While most people were fast asleep or, at best, in #zombie automaton mode, a group of clever but soulless and evil #psychopaths conspired to control the whole world and all of mankind.
With the groundwork completed and everything in place, they are about to reveal themselves too. But then it will be too late to take any effective action to stop this wholesale takeover. Nothing will be as it was, ever again.
Already, they control utilities, banks, hospitals, schools, governments, police, energy and communications infrastructure and national defense and security organisations in most countries including Russia and China and are capable of turning everything OFF with the flick of a switch.
Bigger than the biggest Nukes
A weapon so powerful it makes a nuclear attack look like child’s play and a serious waste of resources and infrastructure. Anyone who would dare stand up against them would truly suffer the wrath of the devil: Everything will come to a complete stop: no banks, no transport, no police, no emergency services, no communications, no transport, no food supplies, NOTHING.
Watch the video to find out that this is NO fairy-tale.
Just this morning I fell foul of the #Stasi style interrogation I was subjected to by some underpaid #Telstra employee in some unidentified overseas location, simply because I wished to report that I could not make outgoing calls from my Telstra #mobile service.
The various Telstra employees I spoke to this morning in an attempt to rectify the situation all came to nothing when I told them that I was not prepared to give them any information other than my service number. No full name, No date of birth, nothing. Anyone with that knowledge could impersonate me anyway so why Telstra? Why?
When I asked the otherwise friendly person on the line what her full name and date of birth was I was advised that Telstra protocol forbids them from giving out that information. So we are square Telstra.
But, all the same, Telstra FAILS to take reasonable steps to correct the problem with my service. In spite of wasting much of my time trying to get the issue resolved.
What should I do? The article below illustrates that I am not the only one who feels that Telstra is overstepping the privacy mark by a country mile and also gives some interesting background on the Telstra corporation everyone should be aware of. I weep for those poor country folk who cannot go to a competing service provider. Telstra has a MONOPOLY in country areas.
I feel I have no option but to lodge a complaint with the telecommunication OMBUDSMAN about Telstra’s unconscionable protocols and behaviour.
Will Telstra be the Next Facebook Privacy Scandal?
Please share this post far and wide. Together we can force these autocratic corporate behemoths to start behaving.
An in-depth critique of Mark Zuckerberg’s hearing before the US Congress by one of the privacy industry expert insiders Cliqz.com dots the I s and crosses the T s and presents some eye opening statistics.
That Facebook (and Google and Youtube, etc.) are probably evil would meet with general agreement after reading this post.
To take your privacy back from these evil players on the Internet you would be well advised to install browser software (and extensions) that is especially designed to do just that: protect your privacy.
While there are a number of options available out there, I have been test-driving the Cliqz browser with the Ghostery extension for some time both on the desktop and on the mobile. While I have not examined the data-stream between the browser and the Internet, the Cliqz browser has restored my confidence that my Internet activities are private as they should be.
Both Cliqz and Ghostery are available as extensions for other web browsers like Firefox and Google Chrome so you can stay on familiar territory but now in the knowledge that your data is safe.
— Barefoot Warrior, editor
The #Facebook CEO claims to know nothing about shadow profiles. We at #Cliqz consider this statement to be not very credible and ask him to respect everyone’s privacy in an open letter.
At a hearing before the #US_Congress Facebook CEO Mark Zuckerberg claimed that he did not know anything about shadow profiles. Cliqz now confronts him with this obvious lie in an open letter that has appeared in leading German and European media today:
DEAR MARK ZUCKERBERG,
Some lawmakers embarrassed themselves when they questioned you in front of the US Congress. It was a bit like watching one‘s grandparents trying to be cool on social media. At times the ladies and gentlemen there seemed a little out of their depth, there were a few awkward moments – in fact the entire event could have been quite amusing, and you and your shareholders had every reason to feel relieved.
However, upon a closer look, none of it was funny. What you told the world was a lie. You evaded the question about the fact that Facebook has us all under #surveillance, regardless of whether we are actually signed up to Facebook or not by claiming some obscure “security purposes”. That is one conscious aspect of your business model which is not funny at all.
Let us look forward to a better future. You have told the media that this is what you intend to do. You have been given a chance to do things better. Keep your word! Prove that you really intend to implement the changes to your company you have promised to the public. Show your users some respect – and respect everyone’s privacy.
AND IF YOU DON’T KNOW HOW PRIVACY WORKS, ASK US. WE’RE REALLY GOOD AT IT.
Dr.-Ing. Marc Al-Hames
CEO Cliqz GmbH
CEO Cliqz GmbH
Zuckerberg’s statements are not very trustworthy
With the #Cambridge_Analytica scandal, Facebook came into the public eye as one of the actors of the otherwise covert #surveillance_economy. At first glance, users of the major Internet platforms only see a social network, a search engine, a map service, a video portal. In the background, however, data is collected and turned into money. It was long overdue that the data collection practice of Facebook – representing all major advertising-funded Internet giants – was put to the test.
Asked about #shadow_profiles by Congressman Ben Lujan, Zuckerberg said: “I’m not familiar with that.” Shadow profiles are the data that Facebook collects and stores even about those Internet users who never signed up to Facebook or who deliberately left the network. The founder of the Social Network allegedly knows nothing about this practice? Pretty unlikely!
Zuckerberg actually knows very well that Facebook’s tracking scripts are integrated into thousands of websites. They even allow Facebook to see what we are all doing outside its platform. This data is an essential part of their business model. The information reveals a lot about what we want to buy or where we will travel to – ideal for targeting for marketing purposes.
Facebook tracks nearly 30% of global website traffic, as a study by Cliqz and #Ghostery shows. The evaluation of “only” one third of all the websites we visit is enough to know more about us than our closest relatives do: whether we have debts, suffer from a serious illness, cheat on our partner, look for a new job, and what political attitudes and sexual preferences we have – our Internet history reveals it all.
This is how privacy works!
Cliqz respects and protects your privacy. The anti-tracking technology built into our Cliqz and Ghostery browser products reliably prevents you from being tracked across the web. Tracking scripts are either blocked from the outset or the personal data they request is replaced by a generic placeholder. With this combination of blocklist-based anti-tracking and the #AI-powered removal of user identifiers, Cliqz is the innovation leader.
In addition, Cliqz only stores strictly anonymous, merely statistical data on its servers without any reference to individual users. This anonymous statistical data is the foundation of our independent web index, used by our quick search engine that is built into the Cliqz Browser, among others. Nevertheless, Cliqz is able to individualize services. But all data related to individual users always remain on the user’s device, in their possession and under their control. This client-side data aggregation is the privacy-friendly counter model to storing profiles on servers in data centers.
Cliqz’s business model MyOffrz also follows the principle “the browser knows everything, we know nothing”: Cliqz users see attractive offers based on the websites they visit and the search queries they enter. The matching of interests and offers takes place locally in the browser on the user’s device; no data related to individual users is sent to the Cliqz servers. This innovative technology, called Browser-based Performance Marketing, is a proof of concept for a consistently privacy-friendly business model of the future. It proves that no profiles need to be stored on servers to build an ad-based business model.
Altnews editor comments:
Exploring the scientific and anecdotal information about 5G in particular and electromagnetic radiation or EMF in general, I often despair that we might as well build a home-size microwave oven and move our family there. 60 seconds on High should do the trick. Get it over and done with.
When I feel more positive about all this I fantasise about lining the outside walls and roof of my home with thick sheets of lead or whatever other material would manage to stop all this radiation from entering my home. Leave your mobile devices at the door please.
Pedantic technology geeks would likely vehemently exclaim that the microwave oven employs a different frequency of electromagnetic radiation to cook our food and therefor my comparison is without merit, but 5G undeniably still deploys #unnatural electromagnetic radiation all the same. I submit that unnatural is the key word here.
Maybe we should all campaign and lobby hard to reinstate the so sadly and so often, likely purposely and for commercial reasons, forgotten #pecautionary_principle to all these emerging technologies. I know the #technocracy would fight back hard and would need some serious convincing.
It requires me to be constantly alert that my web sites and blog posts do not give #Facebook, #Google and others the opportunity to track and spy on my visitor’s Internet activity.
I see so many of those offending web sites where the webmaster has, mostly innocently, installed code to allow visitors to like and/or share their post on social media and:
Facebook and Google immediately install a cookie on your device that allows them to spy on every move you make, pages you visit, text you type into (comment, registration and order) forms and search terms you may use. They record your location, time of day and often also the URL and content of every other tab you may have open in your web browser.
Surely this is the work of the Devil? In anyone’s language and everyone’s creed?
My next job is to scan every blog post I copy into one of my posts for the like of the above mentioned devilish spying code. For the time being I cannot guarantee that I will catch them all.
But when you install the fabulous #Open Source #Ghostery add-on in your web browser at least you will be protected from data stealing spies at your end and on your device.
So, If I have peaked your interest and curiosity do read on to learn more about what the #Technocracy is doing to build a massive profile on you. They know you better than you know yourself IF you let them get away with it.
It is no surprise to this writer that Youtube’s recent censorship clampdown on material THEY don’t agree with was going to stir people, some vehemently.
We see it all around the internet how angry content creators and video bloggers are with #youtube. They are especially angry about the heavy handed, dictatorial and absolute manner in which youtube has simply cut their income potential to pennies and effectively leaving many of them destitute simply by demonetising their channels or even permanently deleting them.
While youtube may argue that those actions were initiated in response to complaints about someone breaching community standards appears to have some merit, on the surface anyway. But once you realise that any mean and angry troll can lodge a complaint with youtube and that most of youtube employed ‘moderators’ have been selected also on the basis of their political leanings and you realise what a seriously dangerous situation youtube has created for itself.
In addition, youtube further fuels the anger of people by NOT providing reasonable and timely dispute resolution options to the affected parties. You can count yourself lucky if you get an email reply at all from this technocracy behemoth.
So it comes as no surprise that someone would decide to retaliate. Of course many have, through blog posts and vlogs on other platforms and with the help af sympathetic website editors.
Most would have expected that such extreme retaliation would in the first instance come from some gun toting, extreme right wing nationalist but hey, it appears the left also has its own extreme activists. That such would be a pro vegan, animal rights activist is a real pity until we realise that some of those are just as extreme as their right wing pro hunting comrades for example.
So it saddens me that the very first of Google’s chickens to come home to roost was in fact a vegan animal and fitness activist, who also happens to be a national of a country that is on the US’ official ‘candidates for regime change’ list. The plot thickens.
But before we stray too far of the topic here, lets have a look at the article penned by well known colleague warrior Mike Adams, although I must stress here that all opinions expressed are Mike’s alone and do not necessarily reflect the opinions and values of this warrior editor.
In response to a referendum held in the Netherlands on the 21/Mar/2018, asking citizens to vote yes or no on a proposal to collect metadata for security purposes, a group of eminent academics, security professionals and other stakeholders published a clear and concise analysis of the consequences of a yes vote prevailing.
Does a no-vote against the Intelligence and Security Services Act (Wiv) make society more unsafe? Proponents of the new law say “yes” without reservation. But we, cybersecurity researchers, computer scientists and security professionals, question this.
We think the public debate about the new Wiv is too simple: security versus privacy. Are you for safety you vote “yes”; If your privacy is of greater importance, then you vote “no”. That the new law itself creates safety risks does not fit into this frame, but unfortunately this is true. These risks must be included in the debate and translated into the right considerations in the law.
The first security problem is the extensive hacking authority that allows the services to penetrate through unknown vulnerabilities on equipment and in networks. These vulnerabilities do not have to be reported to the producers and developers of the equipment or software. Due to this stagnation, not only the spy target is vulnerable, but also countless citizens at home and abroad. The chance is real that others use the same vulnerability for other purposes. Cyber criminals and less fresh intelligence services will either find the vulnerability themselves or hack the data base of the services to steal this information. The multi-day cyber attack at the container terminal in the port of Rotterdam last summer is linked to information about vulnerabilities that were previously seized at the US service NSA. Not reporting vulnerabilities is a danger that causes serious economic damage and is difficult to reconcile with the safety task of the services. The use of vulnerabilities in devices and software by the government can also cause new vulnerabilities. In Germany this has been encountered with the Bundestrojaner: detection software that placed the German government in snare on computers of suspects, but whose control was easily taken over by third parties. This security risk is reinforced by a new power in the ISS. The law allows the services to hack third party devices that are not themselves a target of the services. This concerns devices that are connected to a target, for example the network equipment that is maintained by a system administrator. Individuals with a key role in IT, such as system administrators, become more vulnerable to external attacks by adding government software.
(Natural News) In recent weeks independent and alternative media outlets and their content creators have been sounding the alarm over censorship actions undertaken by Left-leaning social media giants like Facebook, YouTube, Google, Twitter, and others. In many instances, the social media sites weren’t just censoring content, they were taking down entire channels and with them removing complete video and content libraries that often contained hundreds or thousands of programs — all under the guise of ‘combating hate speech’ and ‘fake news.’
Targets of this censorship included Natural News Network founder/editor Mike Adams, whose Health Ranger channel on YouTube has been completely eradicated. Also included was Alex Jones, creator of InfoWars.com.
By Nicholas West The use of information obtained by smart devices is already threatening to rewrite the criminal justice system in America. I’ve covered various cases that seriously call into question what place the protections afforded by the U.S. Constitution will have in a future filled with in-home surveillance disguised as consumer entertainment.
However, until this point, the data transmitted or stored in items like Amazon Echo, Fitbit, or Smart Meters have been called upon as after-the-fact investigative tools by police. It appears, now, that police in the UK are establishing a far more open relationship with the users of these devices in what looks like a preemptive capacity.
The Intercept has issued a report about a program in Lancashire, England that was specifically designed by police in a partnership with Amazon Echo developers to broadcast a range of crime updates and information that effectively turns Echo owners into a new set of eyes and ears for law enforcement. Furthermore, Amazon itself will become the custodian of the data, not the police…