Technology 2018-02-18T16:57:25+00:00

Technology

There are so many advantages with improved technology in our daily life. With the help of mobile technology we are able to talk to our friends and relatives who are living far from us. With the help of internet, we are able to learn new things and online courses etc. With the help of aviation technology we are able to reach distant places within hours which took years of time to reach in olden days. We are using the all natural resources available for making our life better. With the help of social networking we are able to find our childhood friends, relatives etc. and important events in their life. With the help of information technology we are able to share information to any part of the world with in milliseconds. With progressive technology in the agriculture field, we are able to meet food requirements of people all over the world.

It is a different world than the one in which most of us were raised in, in terms of technology and convenience. Technology is here to stay to make our lives easier. We don’t have to remember phone numbers, look at a map to get where we are going or worry about complaints of “are we there yet?” when we can rely on our devices to inform and entertain us. We can now answer medical questions, get answers to questions like “What does this rash mean?” and make airline reservations, pay bills or compare prices from the convenience of our homes because, “there’s an app for that”.   Read More...

All of this convenience has an unfortunate downside. It is difficult to manage the awesome power that is embedded in today’s technology. Gaming system, tablets, smart phones are everywhere from our homes and desktops to our pockets and purses. Technology offers fun, interesting and educational alternatives. It is convenient and quickly turned to for entertainment or to keep the kids quiet on long road trips. Schools are using the Internet to communicate about assignments as well as directing students to use it to support learning as literature searches are now performed electronically. It can be a marvelous tool with a wealth of information. On the other hand, once the device is in a child’s hands, it presents parents with unprecedented challenges.

The amplitude of the stimulation that makes games/media exciting provides a heightened degree of sensory input into the nervous system, which can shift the threshold for engagement and excitation leaving normal life dull by comparison. “I’m bored” can become the complaint of the child who is used to this supercharged input stream. The high rate of interaction between the game and the gamer, or the viewed and the viewer with rapid shifts in input requires little reflection or working memory to get satisfaction from these activities. This may challenge the development of top-down modulation for the management of attention and working memory in the presence of distraction, a skill that is under construction in childhood. If shaped by gaming or media, how prepared is the young brain to face real world problem-solving such as those presented by demands of homework, requiring short-term memory, reflection, and manipulation of ideas to answer comprehension questions or write a research paper?

On a social level, the two dimensional world of the flat screen does not support the development of communication. It is estimated that as much as 93% of communication is non-verbal, leaving only 7% to the words themselves. Consequently there is significant loss of meaning and intent when reliant on the words alone as in texting/communication via keyboard. Furthermore, with the shield of anonymity provided by a device, there can be cover for intentionally hurtful language without the real time feedback of how the other is affected. In the case of video and media, while there is non-verbal communication (facial expressions, tone of voice, posture, gestures, timing, intensity, etc.) there is an absence of the dynamic experience of face-to-face social interaction. Skills such as social problem solving, compromise and conflict management may go underdeveloped. Consequently, the technology intended to improve the quality of our lives can instead lead to its deterioration through social disconnection, cyber-bullying, loneliness, social and work place challenges.

As parents, it is widely accepted that it is not healthy for your child’s development to allow him to eat candy all day every day at every meal. We know that he needs to have a balanced, nutritious diet with an occasional treat. The challenge technology poses is how to regulate it when it is both the broccoli and the Halloween candy. This is further complicated by the reality that a parent cannot supervise every minute the device is in a child’s hands and he knows how to navigate between programs and pages quicker than you can bat an eye. Boundaries need to be set. In fact, the American Academy of Pediatrics recommends NO media for children under 2 years of age and no more than two hours a day of “high quality content” for children and teens. If a child doesn’t abide by the limits, more direct intervention needs to be considered. While there are parental controls that can be set and programs installed to monitor websites and duration of use, a motivated child can find ways around them. In some cases, more drastic measures may be necessary including, but not limited to, removing devices, cancelling Internet services and disconnecting TV satellite connections. It is important to intervene early, as the challenges can grow because the reliance on devices can become habitual. It is unfortunately not unusual to hear children say that their life is not worth living if they can’t have access to their on-line activity. The stakes are high and, while technology has made some things easier, parenting our children so that they have an appropriate relationship with devices and the world around them is not one of them. Unfortunately, there is not “an app for that”… yet!

With all the good that comes with technology, health and privacy are on a sacrificial alter. An examination of the history of Facebook, Google, Palantir and other tech companies and social media software companies reveals a history with the deep state at the heart of it all. They essentially stole the software from Leader Technologies, who found out first hand how evil the deep state is during the lawsuit. The social media software created by Leader Technologies was used for Twitter, Youtube, Facebook and many others for the purpose of the government to spy on Americans. While social media has the ability to keep us connected to friends, acquaintances, and family there are negative aspects beyond the surveillance issues such as sleeping problems, neurosis, addiction, warped sense of reality, etc.

Despite what we’ve been told by the government and media, namely that we are on the cutting edge of technology, the fact of the matter is that real scientific and technical knowledge is in fact many decades ahead of what the public are given. When we look into recent history we can see this fact demonstrated over and over again. In order to maintain power and control over the masses, the elite tightly control the development and release of advanced technology to the public so that they can control the outcome.

The internet, also known as the world wide web (www), has a completely different meaning to the controllers and that is the “World Wide Wiretap”. The reality is that the internet developed by the US Military via DARPA was given to the public not as a method of efficient communication but rather as a method of controlling and tracking the public; training people to divulge private information freely; and identifying and psychologically profiling each and every person’s habits and behaviour. One of the unintended consequences has been the free flow of knowledge about the controllers themselves. Consequently, the internet itself is being targeted for transformation under Internet 2 into a government/corporate control medium (like TV) where free flow of ideas is censored and prohibited and only approved information will be accessible and the concept of internet neutrality is destroyed.

While it is true that the technological advances have resulted in increased communication capabilities, it is also true that there is an equally dark side to electronic communications and that is the ability to track, monitor and control. Intelligence agencies now routinely monitor ALL email, cell phone and internet traffic. As the technology advances this control will only increase using technologies such as RFID to track a person’s every move and the products they own; the cashless society where all financial transactions will be monitored and the government will know everything you purchase and own; virtual worlds such as “Sentient World” will be used to duplicate in cyberspace every person living in the real world; and as has happened over the past several years microchip implants will used to track and trace your every move.

Published peer reviewed science already indicates that the current wireless technologies of 2G, 3G and 4G – in use today with our cell phones, computers and wearable tech – creates radiofrequency exposures which poses a serious health risk to humans, animals and the environment. Scientists are cautioning that before rolling out 5G, research on human health effects urgently needs to be done first to ensure the public and environment are protected.

In addition to the harmful effects on humans, our increases in radiofrequency technologies may be causing birds to fall from the sky all over the world (Beebe, Arkansas, Boston, Florida, Sweden, Esperence, Australia, Austin TX, Idaho, Southern Utah, Northern Utah, Somerset, England, New Jersey, Canada, Norman, OK, Tennessee, Oregon, Quebec City, Detroit, Louisiana, China, Italy, and Iran to name a few). The birds are being diagnosed with internal bleeding and massive trauma that is logically the result of high frequency microwaves likely associated with HAARP technology. Also, studies have brought out evidence to support the theory of colony collapse disorder (CCD) among honeybees due to bioactive microwave radiation from cell phones and their relay towers.

With all of these health and environmental problems with our current technology, how will we all be affected by 5G, the coming generation of technology so everyone can be surveilled in real time. 5G is the term used to describe the next-generation of mobile networks beyond the 4G LTE mobile networks commonly used today. 5G is intended to be the technology that allows the Internet of Things (IOT) to exist and tie all internet-connected smart devices together. Currently there is no standard for 5G networks in place and it will be a combination of a variety of frequencies and modulations. Industry is developing exactly what 5G will be as the standard ha not been set yet. It is assumed that 5G networks will not become commercially available until 2020 but several cities are rolling out 5G as test areas now.

The “genius” of the New World Order surveillance project lies in the fact that “consumers have been conned into paying out of their own pockets for the instruments that will spy on them and their families,” Putin said, speaking to an assembled tour group in the Kremlin in February 2016. “The average American home is now rigged like a maximum security prison with surveillance in every room recording everything you say and do.” Samsung has admitted that their SMART TVs listen and record customers’ every word, and that they send these recordings to unnamed third-party services.

Televisions and refrigerators are the most common household appliances to have incorporated wi-fi enabled SMART technology. But there are plenty more innocent-seeming household appliances gaining popularity and they can all be used to spy on you – the dishwasher, toaster, and coffee maker in your kitchen, the clothes dryer in your laundry, the clock radio in your bedroom, your thermostat, garage door opener, security alarms, and door locks. The list continues to grow. Caroline DuBois of Raleigh, North Carolina, said Putin was warm and friendly and spoke much better English than he gets credit for.  ‘I asked him for one piece of advice to take home with me.  He said to be very, very careful of SMART technology.  Do not trust it.  The truth is starting to emerge.’ (YourNewsWire)

Instead of prudent public health measures to ensure the public’s safety, governments such as the United States are quickly rolling out 5G networks in neighborhoods and are enacting various state and federal regulations to “streamline” and fasttrack the rollout. These regulations will end the ability of communities to halt and be a part of the decision making process in this massive 5G infrastructure buildout.

THOUSANDS OF MINI CELL TOWERS TO BE BUILT IN FRONT OF HOMES

5G will require the buildout of literally hundreds of thousands of new wireless antennas in neighborhoods, cities and towns. A cellular small cell or other transmitter will be placed every two to ten homes according to estimates. The purpose of this massive infrastructure build out of small cells, distributed antennae systems and microcells is to increase range and capacity in populated urban areas and prepare for the future 5G rollout. 5G frequencies will utilize higher frequencies that do not travel as far as the lower frequencies.

 

US state and federal governments are moving forth regulations which would make the right of way in front of homes as available sites for 5G transmitters – without consent of the property owners. In response, communities are protesting en mass as they do not want these transmitters built in front of their homes and communities want to be able to regulate the placement on right of ways.  Some municipalities are taking the case to the courts with litigation.

5G WILL USE HIGHER ELECTROMAGNETIC FREQUENCIES

5G will utilize multiple frequencies from those currently in use for cell phones and wireless to higher millimeter frequencies.

Today’s cellular and Wi-Fi networks rely on microwaves – a type of electromagnetic radiation utilizing frequencies up to 6 gigahertz (GHz) in order to wirelessly transmit voice or data. However, 5G applications will require unlocking of new spectrum bands in higher frequency ranges above 6 GHz to 100 GHz and beyond, utilizing submillimeter and millimeter waves – to allow ultra-high rates of data to be transmitted in the same amount of time as compared with previous deployments of microwave radiation.

MILLIMETER AND SUBMILLIMETER WAVES ARE BIOLOGICALLY ACTIVE

Current investigations of wireless frequencies in the millimeter and submillimeter range confirm that these waves interact directly with human skin, specifically the sweat glands. Dr. Ben-Ishai of the Department of Physics, Hebrew University, Israel recently detailed how human sweat ducts act like an array of helical antennas when exposed to these wavelengths.

MECHANISM OF ACTION IS PROVEN

Research already indicates serious adverse effects from the wireless modalities in use today. Research studies from the Dielectric Spectroscopy Laboratory of the Department of Applied Physics, Hebrew University of Jerusalem, headed by Dr. Yuri Feldman, indicate that 5Gs millimeter and submillimeter waves will uniquely interact with human skin and  lead to preferential layer absorption. The number of sweat ducts within human skin varies from two million to four million.  Replicated peer research of these biological effects in laboratory research has been conducted internationally  and scientists consider this mechanism of action well proven (See documentation further down on this webpage).

5G FREQUENCIES ARE USED IN WEAPONS

For years, the U.S., Russian and Chinese defense agencies have been developing weapons that rely on the capability of this electromagnetic frequency range to induce unpleasant burning sensations on the skin as a form of crowd control. Millimeter waves are utilized by the U.S. Army in crowd dispersal guns called Active Denial Systems. Dr. Paul Ben-Ishai pointed to research that was commissioned by the U.S. Army to find out why people ran away when the beam touched them. “If you are unlucky enough to be standing there when it hits you, you will feel like your body is on fire.” The U.S. Department of Defense explains how “The sensation dissipates when the target moves out of the beam. The sensation is intense enough to cause a nearly instantaneous reflex action of the target to flee the beam.”

HUMAN SKIN WILL BE CLASSIFIED AS AN EXTREMITY ALLOWING HIGHER EXPOSURES

Our skin is our largest organ. Dariusz Leszczynski, PhD, Chief Editor of Radiation and Health has  stated that  the International Commission on Non-Ionizing Radiation Protection usually referred to as ICNIRP – is  developing recommendations for public exposure limits of these higher frequencies is planning to classify all the skin in the human body as belonging to the limbs rather than to the head or torso. Leszczynski cautioned that, “If you classify skin as limbs – no matter where the skin is – you are permitted to expose it more than otherwise.”

We assume that in terms of US exposure limits this means that the skin will be classified as “an extremity”. Extremities are allowed to be exposed to much higher radiation levels than the brain, torso, legs and arms. In the USA extremities -in regards to wireless radiation- are specifically wrists and hands, ankles and feet and the ear.

5G DEPLOYMENT WITHOUT HEALTH EFFECT EVALUATION

5G is being developed and implemented without adequate evaluation of the effect of this technology on human health after long term exposure to these frequencies. Peer reviewed research studies have found adverse effects from the electromagnetic  frequencies currently in use and that will be in use for this new technology.

“There is an urgent need to evaluate 5G health effects now before millions are exposed. We need to know if 5G increases the risk of skin diseases such as melanoma or other skin cancers,” stated Ron Melnick, the National Institutes of Health scientist, now retired, who led the design of the National Toxicology Program study on cell phone radio frequency radiation.

Read full story here…

SMART METERS

Blacklisted News featured an article titled “Smart Meter Company Landis+Gyr Now Using Copyright To Try To Hide Public Records.”  What happened to transparency, especially in high tech science?  Is there information they don’t want the public to know?

As some background information, back in 2016 L+G took some legal action, which was chronicled in the Tech Dirt article “’Smart Grid’ Company Demands MuckRock Turn Over Info On Anyone Who Might Have Seen Public Records Docs Involving It.”

It would seem that L+G executives and legal department don’t understand the meaning of “public records” or they may be desperate to use legal harassment tactics to prevent information getting out that consumers and others have every legal right to know about products L+G manufactures and sells.

Enforcement tactics regrettably include consumers being forced—against their wills and by duress techniques, e.g., no AMI SM, no utility service to your home—by state laws, public utility commissions and utility companies to be placed on to homes, businesses and everywhere in between.  What is it that I’m not getting when AMI SMs are not mandated in the 2005 Energy Act [Public Law 109-58, The Energy Policy Act of 2005 §1252 Smart Metering], as that would be unconstitutional?

Furthermore, it’s a known principle in U.S. law that if a state law allows something, but federal law does not allow/permit it, then it’s illegal!  What happened at state levels mandating AMI SMs?  Clue: Check out the UN’s Agenda 21 and 2030 and why AMI SMs are an integral part of the global surveillance state!

There are numerous informational links embedded within the Tech Dirt article I encourage readers, especially those who have actions opposing AMI Smart Meters, to research as you may find some clues and nuggets of information that could help you define the issues you are opposing.

As an example, a Tech Dirt link to Stop Smart Meters! features an “Interview with EFF: How Smart Meters Violate our Right to Privacy” wherein the Electronic Frontier Foundation discusses “free speech, privacy, innovation, and consumer rights in a digital age.”

Then there’s MuckRock, the online platform that “files, tracks and share public records requests,” a most readily accessible and valuable resource for any legal action being researched which, according to Tech Dirt, is the platform that makes it easy for journalists and others to file FOIA requests.

Chronological History of Technology and Related Events

 

California’s Department of Public Health Released a Document Kept Secret for 7 Years Outlining Health Officials’ Concerns About Cellphone Radiation Exposure

After keeping it hidden for years, California’s Department of Public Health released a document outlining health officials’ concerns about cellphone radiation exposure. A Superior Court Judge ruled that the “document advising the public of the risks associated with Cellular Phones” is not a draft as claimed by the government, and ordered the state to release an unaltered version of the public record without the text that it added indicating the document was a “Draft and Not for Public Release.” The previously unpublished document was released after a judge indicated she would order the documents be disclosed in the case Moskowitz v. CDPH. Joel Moskowitz, Ph.D., who is the director ...
Read More

Obama Does Not Renew the IANA Contract Thus Opening ICANN & the Internet to Eventually Fall Under UN Jurisdiction & Toward Global Technocracy

Obama cut Internet Corporation for Assigned Names and Numbers (ICANN) loose on September 30, 2016 by letting the Internet Assigned Numbers Authority (IANA) contract expire without being renewed. After expiration, we forever lost the right to renew the contract again. ICANN is a non-profit organization exclusively run by Technocrats. As such, it is an apolitical body that is happy to serve whatever form of governance exists as long as funding is received and salaries are paid. To a Technocrat, a world run by science and technology is better than any other form of governance. That Technocrats have played a ...
Read More

VAXXED Documentary Crew, Dr. Sherri Tenpenny, Dane Wigington, & Kevin Shipp Hold Free Public Awareness Event in Redding, CA

On Friday, August 5th, 2016, an all day free public awareness and call to action event was carried out in the Northern California City of Redding. The event covered extreme vaccination dangers, climate engineering, and the unimaginable government tyranny that is inflicted on whistleblowers and the population as a whole. The groundbreaking documentary VAXXED was screened in the afternoon and again in the evening. The film producers (Del Bigtree and Polly Tommey) and the director (Dr. Andrew Wakefield) were present for extensive Q and A sessions after each screening. Dr Sherri Tenpenny joined the very informative VAXXED Q and A panel discussions in addition to ...
Read More

Orwellian Pokemon Go app released

Pokemon Go app released in most regions of the world by Niantic, an internal start-up of Google, the NSA-linked Big Brother company. Even now Google remains one of Niantic’s major backers. Niantic was founded by John Hanke, who also founded Keyhole, Inc., the mapping company which was created with seed money from In-Q-Tel, the CIA’s venture capital arm, and which was eventually rolled into Google Maps. In just the first two trading days after the game’s release, Nintendo’s market value rose a staggering $7.5 billion. The app requires an excessive amount of permissions on a user’s device, including the ability to read your contacts, find ...
Read More

WHO declared Zika Virus Outbreak an International Public Health Emergency to Cover Vaccine-Caused Microcephaly

The World Health Organization (WHO) declared the Zika virus outbreak an international public health emergency, and the Brazilian President released a decree that increased local and federal pest control agents' access to private property required by mobilization actions for the prevention and elimination of Aedes mosquito outbreaks in the country. Brazil had 2400 localized outbreaks of babies with shrunken heads  (microcephaly) and damaged brains that were born between October and December 2015 in a toxic wasteland of northern Brazil, and the theory, or perhaps the cover story, was that the virus was being caused by mosquitoes with Zika. Through the end of ...
Read More

US Intelligence Whistleblower Leaks Mobile Surveillance Devices

A whistleblower tied to the U.S. intelligence community leaked a secret catalog containing a wide array of cell phone surveillance devices used by the NSA, CIA, military, and police. THE INTERCEPT OBTAINED a secret, internal U.S. government catalogue of dozens of cell phone surveillance devices used by the military and by intelligence agencies. The document, thick with previously undisclosed information, also offers rare insight into the spying capabilities of federal law enforcement and local police inside the United States. The catalogue includes details on the Stingray, a well-known brand of surveillance gear, as well as Boeing “dirt boxes” and dozens of more obscure devices that ...
Read More

Draconian UN Agenda 2030 is Adopted by UN Membership: A Recipe for Global Socialism & Totalitatianism

The United Nations and its mostly autocratic member regimes have big plans for your life, your children, your country, and your world. And those plans are not limited to the coercive “climate” agreement recently concluded in Paris. While the establishment media in the United States was hyping ISIS, football, and of course “global warming,” virtually every national government/dictatorship on the planet met at the 70th annual General Assembly at UN headquarters in New York to adopt a draconian 15-year master plan for the planet. Top globalists such as former NATO chief Javier Solana, a socialist, are celebrating the plan, ...
Read More

190 EMF Scientists make Appeal to UN for Protective Measures

190 scientists from 38 nations submitted the International EMF Scientist Appeal to the United Nations, UN member states and the World Health Organization (WHO) requesting they adopt more protective exposure guidelines for electromagnetic fields (EMF) and wireless technology in the face of increasing evidence of risk from this rapidly increasing environmental pollutant. The scientists who signed the Appeal have collectively published over 2,000 peer-reviewed papers on the biological or health effects of non-ionizing radiation.  It was submitted on 11 may 2015 to His Excellency Ban Ki-moon, Secretary-General of the United Nations, to Dr. Margaret Chan, MD, Director General of ...
Read More

Whistleblower Edward Snowden Provides ‘The Intercept’ with a Top-Secret Document Revealing the CIA’s Campaign to Break Apple’s Code and Steal their Secrets

RESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought ...
Read More

Orwellian Windows 10 Released by Microsoft with Built-in Spy Tools

Microsoft launched Windows 10 on September 30, 2014, promoting the event as the largest software update ever. Unlike previous releases, the new version has been offered by Microsoft to all domestic users as a free upgrade. Over 14 million users are reported to have downloaded and installed it within the first 24 hours of its release. Most probably never bothered reading the 34-page privacy policy and user agreement. The new agreement, by default, effectively gives permission for Microsoft to monitor users’ activities via the use of keylogger type spyware and/or record you through your computers microphone. Oh, and they can pass ...
Read More

Facebook Launched a Secret Experiment with Cornell to Manipulate the Emotions of 689,003 Users

It’s become farcical. Whoever we ask, nobody seems to know anything. Did the study have ethical approval? First the answer was yes. Then it was no. Then it was maybe. Then it was no again. Was it funded by the US army? First the university said yes. Then it said no, without explanation. Why did the scientific journal not state whether the study was ethically approved, as required by its own policy? Sorry, editor Susan Fiske told me, I’m too busy to answer that question. I’m referring of course to the study published last week by the Proceedings of ...
Read More

Snowden Leaks Docs on Secret Government Agency Online Manipulation & Subterfuge Tactics

HOW COVERT AGENTS INFILTRATE THE INTERNET TO MANIPULATE, DECEIVE, AND DESTROY REPUTATIONS Glenn Greenwald (writing for TheIntercept.com) Feb. 24 2014, 4:25 p.m. One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents. Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence ...
Read More

U.S. Gov’t Quietly Pressured Telecom Providers to Install Spy Technology Deep Inside Companies’ Internal Networks to Facilitate Surveillance Efforts

FBI officials sparred with carriers, a process that has on occasion included threats of contempt of court, in a bid to deploy government-provided software capable of intercepting and analyzing entire communications streams. The FBI's legal position during the discussions was that the software's real-time interception of metadata is authorized under the Patriot Act. Attempts by the FBI to install what it internally refers to as "port reader" software, which have not been previously disclosed, were described to CNET in interviews over the last few weeks. One former government official said the software used to be known internally as the "harvesting ...
Read More

Top Secret Document reveals NSA Allowed Full Access to Google, Facebook, Apple, etc. without Court Order

NSA Whistleblower, Edward Snowden, revealed that most large online data services providers participate in an NSA program to sweep up all user data into NSA computers for "Big Data" analysis and data mining. The companies revealed are Microsoft (9/11/07), Yahoo (3/12/08), Google (1/14/09), Facebook (6/3/09), Paltalk (12/7/09), YouTube (9/24/10), Skype (2/6/11), AOL (3/31/11), Apple (added Oct, 2012—one year after Steve Jobs died, replaced by former IBMer Timothy D. Cooke AT&T also participated. From Stellar Wind to PRISM, Boundless Informant to EvilOlive, the NSA spying programs are shrouded in secrecy and rubber-stamped by secret opinions from a court that meets ...
Read More

Whistleblower Edward Snowden Reveals that through PRISM, the NSA Began Spying on Americans through ‘Social’ Providers

On Jun. 06, 2013, thanks to NSA Whistleblower Edward Snowden, we learned that all the large online "social" providers were creations and certainly tools of their U.S. government spy state cronies in a program called PRISM. This strategy was hatched during the Clinton administration by his spy master advisor, Harvard law professor James P. Chandler, later Leader Technologies' patent attorney. AT&T played too. What is Prism? This one is pretty tricky to answer. According to the original leaked slides, Prism is a Us government-run programme for accessing vast swathes of data from some of the world's biggest and most ...
Read More

Former CIA Agent Edward Snowden Begins Leaking Docs on NSA Spying of Every American

Edward Snowden is an American computer professional from N.C., a former Central Intelligence Agency(CIA) employee, and former contractor for the United States government who copied and leaked classified information from the National Security Agency (NSA) in 2013 without prior authorization. His disclosures revealed numerous global surveillance programs, many run by the NSA and the Five Eyes Intelligence Alliance with the cooperation of telecommunication companies and European governments. (1) Snowden's father described Edward as "the smartest one in the family", "a deep thinker" and "a sensitive, caring young man." In accounts published in June 2013, interviewers noted that Snowden's laptop displayed stickers supporting ...
Read More

AP Phone Records Seized by Holder, Obama in Violation of 1st Amendment

US Attorney General Eric Holder faced questions before the House Judiciary Committee on reports of the subpoena of two months' worth of AP journalists’ phone records and the IRS’s scrutiny of conservative organization’s tax exemption requests. Holder lied under oath when he said he had nothing to do with monitoring the emails of Fox reporter James Rosen, even though his own signature is on the search warrant. In response, Obama asked Holder to investigate himself! Freepress.net has Everything you Want to Know About the AP/DOJ Controversy The story of how the Justice Department secretly obtained journalists’ phone records is developing quickly ...
Read More

Kristen Meghan, former Air Force Bio-engineer, turns Chemtrail Whistleblower

Threatened with 120 days in a military psychiatric ward without recourse to judge or hearing or trial, death-threatened, phones tapped, Kristen Meghan comes forward with the truth. "When I was at Tinker Air Force Base, Oklahoma, I heard about geoengineering, and I thought, "Oh, those crazy conspiracy loons." I'm sure we've all heard of Alex Jones from infowars.com, the man I once thought was a loon wearing a tinfoil hat living in a bunker . . . Well, it was around 2007 that I first heard about geoengineering . . . . Part of my job in bio-environmental engineering ...
Read More

BC CDC Radio Frequency Toolkit Release Warns Correlation Between Infertility and Cell Phone Usage

'A Radio frequency Toolkit for Environmental Health Practitioners' released by the British Columbia CDC stated that “the epidemiological studies of men assessed for infertility were consistent in demonstrating decreased sperm motility associated with increased use of mobile phones” and “biological effects on sperm motility related to RF exposure.” Radiofrequency (RF) is a frequency within the electromagnetic spectrum in the range of 3kHz-300GHz, that is used for radio transmission. Included in this frequency range are radio and television broadcastings, cell phones and base stations, microwave ovens, smart meters, WiFi, and baby monitors. The issue note RIN 06 addresses questions on health risks concerning electromagnetic fields surrounding cellular transmitting antennae ...
Read More

C.I.A. DARPA Mind Control Program for Social Media to maniplate political “narratives”

An anonymous whistleblower revealed a secret C.I.A. DARPA (Defense Advanced Research Projects Agency) a C.I.A. mind control program conducted by The Center for Strategic Comminications based at the University of Arizona. The head of the project, Steve Corman, has worked extensively in the area of strategic communication as it applies to terrorism and "extremism"—or what could be called that targeted Christianity and Islam. The secret government program sought to induce and "the war of ideas." The project was intended to disrupt religious "narratives" with desired propaganda and literally change people's minds. . This project entered its implementation Phase III ...
Read More

U.S. Army Sponsored Artificial Intelligence Surveillance System Attempts to Predict The Future – ‘Minority Report’ Style

In something that looks straight out of the CBS show "Person of Interest", the science website Phsy.org is reporting on a potentially important breakthrough from researchers at Carnegie Mellon. In research sponsored by the United States Army Research Laboratory, the Carnegie Mellon researchers presented an artificial intelligence system that can watch and predict what a person will 'likely' do in the future using specially programmed software designed to analyze various real-time video surveillance feeds.  The system can automatically identify and notify officials if it recognized that an action is not permitted, detecting what is described as anomalous behaviors. According to the paper, one such ...
Read More

President’s Council of Advisors on Science and Technology (PCAST) Presents Technology Plan to Spur Economic Growth

Realizing the Full Potential of Government-held Spectrum to Spur Economic Growth; President's Council of Advisors on Science and Technology (PCAST) 14 pg. Ppt. Deborah Tavares interviews Scientist Barrie Trower. They review the document and how harmful technology is being used and will be used in the future. The elite use deception to deceive scientists and the public that these technologies are safe, and threat and intimidation to insure the truth remains hidden ...
Read More

Security Week computer security analyst Jesus Oquendo published an article titled “Microsoft, the CIA and NSA Collude to Take Over the Internet”

Clever security researchers have uncovered the biggest security Coup d'état on the planet. Microsoft, the NSA, the CIA have all been colluding to create the most bloated covert piece of malware known to exist for 5 years [1] undetected. Microsoft decided somewhere along 2006 and 2007, that it was willing to throw away half of their market share (128 billion) in allowing this to occur [2]. Let us begin to analyze how this occurred. Obviously the NSA, CIA and others involved had to determine a mechanism to get the right talent hired at Microsoft. Not a big deal, the ...
Read More

Patent Office Director David J. Kappos Ordered an Unprecedented Third Reexamination of Leader’s Patent to PTAP even after Facebook had Failed on the Same Arguments 4 Times

Patent Office Director David J. Kappos ordered an unprecedented third reexamination of Leader’s patent to the Patent Trial and Appeals Board ("PTAB"), even after Facebook had failed on the same arguments four times previously. Kappos assigned a former IBM and Microsoft employee, Stephen C. Siu, as chief judge and staffed this PTAB kangaroo court with IBM, Xerox and Microsoft cronies—who had collectively issued over 169 patents to those companies. One of the staff attorneys, William J. Stoffel, even lists Facebook interests as conflicts (IBM, Fidelity, Vanguard). Fidelity and Vanguard were two of the largest pre-IPO mutual fund investors in ...
Read More

IBM sold 750 “junk” patents to Facebook, their Eclipse offspring, Likely so Facebook Could Harass other Tech Companies as IBM had done in the 90’s

IBM holds over 67,000 patents, the most in the world. Pundits know well that IBM does not sell their valuable patents. IBM creates and holds good patents. However, in the late 1990's, David J. Kappos and James P. Chandler began a "patent trolling" program to attack the industry with IBM patents of little or no value. The objective was to use IBM market power to cajole license settlements from smaller companies who did not want the expense of fighting IBM. The patents sold to Facebook are of little or no other value than for industry harassment purposes by Facebook's ...
Read More
Loading...