Tag Archives: surveillance

I Spy From Inside


By: Katherine Carroll, NTP, Associate Editor -

Science is a double-edged sword; it creates as many problems as it solves, but always on a higher level.”

Nano-robots in your bloodstream.

In November of 2012, the National Health Federation published a book review on the “Physics of the Future” by Machio Kaku. NHF was the first to alert the public and the health-freedom community in particular about “the need for a Constitution for the Race of Mankind” as we understood we were about to be violated. The excellent, albeit lengthy, book’s major flaw was not carrying the technological innovations in regards to nano-robots through to the ultimate conclusion and NHF noted it: the invasion of privacy and increased vulnerability to outside control of internal bodily processes via monitoring by healthcare professionals. Quoting from that book review:

“There are so many issues to decide, many which invade privacy while delivering greater information and scope of services…We have some major decisions to make as a race in the present- the future is now. Taking a proactive approach to sensitive considerations will ensure the preservation of all you hold dear now.”

Science is a double-edged sword; it creates as many problems as it solves, but always on a higher level.” How can we shape our minds to embrace the constant of change and have the discernment ready to sort the profitable and helpful from the controlling, damaging, and destructive? What will health freedom look like in the future? How much transparency is too much? Where do we let God be God/Nature determine, etc. and where do we intervene? If ever there was a need for a Constitution for the Race of Mankind, it is now.”

So, now with the development of the Internet of Things and Big Data, “we have already traversed the brink of privacy invasion in the implementation of systems like the Epic Medical Record keeping and Smart Meter installations. How far are we willing to go to have knowledge of our body’s inner workings? How much internal invasion will we tolerate in order to gain bio-data, perform surgeries, or deliver medications without using the skin as a portal of entry? Will it be worth the scientific advances to have all this data instantly uploaded – even our clothing uploading all our statistics as we dress in the morning? Suddenly, although clothed, we are naked and there is nothing except our thoughts that remain hidden- so far anyway.”

The Cambridge Dictionary has entered a new word that is going to change your life: Nanorobotics[1] – the use of extremely tiny components (measuring a nanometer or less) to make robots.

Nano-robotics is gaining importance in the field of industrial robotics. It is gaining momentum in health care and other niche markets.

Nano-robotics promise to usher in a new era of human development. They work on an atomic level. They can be remotely controlled or pre-programmed for a certain procedure. While this sounds advanced, it comes at a steep price most will agree may be unreasonable. And this is where you need to be concerned. Personally, most of us would take parasites and bacteria over having nanorobots swimming in our bloodstream monitoring every nuance, delivering drugs to the site, and reporting back to Big Data and the Medical Mafia. Do you realize how much power is lost when we trust these nanobots to act in our favor apart from the potential of the human controlling them on the other end?

The health-freedom community has some major privacy issues to debate NOW.

Will you agree to loss of privacy and control over your own body to simply “make a market” for the industry that created this new technology? NHF sees this at Codex continually; market-making off the backs of people like you and me. Health care? Safety? Not even in the equation oftentimes. Like the law of unintended consequences, this potentially revolutionary technology can imprison you, endanger you, and even kill you. With the use of nano-robotics you place control of your body outside of yourself. You are no longer sovereign. You have relinquished control. Since NHF believes in every man’s right to decide for themselves, this is most assuredly your choice. But please know the risks going in.

Nano-robots are controlled by an outside force.

Information feeds back through the computer system.

You lose control.

You lose privacy.

You subject yourself to a potential pirating of your sovereignty in the form of hacking.

We all know by now that the cameras installed that are monitored by your iPhone are also monitored. And not by you. Did you not think that others could and would be watching what you are watching as you absent yourself from your home?[2]

There is no question that the IOT is a security risk and highly hackable. “According to the FTC, 25 billion objects are already online worldwide, gathering information using sensors and communicating with each other over the internet, and this number is growing, with consumer goods companies, auto manufacturers, healthcare providers, and so many other businesses investing in the new breed of connected devices.

Such devices can help monitor your health, improve safety on highways, and make your home more efficient. But the FTC says that as manufacturers work to reduce the friction involved in using these smart things—to let people more easily gather data and send it to and fro—privacy and security is becoming a serious consumer concern.”[3]

The National Health Federation warned of this years ago and here it is from the FTC, “According to a study from HP Security Research, 70 percent of the most commonly used Internet of Things devices had serious security vulnerabilities.”[4] So we are supposed to trust the source (i.e. health care practitioner’s office, hospital, etc.) and trust staff not to use this information in an unauthorized fashion? The health-freedom community is far too savvy to submit to this invasion potential.

The first step in solving problems is alerting and NHF did in 2012. Now we are to the stage of decision-making. Be forewarned of the issues going into advanced technology medical procedures involving nanorobots that will monitor, deliver drugs, and more. In this extended quote you understand that “These robots are fully self-supporting and are capable of affecting things at a microscopic level.  These robots are so small, in fact that they can build things with molecules and even change the molecular structure of existing material.  They can, for example, break down materials they find, extract the necessary parts, and then build something entirely new.  The usefulness of this technology is clear when we consider the fact there is almost nothing which nanobots cannot, theoretically, change or create.  While this technology may still be quite new, there are already a number of proposed uses for these microscopic little robots.

One area of science which is eagerly developing new uses for these machines is that of medicine.  There are a number of medical problems which represent significant challenges for doctors.  While modern medical and surgical techniques have come a long way, there are still many things which doctors are powerless to change.  Surgery itself is still extremely complicated and success is not always guaranteed.  Part of the reason for this is that it is still incredibly invasive and can often cause much more damage than it had tried to fix.

Medical uses for nanotechnology are numerous.  Since these robots are so small, they can be inserted into a person’s biological system without any noticeable effects.  They are so small, in fact, that they may be the same size as blood cells.  They can either be remotely controlled or pre-programmed for a certain procedure.  They could, theoretically, be programmed to seek out and deconstruct cancer cells and completely eliminate them without the need for lengthy treatments.  They could also be employed to repair and reconstruct damaged tissue on the cellular level.  This would have the effect of drastically increasing a person’s own natural ability to heal themselves.  No matter how damaged a portion of a person’s body may be, these nanobots might be able to repair them.”[5]

Dramatic. As revolutionary as the printing press to the development of mankind, but in the wrong hands or with the wrong programming—deadly. And at minimum, you are an open book from the “book of life” outward, profilable, programmable, etc.

Due to Japan’s discrepancy in children available to care for elderly parents, they have resorted to using robots.[6] It is time for the health-freedom community to face the facts and draw the line in the sand. Will it be a Maginot Line that is easily breached or will it be firm? It is up to us to decide.


[1] http://dictionaryblog.cambridge.org/2015/04/06/new-words-6-april-2015/[www.mmtonline.in 03 July 2014]

[2] http://www.sileo.com/baby-cam-hacked-what-you-can-do-to-protect-yourself-and-your-children/

[3] http://www.wired.com/2015/01/ftc-warns-huge-security-risks-internet-things/

[4] ibid

[5] http://dbdresearchinstitute.com/the-many-uses-of-nanobots/

[6] http://www.slashgear.com/robear-robot-to-take-care-of-japans-elderly-population-27370782/

Kat Carroll is Associate Editor of the National Health Federation’s magazine, Health Freedom News, and is on the Board of Directors of the National Health Federation Canada. She also writes for several blogs, magazines, and is currently compiling a book on Codex Alimentarius based on first-hand experience attending International Codex meetings. Kat is a Nutritional Therapy Practitioner and Clinic Administrator at her and her husband’s Optometry clinics. Additionally, Kat enjoys hosting guests at Adytum Sanctuary, their Pacific Northwest retreat. [email protected]. www.adytumsanctuary.com. www.thenhf.com


France Prepares For Widespread, Unlimited Spying Practices

By: The Real Agenda -

False-flag events such as the Charlie Hebdo attack serve just fine for governments to justify outrageous policies and procedures which would otherwise be even more unjustifiable and unacceptable.

The supposed threat that terrorism presents to western nations serves many purposes. After 9/11 it was used to justify government powergrabs on many areas, and in the last few years is the cornerstone of increasing cyberspying practices by countries like the United States, England and now France.

If plans in France work out as planned, its secret services may be able to ‘legally’ infiltrate and monitor ‘potential terrorists’ using various techniques of espionage with a simple administrative authorization or without it in case of emergency or imminent risk, according to a bill unveiled by French newspaper “Le Figaro”. This bill sounds and smells a lot like American versions of spying proposals that are already in effect.

The project of the French Socialist government, which will be adopted on Thursday by the Council of Ministers, supposedly aims to provide “a comprehensive legal framework” to secret agents in their intrusive activities into the private life of average citizens with a clear focus on “the principles and purposes”, says the bill.

The drafters set a “limiting” list of reasons justifying the use of “special techniques”. Among them are the national defense, foreign interests, economic or scientific policy, prevention of terrorism and proliferation of weapons of mass destruction as well as violence that disrupts the public peace.

As it happens with legislation adopted in other European nations and in the United States, the problem with this type of proposals is that, due to its broad terms, it gives the government the ability to interpret its text in multiple ways to accomodate whatever it wants to frame within the limits of the law.

Specifically, spies can access data connections or intercept communications such as phone calls and emails with a simple administrative approval, without obtaining court approval.

That includes listening through IMSI receptors such as computers or mobile devices; the installation of GPS in vehicles to track their movement; interception of all types of communications even encrypted ones and the placement of microphones and cameras.

The authorization to adopt these procedures may be requested by the Ministers of Defense, Interior and Finance and are subject to the direction and approval of the Prime Minister. Again, as in the case of the Americans, the French Parliament is concentrating more and more power on one political figure and less on the legislative body itself.

According to the bill, the head of government and other authorities should also be informed without delay where the secret services have launched an operation for reasons of urgency with “an imminent threat or a very high risk which renders them unable to perform the operation later.”

The bill provides for the establishment of a National Commission for the Control of Information Techniques (CNCTI) in front of which will be judges of the State Council and the Supreme Court and parliamentarians advised by engineers, lawyers, computer and encoding specialists.

The CNCTI, which replaces another body established in 1991, will “recommend” the interruption of any technique they are using for spying if it is deemed irregular, and may refer to the Council of State, which ultimately could order the destruction of the elements obtained.

Beyond this adversary proceeding, the secret services must destroy the information collected within twelve months and after five years when they are data connections.

One of the peculiarities of the bill is that it requires that telecommunications operators and Internet providers are obligated to extend the period of retention of data connections from one to five years, and transmit it to the secret services at their request.

As decribed above, the new French bill is a direct copy of the policies used by the American National Security Agency which are now being codified as ‘legal’ in France.

The bill also allows for the “immediate collection” of the data of suspects, and anything else that offers clues to the spies such as decrypted and encrypted conversations or information.

The proposal to have this particular practice responds in part to a series of needs identified after the wave of alleged jihadist attacks that took place in France in early January.

As it happened in the UK and in the United States, false flag events such as the Charlie Hebdo attack serve just fine for governments to justify outrageous policies and procedures which would otherwise be even more unjustifiable and unacceptable.

Luis R. Miranda is an award-winning journalist and the founder and editor-in-chief at The Real Agenda. His career spans over 18 years and almost every form of news media. His articles include subjects such as environmentalism, Agenda 21, climate change, geopolitics, globalisation, health, vaccines, food safety, corporate control of governments, immigration and banking cartels, among others. Luis has worked as a news reporter, on-air personality for Live and Live-to-tape news programs. He has also worked as a script writer, producer and co-producer on broadcast news. Read more about Luis.

Spy Master A Lethal Melanoma


Nam si vos omnibus imperitare vultis, sequitur ut omnes servitutem accipiant?

If you want to rule the whole world, does it then follow that everyone else welcomes enslavement? – Caratacus (Tacitus, Annales XII, xxxvii)

The formation of a bureaucratic superstructure for national intelligence will put in motion a perverse organism. The significance lies not in the figurehead or even the process for the selection, but rests in the birthing of a Medusa. Little wisdom comes out of this modern daughter of Phorkys and Keto, the children of Gaia (Earth) and Okeanos (Ocean).  This ugly creature will use the charms of seduction – national security – but will end up spreading a den of snakes. The globe will be her playpen and the seas will be her lake. No one or no place will fall outside her watch. She will run her hydra network through all those underling heads, but in the end her advice will revival that of Eve.  The mother of all evil won’t be a gender bias for any director will impose paternity over the stream of information. The children of this fraudulent union will bear the price from her wrath. Overseas enemies will feel the force of her boot. And the only creature to resist her might may well be those who run under the radar screen.   

Quite a departure from all those spies that came in from the cold.  Can you envision James Jesus Angleton following orders? Remember his direction to CIA Director McCone and FBI Director  Hoover during the Warren Commission: 

“One question will be “Was Lee Harvey Oswald ever an agent of CIA?” The answer will be no. A second question will be “Does CIA have any evidence showing that a conspiracy existed to assassinate President Kennedy?” The answer to this question will also be no. The third question will be “What suggestions does CIA have to offer for safe-guarding the life of the President of the United States?” Angleton didn’t have the complete answer to this worked out but because of the nature of the question, it wouldn’t conflict with what the Bureau has already suggested. A fourth question will be “Does CIA believe the Soviet documents on Oswald submitted to the Warren Commission accurately reflect the Soviet relations with Oswald?” Angleton said their answer cannot be either a flat yes or no because they do not have the knowledge to so state. He said he believes McCone’s answer will be to the effect that CIA is aware that Soviet Russia does have a directorate charged with the responsibility for carrying out assassinations and, therefore, these documents in question would not normally reflect accurately relations with such a person as Oswald. However, on the other hand, CIA has no evidence that Oswald was under the instructions of this directorate charged with assassinations. “ 

How about the Dulles brothers? John Foster Dulles and Allen Dulles would turn over in their graves before allowing a consolidation of a top down national intelligence director, unless of course, one of them got the position. Richard Helms might be LBJ’s man and Nixon’s accomplice, but would he adhere to a rogue elephant herd running the intelligence community? If you still have doubts, ask William Colby how safe it is to canoe the waters of Maryland’s Wicomico River – loose lips sink ships. What all these infamous Beltway spooks have in common is a dedication to a stalwart state of elitist control for world affairs. 

National security, for this company, and all power demons is always the same – cover your own ass. So when George Tenet states: “I don’t believe that you should separate the leader of American intelligence from a line agency”, you get the real low down. A fiefdom for any ‘Intelligence Community” agency head is sacred ground and must be defended with all their resources, covert and clandestine, if considered necessary. When a Sub Rosa bureau or a  faction element within an agency, venture into executing their own policy, the players at the top are undermined. That’s not necessarily bad, depending upon your loyalty. Surely your own interests are seldom protected or advanced by official doctrine.  However, when the entire apparatus of intelligence gathering is directed towards the eradication of true national self-interest and the implementation of a total compliant society, one needs to re-examine if trusting in claims of national security, really safeguards our country. 

The riddle within an enigma that is presented as too complex for ordinary people to understand is not a mystery. It is a designed plan meant to cover the real goal. An oversized and reinvented supra-bureaucracy won’t curb the internal conflict among contradictory viewpoints. Case in point, since the NeoCons are in charge, any movement to purge their extensive inter connection of disloyal treachery, will be put down with official blessings.  When a dedicated Likudnik is placed as head master at the intelligence institution, you can be assured that the only curriculum accepted for public indoctrination will reflect an Israel First benefit. With the appointment of a “super spook” will the prospects of national independence become a reality? Based upon current events, further integration with hostile intelligence services will intensify. 

Ironically, this prospect flies in the face of Efraim Halevy, head of Mossad, Israel’s intelligence service, from 1998 to 2002 warning:  

“Now there is a recommendation to appoint an intelligence “tsar” in the United States. In my humble opinion no greater mistake could be made so far as the intelligence community is concerned. If the new tsar is to assume command responsibility for the intelligence community, then he will be de facto director of the CIA and the other intelligence agencies in the country. He, and he alone, will be responsible for the content and standard of the evaluation. The professional director of the CIA will be responsible to the tsar, and the president of the United States will be functioning through a “proxy” on matters of war and peace. In intelligence, there can be no sharing in responsibility; it is, and will always remain, indivisible.” 

Just maybe the NeoCons in this administration are more kosher than the Israeli ‘Tinker, Tailor, Soldier, Spy’. Halevy has his own nasty record, and certainly shares the same regional goals as the likes of Perle, Feith and Wolfowitz, but his perceptive analysis has already been rejected with the decision for reorganization. Homeland Defense move over, the new gorilla on the block, will make MI 6 shutter and James Bond defect. 

Such delusions only go to reduce our real national interest. The first task for any intelligence service is to know who is your real enemy. Spying on Americans while sharing information with Tel Aviv is pure madness. Yet, what should be expected out of a culture that doesn’t trust anyone, but obeys orders from those who can advance their personal circumstance. The terminal cancer that spreads within the “Intelligence Community” has only one cure – loyalty to the legitimate America.  The operatives that run their cells and control their moles need to disrupt the move towards a national sellout. The beast they work for and serve is a mortal threat to the last remains of a republic. Their Medusa myths are a Greek tragedy that has grave real world consequences.  The overhaul needed is not one of organization, but one of exclusion. That’s the only intelligent approach.

SARTRE is the pen name of James Hall, a reformed, former political operative. This pundit’s formal instruction in History, Philosophy and Political Science served as training for activism, on the staff of several politicians and in many campaigns. A believer in authentic Public Service, independent business interests were pursued in the private sector. As a small business owner and entrepreneur, several successful ventures expanded opportunities for customers and employees. Speculation in markets, and international business investments, allowed for extensive travel and a world view for commerce. He is retired and lives with his wife in a rural community. “Populism” best describes the approach to SARTRE’s perspective on Politics. Realities, suggest that American Values can be restored with an appreciation of “Pragmatic Anarchism.” Reforms will require an Existential approach. “Ideas Move the World,” and SARTRE’S intent is to stir the conscience of those who desire to bring back a common sense, moral and traditional value culture for America. Not seeking fame nor fortune, SARTRE’s only goal is to ask the questions that few will dare … Having refused the invites of an academic career because of the hypocrisy of elite’s, the search for TRUTH is the challenge that is made to all readers. It starts within yourself and is achieved only with your sincere desire to face Reality. So who is SARTRE? He is really an ordinary man just like you, who invites you to join in on this journey. Visit his website at http://batr.org.



Brazil Hosts American Spy Base


By: The Real Agenda News -

The location in Brasilia is part of the NSA’s Computer Network Exploitation operations.

Sometimes it is necessary to ask whether surprising facts are so surprising. Brazil has been subjected to American spying to the point that current Brazilian President, Dilma Rousseff’s phone was allegedly tapped into by the National Security Agency (NSA). Brazil’s dissatisfaction with such a practice did not take long to be made public.

However, it will be as surprising as the spying itself to learn that the Brazilian government actually hosts an American Spy Base right in the heart of the country in its capital city Brasilia.

According to a recent report published by RT.com, whose main focus is the refusal to allow Germany to join the Five Eyes (the United States, Canada, Britain, Australia, and New Zealand), a group of five nations that actively spy on behalf of the US government, Brazil is part of a network of countries that allows the presence of a US base whose purpose is to expand the spying apparatus of the American government.

The NSA network of Spy Bases is spread all over the globe. The US government and more specifically, the NSA, negotiates different agreements with different countries and separates groups of countries into three tiers.

The first tier is composed by the Five Eyes, which provide ‘Complete Cooperation’ with the NSA.

The second tier is said to be on ‘Focused Cooperation’ and includes a total of 20 nations.

“The third tier group of ‘Limited cooperation’ consists of countries such as France, Israel, India and Pakistan. Finally, the fourth group is about ‘Exceptional Cooperation’ with countries that the US considers to be hostile to its interests,” reports Electrospaces.net.

Many of the sites where NSA Bases are located also have second and third purposes. For example, they serve as bases of operations for the Central Intelligence Agency (CIA), Cable Access locations, Third Party Liaisons and Regional Centers, among others. The CSC Spy Base that operates in Brasilia, is what it’s called a Computer Network Exploitation or CNE.

NSA global interception network map. (Image: Electrospaces.net)

NSA global interception network map. Click image to enlarge. (Image: Electrospaces.net)

Locations such as the one in Brasilia is the type where the NSA set up about 50,000 implants in computer networks as part of its Computer Network Exploitation operations.

“These operations are conducted by NSA’s highly specialized and secretive Tailored Access Operations (TAO) division,” reports Electrospaces.net.

“From the Snowden-leaks we know that Tailored Access Operations uses a wide variety of sophisticated hacking tools to gain access to foreign computer networks.

For example, they operate a network of secret internet servers, codenamed FOXACID, which is used to attract the traffic of targets, in order to install spying software on their computers”.

Second Party Sites include places the like CARBOY, Bude (Great Britain), SOUNDER, Ayios Nikolaos (Cyprus), – SNICK, near Seeb (Oman), SCAPEL, Nairobi (Kenya), STELLAR, Geraldton (Australia), SHOAL BAY, Darwin (Australia), IRONSAND, New Zealand. Less known sites include CORALINE – Sabena Seca (Puerto Rico), GARLICK Bad Aibling (Germany), SCAPEL – Nairobi (Kenya), and SHOAL BAY – Darwin (Australia).

Luis R. Miranda is an award-winning journalist and the founder and editor-in-chief at The Real Agenda. His career spans over 18 years and almost every form of news media. His articles include subjects such as environmentalism, Agenda 21, climate change, geopolitics, globalisation, health, vaccines, food safety, corporate control of governments, immigration and banking cartels, among others. Luis has worked as a news reporter, on-air personality for Live and Live-to-tape news programs. He has also worked as a script writer, producer and co-producer on broadcast news. Read more about Luis.

Face Recognition, License Plate Tracking Camera Disappears After Journalists Ask US Postal Service About It


By: PrivacySOS.org -

Apparently the Post Office police maintain their own secret spy budget. Fox News’ Denver affiliate reports on what happened after a customer at a Denver post office noticed a strange looking utility box, and the journalists looked into it:

Within an hour of FOX31 Denver discovering a hidden camera, which was positioned to capture and record the license plates and facial features of customers leaving a Golden Post Office, the device was ripped from the ground and disappeared.

FOX31 Denver investigative reporter Chris Halsne confirmed the hidden camera and recorder is owned and operated by the United State Postal Inspection Service, the law enforcement branch of the U.S. Postal Service.

The recording device appeared to be tripped by any vehicle leaving the property on Johnson Road, but the lens was not positioned to capture images of the front door, employee entrance, or loading dock areas of the post office.

According to Fox Denver, the managers of the post office in question denied knowledge of the device. While a federal postal police employee told the reporters that its officials “do not engage in routine or random surveillance,” and only use deploy cameras for “law enforcement or security purposes” or criminal investigations, the journalists were unable to find any criminal warrant applications describing the placement of a face recognition and license plate tracking camera in Denver.

After filing “multiple Freedom of Information Act requests with the Postal Service, Postal Inspection Service, and Office of the Inspector General,” reporters found that these agencies apparently maintain no written policies to govern how and why cameras like this one might be deployed, or the data from them used.

In July 2013, the New York Times revealed the existence of a possibly unconstitutional ‘mail covers’ program at the Postal Service. A 2014 Inspector General report showed that the US Postal Service received nearly 50,000 law enforcement requests to monitor mail in 2013. The ACLU’s Jameel Jaffer told Newshour that this warrantless surveillance was “yet another reminder” that there aren’t enough rules limiting snooping powers, and that those that exist are insufficiently enforced. “When a targeted surveillance tool is used on this scale, the distinction between targeted and dragnet surveillance begins to seem academic,” he said.


7 Creepy Robots Used By The Police State (VIDEO)

robots for cops

Cops use robots to defuse bombs, confront barricaded suspects and rescue victims during disasters. But they also use robots that can see, record and track what you are doing all day long. If you aren’t paranoid by the thought of cops knowing your business, watch as Reason TV counts down 7 Creepy Robots for Cops.


Drones Now Collecting Your Mobile Data To Create Targeted Ads: “With Drones, It Becomes So Much Easier”

drone mobile device tracking for ads

By: Mac Slavo | SHTFplan.com -

It seems that the NSA, the feds and law enforcement aren’t the only ones monitoring cell phone data and mobile devices.

The Ad companies are in on it, too – and are now using drones to spy, err.. track, err… keep pace with consumers.

Here’s what Venture Beat is reporting about the new drone fleet operating in the L.A. area:

It was only a matter of time before drones started monitoring signals from mobile devices.

Since early February, several small drones flying around the San Fernando Valley in Los Angeles have been determining mobile devices’ locations from Wi-Fi and cellular transmission signals.

They are part of an experiment by Singapore-based location marketing firm Adnear, which has offices around the world.

For now, this company (and likely other competitors) are “testing location mapping” to quantify which areas are most heavily trafficked, and thus hold the best potential for profit.

In the long term, the intent is to use this data to deliver real-time targeted ads at consumers to draw them into nearby business – perhaps ones they walk past but never shop in – or to special products and sales. It might go something like this:

“Let’s say someone is walking near a coffee shop,” Kataria said by way of example.

The coffee shop may want to offer in-app ads or discount coupons to people who often walk by but don’t enter, as well as to frequent patrons when they are elsewhere. Adnear’s client would be the coffee shop or other retailers who want to entice passersby.

The entire affair is very much like Minority Report, where personalized ads are delivered straight to the consumer with the help of all your personal data, demographic profile and shopping habits. The result is customized pitches based on your location and interests.

For some, that is progress. For most others, it’s an invasion of privacy on nightmarish levels.

Click to report a drone sighting.

drone patrol the sleuth journal


Media Blackout On US ‘Smart Grid Deployment’


Over the past several years a conspiracy of silence has surrounded the implementation of the Smart Grid across the United States, perhaps with good reason. If the public was aware of what lay behind this agenda there would likely be considerable outcry and resistance.

“Smart meters”–the principal nodes of the Smart Grid network–are being installed on homes and businesses by power utilities across the United States under the legal and fiscal direction of the United States government. In December 2007 both houses of the US Congress passed and President George W. Bush signed into law the Energy Independence and Security Act (EISA).

This 310-page piece of legislation employs the dubious science of anthropogenic CO2-based climate change science to mandate an array of policies, such as fuel efficiency standards for vehicles and “green” energy initiatives. Tucked away in the final pages of this law is the description and de facto mandate for national implementation of the Smart Grid that the Bush administration promised would result in “some of the largest CO2 emission cuts in our nation’s history.”[1]

The bill unambiguously lays out the design and intent behind the Smart Grid, including surveillance, tiered energy pricing, and energy rationing for all US households and businesses through round-the-clock monitoring of RFID-chipped “Energy Star” appliances.[2] Congress and “other stakeholders” (presumably for-profit utilities and an array of Smart Grid technology patent holders[3] whose lobbyists co-wrote the legislation) describe the Smart Grid’s characteristics and goals via ten provisions.

(1) Increased use of digital information and controls technology to improve reliability, security, and efficiency of the electric grid.
(2) Dynamic optimization of grid operations and resources with full cyber-security.
(3) Deployment[4] and integration of distributed resources and generation, including renewable resources.
(4) Development and incorporation of demand response, demand-side resources, and energy efficiency resources.
(5) Deployment of “smart” technologies (real-time, automated, interactive technologies that optimize the physical operation of appliances and consumer devices) for metering, communications concerning grid operations and status, and distribution automation.
(6) Integration of “smart” appliances and consumer devices.
(7) Deployment and integration of advanced electricity storage and peak-shaving technologies, including plug-in electric and hybrid electric vehicles, and thermal-storage air conditioning.
(8) Provision to consumers of timely information and control operations.
(9) Development of standards for communication and interoperability of appliances and equipment connected to the electric grid, including the infrastructure serving the grid.
(10) Identification and lowering of unreasonable or unnecessary barriers to adoption of smart grid technologies, practices, and services [emphases added].[5]

Less than two years after EISA’s enactment President Barack Obama directed $3.4 billion of the American Reinvestment and Recovery Act to Smart Grid development. Matching funds from the energy industry brought the total initial Smart Grid investment to $8 billion.[6] The overall completion of the Smart Grid will cost another $330 billion.[7] Today a majority of energy delivery throughout the US is routed to homes equipped with smart meters that monitor power consumption on a minute-to-minute basis.

As noted, the American public remains largely unaware of the numerous designs and monied interests behind the Smart Grid–not to mention how smart meters themselves pose substantial dangers to human health and privacy. This is because the plan for tiered energy pricing via wireless monitoring of household appliances has been almost entirely excluded from news media coverage since the EISA became law on December 19, 2007.

A LexisNexis search of US print news outlets for “Energy Independence and Security Act” and “Smart Grid” between the dates December 1, 2007 to January 31, 2008 yields virtually no results.

An identical LexisNexis search of such media for the dates December 1, 2007 to February 18, 2015 retrieves a total 11 print news items appearing in US dailies (seven in McClatchey Tribune papers; one article appearing in each of the following: New York Times 8/14/08, Santa Fe New Mexican, 5/12/09, Providence Journal, 2/24/11, Tampa Bay Times, 12/13/12).[8]

Even this scant reportage scarcely begins to examine the implications of the EISA’s Smart Grid plan. The New York Times chose to confine its coverage to a 364-word article, “The 8th Annual Year in Ideas; Smart Grids.” “It’s a response to what economists would call a tragedy of the commons,” the Times explains.

[P]eople use as much energy as they are willing to pay for, without giving any thought to how their use affects the overall amount of energy available … Enter Xcel’s $100 million initiative, called SmartGridCity, a set of technologies that give both energy providers and their customers more control over power consumption … Consumers, through a Web-enabled control panel in their homes, are able to regulate their energy consumption more closely — for example, setting their A.C. system to automatically reduce power use during peak hours.[9]

News in far more modest papers likewise resembles the promotional materials distributed by the utilities themselves. “There will soon be a time when homeowners can save electricity by having appliances automatically adjust power for peak-demand times and other periods of inactivity by a signal sent through the electrical outlet,” an article in Sunbury Pennsylvania’s Daily Item reads. “‘Right now, it’s at the infant stage,’” a power company executive observes. “‘We didn’t worry about this until two years ago. Nobody cared when electricity was five cents per kilowatt hour. People just bit the bullet and paid the bill.’”[10]

Smart Grid Czar Patricia Hoffman

Smart Grid Czar Patricia Hoffman

Along these lines, the Department of Energy’s Assistant Secretary for the Office of Electricity Delivery and Energy Reliability Patricia Hoffman, is charged under the EISA with federal oversight of nationwide Smart Grid implementation. In other words, Hoffman is America’s “Smart Grid Czar.” Yet despite heading up such a dubious program since 2010, she has almost entirely escaped journalistic scrutiny, having been referenced or quoted in only four US daily papers (Washington Post, 2/8/12, St. Paul Pioneer Press, 4/26/12, Palm Beach Post, 5/12/13, Pittsburgh Tribune Review 11/13/13) since her tenure began.

In an era where news media wax rhapsodic over new technologies and fall over each other to report consumer-oriented “news you can use,” the Smart Grid’s pending debut should be a major story. It’s not. Indeed, almost the entire US population remains in the dark about this major technological development that will profoundly impact their lives.

When one more closely examines the implications and realities of the federally-approved Smart Grid scheme—from the adverse health effects of electromagnetic radiation to surveillance and energy rationing—there should be little wonder why this degree of silence surrounds its implementation. Such a technocratic system would never be freely accepted if subject to an open exchange and referendum.


[1] “Fact Sheet: Energy Independence and Security Act of 2007,” whitehouse.gov, December 19, 2007.

[2] “ENERGY STAR is a U.S. Environmental Protection Agency (EPA) voluntary program that helps businesses and individuals save money and protect our climate through superior energy efficiency. The ENERGY STAR program was established by EPA in 1992, under the authority of the Clean Air Act Section 103(g).” http://www.energystar.gov/about

[3] Jeff St. John, “Who’s Got the Most Smart Grid Patents?greentechmedia.com, August 5, 2014.

[4] The word “deployment,” commonly used in government and technical plans for the Smart Grid’s launch, is a military term. From the Latin displicāre, “to scatter,” the modern definition is “[t]o distribute (persons or forces) systematically or strategically.”

[5] Public Law 110-140, Energy Independence and Security Act of 2007, Title XIII, Section 1301, Washington DC: United States Congress, December 19,2007.

[6] “President Obama Announces $3.4 Billion Investment to Spur Transition to Smart Energy Grid,” energy.gov, October 27, 2009.

[7] Jon Chavez, “Expert Sees $2 Trillion Benefit For Country in Smart Grid,” Toledo Blade, January 16 2013.

[8] In contrast, seven times as many articles (78) appeared in law journals over the same seven year period.

[9] Clay Risen, “”The 8th Annual Year in Ideas; Smart Grids,” New York Times, December 14, 2008.

[10] Jaime North, “Devices Will Soon Monitor Themselves,” Daily Item, October 4, 2008.

Professor James F. Tracy is an Associate Professor of Media Studies at Florida Atlantic University. James Tracy’s work on media history, politics and culture has appeared in a wide variety of academic journals, edited volumes, and alternative news and opinion outlets. James is editor of Union for Democratic Communication’s Journal Democratic Communiqué and a contributor to Project Censored’s forthcoming publication Censored 2013: The Top Censored Stories and Media Analysis of 2011-2012. Additional writings and information are accessible at memoryholeblog.com.

Goodbye U.S.S.R And Hello U.S.S.A. (VIDEO)


“If You Have Nothing To Hide You Have Nothing to Fear”, said once Joseph Goebbels, former Nazi Minister of Propaganda. We all know what happened while the Nazis and their American collaborators were in power. Yet, the quote cited above is exactly what the handlers of the U.S.S.A. use to justify its existence.

The same quote was used by William Hague and pretty much every other law enforcement official who believes in the need to have a worldwide Surveillance State. Even lay people who are interviewed on the streets of America and Europe often repeat the words of the former Nazi Propaganda Minister.

However, since not everyone agrees with Goebbels, many politicians and bureaucrats need to create reason for them to believe. The best reasons to make people believe what would be otherwise un-believable, is the typical ‘little known outside threat’ and the premise is always the same: we all need to surrender something we hold dear in order to do away with the threat.

For instance, in spite of what many western politicians say about Russia and how its actions supposedly resemble the U.S.S.R., the fact is that Russia is not the USSR. It is not even close to it being the U.S.S.R..

Ad-hominem attacks on Russia and its leaders, of whom I am not a fan of, are attempts to distract people from a greater global threat: the U.S.S.A..

The U.S.S.A. has been in the works for decades and its power has been expanded based on false premises, such as the Russian menace, the ISIS threat or the Al-Qaeda rising tide of global terrorism.

The United Surveillance States of America (U.S.S.A.) and its branches in Europe, Asia and Oceania are the threat we have all been distracted from by way of unfounded fear, misinformation, propaganda and outright ignorance.

This entity is not only charged with spying on billions of people worldwide, but also with carrying out offensive cyber attacks on infrastructure at home and abroad.

It collects billions of bytes of metadata whose associated content is later used, when possible, as a tool to blackmail anyone who may become an obstacle to the advancement of the U.S.S.A..

The U.S.S.A. is not only composed by American and allied monitoring agencies, but also by global communication networks and media conglomerates that, either voluntarily or by way of force (inter-connectedness, built-in back doors, direct and indirect threats, etc) serve as bridges to the larger U.S.S.A. infrastructure to capture, filter and direct information on everything and everyone that is somehow making use of digital resources almost anywhere on the planet.

Although much of the blame on the existence and operation of the United Surveillance States of America has been rightfully placed on the United States National Security Agency (NSA), as its name describes it, the existence of such a massive surveillance infrastructure would not be possible without the collaboration of similar entities in Europe, Asia and Oceania, to cite a few.

It is true, America is the central command of the U.S.S.A., but this globally operating multi-headed cyber beast could not do the work it does without the collaboration of partner organizations in other parts of the world.

Recently, a documentary titled “America’s Surveillance State”, whose content is based on declassified and leaked documents as well as testimony from former ‘intelligence gatherers’ such as Thomas Drake, Russ Tice and Edward Snowden, unveiled details about the strength and reach of the U.S.S.A. and how, despite political rhetoric from seating presidents and congressmen about its despotic existence, it continues to grow out of control.

The following is the six part documentary which shows how the U.S.S.A and not the U.S.S.R. is the most significant threat to all of us. This is so not only because it is out there sniffing it all, but also because people have become accustomed to it. It is part of their lives and most of them do not even see it as an inconvenience, much less as a threat.

Luis R. Miranda is an award-winning journalist and the founder and editor-in-chief at The Real Agenda. His career spans over 18 years and almost every form of news media. His articles include subjects such as environmentalism, Agenda 21, climate change, geopolitics, globalisation, health, vaccines, food safety, corporate control of governments, immigration and banking cartels, among others. Luis has worked as a news reporter, on-air personality for Live and Live-to-tape news programs. He has also worked as a script writer, producer and co-producer on broadcast news. Read more about Luis.


64 Percent Of News Reporters Believe That Obama Is Spying On Them

U.S. President Barack Obama visits Mooresville Middle School in North Carolina

Is it okay for Barack Obama to spy on reporters?  Is it okay for government spooks to record their calls, monitor their online activity and collect their emails whenever they want?  Well, according to a shocking new poll conducted by Pew Research, 64 percent of investigative journalists believe that the government is already collecting data from them right now.  Sadly, very few of them are publicly voicing objections.  We are rapidly becoming the type of “Big Brother” society that George Orwell once wrote about, and most Americans are just going along for the ride.  One journalist that is making waves is former CBS News reporter Sharyl Attkisson.  In her new book entitled Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington, she claims that she has evidence that the government remotely activated her computer numerous times, monitored her keystrokes and even buried incriminating documents very deeply on her hard drive.  She has filed a lawsuit, and hopefully this will result in the public shaming of those involved in this spying.  With each passing day, we are becoming a little bit more like Nazi Germany, and if we continue down this road America will eventually be completely transformed into a totalitarian hellhole.

Have we really gotten to the point where virtually everyone knows that the government is spying on them but we just accept it as a fact of life?

How in the world can we have “freedom of the press” if the government is constantly looking over the shoulders of journalists?

When I first learned about this shocking new survey of journalists that I mentioned above, I was absolutely stunned…

In a survey of investigative reporters that makes Richard Nixon’s enemies list look like child’s play, nearly seven in 10 said they believe that the Obama administration has spied on their phone calls, emails and online searches.

According to a Pew Research Center survey of 454 media figures, 64 percent “believe that the U.S. government has probably collected data” from their calls and email and eight in 10 believe just being a journalist jumps the chance Uncle Sam is spying on them.

The survey follows multiple reports of actual spying by federal officials on reporters, and the White House’s effort to track down those who leak information to reporters despite long-forgotten promises to be the most transparent administration ever.


As a nation, are we going to put up with this kind of thing?

Or could it be that we are already so whipped into submission that we are incapable of even objecting to Big Brother?

Our control freak politicians wish to monitor and control every area of our lives.  One of the latest areas where there is a renewed push for control is vaccines.  A recent outbreak of measles has lawmakers all over the nation in a rush to make vaccinations mandatory.

In the state of California, for example, new legislation would eliminate all exemptions from vaccination…

Responding to an outbreak of measles that has infected more than 100 people, two California lawmakers said on Wednesday they would introduce legislation to end the right of parents in the state to exempt their children from school vaccinations based on personal beliefs.

This is being done even though it is indisputable that far more children die from the MMR vaccine than die from the measles.  The following numbers come from a recent article by Dr. Lee Hieb

1. Since 2005 (and even before that), there have been no deaths in the U.S. from measles, but there have been 86 deaths from MMR vaccine – 68 of them in children under 3 years old. And there were nearly 2,000 disabled.

2. In countries which use BCG vaccinations against tuberculosis, the incidence of Type I diabetes in children under 14 is nearly double. (“Infectious Disease in Clinical Practice” no. 6 pages 449-454, 1997)

3. As reported in Lancet in 1995, inflammatory bowel disease (i.e. Crohn’s and ulcerative colitis) is 13 times more prevalent in persons vaccinated for measles.

4. In a nested case-control study within the General Practice Research Database (GPRD) in the United Kingdom, patients who had a first MS (Multiple Sclerosis) diagnosis recorded were compared with controls. The authors concluded that immunization with the recombinant hepatitis B vaccine is associated with a threefold increased risk of developing MS (Hernan et al., 2004). No increased risk of MS was associated with other vaccines, which included tetanus and influenza vaccinations.

5. In 1982 William Torch, a prolific researcher and publisher on Neurologic topics, presented a paper (later published) at the American Academy of Neurology reviewing SIDS deaths. He reported that in 100 consecutive cases, 70 percent of SIDS deaths occurred within three weeks of pertussis vaccination.

Over the years, countless numbers of children have been killed or permanently disabled by vaccines.  At this point, more than 3 billion dollars has been paid out to the victims.

But you never hear about any of this on CNN or MSNBC, do you?

And once they force everyone to receive their vaccines, Dr. Hieb wonders what is next

If you think the government has the right to forcibly vaccinate people – for the good of society – what is to prevent them from forcibly sterilizing people, or forcibly euthanizing people, or forcibly implanting a tracking device – for the good of society?

If you think that forcible sterilization would never happen, you are wrong.

In fact, it is already happening in the UK

A mother of six with an IQ of 70 should be sterilised for her own safety, the Court of Protection has ruled.

The Court heard that a further pregnancy would be a “significantly life-threatening event” for both the mother and child.

Mr Justice Cobb said the woman had the “same human rights” as everyone else and this was not a case of “eugenics”.

He has authorised health and council services to intervene and perform the sterilisation.

This is where our society is heading.

We are becoming a society where the government is god, and where all of our life decisions are made for us by control freaks that believe that they know better than everyone else.

Unfortunately, we are so addicted to the things that are entertaining us that most of us never even bother to notice what is happening to our society.  I found the following news story earlier today, and I thought that it was a great metaphor for what is happening to us as a nation.

The mother of three young children found abandoned and locked inside a Washington home has admitted to using meth and told the court she is pregnant with a fifth child.

Amanda Foley and Mark Dorson, both 33, were arrested this week after their children were found on Saturday alone locked in a filthy run-down Lake Stevens house, starving and shivering in 40-degree temperatures.

The children, aged seven, three, and 11 months, were living ‘among animal feces and human excrement’, according to court documents.

Just like that young mother, we are so addicted to entertainment that we can’t even see what is happening to the future of this country.

Most of us would live in our own filth until it piled up to the ceiling as long as we were being entertained.

Meanwhile, everything that this country is supposed to stand for is being destroyed.

Wake up America.

Michael T. Snyder is a graduate of the McIntire School of Commerce at the University of Virginia and has a law degree and an LLM from the University of Florida Law School. He is an attorney that has worked for some of the largest and most prominent law firms in Washington D.C. and who now spends his time researching and writing and trying to wake the American people up. You can follow his work on The Economic Collapse blog, End of the American Dream and The Truth Wins. His new novel entitled “The Beginning Of The End” is now available on Amazon.com.


Internet Of Things And Smart Grid To Fully Eviscerate Privacy


The “Internet of Things” (IoT) and Smart Grid technologies will together be aggressively integrated into the developed world’s socioeconomic fabric with little-if-any public or governmental oversight. This is the overall opinion of a new report by the Federal Trade Commission, which has announced a series of “recommendations” to major utility companies and transnational corporations heavily invested in the IoT and Smart Grid, suggesting that such technologies should be rolled out almost entirely on the basis of “free market” principles so as not to stifle “innovation.”[1]

As with other overfunded and unelected bureaucracies, such as the Food and Drug Administration and the Environmental Protection Agency, the FTC functions to provide the semblance of democratic governance and studied concern as it allows corporate monied interests and prerogatives to run roughshod over the body politic.

The IoT refers to all digital electronic and RFID-chipped devices wirelessly connected to the internet. The number of such items has increased dramatically since the early 2000s. In 2003 an estimated 500 million gadgets were connected, or about one for every twelve people on earth. By 2015 the number has grown 50 fold to an estimated 25 billion, or 3.5 units per person. By 2020 the IoT is expected to double the number of physical items it encompasses to 50 billion, or roughly 7 per individual.[2]

The IoT is developing in tandem with the “Smart Grid,” comprised of tens of millions of wireless transceivers (a combination cellular transmitter and receiver) more commonly known as “smart meters.” Unlike conventional wireless routers, smart meters are regarded as such because they are equipped to capture, store, and transmit an abundance of data on home energy usage with a degree of precision scarcely imagined by utility customers. On the contrary, energy consumers are typically appeased with persuasive promotional materials from their power company explaining how smart meter technology allows patrons to better monitor and control their energy usage.

Almost two decades ago media sociologist Rick Crawford defined Smart Grid technology as “real time residential power line surveillance” (RRPLS). These practices exhibited all the characteristics of eavesdropping and more. “Whereas primitive forms of power monitoring merely sampled one data point per month by checking the cumulative reading on the residential power meter,” Crawford explains,

modern forms of RRPLS permit nearly continued digital sampling. This allows watchers to develop a fine-grained profile of the occupants’ electrical appliance usage. The computerized RRPLS device may be placed on-site with the occupants’ knowledge and assent, or it may be hidden outside and surreptitiously attached to the power line feeding into the residence.

This device records a log of both resistive power levels and reactive loads as a function of time. The RRPLS device can extract characteristic appliance “signatures” from the raw data. For example, existing [1990s] RRPLS devices can identify whenever the sheets are thrown back from a water bed by detecting the duty cycles of the water bed heater. RRPLS can infer that two people shared a shower by noting an unusually heavy load on the electric water heater and that two uses of the hair dryer followed.[3]

A majority of utility companies are reluctant to acknowledge the profoundly advanced capabilities of these mechanisms that have now been effectively mandated for residential and business clients. Along these lines, when confronted with questions on whether the devices are able to gather usage data with such exactitude, company representatives are apparently compelled to feign ignorance or demur.

i210Yet the features Crawford describes and their assimilation with the IoT are indeed a part of General Electric’s I-210+C smart meter, among the most widely-deployed models in the US. This meter is equipped with not one, not two, but three transceivers, the I-210+C’s promotional brochure explains.[4]

One of the set’s transceivers uses ZigBee Pro protocols, “one of several wireless communication standards in the works to link up appliances, light bulbs, security systems, thermostats and other equipment in home and enterprises.”[5] With most every new appliance now required to be IoT-equipped, not only will consumer habits be increasingly monitored through energy usage, but over the longer term lifestyle and thus behavior will be transformed through power rationing, first in the form of “tiered usage,” and eventually in a less accommodating way through the remote control of “smart” appliances during peak hours.[6]

Information gathered from the combined IoT and Smart Grid will also be of immense value to marketers that up to now have basically been excluded from the domestic sphere. As an affiliate of WPP Pic., the world’s biggest ad agency put it, the data harvested by smart meters “opens the door to the home. Consumers are leaving a digital footprint that opens the door to their online habits and to their shopping habits and their location, and the last thing that is understood is the home, because at the moment when you shut the door, that’s it.”[7]

esAs the FTC’s 2015 report makes clear, this is the sort of retail (permissible) criminality hastened by the merging of Smart Grid and IoT technologies also provides an immense facility for wholesale criminals to scan and monitor various households’ activities as potential targets for robbery, or worse.

The FTC, utility companies and smart meter manufacturers alike still defer to the Federal Communications Commission as confirmation of the alleged safety of Smart Grid and smart meter deployment. This is the case even though the FCC is not chartered to oversee public health and, basing its regulatory procedure on severely outdated science, maintains that microwave radiation is not a threat to public health so long as no individual’s skin or flesh have risen in temperature.

Yet in the home and workplace the profusion of wireless technologies such as ZigBee will compound the already significant collective radiation load of WiFi, cellular telephony, and the smart meter’s routine transmissions. The short term physiological impact will likely include weakened immunity, fatigue, and insomnia that can hasten terminal illnesses.[8]

Perhaps the greatest irony is how the Internet of Things, the Smart Grid and their attendant “Smart Home” are sold under the guise of convenience, personal autonomy, even knowledge production and wisdom. “The more data that is created,” Cisco gushes, “the more knowledge and wisdom people can obtain. IoT dramatically increases the amount of data available for us to process. This, coupled with the Internet’s ability to communicate this data, will enable people to advance even further.”[9]

In light of the grave privacy and health-related concerns posed by this techno tsunami, the members of a sane society might seriously ask themselves exactly where they are advancing, or being compelled to advance to.


[1] Federal Trade Commission, Internet of Things: Privacy and Security in a Connected World, Washington DC, January 2015. Accessible at http://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf

[2] Dave Evans, “The Internet of Things: How the Next Evolution of the Internet is Changing Everything, Cisco Internet Business Solutions Group, April 2011, 3. Accessible at http://www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf

[3] Rick Crawford, “Computer Assisted Crises,” in George Gerbner, Hamid Mowlana and Herbert I. Schiller (eds.) Invisible Crises: What Conglomerate Control of Media Means for American and the World, Boulder CO: Westview Press, 1996, 47-81.

[4] “I-210+C with Silver Spring Networks Micro-AP” [Brochure], General Electric, Atlanta Georgia. Accessible at http://www.gedigitalenergy.com/app/Resources.aspx?prod=i210_family&type=1

[5] Stephen Lawson, “ZigBee 3.0 Promises One Smart Home Standard for Many Uses,” pcworld.com, November 16, 2014.

[6] One of the United States’ largest utilities, Pacific Gas & Electric, has already introduced tiered pricing to curb energy usage in summer months during “high demand” times of the day. http://www.pge.com/en/myhome/saveenergymoney/plans/smartrate/index.page

[7] Louise Downing, “WPP Unit, Onzo Study Harvesting Smart-Meter Data,” Bloomberg.com, May 11, 2014.

[8] Sue Kovach, “The Hidden Dangers of Cellphone Radiation,” Life Extension Magazine, August 2007; James F. Tracy, “Looming Health Crisis: Wireless Technology and the Toxification of America,” GlobalResearch.ca, July 8, 2012.

[9] Evans, 6.

Professor James F. Tracy is an Associate Professor of Media Studies at Florida Atlantic University. James Tracy’s work on media history, politics and culture has appeared in a wide variety of academic journals, edited volumes, and alternative news and opinion outlets. James is editor of Union for Democratic Communication’s Journal Democratic Communiqué and a contributor to Project Censored’s forthcoming publication Censored 2013: The Top Censored Stories and Media Analysis of 2011-2012. Additional writings and information are accessible at memoryholeblog.com.


A 600,000 Cubic Foot Blimp May Be Spying On You


By: Ted Baumann | The Sovereign Investor -

In the summer of 1849, Austrian Field Marshall Joseph Radetzky did something no one had done before: He bombed a city from the air.

His target was Venice, then in rebellion against the Habsburg crown. During the siege, he launched a fleet of unmanned linen balloons, carrying bombs made from canister shot and gunpowder, timed to drop over the besieged city.

Radetzky told Emperor Franz Joseph that the effect on the people of Venice was “frightful.” Indeed, Radetzky’s balloons had done little physical damage, but had a substantial effect on the morale of the city’s defenders. As the 19th century wore on, fear of attack by airships became a constant theme in popular literature. By World War I, the mere mention of the word “Zeppelin” was enough to cause panic in the streets of London.

A prevailing theme in the literature of the era and the minds of the people was that these aerial monsters would always be deployed by one’s enemies. So it says a lot about the current atmosphere in the U.S. that the overwhelming public reaction to the deployment of massive Army blimps over Interstate 95 in Maryland has been fear and rejection….

Government Surveillance: From Zeppelin to JLENS

The blimps launched just outside Baltimore in December — known as Joint Land Attack Cruise Missile Defense Elevated Netted Sensor Systems (JLENS) — are the largest ever sent aloft. At 80 yards long with a total volume of around 600,000 cubic feet, they’re the size of three Goodyear blimps. They will float at 10,000 feet, about one-third as high as an airliner. They’re also expensive. The two prototype airships have cost almost $3 billion so far.

Officially, the blimps will deploy a sophisticated radar system that can spot and track aircraft, missiles, ships or even ground vehicles in a circular area, ranging from New York to North Carolina and from halfway to Bermuda to the Ohio Valley. They are meant to replace the Air Force radar planes currently used for this purpose.

But JLENS isn’t technically limited to radar. If equipped with high-resolution cameras, they can see and record everything for miles, in extraordinary detail. In Kabul, for example, residents are used to seeing the U.S. military’s tethered blimp — called the Persistent Ground Surveillance system — hovering above the city, capturing video of daily life below.

Blimps are ideal platforms for mass surveillance. As Ginger McCall, associate director of the Electronic Privacy Information Center (EPIC), says, “There’s something inherently suspect for the public to look up in the sky and see this surveillance device hanging there. It’s the definition of persistent surveillance.” Not only can the blimps potentially see everything you’re doing — they can be seen seeing you. That speaks volumes.

Like Radetzky’s balloons and Count von Zeppelin’s dirigibles, the main effect of the big blimps will be psychological. As Ed Herlik, a former Air Force officer and technology analyst, explains: “If you put a camera in a sky over an area where you expect a lot of unrest, the area will calm down.”

Stay Calm, but Get Ready to Go

Does the U.S. government expect unrest in an area the size of Texas centered on Washington, D.C.? If our rulers are smart, they should.

They incur debt on our behalf at a terrific rate. They use those borrowings to increase their capacity to monitor and control us, and to undertake ruinous foreign wars. They indulge in wholesale corruption, sanitized as “campaign finance.” And they resolutely refuse to listen to the wishes of the majority of Americans, who don’t want any of these things.

As we advise our Freedom Alliance members, you can expect a lower level of public service and amenities in countries that aren’t as rich as the U.S. The upside is that the governments of those countries also can’t afford to spend $3 billion on massive surveillance blimps parked atop their capital cities, even if they wanted to.

From where I stand, our slide towards a corrupt, oligarchic U.S. society, held in check by mass technological surveillance and unaccountable bureaucracy, is well under way. It’s not a theoretical issue anymore — and neither is the need to do something about it.

Don’t put all your eggs in one basket. Begin making steps to establish second residency in another country, and start preparing for a life elsewhere … where there aren’t any blimps hovering overhead.

Ted Baumann is an Offshore and Asset Protection Editor who joined The Sovereign Society in 2013. As an expat who lived in South Africa for 25 years, Ted specializes in asset protection and international migration. He is the editor of Offshore Confidential and Plan B Club. His writing is featured at The Sovereign Investor, where this article first appeared. For more information about how to protect your assets, please visit here.


New Police Radars Can ‘See’ Inside Homes

police radars

At least 50 U.S. law enforcement agencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance.

Those agencies, including the FBI and the U.S. Marshals Service, began deploying the radar systems more than two years ago with little notice to the courts and no public disclosure of when or how they would be used. The technology raises legal and privacy issues because the U.S. Supreme Court has said officers generally cannot use high-tech sensors to tell them about the inside of a person’s house without first obtaining a search warrant.

The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. They can detect whether anyone is inside of a house, where they are and whether they are moving.

Read full article

New NSA Power-Grab To “Fight” Terrorism

The United States, Russia, China and all other members of the G7 have been spying on themselves and on everyone else for years, even before Edward Snowden leaked it to the public.
Although it may be tricky to find the exact birth date of the Surveillance State we know it was a gradual process. It was brought upon us all by means of convenience and even more gradually through fear.
As philosophers had warned, the third world war would not be necessarily a battle of firepower, but a fight between those who intend to provide information and those who purposely counteract information with propaganda and disinformation.
That is where we are today.
The world is fighting an information guerrilla warfare between those who inform – mostly citizen journalists and some alternative media – and the military industrial complex, that controls the firepower, the media and the cyber world. The world in immersed in a hot information war that slowly but surely seems to be driving humanity towards the specter of nuclear war.Today because of a secret program launched and managed by the infamous and controversial National Security Agency (NSA) of the United States, GHCQ from the United Kingdom and the collaboration of western European countries along with Israel, Australia and New Zealand, the military and political establishments have a way to conceal an effective cyber army of spies, an exclusive group of guerrillas that are part of the operation named Tailored Access Operations or CAT.

The troop members of these guerrillas are solely dedicated to conducting missions in cyber space to manipulate and destroy enemy computers and their hard drives and to discover ultimately how we all think and how we make use of technology on the world wide web. Cyber security is not what the establishment would have us believe it is. It is a war between them and us.

The program leaked by Edward Snowden was launched eight years ago and it made it possible for governments to manage and devise strategies for fighting on the Internet, to spy on everyone who uses cyber space and to cripple communications from and to civilians as well as competing cyber forces from foreign nations. 

Their control is so immense, that they are able to interrupt and destroy complete computer networks that are in charge of controlling potable water, electricity , factories, airports and payment transactions. In sum, they can cripple a whole nation with a few key strokes.

The existence of this program was discovered by former NSA consultant, Edward Snowden, who made public thousands of documents summarizing the work of the NSA. Many of those documents have been dumped by major media outlets, as well as independent reporters including Der Spiegel, The Guardian and journalists like Glenn Greenwald.

The secret services are no longer only occupied with espionage. Edward Snowden documents show that they dominate Internet and are preparing for a major digital war. The weekly magazine reveals that digital spies are working in secret services that form the “Alliance of Five Eyes, composed by the United Kingdom, Canada, New Zealand, the United States and Australia.

The documents held by Snowden reveal the NSA is aware that the next great global conflict will begin on the Internet, a certainty that convinced the agency to request a substantial increase in its budget to reinforce itseld and to carry out offensive operations on covers designed to invade enemy computer networks.

The documents state that one of the most successful attacks by the NSA was using the Stuxnet virus to cripple Iran‘s atomic program. Another tool developed by cyber warriors at the NSA was the Regin virus, with which it tried to infiltrate the computer network of the German Foreign Ministry. The virus was also used to spy on the European Commission.

The NSA and its allies have also used cyber attacks that they have allegedly suffered to demand more power and more resources to benefit their spying programs worldwide which continue to Steal it All, as its motto says.

The team of experts from the NSA failed to detect the IP address in Asia, a trail that eventually led them to find the start of the attack on China. The counterattack was swift and successful. The spies managed to discover the outcome of the Chinese attack, but also discovered that China was responsible for an attack suffered by the United Nations.

The core of the NSA spies work under a Senate Law 321 that deals with the Remote Operation Center located at Fort Meade in Maryland, which occupies the third floor of one of the main buildings of the complex. This spying body sweeps the internet and gathers all information possible 24 hours a day.

The priority of the NSA are attacks and no defense” admitted Snowden in a recent interview, referring to the new strategy of the watchdog and when it can, ‘it attacks along with its allies from the group of the Five Eyes, all other countries that do not belong to that exclusive group of espionage, including Germany and Spain.

Luis Miranda is an award-winning journalist and the founder and editor-in-chief at The Real Agenda News. His career spans over 18 years and almost every form of news media. His articles include subjects such as environmentalism, Agenda 21, climate change, geopolitics, globalisation, health, vaccines, food safety, corporate control of governments, immigration and banking cartels, among others. Luis has worked as a news reporter, on-air personality for Live and Live-to-tape news programs. He has also worked as a script writer, producer and co-producer on broadcast news.


DARPA’s Autonomous Microdrones Designed To Patrol Inside Houses (VIDEOS)


By: Nicholas West | Techswarm -

As drone expert, P.W. Singer said, “At this point, it doesn’t really matter if you are against the technology, because it’s coming.” According to Singer, “The miniaturization of drones is where it really gets interesting. You can use these things anywhere, put them anyplace, and the target will never even know they’re being watched.”

This has been the promise that the Air Force made quite clear in their video early last year about nanodrone tech that you can see below. According to the USAF, Micro Air Vehicles (MAVs), combined with the ability to harvest energy, will enable insect-sized drone swarms to be dropped from military aircraft to stay aloft for a prolonged amount of time, offering a host of functions, including assassination.

DARPA is now announcing a new wave of these microdrones under the Fast Lightweight Autonomy program. As the name indicates, they ideally would like humans to be completely removed from the control process.

For now, they clearly state “overseas” as the theater of operation, but it doesn’t take much imagination to see how these microdrones could be applied in the U.S., especially amid an increasingly tense urban environment in the wake of confrontations with domestic police. And, as always, the tantalizing application in disaster relief paves the way for easy introduction.  

(My emphasis added in press release)


DARPA aims to give small unmanned aerial vehicles advanced perception and autonomy to rapidly search buildings or other cluttered environments without teleoperation.

Military teams patrolling dangerous urban environments overseas and rescue teams responding to disasters such as earthquakes or floods currently rely on remotely piloted unmanned aerial vehicles to provide a bird’s-eye view of the situation and spot threats that can’t be seen from the ground. But to know what’s going on inside an unstable building or a threatening indoor space often requires physical entry, which can put troops or civilian response teams in danger.

To address these challenges, DARPA issued a Broad Agency Announcement solicitation today for the Fast Lightweight Autonomy (FLA) program. FLA focuses on creating a new class of algorithms to enable small, unmanned aerial vehicles to quickly navigate a labyrinth of rooms, stairways and corridors or other obstacle-filled environments without a remote pilot. The solicitation is available here: http://go.usa.gov/MGWx

The program aims to develop and demonstrate autonomous UAVs small enough to fit through an open window and able to fly at speeds up to 20 meters per second (45 miles per hour)—while navigating within complex indoor spaces independent of communication with outside operators or sensors and without reliance on GPS waypoints.

“Birds of prey and flying insects exhibit the kinds of capabilities we want for small UAVs,” said Mark Micire, DARPA program manager. “Goshawks, for example, can fly very fast through a dense forest without smacking into a tree. Many insects, too, can dart and hover with incredible speed and precision. The goal of the FLA program is to explore non-traditional perception and autonomy methods that would give small UAVs the capacity to perform in a similar way, including an ability to easily navigate tight spaces at high speed and quickly recognize if it had already been in a room before.

If successful, the algorithms developed in the program could enhance unmanned system capabilities by reducing the amount of processing power, communications, and human intervention needed for low-level tasks, such as navigation around obstacles in a cluttered environment. The initial focus is on UAVs, but advances made through the FLA program could potentially be applied to ground, marine and underwater systems, which could be especially useful in GPS-degraded or denied environments.

“Urban and disaster relief operations would be obvious key beneficiaries, but applications for this technology could extend to a wide variety of missions using small and large unmanned systems linked together with manned platforms as a system of systems,” said Stefanie Tompkins, director of DARPA’s Defense Sciences Office. “By enabling unmanned systems to learn ‘muscle memory’ and perception for basic tasks like avoiding obstacles, it would relieve overload and stress on human operators so they can focus on supervising the systems and executing the larger mission.”

Since the focus of the program is improving perception and reducing dependence on external sources—as opposed to designing new small UAVs—DARPA will provide performers selected for the program with the same small UAV testbed as government-furnished equipment.

Source: DARPA


How Your Threat Matrix Score Could Land You On The Terminal “Red List”


Did you know that Daniel Freeman’s study published in the British Journal of Psychiatry found that paranoid thoughts are common among normally functioning people? In fact, the study concluded that some dose of paranoia is actually quite adaptive and can serve to keep us safe from danger. What is about to be presented in this article should make one paranoid for when one considers why governments in the West, particularly in the United States, spend billions of dollars to spy on our actions, words, Internet browsing habits, places visited and even our thoughts, we should all be looking under our beds.

The following represents a small cross-section of illegal government spying activities which are designed to do one thing: To determine whose thoughts and actions pose a threat to the newest totalitarian regime on the face of the Earth, the United States. Everything you say and do is being being cataloged and categorized and every American is receiving a threat matrix score similar to a credit rating. And where this is headed is worse than anything Orwell could have imagined.

“Every Move You Make, We’ll Be Watching You”

Civil rights activist, Daphne Lee told NBC News 3 that she is worried about her freedom as an American citizen. “This technology, you know is taking us to a place where, you know, you’ll essentially be monitored from the moment you leave your home till the moment you get home”. What is Ms. Lee talking about?


They look like ordinary streetlights, shining down on Las Vegas, but these streetlights have special capabilities that have aware and informed citizens up in arms.

This year, the city of Las Vegas, NV., is completing a project that it began last year and it has average citizens screaming constitutional foul play. However, these streetlights have capabilities far beyond anything the American people have ever seen.

The program is called Intellistreets and it records conversations, can scan you for a weapon, listen to your conversations and it can even “read your mind”. Eventually you will be placed on a “naughty or nice” list, and this list could have very consequences for your longevity.

Did you pick up on the part of the Intellistreets video that they passively admit that this is a surveillance and data mining tool? The program, like so many programs that violate the Fourth and Fifth Amendment of the Constitution, are adding to your personal threat matrix data base.

Law Professor Alarmed by DHS Data Gathering Could Lead to One Being Put on the “Red List”

Law Professor Margaret Hu says “Americans could be targeted for unlawful detention and even execution”.

Law Professor Margaret Hu says “Americans could be targeted for unlawful detention and even execution”.

Professor Margaret Hu from the Washington and Lee University School of Law states that “The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens”.

Professor Hu explains that the FBI’s Next Generation Identification project will institute the following:

“A comprehensive, centralized, and technologically interoperable biometric database that spans across military and national security agencies, as well as all other state and federal government agencies. Once complete, NGI will strive to centralize whatever biometric data is available on all citizens and noncitizens in the United States and abroad, including information on fingerprints, DNA, iris scans, voice recognition, and facial recognition data captured through digitalized photos, such as U.S. passport photos and REAL ID driver’s licenses. The NGI Interstate Photo System, for instance, aims to aggregate digital photos from not only federal, state, and local law enforcement, but also digital photos from private businesses, social networking sites, government agencies, and foreign and international entities, as well as acquaintances, friends, and family members”. Biometric ID cybersurveillance might be used to assign risk assessment scores and to take action based on those scores“.

The healthy side of your paranoia is about to emerge as we consider the fact that Professor Hu describes a DHS program known as FAST, which is a DHS tested program and has been described as a “precrime” program. FAST will gather upon complex statistical algorithms that will compile data from multiple databases and will subsequently “predict” future criminal or terrorist acts.

The “precrime” data will be gathered” through cybersurveillance and stealth data monitoring of ordinary citizens. The FAST program purports to assess whether an individual might pose a “precrime” threat through the capture of a range of data, including biometric data. In other words, FAST accuses non-convicted individuals as being a security threat risk of becoming future criminals and terrorists through data analysis. No charges, no police interviews – the system is designed to become “judge, jury and executioner“.

Under the Future Attribute Screening Technology (FAST), criminal cues are captured through the following types of biometric data including body and eye movements, eye blink rate and pupil variation, body heat changes, and breathing patterns. Various linguistic cues include the analysis of voice pitch changes, alterations in voice rhythm patterns, and changes in intonations of speech. Hu notes that in documents released by DHS clearly show that individuals could be arrested and face serious consequences based upon statistical algorithms and predictive analytical assessments.

Professor Hu issued the following warning:

“The prognostications of FAST can range from none to being temporarily detained to deportation, prison, or death“.

fema camp

Now we know why the unconstitutional NDAA was passed which gave the government the power to permanently detain American citizens without due process of law.

DHS Wants to Know Everything About You

dhsThere is a new DHS funded multi-billion dollar spy tool and it is called FirstNet. This is a citizen information gathering device like no other. A company called New World Systems (do they really mean New World Order Systems?) is in charge of implementing this system.

The Radio Access Network (RAN) part of this elaborate network, consists of the radio base station infrastructure that connects to user devices including cell towers and mobile hotspots embedded in vehicles which connects to the satellite network or other types of wireless infrastructure. This is a “search and destroy system” as FirstNet is designed to hunt you down in remote areas. Take a look at the map below along with the embedded graphics from the FirstNet website. They have developed the technology to track you and find you should you be a fugitive from their own special brand of justice. RAN has the ability to track you anywhere on the planet. Soon, there will be nowhere for people with high threat matrix scores to run and hide without being found by this system.

There Is No End to the Madness


A company called PredPol claims that it possesses proprietary software which can actually predict times and places for likely future crimes. Intrado has the capability to data mine all social media and create your personal profile based on your Internet chatter. Subsequently, if you are pulled over for a speeding violation, you could find yourself face down on the pavement because you have written something negative about the police who murdered Eric Garner. Or, you might just end up like Eric Garner.

Does anyone else have a problem with this police state surveillance grid? Some might intimate, it is time for a revolution. For those who are so inclined, the authorities, the minions for the banksters, have that possibility covered as well and that will be the topic of a future article. Meanwhile, take a pill, your paranoia is about to get worse.

Dave Hodges is the host of the popular weekly talk show, The Common Sense Show, which airs on Sunday nights from 9pm – Midnight (central) on the Republic Broadcasting Network and its 29 affiliate stations. Dave also hosts a website (www.thecommonsenseshow.com) in which he writes daily articles on the geopolitical state of affairs both nationally and internationally. The theme of Dave’s show and website centers around exposing the corruption and treason which has invaded the presidency and Congress as well as their corporate and banking benefactors. Dave is an award winning psychology, sociology, statistics and research professor. He is also a former college basketball coach who retired as the winningest coach in his college’s history. A mental health therapist by training, Dave brings a broad based perspective in his fight against the corrupt central banking cartels which have hijacked the US government. Dave and his wife, Nora have one son and they presently reside in rural Arizona approximately 25 miles north of the greater Phoenix area. Dave was drawn to the fight for freedom when the globalist central banking forces, led by Senator John McCain, attempted to seize his home and property and that of 300 of his neighbors, without one dime being offered in compensation. This attempted public theft of private property was conducted for the purpose of securing cheap land in which the globalists intended on putting in an international highway through their area known as the Canamex Corridor. Dave’s community appointed him the spokesperson and eventually his community won their fight against the bankers and their front man, Senator McCain. This event launched Dave’s career as a broadcaster and an investigative journalist. Dave’s website presently enjoys over a half a million visitors every month.