the 1980s equivalent of “Netflix and chill” (Channel J and wine coolers?) rather than deal with the stress. (We broke up for other reasons.)
So back to the big ransomware attack. What should you do if your ‘puter locks you out of your files unless you fork over $300? Wipe your hard drive and move on.
Back up regularly, Internet experts say, and this threat is one reason why. With a recent backup you can usually wipe your hard drive and restore your files from a backed-up version that predates the virus. Take that, villains! But no one does.
Meanwhile, our online lives are becoming as hobbled by excessive security as the airlines. Like the countless locks on Gabe Kaplan’s Brooklyn apartment door in “Welcome Back Kotter,” two-step authentication helps — but at what cost? You have to enter your password, wait for a text — if you’re traveling overseas, you have to pay a dollar or more to receive it — and enter it before accessing a site. Tech companies force us to choose a new password each time we forget the old one. Studies show that makes things worse: most users choose simpler passwords because they’re easier to remember.
The only thing to fear, FDR told us, is fear itself. What if we liberated ourselves from the threat of cyberattack — and a ton of work maintaining online security — by not having anything on our Internet-connected devices that we care about?
This would require a mental shift.
First, we should have fewer things online. When you think about it, many devices are connected to the Internet for a tiny bit of convenience but at significant risk to security. Using an app to warm up your house before you come home is nifty, but online thermostats are hardly worth the exposure to hackers who could drive up your utility bills, start a fire or even cause a brownout. Driverless cars could be remotely ordered to kill you — no thanks! I laugh at the Iranian nuclear scientists who set back their nation’s top-secret research program for years because their desire to cybercommute opened their system to the Stuxnet attack. Go to the office, lazybones!
The Internet of Things needs to be seriously rethought — and resisted.
As for your old-fashioned electronic devices — smartphones, tablets and laptops — it might time to start thinking like a New Yorker during the 1980s. Leave the door unlocked. Just don’t leave anything in your glove compartment, or on your hard drive, that you wouldn’t mind losing.
Ted Rall, syndicated writer and the cartoonist for ANewDomain.net, is the author of the book “Snowden,” the biography of the NSA whistleblower.
The “Weeping Angel” tool is an implant designed for Samsung F Series Smart TVs. It is “designed to record audio from the built-in microphone and egress or store the data,” the Wikileaks’ press release said.
“The classification marks of the User Guide document hint that… was originally written by the MI5/BTSS and later shared with the CIA. Both agencies collaborated on the further development of the malware and coordinated their work in Joint Development Workshops,” the whistleblowing site said.
On March 7, WikiLeaks released the first part of what it called an unprecedentedly large archive of CIA-related classified documents. According to the website, a large archive comprising various viruses, malware, software vulnerability hacks and relevant documentation, was uncovered by US government hackers, which is how WikiLeaks gained access to some of the data from the trove.The “Year Zero” batch was followed by the “Dark Matter” released on Match 23. The third batch called “Marble” was released on March 31. The “Grasshopper” batch revealing a platform for building malware was released on April 4. The HIVE batch revealing top secret CIA virus control system was released on April 14.
The first batch of Wikileaks’ CIA revelations shed light on a technology allowing to turn on a Samsung smart TV set’s audio recording capabilities remotely which had been designed by the CIA and the UK Security Service MI5.
Makers of the We-Vibe have agreed to delete all the hump and vibe info they stored without users’ consent.
The first time I heard about the We-Vibe I was in a Victoria, BC sex shop, where a 38-year-old woman told me about her search for something that could vibrate inside her as she goes about her daily tasks. She was scoping out the Canadian-made sex toy because it could be controlled remotely via her partner’s phone app—a fantasy that seemed genuinely futuristic three years ago.
Now the future has truly arrived, as the sex toy maker is paying out a massive $3.75 million settlement to make a class-action lawsuit go away. Standard Innovation, the company that seemingly invented remote-control vag-zapping, is accused of spying on users without consent and breaking a bunch of privacy laws.
A lawsuit filed in Illinois last year alleged the company was collecting “highly personal” information about its user’s diddling habits, from how frequently they’re taking care of business, to the intensity settings they’re using in real time.
Last year the company claimed they were just using the data to improve user experience. They noticed many masturbators were using the highest setting, for example, which suggests people out there wanted more juice. Hmmm.
The company has admitted no wrongdoing, but has agreed to empty its Canadian servers of all the vibrator-related personal info, and stop collecting it in future.
We-Vibe app users can claim up to USD $10,000 in damages. There are roughly 300,000 users out there, about a third of which use the app. To the woman I met in Victoria, if you’re out there, getting in on this cash bonanza would be the greatest act of self-love.
Once the CIA’s weapons have been disarmed, WikiLeaks would post the code publicly, Assange said. (Photo: Reuters)
WikiLeaks will give technology companies exclusive access to alleged CIA documents to help them repair security flaws that allowed the government to spy on individuals through their smart devices, the organization’s founder Julian Assange said Thursday.
“Considering what we think is the best way to proceed and hearing these calls from some of the manufacturers, we have decided to work with them to give them some exclusive access to the additional technical details that we have so that the fixes can be developed and pushed out, so people can be secure,” Assange said in a Facebook live address from the Ecuadorian embassy in London, where he has lived in exile since 2012.
WikiLeaks on Tuesday released a trove of documents purporting to show that the CIA exploited security flaws in mobile phones, smart TVs, and other devices that allowed the intelligence agency to listen in on users in their own homes. But the documents did not disclose what those flaws actually were—instead showing user guides, developer manuals, and other communications.
The group said it held back publishing that information to “[avoid] the distribution of ‘armed’ cyberweapons” until there was a “consensus” on how to dismantle them.
Once they have been disarmed, WikiLeaks would post the code publicly, Assange said.
CIA spokesman Dean Boyd responded to Assange’s comments by stating that he was “not exactly a bastion of truth and integrity.”
WikiLeaks fired back, “but he literally won the award for just that,” referring to the 2010 honor Assange received from the Sam Adams Associates for Integrity in Intelligence, an organization founded by retired CIA officers that recognizes intelligence whistleblowers.
During the press conference, Assange again reiterated the group’s claim that the documents show the CIA has lost its grip on its vast surveillance enterprise.
“The Central Intelligence Agency lost control of its entire cyberweapons arsenal,” Assange said. “This is an historic act of devastating incompetence to have created such an arsenal and stored it all in one place and not secured it.”
Following Wikileaks Vault 7 release alerting Americans to the fact that the CIA is using tons of exploits to turn all sorts of internet-connected smart devices into surveillance microphones, granting the intelligence agency access to millions of people’s private homes, people started asking questions.
Welcome to New World Next Week – the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. This week:
DPhil Candidate in Philosophy, Uehiro Centre for Practical Ethics, University of Oxford
January 11, 2017
Carissa Véliz does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond the academic appointment above.
Just a click away once you tick this too-long-to-read privacy agreement. Shutterstock
It is inconvenient to guard one’s privacy, and the better one protects it, the more inconvenience one must endure. Enjoying privacy, at a minimum, demands installing software to block tracking online, using long and different passwords for online services, remembering to turn off the WiFi and Bluetooth signals on your mobile phone when leaving the house, using cash, and so on.
The more privacy conscious have to go through the trouble of using encryption for all their messages, covering the camera on their laptop with a sticker, suffering the slowness and limitations of using Tor (a software that enables anonymity online), and may even be willing to forgo the many advantages of having a mobile phone altogether.
Companies and institutions should not make it this hard for people to enjoy privacy – we shouldn’t have to go through all this trouble to make good on a right. However, we live in a non-ideal world, where it is more and more a fact of the matter that governments and businesses exploit people’s personal information for economic and political reasons.
So, individuals living in the real world are faced with the dilemma of either complying with the default option and surrendering their privacy, or trying to resist exposure through paying a high price in inconvenience. It makes sense to ask whether privacy is worth all the trouble.
Imagine going into a shop, picking out whatever you fancy, putting it in your bag, and simply walking out. No cash, no credit cards, no queues. Cameras using facial recognition have identified you and you will be billed automatically. You rarely go into shops, anyway. Only when you feel like going for a stroll, or when you wish to explore new products. Most of the time, everything in your house gets restocked automatically through sensors connected to the Internet of Things. That future may not be far away. Amazon just opened a checkout-free shop in Seattle, and may soon open more stores in the UK.
The inconvenience of convenience
The bright side of convenience is an attractive one: it promises us an easier life. Convenience, like pleasure, is an important component of a good life. If we didn’t choose convenience every now and again our lives would be hopelessly uncomfortable and inefficient.
It is inconvenient to only buy from socially responsible businesses, to exercise, to find new things to do, to keep well informed, to vote and protest when governments commit injustices. A good life demands a reasonable degree of struggle – the right balance between the ease of convenience and the benefits of meaningful efforts. Like pleasure, convenience has to be weighed against the price we are paying for it, and the short- and long-term consequences that might ensue.
Weighing up the losses
Unfortunately, it is not easy to assess the weight of privacy losses. Typically, in the online world, no small privacy loss will create a catastrophe. One business tracking one click of yours is not a big deal. But privacy losses accumulate, and the entirety of what you have revealed online through browsing, clicking, buying and liking, can paint a frighteningly detailed portrait of you.
Privacy losses are like ecologic damages or health deterioration: no one act of littering, no one puff of a cigarette will bring about disaster, but the sum of them through time might.
What possible damage could come from giving up privacy online, you may wonder. If you ask for a job, it is likely that the company considering hiring you will buy a file on you from data brokers. Your file may contain information on browsing habits, credit history, health records, and more. The company may not hire you because of something you posted on social media, or because of some other kind of “stain” on your record, and you will never know why it was, nor will you ever be able to contest that decision.
Similarly, a bank may not grant you a loan from information they glean from you on the internet. The information on which they make their decision may be inaccurate, but again, you will never know. Hackers could turn on your camera and blackmail you with sensitive footage. Criminals may commit identity theft.
According to the Federal Trade Commission, identity theft complaints in the US increased by 47% between 2014 and 2015. Trolls may harass you online and offline. Insurance companies may charge you according to information about your habits. Products such as flights may become more expensive for you depending on how much you seem to want them. And the list goes on.
It is paramount that we demand businesses and government institutions enable us to enjoy privacy online more easily. In the meantime, however, you might want to think twice about surrendering your privacy for the sake of convenience.
High-tech washing machines and fridges will soon be used by detectives gathering evidence from crime scenes, experts have forecast.
The advent of ‘the internet of things’ in which more devices are connected together in a world of ‘smart working’ could in future provide important clues for the police.
Detectives are currently being trained to look for gadgets and white goods which could provide a ‘digital footprint’ of victims or criminals.
Mark Stokes, the head of the digital, cyber and communications forensics unit at the Metropolitan Police told The Times: “Wireless cameras within a device, such as fridge, may record the movement of owners and suspects.
“Doorbells that connect directly to apps on a user’s phone can show who has rung the door and the owner or others may then remotely,m if they choose, to give controlled access to the premises while away from the property.
“All these leave a log and a trace of activity. The crime scene of tomorrow is going to be the internet of things.”
The new Samsung Family Hub Fridge has cameras that carry a live feed of its contents, so shoppers can tell what they need when they are out at the shop. The dates and times that people logon to the fridge, therefore could provide alibis or prove people were not were they said they were.
Mr Stokes said detectives of the future would carry a ‘digital forensics toolkit’ which would allow them to analyse microchips and download data at the scene, rather than removing devices for testing.
However the police could come up against opposition from companies making the gadgets, who are concerned about the privacy of their customers.
In the US, Amazon is currently fighting requests by the US authorities to hand over recordings from one of its Echo home entertainment systems belonging to James Andrew Bates.
Officers in Arkansas are investigating the murder of Victor Collins who was found dead at Mr Bates’ hot tub in 2015. They have already taken evidence from an electric water meter, which appears to show that a huge amount of water was used. Detectives say it could have been to wash blood away from the patio.
The Echo delivers weather forecasts, controls thermostats and light switches, and plays music. But it also has artificial intelligence and improves over time based on the owner’s voices so could provide insight into what happened on the night of Mr Collins’ death.
A massive hack attack took nearly a million people offline, cutting them off in an Internet outage that proves how vulnerable our lives have really become.
The motive for the disruption isn’t clear, but the sheer power that now lies in a handful of vigilantes and manipulators is stunning.
If hackers turn against you, your connection to the outside world can be dismantled in a matter of seconds, unless, of course, you have established back up, off grid communications.
Around 900,000 routers across Germany were hit by the outage which started on Sunday, a company spokesman told DPA on Monday.
The routers connect customers not only to the internet, but also to telephone and television services. The spokesman explained that the problem was not with the network itself, but rather with identifying routers upon dial-up.
The company is now looking into evidence found by IT analysts that the connection problem may have been due to an outside attack rather than a normal system failure…
“We have found the first indications that we were possibly victims of a hacker attack,” a spokesman said. Massive outages are rare… [but] Germany has been the target of repeated cyber attacks in recent years.
Most new cars, outfitted with GPS and wifi systems, can also be hacked, and the results could be fatal if a black hat operator were to target you. Basically, any device connected to the Internet can be weaponized. Stephen King’s Maximum Overdrive alternative reality has dawned, and already things are getting pretty weird.
Hackers have been taking down the global infrastructure, but for whose agenda isn’t clear.
News sources have been quick to tie hacking activity to Russia, as if cyber warfare were confined to borders and nationalities. The information war has more sides than a dodecahedron. However, this adds fuel to the ideological fire that is creating a new enemy in Putin and a resurrected Cold War.
A new national enemy will keep the restless and angry population distracted, and their anger and confusion can be redirected; dissent can be stifled under cover of patriotism and national security. Facebook and Google are doing most of the work anyway, using the meme of “fake news” to cull the weeds of free speech, and cultivate their bonzai tech democra-topia.
In the wake of a major cyber attack that blocked access to popular websites along the East Coast on Friday, security researchers have created a Twitter account that posts live updates of ongoing distributed denial-of-service (DDoS) attacks being launched by massive armies of smart devices compromised by malware known as Mirai.
The account, called Mirai Attacks, includes updates showing the IP addresses being targeted by the zombie botnets bearing the malware’s digital signature, which currently include over half a million infected Internet of Things devices like security cameras and smart TVs. The compromised devices were partly blamed for a large attack on Friday that targeted key infrastructure supporting the internet’s Domain Name System (DNS), resulting in outages for popular sites including Twitter, Reddit, and Etsy.
It’s still unclear who is behind the attacks, and several distinct Mirai botnets have emerged since the malware’s release. According to the researchers, the botnets have even been observed attacking one another, in some kind of bizarre cyber-dystopian turf war.
Could millions of connected cameras, thermostats and kids’ toys bring the internet to its knees? It’s beginning to look that way. The hacker group claiming responsibility for Friday’s attacks says it has its sights set on a much bigger target.
Friday’s DDoS attackers now have a secret weapon in the increasing array of internet-enabled household devices they can subvert and use to wreak havoc. (Kacper Pempel/Reuters)
Could millions of connected cameras, thermostats and kids’ toys bring the internet to its knees? It’s beginning to look that way.
On Friday, epic cyberattacks crippled a major internet firm, repeatedly disrupting the availability of popular websites across North America and Europe such as Twitter, Netflix and PayPal.
The hacker group claiming responsibility says that the day’s antics were just a dry run and that it has its sights set on a much bigger target.
And the attackers now have a secret weapon in the increasing array of internet-enabled household devices they can subvert and use to wreak havoc.
Manchester, N.H.-based Dyn Inc. said its server infrastructure was hit by distributed denial-of-service, or DDoS, attacks. These work by overwhelming targeted machines with junk data traffic — sort of like knocking someone over by blasting them with a fire hose.
Jason Read, founder of the internet performance monitoring firm CloudHarmony, owned by Gartner Inc., said his company tracked a half-hour-long disruption early Friday affecting access to many sites from the East Coast. A second attack later in the day spread disruption to the West Coast as well as some users in Europe.
Members of a shadowy hacker group that calls itself New World Hackers claimed responsibility for the attack via Twitter, though that claim could not be verified. They said they organized networks of connected devices to create a massive botnet that threw a monstrous 1.2 trillion bits of data every second at Dyn’s servers. Dyn officials wouldn’t confirm the figure during a conference call later Friday with reporters.
DDoS attacks have become bigger
DDoS attacks have been growing in frequency and size in recent months. But if the hackers’ claims are true, Friday’s attacks take DDoS to a new level. According to a report from the cybersecurity firm Verisign, the largest DDoS attack perpetrated during that second quarter of this year peaked at just 256 billion bits per second.
“Our citizens should know the urgent facts…but they don’t because our media serves imperial, not popular interests. They lie, deceive, connive and suppress what everyone needs to know, substituting managed news misinformation and rubbish for hard truths…”—Oliver Stone