Revealing that which is concealed. Learning about anything that resembles real freedom. A journey of self-discovery shared with the world. Have no fellowship with the unfruitful works of darkness, but rather reprove them - Ephesians 5-11 Join me and let's follow that high road...
Wednesday, April 29, 2015
Baltimore Cutting Water to Hundreds of Residents and Zero Corporations
Drought scam in NON DROUGHT STATES
Sunday, April 26, 2015
making mass murder mandatory
Killing your immune system, nervous system, and mind - one shot at a time |
Dirpy
MessiahMews Blogs: Dirpy: One of many YouTube downloaders. Some important videos tend to disappear or get taken down, especially if of a sensitive nature. Dirpy to ...
Saturday, April 25, 2015
Raining in the Sierras, every time it rains in Ojai.
Friday, April 24, 2015
More rain in Ojai, 28 inches since 10-30-14
Wednesday, April 22, 2015
Tuesday, April 21, 2015
Hackers are more interested in hacking cars so they can take control from a distance. Unfortunately, they’re getting good at it, and it’s getting easier as cars become more and more computer controlled. Do you own one of the three most hackable cars in the world?
(Kim Komando) Most commercial airplanes have an indestructible flight
recorder, also called a “black box” – even though the casing is actually bright
orange. The black box records information from the flight computers and another
box records cockpit audio and other sources around the plane. In the event of a
crash, investigators can recover the black boxes to help find out exactly what
happened.
Cars can have black boxes, too. In fact, it’s a good bet your current car has one already, and if it doesn’t your next new car certainly will. That’s why you should know exactly what that black box is recording, who can get that information and how you can stay in control.
Black boxes in cars aren’t a new thing. The practice started in 1994 with cars from Cadillac, Buick, Chevrolet and Pontiac. The black boxes were meant to help manufacturers learn how their cars performed in crashes.
Since the early 2000s, the National Highway Traffic Safety Administration has been collecting black box information to get a better picture of the circumstances surrounding car accidents. In 2013, 96% of new cars sold in the United States came with a black box, and as of September 1, 2014, every new vehicle must have one installed.
Black box data have been used in a few high-profile investigations. In 2011, Massachusetts Lt. Gov. Timothy Murray totaled a government car, although he walked away. He claimed he was driving the speed limit and wearing a seat belt. Investigators used his black box data to show he was driving 100 mph without a seatbelt at the time of the crash.
Wondering if your car has a black box? This site lists the year, make and model of nearly every car that includes a black box. You can also check your car’s manual. If you’re buying a car from a dealership, they have to tell you if the car has a black box.
The information includes vehicle speed, throttle position, airbag deployment times, whether the brakes were applied, if seatbelts were worn, engine speed, steering angles and more. Manufacturers may also include up to 30 additional data points if they want, but manufacturers say that doesn’t include GPS location, video or audio. Also, the black box only stores information for 20 seconds around the crash.
Still, many privacy advocates worry that the recording length might eventually increase and include more identifying information. That raises the question of who can access the data in the first place.
Obviously, car manufacturers have the equipment. The NHTSA and law enforcement have the resources to get the information either directly or through specialized third parties. Third-party shops often pull the data as part of an accident reconstruction service. Insurance companies and law firms may also use third parties to get data for accident investigations or court cases.
Then there’s the group everyone worries about – hackers. In most cases, I doubt hackers want your black box data. It would need to have a lot more data on you to make it worth their while.
Hackers are more interested in hacking cars so they can take control from a distance. Unfortunately, they’re getting good at it, and it’s getting easier as cars become more and more computer controlled. Do you own one of the three most hackable cars in the world? Click here to find out.
That’s the technical side of downloading black box data, but there’s a legal side as well. As of this writing, 15 states – Arkansas, California, Colorado, Connecticut, Delaware, Maine, Nevada, New Hampshire, New York, North Dakota, Oregon, Texas, Utah, Virginia and Washington – have passed regulations regarding who can pull the information with and without the car owner’s permission.
You can find an up-to-date list of the states and their rules at the National Conference of State Legislatures site. In general, however, no one can pull data without your permission or a court order. Insurance companies can’t use the data to set your rates unless you opt into a program, and those programs usually use another tracking unit. The rules are much less clear in states that haven’t passed any legislation yet.
Fortunately, there is a simpler option. Products like AutoCYB, OBD Lock and OBD Saver put a lock on the diagnostic port so no one can plug anything into it without your permission. That keeps people from resetting information, extracting data or falsifying records that could be used against you.
Whether a court order would require you to hand over the keys to the lock is another story. I’ll leave that one for the lawyers to decide. However, you can at least make sure that nothing short of a court order lets someone get your data.
Cars can have black boxes, too. In fact, it’s a good bet your current car has one already, and if it doesn’t your next new car certainly will. That’s why you should know exactly what that black box is recording, who can get that information and how you can stay in control.
Black boxes in cars aren’t a new thing. The practice started in 1994 with cars from Cadillac, Buick, Chevrolet and Pontiac. The black boxes were meant to help manufacturers learn how their cars performed in crashes.
Since the early 2000s, the National Highway Traffic Safety Administration has been collecting black box information to get a better picture of the circumstances surrounding car accidents. In 2013, 96% of new cars sold in the United States came with a black box, and as of September 1, 2014, every new vehicle must have one installed.
Black box data have been used in a few high-profile investigations. In 2011, Massachusetts Lt. Gov. Timothy Murray totaled a government car, although he walked away. He claimed he was driving the speed limit and wearing a seat belt. Investigators used his black box data to show he was driving 100 mph without a seatbelt at the time of the crash.
Wondering if your car has a black box? This site lists the year, make and model of nearly every car that includes a black box. You can also check your car’s manual. If you’re buying a car from a dealership, they have to tell you if the car has a black box.
WHAT DO BLACK BOXES RECORD?
While the first-generation event data recorders did little more than track whether or not the car’s airbags deployed, recording and sensor technologies have become smaller and much more powerful. The NHTSA has mandated that every new recorder must track 15 variables, although older recorders might not have all of them.The information includes vehicle speed, throttle position, airbag deployment times, whether the brakes were applied, if seatbelts were worn, engine speed, steering angles and more. Manufacturers may also include up to 30 additional data points if they want, but manufacturers say that doesn’t include GPS location, video or audio. Also, the black box only stores information for 20 seconds around the crash.
Still, many privacy advocates worry that the recording length might eventually increase and include more identifying information. That raises the question of who can access the data in the first place.
WHO CAN PULL THE DATA?
Actually getting your hands on black box data requires professional training, and a Crash Data Retrieval system that starts at $2,000 and can cost up to $20,000 with accessories. The CDR system plugs into the on-board diagnostics port under the dashboard on the driver’s side and transfers the information to a special computer program.Obviously, car manufacturers have the equipment. The NHTSA and law enforcement have the resources to get the information either directly or through specialized third parties. Third-party shops often pull the data as part of an accident reconstruction service. Insurance companies and law firms may also use third parties to get data for accident investigations or court cases.
Then there’s the group everyone worries about – hackers. In most cases, I doubt hackers want your black box data. It would need to have a lot more data on you to make it worth their while.
Hackers are more interested in hacking cars so they can take control from a distance. Unfortunately, they’re getting good at it, and it’s getting easier as cars become more and more computer controlled. Do you own one of the three most hackable cars in the world? Click here to find out.
That’s the technical side of downloading black box data, but there’s a legal side as well. As of this writing, 15 states – Arkansas, California, Colorado, Connecticut, Delaware, Maine, Nevada, New Hampshire, New York, North Dakota, Oregon, Texas, Utah, Virginia and Washington – have passed regulations regarding who can pull the information with and without the car owner’s permission.
You can find an up-to-date list of the states and their rules at the National Conference of State Legislatures site. In general, however, no one can pull data without your permission or a court order. Insurance companies can’t use the data to set your rates unless you opt into a program, and those programs usually use another tracking unit. The rules are much less clear in states that haven’t passed any legislation yet.
CAN YOU KEEP YOUR DATA PRIVATE?
Still, anyone with a court order, or just the right tool and a little time, can get at your black box information. There’s no way you can delete the data or disable the black box.Fortunately, there is a simpler option. Products like AutoCYB, OBD Lock and OBD Saver put a lock on the diagnostic port so no one can plug anything into it without your permission. That keeps people from resetting information, extracting data or falsifying records that could be used against you.
Whether a court order would require you to hand over the keys to the lock is another story. I’ll leave that one for the lawyers to decide. However, you can at least make sure that nothing short of a court order lets someone get your data.
Home › Big Brother & Police State › Police Seize $63,530 From Veteran Because He Kept It In Grocery Bags Police Seize $63,530 From Veteran Because He Kept It In Grocery Bags
(Daniel Jennings) Simply carrying a large amount of cash in a
grocery sack in your car is now sufficient grounds for a police officer to seize
your money, a US circuit court has ruled. A panel of the Eighth US Circuit Court
of Appeals found that all a deputy has to do to seize cash from a person is say
it is drug money.
The court refused to return the $63,530 that Deputy Dave Wintle seized from a disabled veteran named Mark A. Brewer during a traffic stop in 2011. Brewer was never charged with a crime or even given a traffic ticket. Yet the decorated Air Force veteran lost his savings when a drug-sniffing dog smelled marijuana on it, even though no cannabis was found in Brewer’s car or his home.
Brewer saved the money from disability payments and his Air Force pay — as documents deputies found in the car indicated. He said he was traveling to Los Angeles to visit his uncle and to use the money as a down payment for a house. He added he was hoping his uncle could help him get a job there.
“The record here does not make clear whether the seized currency constitutes property used to facilitate a drug offense or proceeds from a drug offense,” Judge Bobby E. Shepherd wrote in a March 23 opinion upholding the seizure. “For the purposes of analysis, however, we will assume that the currency facilitated a drug offense and is thus subject to [to be seized].”
It was taken through a legal mechanism called civil forfeiture. (Listen to Off The Grid Radio’s report on civil forfeiture here.)
Brewer’s ordeal began when he was driving through Douglas County, Nebraska, outside of Omaha on Interstate 680 in November 2011. Wintle, a Douglas County sheriff’s deputy, pulled him over for not signaling when he made a lane change, and then Wintle asked for permission to search the vehicle.
Keeping Cash in a Grocery Bag Can Lead to Seizure
Wintle had just run a background check on Brewer and found he had “no major violations” on his record when he had the dog search the car. The search was apparently prompted by Wintle’s discovery of $1,000 in cash in Brewer’s pocket. He then found the other money in grocery sacks in a backpack.
The court refused to return the $63,530 that Deputy Dave Wintle seized from a disabled veteran named Mark A. Brewer during a traffic stop in 2011. Brewer was never charged with a crime or even given a traffic ticket. Yet the decorated Air Force veteran lost his savings when a drug-sniffing dog smelled marijuana on it, even though no cannabis was found in Brewer’s car or his home.
Brewer saved the money from disability payments and his Air Force pay — as documents deputies found in the car indicated. He said he was traveling to Los Angeles to visit his uncle and to use the money as a down payment for a house. He added he was hoping his uncle could help him get a job there.
“The record here does not make clear whether the seized currency constitutes property used to facilitate a drug offense or proceeds from a drug offense,” Judge Bobby E. Shepherd wrote in a March 23 opinion upholding the seizure. “For the purposes of analysis, however, we will assume that the currency facilitated a drug offense and is thus subject to [to be seized].”
It was taken through a legal mechanism called civil forfeiture. (Listen to Off The Grid Radio’s report on civil forfeiture here.)
Brewer’s ordeal began when he was driving through Douglas County, Nebraska, outside of Omaha on Interstate 680 in November 2011. Wintle, a Douglas County sheriff’s deputy, pulled him over for not signaling when he made a lane change, and then Wintle asked for permission to search the vehicle.
Keeping Cash in a Grocery Bag Can Lead to Seizure
Wintle had just run a background check on Brewer and found he had “no major violations” on his record when he had the dog search the car. The search was apparently prompted by Wintle’s discovery of $1,000 in cash in Brewer’s pocket. He then found the other money in grocery sacks in a backpack.
The Bankster War on Cash; JPMorganChase Begins to Prohibit the Storage of Cash in Its Safety Deposit Boxes
Letters are apparently going out to some JPMoragnChase customers announcing that
cash will be prohibited from being stored in the bank's safety deposit
boxes.
At the Collectors Universe message board, a commenter reports:
Hide your wallets, the banksters are on the move.
At the Collectors Universe message board, a commenter reports:
My mother has a SDB at a Chase branch with one of my siblings as co-signers. Last week they got a letter outlining a number of changes to the lease agreement, including this:Professor Joseph Salerno of the Mises Institute writes:
"Contents of the box: You agree not to store any cash or coins other than those found to have a collectible value."
Another change is that signatures will no longer be accepted to access the box. The next time they go in they have to bring two forms of ID and they will be issued a four-digit pin number that will be used to access the box then and in the future.
As of March, Chase began restricting the use of cash in selected markets, including Greater Cleveland. The new policy restricts borrowers from using cash to make payments on credit cards, mortgages, equity lines, and auto loans. Chase even goes as far as to prohibit the storage of cash in its safe deposit boxes . In a letter to its customers dated April 1, 2015 pertaining to its “Updated Safe Deposit Box Lease Agreement,” one of the highlighted items reads: “You agree not to store any cash or coins other than those found to have a collectible value.”Just last week, Citigroup's top economist, Willem Buiter, wrote a report calling for the abolishment of cash as a sound policy.
Hide your wallets, the banksters are on the move.
Monday, April 20, 2015
Exclusive Video Inside Closed Jade Helm State Wal-...
Prophecies, conspiracies, and endtimes stuff: Exclusive Video Inside Closed Jade Helm State Wal-...: This is the real deal, people. The United States government, under the control of the Powers That Be, a.k.a. Illuminati, is preparing to go...
Sunday, April 19, 2015
Saturday, April 18, 2015
BREAKING: Mandatory adult vaccination in Kalifornia - for the upcoming EBOLA scam in Kali this summer
MessiahMews Blogs: [Vaccination-Liberation] BREAKING: Mandatory adult...: CALIFORNIA ALERT: Under your nose, while the exemption bills are being argued and opposed, these creepy senators introduced a mandatory adul...
Military Exercise In Connecticut, Army Seeks Role ...
MessiahMews Blogs: Military Exercise In Connecticut, Army Seeks Role ...: I believe this is real pick up not a drill. It's called a drill and they are hiring people telling they are crises actors so they will &...
The troops are already deploying in cities in the WESTERN states only.... practiciing internment of civilians.
Notice in the videos, they are TRAINING THE TROOPS TO SHOOT AMERICAN CITIZENS?
Here's the play.
- Deployment of troops in the west. First at schools, and major intersections and highways.
- People get used to seeing them as the NEW NORMAL.
- There will be happy "glad to see the troops, troops playing with children, human interest stories, troops saving a little girl's life, troops stopping a bank robbery, etc" all designed to make human and friendly the conditioning of armed violent killers everywhere you look, go, or do business.
- Then, they start directing traffic, cuz the traffic lights will start failing MORE AND MORE.
- People will get used to that, a NEW NORMAL.
- Then, they will start doing roadside search of cars, as the police have been doing for years to condition the public.
- People will get used to that, a NEW NORMAL.
- Then it will be seizure of citizens, in buses with blacked out windows to designated walmarts and large holding pens already built.
- The same week the STOCK MARKET CRASHES in the fall or just before it. Depending upon how they read the public. Either a week past the equinox or late October. Millions will disappear.
- Never to be seen again.
Martial Law, hundreds of thousands of tanks, troop carriers and men - for four months. Remember the big eviction of the national parks of 4 million people? Well, now its TEN STATES and troops on street corners with machine guns. Just like in Iraq or Afghanistan
Late last week, when we covered the various signs that "something big" may be coming, we discussed the one "exercise that people have really been buzzing about"
- operation "Jade Helm", an “unconventional warfare exercise” during
which the states Texas and Utah will be designated as hostile territory.
As previously profiled, "Jade Helm is a challenging eight-week joint military and Interagency (IA) Unconventional Warfare (UW) exercise conducted throughout Texas, New Mexico, Arizona, California, Nevada, Utah and Colorado,” according to an unclassified military document announcing the training drill, which runs from July 15 through September 15.
Multiple branches of the US military, including Green Berets, Navy Seals, and the 82nd Airborne Division, will participate in the 8-week long exercise, which may result in “increased aircraft in the area at night.”
Troops will be tasked with honing advanced skills in “large areas of undeveloped land with low population densities,” and will work alongside “civilians to gain their trust and an understanding of the issues.”
The exercise, in which some participants will be “wearing civilian clothes and driving civilian vehicles,” lists Texas and Utah as “hostile" territory.
The proposed theater of operations of Operation Jade Helm is shown on the map below:
So while there are still three months until Jade Helm officially opens, various documented reports of substantial national guard drills and troop exercises are starting to trickle in early. As Paul Joseph Watson notes, the first documented proof of National Guard drills comes from Ontario, California where National Guard troops can be seen patrolling residential streets and practicing traffic control.
In the video troops, followed by a humvee, are seen marching close to an elementary school and single family homes.
Meanwhile on the eastern US easboard, the PostStar reports that nearly 600 Army and Air National Guard forces from New Jersey and New York "are preparing for the worst."
How is that possible, some would say? Could the national guard really be preparing for a confrontation with the US population?
Unfortunately the answer is yes, as we reported last August in "Under What Conditions Can The US Army Engage Citizens: The Army's "Civil Disturbances" Primer" which lays out not only when the US Army (and national guard) can engage the US population, but lays out clearly the protocol under which the US army is specifically permitted to engage in "PSYOPs" against the US population.
Here are the salient points, as reported previously, from the primer which begins with the umbrella statement:
It gets worse, because whereas one would expect that a "Constitutional expert" such as the president, Barack Obama would be the one tasked with interpreting if and when the Constitution no longer applies, the primer is quite explicit in handing over responsibility to "federal military commanders":
The good news: the use of lethal force is not the only option the US Army would have if and when it engages with the population. US citizens may simply be herded into "temporary internment camps" for reindoctrination purposes under the supervision of PSYOP Officer (no really, they used that word), as follows from the Army's FM3-39.40 "Internment and Resettlment Operations" manual:
As previously profiled, "Jade Helm is a challenging eight-week joint military and Interagency (IA) Unconventional Warfare (UW) exercise conducted throughout Texas, New Mexico, Arizona, California, Nevada, Utah and Colorado,” according to an unclassified military document announcing the training drill, which runs from July 15 through September 15.
Multiple branches of the US military, including Green Berets, Navy Seals, and the 82nd Airborne Division, will participate in the 8-week long exercise, which may result in “increased aircraft in the area at night.”
Troops will be tasked with honing advanced skills in “large areas of undeveloped land with low population densities,” and will work alongside “civilians to gain their trust and an understanding of the issues.”
The exercise, in which some participants will be “wearing civilian clothes and driving civilian vehicles,” lists Texas and Utah as “hostile" territory.
The proposed theater of operations of Operation Jade Helm is shown on the map below:
So while there are still three months until Jade Helm officially opens, various documented reports of substantial national guard drills and troop exercises are starting to trickle in early. As Paul Joseph Watson notes, the first documented proof of National Guard drills comes from Ontario, California where National Guard troops can be seen patrolling residential streets and practicing traffic control.
In the video troops, followed by a humvee, are seen marching close to an elementary school and single family homes.
This is not the first such clip: a disturbing video out of Fort Lauderdale, Florida last month also showed military and law enforcement practicing the internment of citizens during martial-law style training.“I just watched it again and recognized the low block wall and the elementary school! It was right there where my sister and her husband live! OMG how frightening!” one YouTube commenter responded, while others insisted the patrols were a routine occurrence.
However, another respondent insisted that the patrol was not normal.
“During the last few seconds I got a quick glimpse of my sister and brother-in-laws house on Fuschia. Ave,” wrote the commenter.”That motorcycle was parked almost in front of their house. They told me they saw this procession going on from their front yard. They have lived in that house for 30 or so yrs and this is the first time they have seen this type of thing in their neighborhood. Might be a common thing to do their training someplace else but not in that area.”
Meanwhile on the eastern US easboard, the PostStar reports that nearly 600 Army and Air National Guard forces from New Jersey and New York "are preparing for the worst."
Of course, the bigger concern is that the real motive behind this major national guard exercise is not a focus on a "defensive" drill from an outside threat, but one dealing with a domestic threat.They are participating in a homeland response force drill at New Jersey's Joint Base McGuire-Dix-Lakehurst on Friday.
The troops specialize in rescue, security, decontamination and medical treatment.
The units will train to rapidly assess and identify a chemical, biological, radiological or nuclear incident.
How is that possible, some would say? Could the national guard really be preparing for a confrontation with the US population?
Unfortunately the answer is yes, as we reported last August in "Under What Conditions Can The US Army Engage Citizens: The Army's "Civil Disturbances" Primer" which lays out not only when the US Army (and national guard) can engage the US population, but lays out clearly the protocol under which the US army is specifically permitted to engage in "PSYOPs" against the US population.
Here are the salient points, as reported previously, from the primer which begins with the umbrella statement:
"Protected" it may be, but as usual, the interpretation of the Constitution is in the eye of the beholder, or more appropriately, gun holder. Because shortly thereafter we further read the following:Civil unrest may range from simple, nonviolent protests that address specific issues, to events that turn into full-scale riots. Gathering in protest may be a recognized right of any person or group, regardless of where U.S. forces may be operating. In the United States, this fundamental right is protected under the Constitution of the United States...
What circumstances? For the answer we turn to section, 2-8. To wit:The Constitution of the United States, laws, regulations, policies, and other legal issues limit the use of federal military personnel in domestic support operations. Any Army involvement in civil disturbance operations involves many legal issues requiring comprehensive legal reviews. However, federal forces are authorized for use in civil disturbance operations under certain circumstances.
In other words, if and when the US Armed Forces decide that rioting infringes upon any of these exclusions, then the constitution no longer applies and the use of lethal force becomes a viable option against US citizens.The Constitution of the United States provides two exceptions for which the Posse Comitatus Act does not apply. These exceptions are based upon the inherent right of the U.S. government to ensure the preservation of public order and to carrying out governmental operations within its territorial limits by force, if necessary. These two exceptions are—
2-9. Laws passed by the U.S. congress include four exceptions to the Posse Comitatus Act. With the first three laws discussed below (10 USC 331–333) there is a prerequisite that the President must take personal action, including the issuance of a proclamation calling upon insurgents to disperse and retire peaceably within a limited time. The four exceptions, based on law are—
- Emergency authority. A sudden and unexpected civil disturbance, disaster, or calamity may seriously endanger life and property and disrupt normal governmental functions to such an extent that local authorities cannot control the situation. At such times, the federal government may use military force to prevent the loss of life or wanton destruction of property and to restore government functions and public order. In these circumstances, federal military commanders have the authority, in extraordinary emergency circumstances where prior authorization by the President is impossible and duly constituted local authorities are unable to control the situation, to engage temporarily in activities that are necessary to quell large-scale, unexpected civil disturbances (see DODD 3025.18).
- Protection of federal property and functions. When the need for the protection of federal property or federal functions exists, and duly constituted local authorities are unable to, or decline to provide adequate protection, federal action, including the use of military forces, is authorized.
- 10 USC 331. When a state is unable to control domestic violence and they have requested federal assistance, the use of the militia or Armed Forces is authorized.
- 10 USC 332. When ordinary enforcement means are unworkable due to unlawful obstructions or rebellion against the authority of the United States, use of the militia or Armed Forces is authorized.
- 10 USC 333. When a state cannot or will not protect the constitutional rights of the citizens, due to domestic violence or conspiracy to hinder execution of State or Federal law, the use of the militia or Armed Forces is authorized.
- House Joint Resolution 1292. This resolution directs all departments of the U.S. government, upon request of the Secret Service, to assist in carrying out its statutory duties to protect government officials and major political candidates from physical harm.
It gets worse, because whereas one would expect that a "Constitutional expert" such as the president, Barack Obama would be the one tasked with interpreting if and when the Constitution no longer applies, the primer is quite explicit in handing over responsibility to "federal military commanders":
So should Obama resume his vacation even as things in Missouri escalate dramatically, and be "unreachable", it may well come to pass that Obama's opinion will be irrelevant not only whether the National Guard should be unleashed in Ferguson, but whether Posse Comitatus is suddenly null and void.... federal military commanders have the authority, in extraordinary emergency circumstances where prior authorization by the President is impossible and duly constituted local authorities are unable to control the situation, to engage temporarily in activities that are necessary to quell large-scale, unexpected civil disturbance.
The good news: the use of lethal force is not the only option the US Army would have if and when it engages with the population. US citizens may simply be herded into "temporary internment camps" for reindoctrination purposes under the supervision of PSYOP Officer (no really, they used that word), as follows from the Army's FM3-39.40 "Internment and Resettlment Operations" manual:
Presenting army camps, hopefully not in a city near you:Internment and Resettlement (I/R) operations facilitate the ability to conduct rapid and decisive combat operations; deter, mitigate, and defeat threats to populations that may result in conflict; reverse conditions of human suffering; and build the capacity of a foreign government to effectively care for and govern its population. This includes capabilities to conduct shaping operations across the spectrum of military operations to mitigate and defeat the underlying conditions for conflict and counter the core motivations that result in support to criminal, terrorist, insurgent, and other destabilizing groups. I/R operations also include the daily incarceration of U.S. military prisoners at facilities throughout the world.
An adaptive enemy will manipulate populations that are hostile to U.S. intent by instigating mass civil disobedience, directing criminal activity, masking their operations in urban and other complex terrain, maintaining an indistinguishable presence through cultural anonymity, and actively seeking the traditional sanctuary of protected areas as defined by the rules of land warfare. Such actions will facilitate the dispersal of threat forces, negate technological overmatches, and degrade targeting opportunities. Commanders will use technology and conduct police intelligence operations to influence and control populations, evacuate detainees and, conclusively, transition rehabilitative and reconciliation operations to other functional agencies. The combat identification of friend, foe, or neutral is used to differentiate combatants from noncombatants and friendly forces from threat forces.
Of course, none of this will be needed if the Army's Psyops work as required:Detainee facilities, an important planning consideration, are treated in the same basic fashion as any base camps. The same basic planning considerations are taken into account. Some detainee facilities will be subordinate to a larger base camp but they may also be at a separate location.
In other words, if and when the time comes to "override" Posse Comitatus, random US citizens may have two options: i) end up in the US version of a Gulag or, worse, ii) be shot. For now, however, just keep an eye on the various drill videos to get a sense of the US army's preparedness in dealing with "civil disobedience."The PSYOP officer in charge of supporting I/R operations serves as the special staff officer responsible for PSYOP. The PSYOP officer advises the military police commander on the psychological impact of military police or MI actions to prevent misunderstandings and disturbances by detainees and DCs. The supporting I/R PSYOP team has two missions that reduce the need to divert military police assets to maintain security in the I/R facility. The team—
- Assists the military police force in controlling detainees and DCs.
- Introduces detainees or DCs to U.S. and multinational policy.
- Develops PSYOP products that are designed to pacify and acclimate detainees or DCs to accept U.S. I/R facility authority and regulations.
- Gains the cooperation of detainees or DCs to reduce the number of guards needed.
- Identifies malcontents, trained agitators, and political leaders within the facility who may try to organize resistance or create disturbances.
- Develops and executes indoctrination programs to reduce or remove antagonistic attitudes.
- Identifies political activists.
- Provides loudspeaker support (such as administrative announcements and facility instructions when necessary).
- Helps the military police commander control detainee and DC populations during emergencies.
- Plans and executes a PSYOP
Wednesday, April 15, 2015
Obamacare really is working (for the fascists)
Since the Obama administration began pushing the healthcare reform bill
in early 2009, the stock prices of the Big Five health insurers have
done remarkably well, even vs. the S&P 500, and even without taking
into account their phenomenal dividend yields.
“Encryption Doesn’t Matter In a World Where Anyone Can Plant Software On Your Phone and See What You’re Seeing”
John McAfee invented commercial antivirus software. He may be a controversial and eccentric figure … but the man knows his technology.
Earlier this month, McAfee told security expert Paul Asadoorian that encryption is dead. Specifically, he said:
Earlier this month, McAfee told security expert Paul Asadoorian that encryption is dead. Specifically, he said:
- Every city in the country has 1 to 3 Stingray spy devices … Bigger cities like New York probably have 200 or 300
- When you buy a Stingray, Harris Corporation makes you sign a contract keeping your Stingray secret (background here and here)
- Stingray pushes automatic “updates” – really malicious software – onto your phone as soon as you come into range
- The software – written by the largest software company in the world – allows people to turn on your phone, microphone and camera, and read everything you do and see everything on your screen
- Encryption doesn’t matter in a world where anyone can plant software on your phone and see what you’re seeing. Protecting transmission of information from one device to the other doesn’t matter anymore … they can see what you see on your device
- There are many intrusions other than Stingray. For example, everyone has a mobile phone or mobile device which has at least 10 apps which have permission to access camera and microphone
- Bank of America’s online banking app requires you to accept microphones and cameras. McAfee called Bank of America and asked why they require microphones and cameras. They replied that – if you emptied all of the money in your account and said “it wasn’t me”, they could check, and then say:
Well, it certainly looks like you. And it certainly sounds like you.
- In order to do that, B of A’s app keeps your microphone and camera on for a half hour after you’ve finished your banking
- In addition, people can call you – and have you call them back – and plant software on your phone when you call them back
Eye In the Sky - Evidence of spirit in our world
MessiahMews Blogs: Eye In the Sky: The Eye in the Sky. Peggy Lee September 8, 2014 My sister took this pic today....your thoughts?
Discovery Of Medieval Burial Ground Yields Surpris...
Prophecies, conspiracies, and endtimes stuff: Discovery Of Medieval Burial Ground Yields Surpris...: By: Marshall Ramsey II, Worthy News U.S. Correspondent CAMBRIDGE, England -- ( WorthyNews ) The discovery of a medieval burial ground b...
Inventor of Antivirus Sofware: The Government Is Planting Malicious Software On Your Phone So It Can See What You're Doing
Top computer and internet experts say that NSA spying breaks the functionality of our computers and of the Internet. It reduces functionality and reduces security by – for example – creating backdoors that malicious hackers can get through.
Remember, American and British spy agencies have intentionally weakened security for many decades. And it’s getting worse and worse. For example, they plan to use automated programs to infect millions of computers.
Earlier this month, McAfee told security expert Paul Asadoorian that encryption is dead. Specifically, he said:
Remember, American and British spy agencies have intentionally weakened security for many decades. And it’s getting worse and worse. For example, they plan to use automated programs to infect millions of computers.
Smart Phones Vulnerable to Spying
We documented in 2013 that smart phones are very vulnerable to spying:The government is spying on you through your phone … and may even remotely turn on your camera and microphone when your phone is off.
As one example, the NSA has inserted its code into Android’s operating system … bugging three-quarters of the world’s smartphones. Google – or the NSA – can remotely turn on your phone’s camera and recorder at any time.
Moreover, Google knows just about every WiFi password in the world … and so the NSA does as well, since it spies so widely on Google.
But it’s not just the Android. In reality, the NSA can spy on just about everyone’s smart phone.
Cell towers track where your phone is at any moment, and the major cell carriers, including Verizon and AT&T, responded to at least 1.3 million law enforcement requests for cell phone locations and other data in 2011. (And – given that your smartphone routinely sends your location information back to Apple or Google – it would be child’s play for the government to track your location that way.) Your iPhone, or other brand of smartphone is spying on virtually everything you do (ProPublica notes: “That’s No Phone. That’s My Tracker“). Remember, that might be happening even when your phone is turned off.
The NSA has gathered all of that cellphone location information.
“Encryption Doesn’t Matter In a World Where Anyone Can Plant Software On Your Phone and See What You’re Seeing”
John McAfee invented commercial antivirus software. He may be a controversial and eccentric figure … but the man knows his technology.Earlier this month, McAfee told security expert Paul Asadoorian that encryption is dead. Specifically, he said:
- Every city in the country has 1 to 3 Stingray spy devices … Bigger cities like New York probably have 200 or 300
- When you buy a Stingray, Harris Corporation makes you sign a contract keeping your Stingray secret (background here and here)
- Stingray pushes automatic “updates” – really malicious software – onto your phone as soon as you come into range
- The software – written by the largest software company in the world – allows people to turn on your phone, microphone and camera, and read everything you do and see everything on your screen
- Encryption doesn’t matter in a world where anyone can plant software on your phone and see what you’re seeing. Protecting transmission of information from one device to the other doesn’t matter anymore … they can see what you see on your device
- There are many intrusions other than Stingray. For example, everyone has a mobile phone or mobile device which has at least 10 apps which have permission to access camera and microphone
- Bank of America’s online banking app requires you to accept microphones and cameras. McAfee called Bank of America and asked why they require microphones and cameras. They replied that – if you emptied all of the money in your account and said “it wasn’t me”, they could check, and then say:
Well, it certainly looks like you. And it certainly sounds like you.
- In order to do that, B of A’s app keeps your microphone and camera on for a half hour after you’ve finished your banking
- In addition, people can call you – and have you call them back – and plant software on your phone when you call them back
Spy Agencies Are Intentionally Destroying Digital Security
http://www.zerohedge.com/news/2015-04-14/inventor-antivirus-sofware-government-planting-malicious-software-your-phone-so-it-c
Monday, April 13, 2015
Wednesday, April 8, 2015
Monday, April 6, 2015
Sunday, April 5, 2015
Saturday, April 4, 2015
Friday, April 3, 2015
Thursday, April 2, 2015
Subscribe to:
Posts (Atom)