This Is A Concern for EVERYONE!

French Doctors Speak Out Against New Contact Tracing As Attack on Right to Medical Privacy

French Doctors Speak Out Against New Contact Tracing

Pam Barker | Director of TLB Europe Reloaded Project

A somewhat emotional video from a young practicing physician on Youtube, republished below, alerted us to this topic of medical snooping by the French government in order to allegedly stop / control / monitor the chain of infection (and us). Overall, this practice may become the next reason why we shouldn’t be visiting our family doctor or the local hospital starting from tomorrow, May 11, when our two-month(!) lockdown officially ends.

An MSM report of the French situation may be found here, but below are two actual doctors giving their feedback, one on video and one anonymously in writing. Readers may also be interested in this US article by Daisy Luther via Zerohedge on the rollout of contact tracing titled “Contact Tracer” And “Disease Investigator” Jobs Spring Up Across The Country.

So from tomorrow, the French family doctor (and the hospital doctor) will be the initiating person to identify a patient supposedly with covid, ask for the names and contact numbers of those people the patient has been in contact with (both within and without the immediate family), enter the information given into a centralized database, and do (unreliable) testing on the patient. At which point the non-medical staff of the French health insurance system will take over and send teams of people to test those contacts, hoping to find patient zero along the way. The initiating doctors themselves will get 55 euros instead of the regular fee of around 25 euros, plus 2 (or 4) extra euros for each contact name with a phone number.

The infection has likely been in France since at least October/November; confirmed cases were predicted to be going down around the time lockdowns were enforced in France (March 16) and the UK (March 23); Public Health England downgraded the severity of the disease on March 19. So is this all a case of a system and government justifying themselves to the public when, originally, they did absolutely nothing, telling us via the media that it was a Chinese problem? Likely the infection has been doing the rounds here for a while although it remains to be seen what kind of spike in cases will happen post-lockdown. Some government heads are expected to roll following the resumption of ‘normal’ life, so they must be anxious to be seen to be doing something. As well as finding a reason to implement Big Data surveillance systems on us.

The anonymous doctor below raises concerns about doctors being motivated to participate with a fee incentive; the reliability of the diagnostic tests (presumably the PCR test); confidentiality of a patient’s medical data by administrative, i.e. non-medical, staff; use and security of patient data entered in the system once it’s all finished; retaliation by people named as contacts who may be subject to confinement. And overall, the ethical problem of doctors turning in their patients to a bigger, data-driven system outside the normal bounds of doctor-patient relationship, as well as turning in names of people to the government who are not even their patients.

The doctor in the very short video below raises some additional points:

  1. Covid is a notifiable disease so reporting these cases in and of itself isn’t a problem. (ER: It is in the UK, too, but should it be? Should covid, with a death rate comparable to ‘flu and mild or no symptoms in the majority of the population, be put in the class of diseases like cholera and TB?)
  2. Yet a government bill is in the pipeline to create a new system of health data in the context of this crisis, without our input. Patient health information cannot be kept for more than a year, but it is likely to become a permanent system.
  3. The national platform of patient data will be kept on Microsoft servers; the data will be drawn from hospitals, pharmacies, and patient files.
  4. Will this result in health insurance costs going up for people? Will banks refuse loans to people? Will employers not re-hire people because their health data is accessible?

The young guy’s overall point below is – I’m a doctor, not a cop.

******

********

Philippe Jandrok’s Blog, 7 May 2020

Message from a Doctor Who Wishes to Remain Anonymous

ATTENTION! … TO BE WIDELY DISTRIBUTED! NEW DRAMATIC DIRECTION IN THE ONGOING MADNESS!…
The total compromise of the SS in this so-called state of emergency, totally falsified and allowing all the most Orwellian excesses!

What I am reporting here is taken from a communication from the CGT Union of social security funds following a meeting with the national director of the fund, Mr. Nicola Revel, dated May 5, 2020.

It concerns the plan to mobilize the fund’s administrative employees (and not the fund’s medical personnel, who are supposed to be trained and protect the notion of medical secrecy!) to supposedly limit the spread of the post-lockdown virus.

It consists of the creation of a “brigade” (sic!) in the form of a telephone platform of 6,500 people at the national level, which they cynically call the “Guardian Angel Brigade” BAD (… Really, what a sense of humour!) supposed to carry out large-scale epidemic detection of the famous “contact cases,” identified by family doctors on the declaration of their Covid patients.

In order not to get rid of the increasingly invasive anglicisms, it is called “contact tracing”!

These agents will be employed 7 days a week, this by freezing their collective agreement, and with compulsory overtime, but not eligible for the scheme in question from 8am to 7pm .

I remind us all once again (we can never hammer it home enough) that the covid tests have no validity, with a positive predictive value between 30 and 50%, which means that one can be a carrier of the virus and negative on the test, just as one can be declared positive even without having contracted the virus!! It is, however, on this basis that the policing will be carried out with an insane stigmatization of anyone!

But in high places, it causes no remorse!

The “contact tracing,” in fact, is old-fashioned: the family doctor diagnoses an infected patient. He tests him with a virological test, takes care of him and organizes his confinement as well as that of his close entourage. 3,000 to 5,000 cases will be expected per day starting May 11th according to Santé Publique France.

The doctor registers his patient in Ameli Pro, with his consent within 24 hours. (ER: Ameli.fr is the website portal for all health insurers in France.)

He receives 55 €, plus 2 € per individual name (4 € with a phone number) entered in Ameli Pro, with whom the patient has been in contact, outside the rules of physical distance and protection.

(ER: From another report, the 55 euros includes the normal 25 euro family doctor consultation fee.)

Mr Revel considers that the professional secrecy to which the employees of the Sécu are bound is sufficient to guarantee data protection. No details are given on what will happen to the data collected on Ameli Pro after the crisis is over.

On the other hand, it is confirmed that its twin, the SITEP tool (operated by DGS/AP-HP/Santé Publique France) will (together with the results of serological tests carried out in laboratories) make it possible to carry out epidemiological studies under cover of anonymity. As the CNIL has not given its opinion on the nature of the files created, it will arrive after the battle. So much the worse, when it comes to health data, as well as labour law – it is a matter of urgency!

Behind Ameli Pro, the agents will take over from the doctor to contact the “contact cases” by telephone. Their mission will be to convince everyone to get masks from the pharmacy, do a laboratory test and go into isolation while waiting for the results, with a work stoppage as backup.

In addition to the research and the relationship with the “contact cases”, the colleagues will also issue work stoppages.

Unanticipated risks to patients zero :

Patients (“patient zero”) who are the source of the trace will have the right to have their identity withheld from individuals who will be identified and quarantined. But only if they ask their doctor not to check the “does not wish to be identified” box in Ameli Pro. There is a risk there.

If claiming to be a known person (ER: an ‘infected’ person?) can make it easier to quarantine a third party, it could lead to retaliatory measures. There are environments where “snitching” is a serious thing. You have to be aware of this reality when you’re doing population tracing.

I’ll stop here. It’s edifying enough for anyone who still has their common sense. Not to mention that if medical ethics still had any meaning that was not misused, all doctors would have to resist and oppose the implementation of such a nightmare. But hey, most of them have seen their incomes drastically reduced during this epidemic! Yes, they have! It’s strictly attested to! And so… A big increase in income after a famine, it can be tempting!!…

Original article in French

from:    https://www.europereloaded.com/french-doctors-speak-out-against-new-contact-tracing-as-attack-on-right-to-medical-privacy/

What. DOES Facebook Know About you?

The 18 things you may not realise Facebook knows about you: Firm reveals the extent of its spying in a 454-page document to Congress

  • Facebook knows your exact mouse movements and battery status
  • It can tell if your browser window is ‘foregrounded or backgrounded’
  • In some cases, it monitors devices around its users or on the same network 
  • The details were revealed in document of answers to Congress following Mark Zuckerberg’s appearance in April over the Cambridge Analytica scandal

WHAT ARE THE 18 METHODS USED BY FACEBOOK TO TRACK USERS REVEALED IN LETTERS TO CONGRESS?

1. ‘Device information’ from ‘computers, phones, connected TVs, and other web-connected devices,’ as well as your ‘internet service provider or mobile operator’

2. ‘Mouse movements’, which can help distinguish humans from bots

3. ‘App and file names’, including the types of files on your devices

4. ‘Device operations’ such as whether a window running Facebook is ‘foregrounded or backgrounded’

5. ‘Device signals’, including ‘nearby Wi-Fi access points, beacons, and cell towers’ and ‘signal strength’ as well as Bluetooth signals

6. ‘Other devices that are nearby or on their network’

7. ‘Battery level’

8. ‘Available storage space’

9. ‘Plugins’ installed

10. ‘Connection speed’

11. ‘Purchases’ Facebook users make on third-party websites

12. Contact information ‘such as an address book’ and ‘call log or SMS log history’ for Android users with these settings synced

13. Information ‘about how users use features like our camera’

14. The ‘location of a photo or the date a file was created’ through the file’s metadata

15. ‘GPS location, camera, or photo’ information found through your device’s settings

16. Purchases from third-party data providers as well as other information about your ‘online and offline actions’

17. ‘Device IDs, and other identifiers, such as from games, apps or accounts users use’

18. ‘When others share or comment on a photo of them, send a message to them, or upload, sync or import their contact information’ text

The creepy ways Facebook spies on its users have been detailed in a bumper document presented to Congress.

They include tracking mouse movements, logging battery levels and monitoring devices close to a user that are on the same network.

The 454-page report was created in response to questions Mark Zuckerberg was asked during his appearance before Congress in April.

Lawmakers gave Zuckerberg a public grilling over the Cambridge Analytica scandal, but he failed to answer many of their queries.

The new report is Facebook’s attempt to address their questions, although it sheds little new light on the Cambridge Analytica scandal.

However, it does contain multiple disclosures about the way Facebook collects data.

Some are unsurprising, such as the time people spend on Facebook, while others may come as a shock to the majority of users.

Device information

Facebook tracks what device you are using to access the network.

To do this, it will log the hardware manufacturer of your smartphone, connected television, tablet, computer, or other internet-connected devices.

Facebook also tracks the operating system, software versions and web browser.

If you’re using a smartphone, it will keep a record of the mobile carrier, while internet service providers (ISPs) will be stored for users using a Wi-Fi or Ethernet connection to access Facebook.

In some cases, it will monitor devices that are using the same network as you.

‘Facebook’s services inherently operate on a cross-device basis: understanding when people use our services across multiple devices helps us provide the same personalized experience wherever people use Facebook,’ the firm wrote in the lengthy document.

According to Facebook, this is done, for example, ‘to ensure that a person’s News Feed or profile contains the same content whether they access our services on their mobile phone or in a desktop computer’s web browser.’

Facebook also says this information is used to curate more personalized ads.

 

to find out more, go to:    http://www.dailymail.co.uk/sciencetech/article-5834371/The-18-things-not-realise-Facebook-knows-YOU.html

Perils of Smart Meter Grid

Smart Meter Companies Admit: We’re Spying On You

Power companies admit: We're spying on you

Smart meters are spying devices. Not breaking news? Likely not for those of us who have researched the issue for quite a long while, but an admission by those who make the devices is rather shocking.

That is exactly what has happened, as SmartGridNews, a website supported by the high-tech meter industry, acknowledged that smart meters are gathering private information on homeowners.

Smart meters utilize wireless technology and instantly tell power companies how much electricity a home is using, and even can report on the power usage by individual appliances, as Smart Grid News said. Smart meters also can literally control newer household appliances that have the capability to communicate with the device.

“One of the next areas of value comes from taking smart meter data and ‘disaggregating’ it to tell us exactly how customers are using electricity,” reads a new story on the website. “Do external devices already do this? Sure. Just as progress in the smart phone world reduced the need for external devices (cameras, alarm clocks, radios, pedometers, navigation systems, etc.) the ability to get accurate, appliance level feedback, without the need to invest in external hardware, is the next step in the world of smart meters.”

The Stop Smart Meters website states that fire dangers are also a problem associated with smart meters. Fire calls after smart meter installations reportedly include the shorting-out of electronics of all varieties and the burning-out of appliances.

Cyber hacking of smart meters to possibly overload and garner control of significant portions of the power grid is also an often-voiced worry about the smart power initiative. In Connecticut, 30 percent of customers in a pilot program had higher bills after smart meters were installed.

According to the Stop Smart Meters group, the smart grid devices do not always emit less RF (radio frequency) exposure than a cell phone — as some utility companies allegedly state.

“People are becoming increasingly aware of the potential harm done by chronic exposure to RF radiation-emitting devices and are taking steps to change how they use them. Most people are not offered a wired smart meter and you can’t turn it off once it is installed,” the group contends.

Story continues below video

Smart grid opponents have long opposed the gathering of their personal usage information.

Former CIA Director David Petraeus once stated that WiFi-connected devices, such as appliances commonly found inside many homes, will “transform the art of spying.” Petraeus also said that spies will be capable of monitoring Americans without going inside the home or perhaps even acquiring a warrant. He went on to state that remote control radio frequency identification devices, “energy harvesters,” sensor networks, and small embedded severs all connected to an Internet network will be all that is necessary for clandestine intelligence gathering.

The Smart Grid News report said customers surveyed in a recent report supported smart meters.

“Customers were delighted with the initiative as it showed how their new smart meters could work for them,” the website said. “Utility companies wanting to meet their specific conservation targets to drive customer engagement should ensure they are making the most of their smart meter investment. They can now use the power of smart meter data disaggregation to identify the customers who are most likely to help them reach their specific targets and turn them into willing partners in the drive for energy conservation.”

Data disaggregation basically means the automatic collection of personal energy habits of the homes attached to smart meters. The more customers know that is the case, the more they will oppose smart meters.

from:    http://www.offthegridnews.com/privacy/smart-meter-companies-admit-were-spying-on-you/

Protect Your Web Privacy

Constitutional Judge Begs America to “Wake Up” Over Fed’s Plan to Spy on Your Web Activity
TOPICS:Andrew NapolitanoCivil LibertiesFBISurveillance

June 9, 2016

fbi-spyingBy Matt Agorist

This week, the US senate published a bill that would give the FBI seemingly unlimited power to pry into the “electronic communications” of American citizens. The bill would give the FBI warrantless access to email records as well as a slew of other electronic data.

Its passage could effectively end online privacy.

According to a report in the Intercept:

The provision, tucked into the Senate Intelligence Authorization Act, would explicitly authorize the FBI to obtain “electronic communication transactional records” for individuals or entities — though it doesn’t define what that means. The bill was passed by the Senate Intelligence Committee last week.

In the past, the FBI has considered “electronic communication transactional records” to be a broad category of information — including everything from browsing history, email header information, records of online purchases, IP addresses of contacts, and more.

The single ‘no’ vote against the bill came from Sen. Ron Wyden, who wrote a letter warning Americans that the bill’s provisions “would allow any FBI field office to demand email records without a court order, a major expansion of federal surveillance powers.”

Using the fear mongering tactics of “we need this to keep you safe,” the Fed will likely force this bill to become law.

The bill, if passed, could theoretically allow the FBI to target any individual who visits the FreeThoughtProject.com because of the subversive, yet entirely peaceful nature of the site. That information would then be stored, and a file kept on all people who are perceived rebellious by the State.

If you think the government declaring peaceful liberty-minded individuals as enemies of the state is far-fetched, think again. In 2009, a secret report distributed by the Missouri Information Analysis Center (MIAC) entitled “The Modern Militia Movement” specifically describes supporters of presidential candidates Ron Paul, Chuck Baldwin, and Bob Barr as “militia” influenced terrorists and instructs the Missouri police to be on the lookout for supporters displaying bumper stickers and other paraphernalia associated with the Constitutional, Campaign for Liberty, and Libertarian parties.

Of course, all laws like this one are ostensibly designed to keep you safe from ‘terror;’ however, as we’ve seen in the past — terrorism is but a fraction of the cause for legislation like this.

Taking to the airwaves to voice his concern over the death of the 4th Amendment in relation to Senate Intelligence Authorization Act, Judge Andrew Napolitano unleashed his fury.

Napolitano noted the sheer ominous nature of a bill that would allow the FBI access to a person’s Web history.

He pointed out that the government will, as it always does, argue that this is necessary to keep us safe from terror attacks. But he would note that the argument is a “facade.”

“This law will pass because the Congress doesn’t give a damn about whether it’s unconstitutional!” said Napolitano.

Pointing out that the police state continues to get worse, regardless of which puppet is in the White House, Napolitano bravely said, on FOX News of all places, “It always gets worse, it never gets better. No matter who’s in the White House, and no matter which party controls the Congress.”

“The American people should wake up. This is a major step…….toward a police state,” he said.

At the end of the video, Shepard Smith makes a hard hitting point about why this is able to continue.

People get riled up about the stupidest things and something important like this, you can’t get them to even send an email.

from:    http://www.activistpost.com/2016/06/constitutional-judge-begs-america-to-wake-up-over-feds-plan-to-spy-on-your-web-activity.html

Bank Spying on You?

Spy on Your Customers … or Else

Freda-Digital-CreepsBy Mark Nestmann

Do you distrust the banking system? Prefer to do business in cash? Complain about the encroachment of Big Brother into every facet of your life?

If you answered “yes” to any of these questions, you’d better watch out. You’re a “person of interest” – and a growing number of businesses must report your “suspicious activities” to the feds. If they don’t, they can be fined and the responsible parties even imprisoned.

These requirements originated in a law called the “Bank Secrecy Act” (BSA). Of course, this Orwellian law has nothing at all to do with protecting bank secrecy. Indeed, the BSA has all but eliminated confidentiality.

Regulations issued under the BSA require financial institutions to notify the Financial Crimes Enforcement Network (FinCEN), a Treasury Department bureau, of any unusual transactions in which their customers engage. Reporting is mandatory for transactions that exceed $10,000 and are not the sort in which the particular customer would normally be expected to engage. For money transmitter businesses, a $2,000 threshold applies.

The businesses covered by these requirements must file “suspicious activities reports” (SARs) secretly, without your knowledge or consent. FinCEN makes the reports available electronically to every US Attorney’s office and to dozens of law enforcement agencies. No court order, warrant, subpoena, or even written request is needed to access a report.

What exactly is suspicious? According to official Treasury guidance, suspicious behavior includes:

  • Paying off a loan;
  • Objecting to completing Currency Transaction Reports (required for transactions over $10,000);
  • Changing currency from small to large denominations;
  • Buying cashier’s checks, money orders, or travelers’ checks for less than the reporting limit ($10,000 for a cash transaction);
  • Making deposits in cash, then having the money wired somewhere else; and
  • Withdrawing cash without counting the cash first.

Now, FinCEN has issued preliminary regulations that could extend these rules to investment managers. All SEC-registered investment advisers would be required to design and implement an anti-money-laundering program. They would also need to file SARs with FinCEN.

Once these rules come into effect, investment advisors would no longer be accountable to you, their client. Their highest duty, reinforced by civil and criminal sanctions, would be to act as unpaid undercover agents for the US Treasury.

But FinCEN’s suspicious transaction reporting rules are just the tip of the iceberg. For instance, official guidance from the FBI and other government agencies indicate that all of the following actions make you a terror suspect:

Then there’s the “drug courier profile” developed by the Drug Enforcement Administration (DEA). The following profiles are all court-approved reasons to search you and your property:

  • Having a pale or dark complexion;
  • Having a Hispanic appearance;
  • Being between the ages of 25 and 35;
  • Acting too nervous or too calm;
  • Carrying $100, $50, $20, $10, or $5 bills;
  • Wearing casual clothing;
  • Wearing perfume;
  • Having window coverings on your personal residence;
  • Buying a one-way or round-trip airline ticket; and
  • Being among the first, last, or middle group of passengers off of an airplane.

As Richard Miller expressed in his landmark book, Drug Warriors and Their Prey,

[B]eing a citizen is sufficient cause to suspect a person of criminal conduct, thereby constricting civil liberties protections for that person. That situation is hard to distinguish from the legal status of citizens of Nazi Germany.

In a world that views virtually everything you do as suspicious, there aren’t a lot of options to protect yourself. Indeed, simply by expressing your interest in privacy, asset protection, precious metals, or any of the other topics I cover routinely, you’re likely on one government watch list or another already.

However, you can take steps to avoid having a bank or other financial institution – including an investment manager – file an SAR on you. If you’re considering doing anything out of the ordinary in your account, talk to an officer at the bank, brokerage, or other financial institution first. For instance, you might want to let someone know before you pay off a loan or make or receive a large transfer.

If you have a reasonable explanation for the transaction, it’s much less likely to set off an alarm. And in a country in which all citizens are considered criminal suspects, that’s definitely something you want to avoid.

Image Credit: Anthony Freda Art

You can read more from Mark Nestmann at Nestmann.com

from:    http://www.activistpost.com/2015/09/spy-on-your-customers-or-else.html

NSA XKeyscore Data Collection Program

It turns out the NSA was collecting voice calls, photos, passwords, documents, and much more

Cale Guthrie Weissman

Jul. 1, 2015

NSA documents leaked to the Guardian in 2013 described a covert program called XKeyscore, which involved a searchable database for intelligence analysts to scan intercepted data.

Now, new documents show the breadth of this program and just what sort of data XKeyscore catalogs.

According to a new report from The Intercept, the amount of data XKeyscore scoops up as well as the sort of data it collects is much larger than originally thought.

Here are a few highlights from the new report:

The XKeyescore database is “fed a constant flow of Internet traffic from fiber optic cables that make up the back of the world’s communication network, among other sources, for processing,” the new report writes. Its servers collect all of this data for up to five days, and store the metadata of this traffic for up to 45 days.
Web traffic wasn’t XKeyscore’s only target. In fact, according to the documents posted by The Intercept, it was able to gather data like voice recordings. A list of the intercepted data included “pictures, documents, voice calls, webcam photos, web searches, advertising analytics traffic, social media traffic, botnet traffic, logged keystrokes, computer network exploitation (CNE) targeting, intercepted username and password pairs, file uploads to online services, Skype sessions and more.”
How the search works is very advanced. The new documents detail ways that analysts can query the database for information on people based on location, nationality, and previous web traffic.
XKeyscore was also used to help hack into computer networks for both the US and its spying allies. One document dated in 2009 claims that the program could be used to gain access into unencrypted networks.
Using XKeyscore was reportedly insanely easy. “The amount of work an analyst has to perform to actually break into remote computers over the Internet seems ridiculously reduced — we are talking minutes, if not seconds,” security researcher Jonathan Brossard told The Intercept. “Simple. As easy as typing a few words in Google.”

While XKeyscore has been known as an intelligence tool for years now, these new documents highlight just how advanced and far-reaching the program’s surveillance is.

The NSA, in a statement to The Intercept, claims that all of its intelligence operations are “authorized by law.” It added, “NSA goes to great lengths to narrowly tailor and focus its signals intelligence operations on the collection of communications that are most likely to contain foreign intelligence or counterintelligence information.”

Read more: http://www.businessinsider.com/nsa-xkeyscore-surveillance-program-details-revealed-in-new-snowden-documents-2015-7#ixzz3eqx12a82

The End of NSA Spying? Really?

NSA

Has everybody gone stupid? The NSA has not stopped spying on Americans… and it never will, either

(NaturalNews) There are days I just shake my head in bewilderment at the astonishing, almost incomprehensible gullibility of mainstream Americans and the media that claims to be practicing intelligent journalism. When I see the Associated Press report things like, “The NSA had stopped gathering the records from phone companies hours before the deadline,” I’m almost paralyzed with disbelief.

That’s their story, though. And they apparently believe it. See Either way, no more NSA collection of US phone records. Read the story yourself if you need a really good laugh at an example of extreme gullibility in the media.

What’s so funny about that story? For starters, given that the NSA is a super secret organization with ZERO oversight and a history of repeatedly lying about what it’s really doing, how on Earth are we supposed to believe the NSA when it says it suddenly stopped spying on Americans’ phone calls because it “lost the authority” it never recognized in the first place?

Is the mainstream media really just taking the NSA’s word that it has stopped spying on everybody because it no longer has the “legal authority” to do so? There isn’t a single shred of evidence that the NSA has stopped any spying activities at all. Even more, the Associated Press has no way to verify whether anything has been halted. Trusting the NSA’s statement claiming it has halted its spying activities is about as gullible as trusting Iran’s statements on how it has halted its nuclear fuel enrichment program. Geesh… how hard is it for people to understand that governments lie by default?

Grow up, America. The NSA was spying on us all long before it ever had any legal authority to do so, and when the Director of National Intelligence James Clapper was asked under oath, at a United States Senate Select Committee on Intelligence, about whether the NSA was spying on Americans, he outright lied over and over again, claiming no such spying was taking place.

So now, suddenly, we’re supposed to believe the NSA isn’t spying on us all merely because it says so? Should we pull out our pinkies and do a pinky swear on it, too? Maybe we can be BFF as well?

The NSA recognizes no legal authority, period

It’s just incredible that anyone would think the NSA’s activities are bound by anything even resembling “legal authority.” The NSA does whatever the hell it wants. And why does it do that? Because it can. Because they’ve already gathered up all the records of U.S. Supreme Court judges and they have enough emails, phone calls, web surfing history and search engine history to blackmail practically everyone in Washington D.C. (and everywhere else, for that matter).

“However Congress resolves its impasse over government surveillance, this much is clear: The National Security Agency will ultimately be out of the business of collecting and storing Americans’ calling records,” says the Associated Press. Yeah, right. In your crack-induced fairytale, maybe. But in the real world of hardball politics and blackmail, any organization that has the power to keep collecting all these records will absolutely keep doing so unless and until it is physically forced to stop (i.e. shut off the power, confiscate the servers and close the buildings).

And that’s never gonna happen, folks. Not by a long shot. The spy apparatus is far too valuable to ever be shut down. At best, it will pretend to shut down long enough to shut up the public. But behind the scenes, every single spy server dedicated to this task will continue as normal, without interruption.

Sorry to have to say this so bluntly, but anyone who believes the government is going to voluntarily stop spying on the American people is a complete fool. The way these games are really played is far beyond any recognition of “legal authority.” For example, the NSA can simply take its entire spy operation, transfer the assets to an NSA shell company in the Cayman Islands (without actually moving the servers anywhere), rename it “NSB” and continue operations as normal… all while testifying before Congress that, “The NSA has halted all domestic surveillance operations.” Yep, it has! But NSB has resumed those operations, ha ha.

And if NSB is ever unveiled, they can move it all to “NSC” and so on. The spying never stops, folks. The only thing that changes is the name of the spy organizations conducting it. Does any intelligent person honestly think they’re going to voluntarily shut off all those billions of dollars in servers and storage facilities they built for this purpose? Ain’t gonna happen.

And the way you know this to be true is to ask yourself this question: If you were the director of the world’s most amazing intelligence gathering spy tool that operated utterly without any boundaries or limitations whatsoever, would YOU shut it down? Of course not. No one would. You’d use it precisely because it’s powerful. It’s the Ring of Power from the Lord of the Rings. Almost no human being has the moral integrity to voluntarily part with it. It’s so PRECIOUSSSSS…

True American heroes: Edward Snowden and Rand Paul

Despite the ongoing spy activities of the NSA, it’s worth mentioning something hugely important in all this.

There is only ONE Presidential candidate who has the courage to stand up against the surveillance state and demand an end to these illegal violations of Americans’ privacy. His name is Rand Paul.

As far as I can tell, Rand Paul is the only candidate who has a spine. While Jeb Bush and Hillary Clinton are both total spy state insiders, Rand Paul is risking not just his political career but even his own neck to take a stand against the surveillance state. That’s historic. It’s truly remarkable, and it may uniquely qualify Rand Paul to be the kind of serious reformer who can take on Washington and knock some heads around.

Edward Snowden is also, of course, the key hero in all this, and I strongly recommend you watch the documentary called Citizen Four to gain a better understanding of Snowden’s contributions to privacy and freedom in America. Edward Snowden has quite literally risked his life — and forfeited his own personal freedom — to blow the whistle on the illegal spying being conducted by the U.S. government on the citizens of America.

What should have happened immediately after Snowden’s shocking revelations was a nationwide movement of pissed off people marching in the streets against Orwellian government. But what really happened instead was a nationwide movement of apathetic sheeple turning on Oprah and munching down some Twinkies before injecting themselves with insulin. In other words, nobody gave a damn because they were too busy cowering in blind obedience and practicing cowardice and conformity.

And so they all are getting the government they deserve: an Orwellian spy state that enslaves them all. This is what they are begging for, after all, when they are so gullible that they’ll believe anything the government tells them. The same people who believe the NSA magically stopped spying on them must also believe the FDA protects the people, the DEA wants to eliminate the drug trade, and the CDC is trying to eradicate infectious disease.

Wake up and smell reality, folks. None of these entities give a damn about the People. They all exist for only one purpose: to expand and assert their own power by any means necessary. That’s the fundamental nature of organizational existence, and it’s precisely why Big Government keeps getting bigger, badder and more dangerous unless its power is somehow limited or halted by the People.

Hence the origins of the Bill of Rights in the first place, over two centuries ago.

We’ve been down this road before, of course. This isn’t the first rise of police state tyranny in the history of our world. And it certainly won’t be the last…

‘Stingray’ Spy Tech

NY Cops Used ‘Stingray’ Spy Tool 46 Times Without Warrant

The police department in Erie County, New York fought hard to prevent the New York Civil Liberties Union from obtaining records about its use of a controversial surveillance tool known as a stingray.

The reason why may be because of what the records show: that cops in that county, which includes the city of Buffalo, used the devices 47 times since 2010 but only once sought and obtained a court order to do so. That revelation contradicts what the county sheriff said last year when he asserted that the department only used the devices under “judicial review.”

In the single case in which police sought permission from a court, they asked for a court order rather than a warrant, which carries a higher burden of proof. And in their request, they mischaracterized the true nature of the tool.

“These records confirm some of the very worst fears about local law enforcement’s use of this expensive and intrusive surveillance equipment.”

The records, which the NYCLU published in a blog post today, also show that the county sheriff’s office signed a stringent gag order with the FBI to maintain secrecy about their stingray records. The department was told to withhold information about the devices in any documents filed with courts, such as affidavits and other documents describing how they obtained evidence in criminal cases. The department was even told that the FBI maintained the right to intervene in county prosecutions to request criminal cases be dismissed if there was a chance that a case might result in the disclosure of information about law enforcement’s use of stingrays.

“Stingrays are an advanced surveillance technology that can sweep up very private information, including information on innocent people,” NYCLU Western Region Director John Curr III said in a statement. “If the FBI can command the Sheriff’s Office to dismiss criminal cases to protect its secret stingrays, it is not clear how the $350,000 we are spending on stingray equipment is keeping the people of Buffalo safer.”

The revelations continue a trend in several states across the U.S. wherein law enforcement agencies have gone to great lengths to prevent the public from learning about their use of stingrays. The surveillance tool simulates a legitimate cell phone tower to trick mobile phones and other devices on a cellular network into connecting to the devices and revealing their location. Stingrays emit a signal that is stronger than the signal of other cell towers in the vicinity in order to force mobile phones and other devices to establish a connection with them and reveal their unique ID. Stingrays can then determine the direction from which the phone connected— a data point that can then be used to track the movement of the phone as it continuously connects to the fake tower.

Many police departments have signed non-disclosure agreements with the Harris Corporation, one of the leading makers of the devices, to prevent them from releasing records about the systems or discussing them. In Florida, the U.S. Marshals service went so far as to seize records about a local police department’s use of stingrays in order to prevent the American Civil Liberties Union from obtaining them. And many law enforcement agencies have deceived judges about their use of the devices in order to prevent defendants and the public from learning about how they’re being used.

Erie County similarly fought hard to prevent the NYCLU from obtaining these records but was ordered to turn them over by a court. The documents show that the sheriff’s office used stingrays at least 47 times between May 1, 2010 and October 3, 2014. The one time the department sought judicial approval was in October 2014, contrary to what Erie County Sheriff Tim Howard said in May, 2014: that the devices were used under “judicial review” in all criminal matters, implying that investigators always seek court approval before using them.

Not only this, but the records show that when the department did seek a court order, they identified the spy tool they planned to use as a pen register device, not a stingray or cell site simulator. The use of the term “pen register device” is controversial. Law enforcement agencies maintain that stingrays operate like pen registers and are not invasive, but this doesn’t paint the picture. Pen registers record the numbers dialed from a specific phone number, but stingrays are used primarily to track the location and movement of a device and can be much more invasive than pen registers. By describing the tool as a pen register device to the judge, the law enforcement agency was withholding information about the full capability of the device.

In fact, the public has yet to learn exactly how much these surveillance tools can really do, due to the secrecy around them. Recently, a federal agent admitted to a court that stingrays have the ability to disrupt cellular communications for any device in its vicinity, not just the ones targeted by law enforcement. And there are also stingray devices that have the ability to collect the content of phone calls, though U.S. law enforcement agencies have often insisted that the ones they use have this capability disabled.

Although there’s still much more the public should know about how and when law enforcement uses this invasive spying tool, it’s clear departments will continue to do everything in their power to keep the public, and judges, in the dark.

from:    http://www.wired.com/2015/04/ny-cops-used-stingray-spy-tool-46-times-without-warrant/

The Power Grid & You

Industry’s Own Words: 6 Admissions Of In-Home Surveillance Using Smart Meters

Josh del Sol
Activist Post

A look at what utility companies, PUCs, and the former CIA director have to say about the ‘smart’ meters, data-mining, and surveillance — sans propaganda.

It’s always a drag to find out when a friend is saying one thing to your face, and another to your back. As uncovered in our film Take Back Your Power, the way in which most utilities are now delivering the lies and propaganda — with your individual rights, security, and potentially health on the line — is elevating the trait of “two-faced” to a completely new level.

It’s important to note that the first 4 of these references have to do with the smart meters / grid infrastructure capabilities as of this time. According to the sum of my research over the past 3 years, the plan involves achieving a greater and greater level of granularity and extraction of in-home data over time — see #5 and #6 below as examples (as well as my article on Google’s Nest acquisition). So as far as privacy and surveillance go, according to utilities’ own documentation and writings, ‘smart’ meters are effectively a trojan horse.

1) US Congressional Research Service report, “Smart Meter Data: Privacy and Cybersecurity” (February 2012)

With smart meters, police will have access to data that might be used to track residents’ daily lives and routines while in their homes, including their eating, sleeping, and showering habits, what appliances they use and when, and whether they prefer the television to the treadmill, among a host of other details.

Source: https://www.fas.org/sgp/crs/misc/R42338.pdf – see page 7 (page 10 of the PDF)

2) Colorado Power Utility Commission report, “Smart Metering & Privacy: Existing Law and Competing Policies” (Spring 2009)

First, the privacy concerns are real, and should be addressed proactively in order to protect consumers. Second and related, a salient privacy invasion—were it to happen and get press—could create significant opposition to smart grid deployment efforts.

Source: http://www.dora.state.co.us/puc/DocketsDecisions/DocketFilings/09I-593EG/09I-593EG_Spring2009Report-SmartGridPrivacy.pdf – see page 6

3) California Public Utility Commission press release, “California Commission Adopts Rules to Protect the Privacy and Security of Customer Electricity Usage Data” (July 2011)

Our action today will protect the privacy and security of customer usage data while enablingutilities and authorized third-parties to use the information to provide useful energy management and conservation services to customers.

I support today’s decision because it adopts reasonable privacy and security rules and expandsconsumer and third-party access to electricity usage and pricing information. I hope this decision stimulates market interest.

Source:http://smartenergyportal.net/article/california-commission-adopts-rules-protect-privacy-and-security-customer-electricity-usage-d

4) SF Chronicle article, “California Utilities Yield Energy Use Data” (July 2013)

California’s electric utilities last year disclosed the energy-use records and other personal information of thousands of customers, according to reports the companies filed with state regulators.

The vast majority of those disclosures – 4,062 – were made by one utility, San Diego Gas and Electric Co. In 4,000 of those cases, the information was subpoenaed by government agencies.

New digital smart meters being installed throughout the state can measure a home’s energy use hour by hour, showing when residents leave for work, go to sleep or travel on vacation. Older analog meters, which measured cumulative energy use over the course of a month, couldn’t do that.

“Before smart meters, what happened inside houses couldn’t be revealed unless there was a police officer inside with a warrant,” Ozer said.

Source: http://www.sfchronicle.com/business/article/Calif-utilities-yield-energy-use-data-4611159.php

5) Raab & Associates, Steering Committee report (February 2013) – Under the heading “Strategic (3-10 years)”:

New tools for mining data for intel

Under the heading “Transformational (10+ years)”:

Centralized intel combined with widespread local/distributed intel

and

Data mining and analytics becomes core competency

Source: http://magrid.raabassociates.org/articles/raab%20subcommittee%20update%20draft.ppt

View slide 17 only (PDF): http://www.takebackyourpower.net/documents/RaabDraft-17.pdf

6) Wired.com, “CIA Chief: We’ll Spy on You Through Your Dishwasher” (15 Mar 2012)

‘Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,’ Petraeus said, ‘the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.

“Petraeus allowed that these household spy devices “change our notions of secrecy” and prompt a rethink of “our notions of identity and secrecy.” All of which is true — if convenient for a CIA director.”

Source: http://www.wired.com/2012/03/petraeus-tv-remote/

* * *

Did we really think that the technocratic oligarchy would stop at collecting information about how we use our phones, who we call, and where we’re located? If we did, we were naive. Plainly, there is a corporate intention to effectively colonize your home.

However, there is also a rising awareness, and resistance, as new solutions are uncovered. The first step is to remove your consent, in writing.

The following is actually written into the California Civil Code. Not only do these provide a strong clue at how the corporatocracy functions (and gets away with what it does), but they also outline a basis for remedy: (notes in parentheses, italics)

California Civil Code (2009)

1619. A contract is either express or implied. (If you didn’t say no, you said yes.) 

3515. He who consents to an act is not wronged by it. (The way they do business is in writing. If you didn’t send them a letter or notice to remove your consent, you have agreed to their terms, and thus have agreed to a reduction in rights.)

3521. He who takes the benefit must bear the burden. (Utilities and their executives – and many public servants – are taking the benefit. They must, according to their law, accept the liability for all harm if the liability is enforced.) 

3523. For every wrong there is a remedy. (We are not bound into something which would have us be as slaves, if we do not want to be.) 

3527. The law helps the vigilant, before those who sleep on their rights.

What statutes are YOUR utilities and governments bound by?

from:    http://www.activistpost.com/2014/04/industrys-own-words-6-admissions-of-in.html

MicroChip Anyone?

| Naturalsociety | 31st March 2014

Former Defense Advanced Research Projects Agency (DARPA) director and now Google Executive, Regina E. Duncan, has unveiled a super small, ingestible microchip that we can all be expected to swallow by 2017. “A means of authentication,” she calls it, also called an electronic tattoo, which takes NSA spying to whole new levels. She talks of the ‘mechanical mismatch problem between machines and humans,’ and specifically targets 10 – 20 year olds in her rant about the wonderful qualities of this new technology that can stretch in the human body and still be functional.

Hailed as a ‘critical shift for research and medicine, ’ these biochips would not only allow full access to insurance companies and government agencies to our pharmaceutical med-taking compliancy (or lack thereof), but also a host of other aspects of our lives which are truly none of their business, and certainly an extension of the removal of our freedoms and rights.

The New York Times writes:

“These biochips look like the integrated circuits in a personal computer, but instead of containing tiny semiconductors, they are loaded with bits of actual DNA that make up genes or fragments of genes. Inserted in a PC-sized analytical instrument, the chips allow scientists to perform thousands of biochemical experiments at a fraction of the cost and time required for traditional tests.”

With bio-tech’s track record of hybridizing genes in our food and trees as GMO, why should we give them full access to our entire genetic makeup? With a satellite or the click of a button, these tiny micro-chips could also be set to begin our own demise, or even control our minds.

And the fact that microchipping has even been mentioned or considered in health care bills is insane:

“This new Health Care (Obamacare) law requires an RFID chip implanted in all of us. This chip will not only contain your personal information with tracking capability but it will also be linked to your bank account. And get this, Page 1004 of the new law (dictating the timing of this chip), reads, and I quote: ‘Not later than 36 months after the date of the enactment”. It is now the law of the land that by March 23rd 2013 we will all be required to have an RFID chip underneath our skin and this chip will be link to our bank accounts as well as have our personal records and tracking capability built into it…’”

This is not a new idea – Dr. Jose M.R. Delgado, Director of Neuropsychiatry Yale University Medical School Congressional Record, No. 26, Vol. 118 February 24, 1974 discusses it extensively in a paper in which he states, “Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electrically control the brain. Some day armies and generals will be controlled by electric stimulation of the brain.”

Is this the kind of mind that is creating bio-tech warfare in the form of GMOs, chemtrails, and vaccines? Don’t sign me up for micro-chipping or high-tech tattoos. I trust the medical establishment and biotech about as far as I can throw a rotten, cancer-causing GMO apple.

from:    http://consciouslifenews.com/getting-ready-microchip-entire-human-race/1172102/