Wednesday, July 18, 2018

The main reason Trump's Russia critics hate him

Health Insurers Are Vacuuming Up Details About You — And It Could Raise Your Rates

With little public scrutiny, the health insurance industry has joined forces with data brokers to vacuum up personal details about hundreds of millions of Americans, including, odds are, many readers of this story. The companies are tracking your race, education level, TV habits, marital status, net worth. They’re collecting what you post on social media, whether you’re behind on your bills, what you order online. Then they feed this information into complicated computer algorithms that spit out predictions about how much your health care could cost them.

Judge slams FBI for improper cellphone search, stingray use

Prosecutors say the two men, Donnell Artis and Chanta Hopkins, were engaged in credit card fraud and also illegally possessed firearms, among other pending charges that also involve four other people.

The crux of the issue is that, in April 2016, an FBI agent sought and obtained two warrants from an Alameda County Superior Court judge: one to search Artis' phone and another to deploy a stingray to locate Hopkins.

As Ars has reported for years, stingrays are in use by both local and federal law enforcement agencies nationwide. The devices determine a target phone's location by spoofing or simulating a cell tower. Mobile phones in range of the stingray then connect to it and exchange data with the device as they would with a real cell tower.

Once deployed, stingrays intercept data from the target phone along with information from other phones within the vicinity—up to and including full calls and text messages. At times, police have falsely claimed that information gathered from a stingray has instead come from a confidential informant.

Tuesday, July 17, 2018

Senators: Your Smart TV Might Be Spying On You

It has been almost 70 years since George Orwell’s dystopian novel Nineteen Eighty-Four was published, but now, some of his forward-looking warnings are starting to be realized in 2018. Take this stunning letter from Senators Edward Markey, D-Mass., and Richard Blumenthal, D-Conn., who told the Federal Trade Commission (FTC) Chairman Joseph Simmons last Thursday that internet-connected smart TVs are spying and creating profiles on the American people.

The Deep State Strikes Back

Watch: Hillary Clinton's Most Outrageous Lies Exposed!

Monday, July 16, 2018

Emergency: Big Tech’s Plot to Kill Free Speech Revealed

The biggest and yet least talked about issue facing conservatives and Trump supporters heading into the mid-terms and the 2020 presidential elections is social media censorship and big tech’s efforts to rig elections by manipulating their algorithms.

In association with Mike Adams, Infowars has published a detailed master compendium on censorship that will serve as a roadmap for lawmakers and for President Trump as we begin the fight to return the battleground of ideas to a level playing field.

The original document is embedded below and should be read in full. What follows below is a brief summary of the major talking points of this document.

The Censorship Master Plan Decoded by kitdaniels on Scribd

Censorship by tech giants is an assault on the right to exist in an online-dominated society


The blueprint for how tech giants covertly silence online speech, and how America can fight back against corporate tech monopolists

To date, no one has assembled a comprehensive compendium of the aggressive censorship
strategies and mechanisms now being deployed against users being targeted by the tech
giants. This document aims to serve as a primer “blueprint” to explain both the motivations
behind the extreme censorship as well as the technical / mechanical means through
which such censorship is carried out.

This document should be required reading for any lawmaker, regulator or judicial decision
maker interested in protecting the freedom of speech that has served as a critical pillar in
our society for over two centuries.

Today’s attacks on the First Amendment are being carried out by a “triple threat” tag-team
of institutions:
#1) Tech giants - Their role is to carry out the mechanics of censorship, shadow banning,
“doubt interruptions” and other techniques described in this report.

#2) Establishment media - Tasked with promoting the lynch mob mentality of hysteria
and hatred which is translated into widespread calls for silencing whatever voices they don’t
like: CNN’s insistent demand for InfoWars to be deplatformed from Facebook, for example.

#3) Third party fact-checkers and moderators - These groups, such as the SPLC,
Politifact, etc., are given the task of flagging all undesirable political speech (or even speech
about natural health, as you’ll see below) as “hate speech,” creating the justification for tech
giants to ban or deplatform such accounts without having to accept internal organizational
responsibility for discriminating against selected targeted.

The Censorship Master Plan Decoded by kitdaniels on Scribd

Sunday, July 15, 2018

Conspiracy "Theories" That Became Conspiracy FACTS

Long-time listeners/readers/viewers of mine will be very familiar with the old "conspiracy theorist" smear and how it is used to stop any would-be truth seekers from questioning the official explanation of contentious events. They will also know how the term can be turned on its head and thrust back in the accusers' face ("shut up, burglary theorist!").

But here's another effective tool to add to your conspiracy conversation toolbox: actual, historical examples of conspiracy "theories" that were proven to be conspiracy facts.

So here are some examples of things that were once derided as zany conspiracy paranoia that are now accepted as mundane historical fact.

Saturday, July 14, 2018

Ireland’s Intellectuals Bow to the Queen of Chaos

Hillary Clinton personifies the last thirty years of US imperialism. And so by honoring her, Trinity College honors three decades of US savagery across the planet. Firstly, during Hillary’s “reign”, there were the wars which the US orchestrated – for example, in Rwanda, Yugoslavia, Iraq, Libya, Syria, Ukraine and Yemen. And secondly, there’s the neoliberal wars against the global working class which Bill and Hillary Clinton have sold nonstop – from NAFTA (1994) to the repeal of Glass-Steagall (1999) and onto the bailout of the banks (2008 – to the present). The resulting social chaos across the world is a testament to Hillary Clinton’s politics. She more than Donald Trump is the face of the corrupt American Empire.

Her contempt for America, democracy and the world is no secret. The Podesta emails (released by WikiLeaks in 2016) – for example – reveal a two faced politician: a Wall Street Clinton and a Main Street Clinton. For $225,000 a speech Clinton tells the banksters the truth. And for votes she tells the American people fairytales. In her own words: “But if everybody’s watching, you know, all of the back room discussions and the deals, you know, then people get a little nervous, to say the least. So, you need both a public and a private position.”

Collection of domestic phone records under the USA FREEDOM Act

One of the most controversial NSA programs revealed by Edward Snowden was the bulk collection of domestic telephone records under the authority of Section 215 of the USA PATRIOT Act. A detailed analysis of the workings of this program was published on this weblog earlier.

In 2015, Section 215 was replaced by the USA FREEDOM Act, which prohibited the collection in bulk and provided more safeguards. The NSA became much more transparant about this program, which provides the opportunity for the following explanation of how the domestic phone records program works nowadays.

NSA is also more transparant about things going wrong: last month it revealed that it had to delete all the telephone records collected since 2015 due to technical irregularities.

PTech and the 9/11 Software

In this classic Corbett Report podcast from 2008, Indira Singh discusses Ptech, the company with numerous investors and managers with direct links to terrorist financing. Ptech’s clients included the CIA, FBI, the White House, the Department of Energy, the Air Force, the Navy, the FAA, IBM and Enron…Yet Singh learnt they were a CIA front company and their software could gain control of the most sensitive computer systems in the country.

Friday, July 13, 2018

All Ears: Always-On Listening Devices Could Soon Be Everywhere

If every tree falling in every forest might soon be heard by an internet-connected microphone, what hope is there for our privacy?

Already when you’re sitting in a room with an iPhone, an Apple Watch and a smart assistant like Amazon Echo or Google Home, you’re surrounded by a dozen microphones. (Newer iPhones have four and the Echo has seven, while the smartwatch has just one, for now.)

Add in the latest smart wireless headphones—Apple’s expected next-generation AirPods or competing ones from Bose or Shure—along with talking microwave ovens and TVs from Samsung, LG and others, and anyone at home or in an open-plan office could soon be within earshot of hundreds of microphones. Most of them will be listening for a wake word like “Alexa,” “Hey Siri,” or “OK Google,” just as our phones and smart assistants do now.

How the US Government Planted 'Spy Phones' on Suspects

That revelation is detailed in a new report from Human Rights Watch, along with a 2015 email that shows that the DEA had expressed interest in using smartphone malware from Italian company Hacking Team to spy on multiple suspects’ locations. Together, they illustrate a potentially chilling practice on the part of the US government to preemptively plant spy devices on suspects. They also shed light on actions by federal law enforcement that aren’t necessarily illegal, but do test the boundaries of surveillance, and potentially subject non-targets to federal snooping.

“If the government is distributing, effectively, bugging devices, without sufficient court oversight and authorization, I think that could really have a chilling effect on free expression, if people feel like they have to assume the risk that any phone they’re handed could have been bugged in a way that would violate their rights,” says Human Rights Watch researcher Sarah St. Vincent.

Hacker persona 'Guccifer 2.0' allegedly invented by 12 Russian intelligence officers

The 12 Russian military officers indicted for digital attacks on the 2016 presidential election developed the mysterious online persona, Guccifer 2.0, in their efforts to hack the Hillary Clinton campaign and the DNC, according an indictment from the United States government.

Announced Friday by Deputy General Rod Rosenstein, the indictment lists a dozen members of the GRU, Russia’s military intelligence unit, who “knowingly and intentionally conspired with each other, and with persons known and unknown to the Grand Jury to” hack into the computer networks of the Democratic Congressional Campaign Committee, and the Democratic National Committee.

What’s more, they allegedly operated under the guise of the self-proclaimed “hacktivist” Guccifer 2.0 — in addition to the persona, DCLeaks — in a bid to obscure their Russian ties.

By June 2016, the group allegedly managed to gain access to 33 computers at the DNC, slowly leaking documents all the while, according to The Verge. The same month, the political organization acknowledged the hackers, saying they first noticed unusual activity in April.