Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - administrator

Pages: 1 [2] 3 4 ... 641
16

      

By Mac Slavo


J.P. Morgan has taken to issuing warnings over the mental state and overall health of the American consumer’s habits. As a nation, we are deeply indebted to consumerism and that’s what is currently keeping the fragile economy afloat.


With the manufacturing industry already officially in a recession, the Institute of Supply Management purchasing manager index was registering a reading of 47.8 (anything over 50 indicated growth) for September, the worst reading since 2009 the news seems bleak even for the consumerism that’s fueling this debt-based economy.  The U.S. and the Chinese trade war is also degrading business confidence, causing management teams to pull back on spending. That leaves consumers to carry the economic water – and many are tapped out; no longer able to take on any more debt in order to keep things afloat.


         



      

J.P. Morgan consumer-finance analyst Richard Shane sees this as bad news for the stocks he covers, according to Barron’s. On Tuesday morning, Shane cut his target prices on every single stock he covers—including names like American Express and Capital One Financial—by an average of almost 10%. What’s more, he downgraded shares of auto lender Ally Financial.


Shane is seeing some visible cracks in this “booming” economy and it’s time to be aware of them, “While the sector should continue to enjoy solid fundamentals through year-end, our outlook headed into 2020 becomes more cautious,” Shane wrote in a research report. “Specifically, the prospects of a slowing economy, indications of pockets of labor weakness and heightened political uncertainty all may weigh on the group.”


See: 177 Different Ways to Generate Extra Income


Investors, so far, appear to be aware of the risks in the markets going into 2020.  Consumers, on the other hand, appear to have hardly noticed any of the red flags appearing right in front of them. After all, total household debt rose to $13.9 trillion in the second quarter, its 20th consecutive quarter of growth, according to Shane. Most consumer debt is housing-related, but borrowers also have $1.3 trillion in car loans. $0.8 trillion in credit-card debt, and $1.5 trillion in student debt.


Shane doesn’t see the bottom falling out of the economy. He doesn’t think it’s time to panic just yet because while consumer debt loads are at record highs, debt as a percentage of household wealth isn’t, he points out.


But the red flags are still there. Consumerism is being fueled by a strong job market.  Should that go sightly the wrong way, things could get ugly, quickly.



This article was sourced from SHTFPlan.com


Image credit: Pixabay


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   

17

      

By Jack Burns


Little Rock, AR — Veteran Little Rock police officer Robert ‘Bobby’ Ward appeared to be enjoying a quiet peaceful night at his home this past summer when Sherwood police officers received a 911 call for a noise complaint. However, when the egos of the cops collided all hell broke loose.


When Sherwood police officers arrived, Ward and the officers both agreed they heard no noise coming from his home and Ward directed the two officers to another location “over there,” he said.


At first, the police contact was cordial. Ward was in his driveway, just outside his garage, on his own property, apparently minding his own business. But Sherwood officers pressed him for more information to fill out their “report,” one officer said.


         



      

Ward, who like so many residents not wishing to have police contact, refused to answer the officers’ questions. “Why?” he asked when pressed for his phone number.


The two originally agreed there was no noise coming from Ward’s home and that should have been the end to the police contact. However, the Sherwood officers kept insisting on information from Ward and, some could say, pressing his buttons.


The media edited out most of the body camera footage and even the footage we found was edited. However, during the entire incident, it appears the only thing Ward did to anger the Sherwood officers was curse at the police officers, something Arkansas courts have said is protected 1st Amendment speech.


Going further, Ward was on his own property, a contention he made with the rookie officers by noting he had 22 years of police work under his belt.


One of the Sherwood officers warned him he would be arrested if he cursed again, something Ward knew was not illegal. So he cursed again, as many residents would, openly defying the perceived authority of his fellow badge-wearing boys in blue standing in his driveway seemingly provoking him.


The Sherwood officer even told Ward he would only give him “one warning” as if to say he would arrest him for cursing at him on his own property.


It must be worth noting the officers simply could have walked away had they been satisfied there was no noise coming from Ward’s home, and both officers agreed there wasn’t any. Why the officers remained on scene is a mystery to us here at TFTP.




Declare Your Independence!
Profit outside the rigged system! Protect yourself from tyranny and economic collapse. Learn to live free and spread peace!
Counter Markets Newsletter - Trends & Strategies for Maximum Freedom




   #mc_embed_signup {clear:left; font:14px Helvetica,Arial,sans-serif; text-align: center; padding-bottom: 15px; }
         .cmhead{color: rgb(255,199,27); text-shadow: 1px 1px 3px rgba(0,0,0,0.5); text-align: center; font-size: 250%; font-family: sans-serif; font-weight: 700;}
         .cmsubhead{color: rgb(255,255,255); text-align: center; font-size: 150%; font-family: sans-serif;}
         .cmformhead{color: rgb(30, 29, 29); font-size: 160%; font-family: sans-serif; margin-bottom: 10px;}
         #mc_embed_signup form { display: inline-block; background-color: #FFF; background-color: #FFF; margin-top: 20px; border-color: rgb(31, 31, 31);
    outline: none;
    background-color: rgb(255, 255, 255);
    opacity: 1;
    border-width: 3px;
    border-style: solid;
    border-radius: 5px;
    width:70%;
}
#mc_embed_signup input.email  {width: 90%; }
#mc_embed_signup input.button { width: 93%; background-color: rgb(246, 137, 34); border-bottom: 3px solid rgba(0,0,0,0.2); font-size: 160%;}
#mc_embed_signup .button:hover {background-color: #e67409;}
   /* Add your own MailChimp form style overrides in your site stylesheet or in this style block.
      We recommend moving this block and the preceding CSS link to the HEAD of your HTML file. */



   
         
Claim Your FREE Issue Today!
   
   


   





However, when Ward called his fellow boys in blue “motherf–kers”, that was all the Sherwood officer needed to violently take ward to the ground, hitting his head on the sidewalk.


For not cooperating with the police and their investigation of a noise complaint, for refusing to give the Sherwood officers any identifying information, and most notably, for cursing at the officers, Ward was given citations.


He was cited for “Public Intoxication, Disorderly Conduct and Resisting Arrest,” according to police records.


It’s unclear how anyone can get cited for being drunk on their own property, but that’s what happened to Ward. Unfortunately, the cop who knew the actual law got fired from Pulaski County as a deputy as a result of his encounter with Sherwood police. He was accused of violating the Pulaski County code of conduct, according to reports.


It’s very rare to catch police-on-police activity, especially on film, given the thin blue line and wall of silence. Ward, it seems, was completely within his rights to call the cops “f–kheads” and tell them to leave his property.




Avoiding The Eye - Ships Free Today!



Unfortunately, it seems free speech may truly be dead in America. If a man cannot say what he wants and express his feelings on his own property, where else is he able to practice such a right?


It’s unclear if Ward will be suing Sherwood and Pulaski police departments but we report on thousands of civil rights cases each year and we think he has a pretty strong one. What do you think? Was Officer Ward well within his rights to say whatever he wanted to the Sherwood cops? Should Pulaski have fired him? Like, comment, and share, below.




Jack Burns is an educator, journalist, investigative reporter, and advocate of natural medicine

This article was sourced from The Free Thought Project.


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   
            


Free ebook How To Survive the Job Automation Apocalypse


Free ebook How To Get Started with Bitcoin: Quick and Easy Beginner’s Guide




      








Activist Post Daily Newsletter

         




   Email address:
   



     Yes - I consent to receive emails
   



   

Leave this field empty if you're human:


Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

      

Share
Tweet
Pin



Previous post


      
   

18

      

By Tyler Durden


Reuters reports, citing defense or administration sources, that the US is set to send thousands of additional troops to Saudi Arabia in the wake of last month’s Aramco attacks.


“The United States is planning to send a large number of additional forces to Saudi Arabia following the Sept. 14 attack on its oil facilities, which Washington and Riyadh have blamed on Iran,” according to a breaking Reuters report. 


Though the Pentagon has yet to officially confirm the report with comment, Reuters noted the “sources did not specify exactly how many troops would be deployed but said it was expected to be in the thousands.”


         



      

And Bloomberg reports this could be as many as 1,800 new personnel, pending an official Pentagon statement:



Defense Secretary Mark Esper is expected to announce a new deployment of U.S. forces to the Middle East as tensions rise over Turkey’s military operations in northern Syria and an explosion on an Iranian oil tanker.


As many as 1,800 military personnel, including two air squadrons, are expected to be deployed to the region, including to Saudi Arabia, according to a defense official.



Since last month the Pentagon has already deployed up to 3,000 troops to the kingdom in coordination with King Salman and crown prince MbS for “regional stability” and to counter Iran.


Ironically, this comes as Trump has promised to “slowly” get “out of the Middle East”. One journalist and MidEast analyst aptly questioned, “Is this to prop up the House of Saud internally, or warn off Iran?”




In separate confirmation of the original Reuters sources, CNN reports that the “Move comes as U.S. Navy is unable to send a relief aircraft carrier to deter potential Iranian aggression,” citing multiple unnamed US defense sources.



This article was sourced from ZeroHedge.com


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   

19

      

By Jon Rappoport


“Imagine this. A big-time doctor from the US Biological Warfare Group waddles into a meeting room, where a collection of Army, CIA, NSA, and DHS representatives sit quietly in their chairs. He says: ‘So I understand you boys want to put on a little domestic bioterror show, to keep the natives from becoming too restless. Well, the first thing you need to know is, germs don’t obey orders. Forget all that sci-fi nonsense. Germs work and they don’t work. It’s a crapshoot. You could have a big fat dud on your hands. I can tell you how to make it work, though, if you give up on your fancy high-tech wet dreams…” (The Underground, Jon Rappoport)


There are future scenarios which, with enough exposure before they’re staged, can be stopped—or at least analyzed correctly when they occur.


A calculated bioterror event is one of those.


The primary fact is: no matter what kind of germ you’re talking about or where it came from, releasing it intentionally does not guarantee predictable results. Far from it.


         



      

For instance, people whose immune systems operate at different levels of strength are going to react differently.


The perpetrators may find that less than 2% of people exposed get sick or die.


But there is another strategy that should be understood:


The use of a germ as a cover story for a chemical.


In other words, there is no germ attack. It’s called a germ attack, but that’s a lie. The perps bring in researchers to the affected area, who go on to claim they have isolated a germ that is the cause of death and illness. It’s a sham. What really happened was:


The spread of a toxic chemical that can’t be detected, unless you’re looking for it.


The chemical has severe, deadly, and predictable effects for a week or two. Then it disperses and loses potency and the “epidemic” is done.


In some town, a fairly isolated community, the word goes out that people are suddenly falling ill and dying. The CDC and the Army are called in to cordon off the area and quarantine all citizens. A peremptory announcement is made, early on, that this is a biowar attack.


Major media are allowed outside the periphery. Network news anchors set up on-location and do their wall to wall broadcasts “from the scene.”


The entire nation, the entire world, is riveted on the event, 24/7.


People inside the cordon fall ill and die. Reports emerge from the town:


The networks state that “heroic doctors are taking samples of blood and the blood is being analyzed to find the germ that is causing the epidemic.” The DOD confirms over and over that this is, indeed, a biowar attack.


Human interest stories pile up. This family lost three members, that family lost everybody. Tragedy and horror produce the desired empathic response from “the world community.”


It’s a soap opera, except real people are dying.


The medical cartel promotes fear of the germ.


All controlling entities obtain their piece of the terrorist pie.


Finally, the doctors announce they have isolated the germ causing death in the small town, and researchers are rushing to develop a vaccine (which they produce in record time).


Everyone everywhere must be vaccinated, now. No choice. Do it or be quarantined or jailed.


In this declared martial law situation, the doctors are the heroes. The doctors and the Army. And the government, and even the media.


Then, after a few weeks, when the potency of the secret chemical has dispersed, it’s over.


When you think about it, this scenario is a rough approximation of what happens every day, all over the world, in doctor’s offices. The doctors are prescribing chemicals (drugs) whose effects are far more dangerous than germs that may (or may not) be causing patients to be ill.


In other words, a chem-war attack is being leveled at people all over the world all the time.


See Dr. Barbara Starfield (Johns Hopkins School of Public Health), July 26, 2000, Journal of the American Medical Association, “Is US health really the best in the world?” 106,000 people in America are killed every year by FDA-approved medical drugs. That’s over a million people per decade.


In the wake of a staged “biowar” terror attack, new laws are enacted. The State clamps down harder on basic freedoms. The right to travel is curtailed. Criticizing the authorities is viewed as highly illegal. Freedom of assembly is limited.


“Citizens must cooperate. We’re all in this together.”


A new federal law mandating the CDC schedule of vaccines for every child and adult—no exceptions permitted—is rushed through the Congress and signed by the President.






It’s all based on a lie…in the same way that the disease theory of the medical cartel is based on a lie: the strength of an individual’s immune system is the basic determinant of health or illness, not germs considered in a vacuum.


There are people who are determined to inflate the dangers of germs. They trumpet every “new” germ as the end of humankind on the planet. They especially sound the alarm when researchers claim a germ may have mutated or jumped from animals to humans.


“This is it! We’re done for!”


However, if you check into actual confirmed cases of death from recent so-called epidemics, such as West Nile, SARS, bird flu, Swine Flu, and Ebola, the numbers of deaths are incredibly low.


If political criminals, behind the scenes, wanted to stage a confined “biowar” event, they would choose a chemical, not a germ, and they would leverage such an event to curtail freedom.


Understand: researchers behind sealed doors in labs can claim, with unassailable ease, that they’ve found a germ that causes an outbreak. Almost no one challenges such an assertion.


This was the case, for example, with the vaunted SARS epidemic (a dud), in 2003, when 10 World Health Organization (WHO) labs, walled off from view, in communication with each other via closed circuit, announced they’d isolated a coronavirus as the culprit.


Later, in Canada, a WHO microbiologist, Frank Plummer, wandered off the reservation and told reporters he was puzzled by the fact that fewer and fewer SARS patients “had the coronavirus.” This was tantamount to confessing that the whole research effort had been a failure and a sham—but after a day or so of coverage, the press fell silent.


SARS was a nonsensical farce. Diagnosed patients had ordinary seasonal flu or a collection of familiar symptoms that could result from many different causes.


But the propaganda effort was a stunning success. Populations were frightened. The need for vaccines, in the public mind, was exacerbated.


Several years ago, I spoke with a biologist about the fake bioterror scenario I’ve sketched out above. His comment was: “Do you think any mainstream scientist would dare go into that cordoned-off town and actually check the area for a highly toxic chemical? He’d be blackballed, exiled, and discredited in a minute. The authorities would call him crazy. And that’s if he were lucky.”


Such is “science,” these days. A researcher can discover anything he wants to, if it’s approved. Otherwise, the door is closed.


After 30 years of covering and reporting on deep science fraud, I can tell you that most scientists know, without instructions from above, the dimensions of their “permitted territory.” They can sniff out career danger from a mile away.


GMOs? Roundup? Other toxic pesticides? Climate change? Vaccines? Medical drugs? Diagnostic medical tests? Actual environmental pollution? Mercury? Chemicals in food? Radiation? Nuclear power plants? Fracking? Fluorides? On these and a whole host of other issues, government is centrally involved as a ruling force. And there are armies of compliant scientists ready and willing to carry out preferred government (and corporate) dictates. These scientists already know the answers before the questions are even asked.


Meanwhile, propaganda rivers flow, extolling the glories of science.




American Natural Superfood - Free Sample



It’s a dream situation, for the terminally corrupt.


A huge number of scientists, who don’t actually participate in research fraud, stand back and watch it happen and say nothing. They see the handwriting on the wall in very large letters.


In 1988, while writing my first book, AIDS INC., I interviewed a highly respected virologist at a US university. I mentioned that several molecular biologists were challenging the HIV-causation hypothesis of AIDS. He told me that he and a number of his colleagues were aware that “a serious problem” existed concerning evidence for the hypothesis, but they were all going to “let this one go.” It was too political, he said.


Yes, well, an enormous amount of science turns out to be political.


Keeping one’s head down and letting things go by may not be part of a PhD curriculum, but soon after school is out, researchers enter a different kind of training.


A main theme then pops up: do you want a career, or do you want to live in the middle of nowhere, in exile?


As it so happens, building a broad scientific consensus resting on sand is a straightforward job. It takes time and money, but the work requires no brilliance.


You just flash signs at scientists. The signs say: money; job security; status; advancement; promotion; grants; prestige; reputation; pension; exposure; censure; discrediting; exile; isolation; death.


They get the idea right away.


They would get the idea when a fake bio-attack (that was actually a chemical) occurred. Stay quiet, agree with the authorities.


“Sure, I knew it was a chemical, but I have house payments to make, and my kids are applying to expensive universities…”



(To join Jon’s email list, click here.)


(To read about Jon’s mega-collection, The Matrix Revealed, click here.)


The author of three explosive collections, THE MATRIX REVEALED, EXIT FROM THE MATRIX, and POWER OUTSIDE THE MATRIX, Jon was a candidate for a US Congressional seat in the 29th District of California. He maintains a consulting practice for private clients, the purpose of which is the expansion of personal creative power. Nominated for a Pulitzer Prize, he has worked as an investigative reporter for 30 years, writing articles on politics, medicine, and health for CBS Healthwatch, LA Weekly, Spin Magazine, Stern, and other newspapers and magazines in the US and Europe. Jon has delivered lectures and seminars on global politics, health, logic, and creative power to audiences around the world. You can sign up for his free NoMoreFakeNews emails here or his free OutsideTheRealityMachine emails here.


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   
            


Free ebook How To Survive the Job Automation Apocalypse


Free ebook How To Get Started with Bitcoin: Quick and Easy Beginner’s Guide




      








Activist Post Daily Newsletter

         




   Email address:
   



     Yes - I consent to receive emails
   



   

Leave this field empty if you're human:


Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

      

Share
Tweet
Pin



Previous post


Next post


      
   

20

      

By George Gilder


The current internet infrastructure was built for a simple purpose: sharing information.


The information superhighway was launched by academics to allow researchers on various projects around the world to collaborate.


But as you know, the internet is now used for much more than sharing ideas.


We send money. We log in to bank accounts. We enter our social security numbers. We make video conference calls with colleagues.


Clearly these new tasks require an upgrade right?


         



      

Yet the infrastructure of the internet hasn’t been upgraded since its inception.


We all know the result: a cybersecurity nightmare.


There were a billion breaches on the internet last year. A billion breaches of private data.


Of course, the various vendors don’t like when this happens. But it’s only an inconvenience for them. The true burden falls on the consumer.


You’re in charge of replacing credit cards, switching accounts, and dealing with the fallout.


So there’s no incentive for the Googles, the Facebooks, the Amazons, of the world to change.


But this is all going to change sooner than you think, thanks to a new technology that’s creating an explosion of new possibilities for advancement.


But in order to appreciate everything internet 2.0 will provide, I need to reveal why the current system is so fundamentally flawed…


The Danger of Centralized Security


To understand the massive security nightmare that the internet currently represents, we need to take a step back.


In order for information to be shared across the internet, it must be copied. Yes, the internet is a gigantic copying machine. And it’s very efficient for sharing data and documents.


Free Live Interview With America’s #1 Futurist October 15th — Register HERE.


But when transactions entered the picture — actually sending money across the internet — this insecure net couldn’t protect property rights, defend privacy, host safe and efficient transactions, permit micropayments to halt spam, or establish sure identities.


So outside intermediaries became involved. Banks, credit card companies, digital certificate suppliers, etc.


Now, when these transaction entities communicate across the internet, they ultimately have to be translated in to readable forms. As in forms of communication that can potentially be captured by hackers.


Of course, this structure was so vulnerable that the big companies doing transactions — Google, Amazon, Facebook, and eBay — created walled gardens for their own commercial domains. There they could accommodate commerce among their mostly locked-in users.


All secured with an individual login and password.


So now we have the internet dividing into these pyramids regulated by a few giant companies across the net.


This caused increasing segmentation. Within the segments, the big companies collected more and more private data and protected them with firewalls and encryption.


But as time passed, they discovered that centralization is not safe either.


Instead, it actually solved the biggest problem that hackers face. It tells them exactly what’s important, and where it is, putting the entire internet at risk.


That’s like storing your entire nest egg in a giant safe with a blinking sign… in your front yard.


This is the fundamental vulnerability of all centralized security and classification systems that are associated with it.


Centralized security is not the answer.


The solution? Distributed security.


The Next Generation of Security Infrastructure






The ability to implement distributed security was not even possible before. It’s only achievable because of the fabulous advances in solid state memory that we have in our devices today.


Back when I started in the ’90s, computers had a megabyte of memory and they were considered to be super computers. Now there are gigabytes of memory in every smartphone, and it’s connected to terabytes of memory in the cloud.


And here’s where the solution comes in — the new infrastructure of the internet.


Thanks to these advancements, we can distribute a compressed version of all the transactions that are conducted, and put them into a particular blockchain.


Now, most people associate blockchain with bitcoin. But it’s much more than that.


It’s a ledger that distributes all the personal information across the network, just as human intelligence is distributed across the world.


It’s not agglomerated in giant data clumps. It provides a timestamped, immutable record of all the transactions that have occurred in a particular transactional arena.


And here’s why that’s a major breakthrough for security…


Because the record is distributed to every node in the network, the information isn’t in one place — where it is surrounded by hackable surfaces.


Instead, a hacker would have to attack all the records of the transactions across the whole internet before they can change anything or steal anything.


That’s the big breakthrough that’s made possible by the blockchain.


An immutable record of timestamped transactions or important documents or classified data, all made secure by distributing it across the entire internet rather than putting it all in one “safe.”


What will this new internet infrastructure look like for you?


How the Cryptocosom Will Change Lives


It means that you won’t have to worry about being in charge of security. You won’t have to learn a separate username and password for all the various vendors on the internet




Brave - The Browser Built for Privacy



No sets of security questions. No remembering your mother’s maiden name. No entering the last four digits of your social security number.


The massive amounts of security data that you need to master to navigate through the different walled gardens in the internet all go away. Instead, they get resolved to your own identity.


Instead, the burden now falls to the companies.


All those vendors on the internet have to respect your own identity. They’ve got to deal with you. They’ve got to know all the numbers.


They need to master all of the private keys of all their customers. Not the other way around. Because data, including your identity, is being verified and distributed everywhere. Not just in a particular walled garden.


Another benefit?


You’ll be in charge of who can access your data. In fact, you’ll be able to charge people for using your immediate data. No more watching ads on YouTube without receiving something in return.


Plus, micropayments will be rendered possible by this technology, which will mean hassle-free small payments for small goods and services on the net.


And the whole system becomes more secure and more responsive to your own needs and your own security.


In fact, the blockchain will become so fundamental to the new system that its very name will be derived from it. I call it the “Cryptocosm.”


And this isn’t just going to be a benefit for consumers. Investors will have several ways to profit as this internet shift emerges.


I’ve recently discovered a few companies that are leading the charge, and I plan to reveal them to a small group of readers on January 26.



Image credit: Pixabay


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   
            


Free ebook How To Survive the Job Automation Apocalypse


Free ebook How To Get Started with Bitcoin: Quick and Easy Beginner’s Guide




      








Activist Post Daily Newsletter

         




   Email address:
   



     Yes - I consent to receive emails
   



   

Leave this field empty if you're human:


Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

      

Share
Tweet
Pin



Previous post


      
   

21

      

By Danny O’Brien


Those outside the People’s Republic of China (PRC) are accustomed to thinking of the Internet censorship practices of the Chinese state as primarily domestic, enacted through the so-called “Great Firewall”—a system of surveillance and blocking technology that prevents Chinese citizens from viewing websites outside the country. The Chinese government’s justification for that firewall is based on the concept of “Internet sovereignty.” The PRC has long declared that “within Chinese territory, the internet is under the jurisdiction of Chinese sovereignty.”


Hong Kong, as part of the “one country, two systems” agreement, has largely lived outside that firewall: foreign services like Twitter, Google, and Facebook are available there, and local ISPs have made clear that they will oppose direct state censorship of its open Internet.


But the ongoing Hong Kong protests, and mainland China’s pervasive attempts to disrupt and discredit the movement globally, have highlighted that China is not above trying to extend its reach beyond the Great Firewall, and beyond its own borders. In attempting to silence protests that lie outside the Firewall, in full view of the rest of the world, China is showing its hand, and revealing the tools it can use to silence dissent or criticism worldwide.


         



      

Some of those tools—such as pressure on private entities, including American corporations NBA and Blizzard—have caught U.S. headlines and outraged customers and employees of those companies. Others have been more technical, and less obvious to the Western observers.


The “Great Cannon” takes aim at sites outside the Firewall


The Great Cannon is a large-scale technology deployed by ISPs based in China to inject javascript code into customers’ insecure (HTTP) requests. This code weaponizes the millions of mainland Chinese Internet connections that pass through these ISPs. When users visit insecure websites, their browsers will also download and run the government’s malicious javascript—which will cause them to send additional traffic to sites outside the Great Firewall, potentially slowing these websites down for other users, or overloading them entirely.


The Great Cannon’s debut in 2015 took down Github, where Chinese users were hosting anti-censorship software and mirrors of otherwise-banned news outlets like the New York Times. Following widespread international backlash, this attack was halted.


Last month, the Great Cannon was activated once again, aiming this time at Hong Kong protestors. It briefly took down LIHKG, a Hong Kong social media platform central to organizing this summer’s protests.


Targeting the global Chinese community through malware


Pervasive online surveillance is a fact of life within the Chinese mainland. But if the communities the Chinese government wants to surveill aren’t at home, it is increasingly willing to invest in expensive zero-days to watch them abroad, or otherwise hold their families at home hostage.


Last month, security researchers uncovered several expensive and involved mobile malware campaigns targeting the Uyghur and Tibetan diasporas. One constituted a broad “watering hole” attack using several zero-days to target visitors of Uyghur-language websites.


As we’ve noted previously, this represents a sea-change in how zero-days are being used; while China continues to target specific high-profile individuals in spear-phishing campaigns, they are now unafraid to cast a much wider net, in order to place their surveillance software on entire ethnic and political groups outside China’s border.


Censoring Chinese Apps Abroad


At home, China doesn’t need to use zero-days to install its own code on individuals’ personal devices. Chinese messaging and browser app makers are required to include government filtering on their client, too. That means that when you use an app created by a mainland Chinese company, it likely contains code intended to scan and block prohibited websites or language.


Until now, China has been largely content to keep the activation of this device-side censorship concentrated within its borders. The keyword filtering embedded in WeChat only occurs for users with a mainland Chinese phone number. Chinese-language versions of domestic browsers censor and surveill significantly more than the English-language versions. But as Hong Kong and domestic human rights abuses draw international interest, the temptation to enforce Chinese policy abroad has grown.




Declare Your Independence!
Profit outside the rigged system! Protect yourself from tyranny and economic collapse. Learn to live free and spread peace!
Counter Markets Newsletter - Trends & Strategies for Maximum Freedom




   #mc_embed_signup {clear:left; font:14px Helvetica,Arial,sans-serif; text-align: center; padding-bottom: 15px; }
         .cmhead{color: rgb(255,199,27); text-shadow: 1px 1px 3px rgba(0,0,0,0.5); text-align: center; font-size: 250%; font-family: sans-serif; font-weight: 700;}
         .cmsubhead{color: rgb(255,255,255); text-align: center; font-size: 150%; font-family: sans-serif;}
         .cmformhead{color: rgb(30, 29, 29); font-size: 160%; font-family: sans-serif; margin-bottom: 10px;}
         #mc_embed_signup form { display: inline-block; background-color: #FFF; background-color: #FFF; margin-top: 20px; border-color: rgb(31, 31, 31);
    outline: none;
    background-color: rgb(255, 255, 255);
    opacity: 1;
    border-width: 3px;
    border-style: solid;
    border-radius: 5px;
    width:70%;
}
#mc_embed_signup input.email  {width: 90%; }
#mc_embed_signup input.button { width: 93%; background-color: rgb(246, 137, 34); border-bottom: 3px solid rgba(0,0,0,0.2); font-size: 160%;}
#mc_embed_signup .button:hover {background-color: #e67409;}
   /* Add your own MailChimp form style overrides in your site stylesheet or in this style block.
      We recommend moving this block and the preceding CSS link to the HEAD of your HTML file. */



   
         
Claim Your FREE Issue Today!
   
   


   





TikTok is one of the largest and fastest-growing global social media platforms spun out of Beijing. It heavily moderates its content, and supposedly has localized censors for different jurisdictions. But following a government crackdown on “short video” platforms at the beginning of this year, news outlets began reporting on the lack of Hong Kong-related content on the platform. TikTok’s leaked general moderation guidelines expressly forbid any content criticizing the Chinese government, like content related to the Chinese persecution of ethnic minorities, or about Tiananmen Square.


Internet users outside the United States may recognise the dynamic of a foreign service exporting its domestic decision-making abroad. For many years, America’s social media companies have been accused of exporting U.S. culture and policy to the rest of the world: Facebook imposes worldwide censorship of nudity and sexual language, even in countries that are more culturally permissive on these topics than the U.S. Most services obey DMCA takedown procedures of allegedly copyright-infringing content, even in countries that have had alternative resolution laws. The influence that the United States has on its domestic tech industries has led to an outsized influence on those companies’ international user base.


That said, U.S. companies have, as with developers in most countries, resisted the inclusion of state-mandated filters or government-imposed code within their own applications. In China, domestic and foreign companies have been explicitly mandated to comply with Chinese censorship under the national Cybersecurity Law passed in 2017, which provides aggressive yet vague guidelines for content moderation. China imposing its rules on global Chinese tech companies differs from the United States’ influence on the global Internet in more than just degree.


Money Talks: But Critics Can’t


This brings us to the most visible arm of the China’s new worldwide censorship toolkit: economic pressure on global companies. The Chinese domestic market is increasingly important to companies like Blizzard and the National Basketball Association (NBA). This means that China can use threats of boycotts or the denial of access to Chinese markets to silence these companies when they, or people affiliated with them, express support for the Hong Kong protestors.


Already, people are fighting back against the imposition of Chinese censorship on global companies. Blizzard employees staged a walk-out in protest, NBA fans continue to voice their support for the demonstrations in Hong Kong, and fans are rallying to boycott the two companies. But multi-national companies who can control their users’ speech can expect to see more pressure from China as its economic clout grows.


Is China setting the Standard for Global Enforcement of Local Law?


Parochial “Internet sovereignty’ has proven insufficient to China’s needs: Domestic policy objectives now require it to control the Internet outside and inside its borders.




American Natural Superfood - Free Sample



To be clear, China’s government is not alone in this: rather than forcefully opposing and protesting their actions, other states—including the United States and the European Union—have been too busy making their own justifications for the extra-territorial exercise of their own surveillance and censorship capabilities.


China now projects its Internet power abroad through the pervasive and unabashed use of malware and state-supported DDoS attacks; mandated client-side filtering and surveillance; economic sanctions to limit cross-border free speech; and pressure on private entities to act as a global cultural police.


Unless lawmakers, corporations, and individual users are as brave in standing up to authoritarian acts as the people of Hong Kong, we can expect to see these tactics adopted by every state, against every user of the Internet.



Danny O’Brien has been an activist for online free speech and privacy for over 20 years. In his home country of the UK, he fought against repressive anti-encryption law, and helped found the Open Rights Group, Britain’s own digital rights organization. He was EFF’s activist from 2005 to 2007, its international outreach coordinator from 2007-2009, and international director from 2013-2019. He now supervises EFF’s medium and long-term strategy, with an eye to maintaining the organization’s global impact and reputation.


This article was sourced from EFF.org


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   
            


Free ebook How To Survive the Job Automation Apocalypse


Free ebook How To Get Started with Bitcoin: Quick and Easy Beginner’s Guide




      








Activist Post Daily Newsletter

         




   Email address:
   



     Yes - I consent to receive emails
   



   

Leave this field empty if you're human:


Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

      

Share
Tweet
Pin



Previous post


      
   

22

      

By Tony Cartalucci


When the West’s leading media organizations attempt to convince audiences they know nothing about where Mohammed Aly – a Spanish-based Egyptian protest leader – came from, the first thing one can be sure of is they are being lied to.


Protests have begun to spread again in Egypt after nearly a decade of frustration in Washington over its inability to coerce Cairo into serving its regional and global designs.


Protesters have allegedly been stirred up by economic turmoil still plaguing Egypt; however, familiar US-backed organizations used in the past to destabilize Egypt are turning up at the center of protest venues including the Muslim Brotherhood which has served a pivotal role in other regional US projects including filling the ranks of militant forces fighting the government in Syria.


         



      

The Western media’s feigned ignorance over self-proclaimed protest leader Mohammed Aly is meant to obfuscate his political ties and those of the organizations and enterprises he is associated with.


The New York Times in its article, “Egypt Protests Came as a Total Shock. The Man Behind Them Is Just as Surprising,” claims:



Under the government of President Abdel Fattah el-Sisi of Egypt, so little dissent is allowed — and what little there is comes at such a high price — that when just a few hundred people across the country called for Mr. el-Sisi’s ouster in a burst of scattered protests on Friday night, it came as a shock.


The apparent trigger for the demonstrations was almost as unexpected: Mohamed Ali, a 45-year-old construction contractor and part-time actor who says he got rich building projects for the Egyptian military and then left for Spain to live in self-imposed exile, where he began posting videos on social media accusing Mr. el-Sisi of corruption and hypocrisy.



The New York Times also claims:


“It is sort of odd,” said Amy Hawthorne, the deputy director for research at the Project on Middle East Democracy. “Who is this person, who is he connected to, what led him to come out with these allegations now? Obviously he’s very well connected, but who exactly are his connections?”


No mention is made by The New York Times regarding the Project on Middle Eastern Democracy (POMED) –  a Washington DC-based front funded by the US National Endowment for Democracy (NED) which served as a propaganda nexus during the 2011 US-fueled “Arab Spring” and is again promoting rhetoric to support ongoing protests in Egypt today.


POMED fails to disclose its funding and associations on its own website, but NED in a 2017 “Grantee Spotlight” titled, “BRAINSTORMING FOR DEMOCRACY IN THE MENA REGION,” reveals:


NED’s main partner in strengthening local policy centers is the Project on Middle East Democracy (POMED), a Washington-based think tank founded in 2006.


That the deputy director of POMED – funded by NED – is unaware of who Mohammed Aly is and the US government-funded networks he is associated with is difficult to believe.


Who is Mohammed Aly?


Aly claims to be an Egyptian contractor turned whistleblower after witnessing government corruption – but reports indicate he was only part of a family-owned contracting firm led by his father who has denounced him and his “activism.”


The BBC in its article, “Mohamed Ali: The self-exiled Egyptian sparking protests at home,” would report:



His father, Ali Abdul Khalek, was a national weightlifting champion before he launched his family contracting businesses for himself and his sons, including Mohamed.


In an interview with pro-government TV presenter Ahmed Moussa, Abdul Khalek appeared to disown his son and sought to discredit his allegations, saying his family owed their fortunes to the armed forces.



Of Aly himself – the BBC would note:


He is also known for having briefly pursued a career as an actor – with credits including the little-known, but somewhat acclaimed film The Other Land – before liquidating his assets and moving to Spain.


Not mentioned is that The Other Land was jointly-produced and filmed in Spain. Involved in marketing the film was MAD Solutions – a firm linked to USAID, US-European government-funded nongovernmental organizations, Western media such as Forbes, as well as Arab production companies across the MENA region.


Among MAD’s partners includes the Ana Hunna Network – a German-based front posing as women’s rights advocates. The network is in turn made up of various US-European funded fronts including USAID-funded International Development Support and Consulting (IDSC).


MAD is also partnered with the Arab language satellite TV channel Alhurra which is based in the US and is funded directly by the US government (Arabic) via the US Agency for Global Media (USAGM), formerly the Broadcasting Board of Governors (BBG).


USAGM/BBG is also responsible for the US State Department’s global-spanning propaganda network including Voice of America, Radio Free Europe/Radio Liberty, and Radio Free Asia.


While documented evidence of Mohammed Aly working directly for the US government or its allies in the Middle East is still forthcoming – it surely is no coincidence that he has become a “sudden” and “unexpected leader” of protests aimed at coercing Egypt back on a pro-Western footing, promoted by the Western media all while his obvious ties to agents of US influence are being covered up by those very agents themselves.


Aly’s role in a politically charged film produced and promoted by pro-Western fronts – and a film jointly produced and filmed in Spain – is also no coincidence. The ties and networks that led him through that process are now hosting him as he begins his next performance as an influential protest leader.


While it is clear he is but the public face of a much more sinister effort by the militant and extremist Muslim Brotherhood to fill Egypt’s streets with growing chaos – the Western media has gone through great efforts to deny this.






DW, for example, in its article, “Muslim Brotherhood or el-Sissi rivals: Who is behind Egypt’s protests?,” would attempt to claim:



Once a major player in the 2011 revolution, the MB has since been labeled a “terror organization” by el-Sissi’s government, but observers say the allegations are a deflection as the organization is a spent force.


“There’s very little or no indication that the Brotherhood within Egypt has any sort of capability to organize on such a scale,” David Butter, an associate fellow at Chatham House, told DW.


“Social media activists from outside Egypt who applauded the action might be trying to take some credit, but nothing suggests the Brothers have any involvement at all,” Butter said.



The Muslim Brotherhood is a massive region-wide organization complete with political parties, armed wings, and of course immense state-sponsorship including from the United States, Western Europe, and the West’s partners particularly in the Persian Gulf and Turkey.


If the Muslim Brotherhood lacks “any sort of capability to organize on such a scale” inside of Egypt, who has more capability to do so?


The DW article suggests there may be a rift within Egypt’s ruling elite – but no evidence, names or even a theory is put forth as to who among Egypt’s elite might be involved or why.


Conversely, the substantial evidence indicating US interference and the Muslim Brotherhood’s role – together with the fact the US and its allies have not only repeatedly destabilized other nations around the globe through similar tactics – but have destabilized Egypt itself in 2011 through similar tactics – points the finger squarely at Washington and its allies.


An “Arab Spring” Reboot


US-funded protests overthrew the Egyptian government led by Hosni Mubarak in 2011.


US-Turkish-Saudi nominee – Mohamed Morsi – rose to power and immediately set out to transform the large North African nation into an obedient servant of Western interests.


This included severing ties between Egypt and the Syrian government of President Bashar al-Assad while arming, funding, and recruiting militants being funneled onto the battlefield within Syria itself.


A 2013 Voice of America article titled, “Morsi Cuts Egypt’s Syria Ties, Backs No-fly Zone,” would report:



Egyptian President Mohamed Morsi said he had cut all diplomatic ties with Damascus on Saturday and backed a no-fly zone over Syria, pitching the most populous Arab state more firmly against President Bashar al-Assad.


Addressing a rally called by Sunni Muslim clerics in Cairo, the Sunni Islamist head of state also warned Assad’s ally, the Iranian-backed Lebanese Shi’ite militia Hezbollah, to pull back from fighting in Syria.





American Natural Superfood - Free Sample



Later in 2013, Egypt’s powerful military regrouped, managing to oust Morsi from office.


The subsequent government headed by General Abdel Fattah el-Sisi incarcerated Morsi, restored ties with Syria, and began steering Egypt back toward a more neutral foreign policy.


Commentators have cited Egypt’s role in the US-led war in Yemen as evidence that el-Sisi’s government also serves US interests – but it should be noted that Egypt’s commitments were symbolic, short-lived, and a result of paying back Persian Gulf monarchies who financially bailed out Egypt’s flagging economy in the wake of 2011’s instability.


For a nation like Egypt whose foreign policy, economic ties, and relations have straddled East and West for decades, “choosing sides” is not a simple matter.


Egypt’s fragile economic, social, and political balance has been repeatedly targeted by Western interests both directly and through militant proxies armed and backed by Persian Gulf states following attempts by Cairo to rebuild ties with Russia or to build closer ties with China.


The presence of the so-called “Islamic State” – the same militant force serving as proxies in Washington’s war on Syria – in Egypt’s Sinai region serves as a constant source of pressure attempting to coerce Cairo to pivot Westward.


Recent protests are also aimed at adding to this pressure.


As to why Egypt is facing such pressure now – we need only look at Washington’s recent escalation with Iran. Egypt under Morsi sought to weaken Syria as part of Washington’s wider conflict with Iran. Efforts to coerce Egypt into joining the US-led war in Yemen was also aimed at eliminating Iranian allies and further isolating Iran itself.


Key to any US foreign policy victory over Iran will be the creation of a regional, united front against Tehran – with nations – willingly or not – enlisted to play a role however small in isolating and undermining Iranian stability internally, regionally, and globally.


Should protests pick up sufficient momentum in Egypt – the prospect of Washington introducing demands in exchange for momentary relief from street violence will undoubtedly follow.


In the days and weeks ahead – Egypt’s ability or inability to contain the protests and resist US efforts to drag Cairo into another round of regional violence and instability – will in turn help indicate the wider prospects of peace or war in the region as Washington struggles to reassert itself at any cost.



Tony Cartalucci, Bangkok-based geopolitical researcher and writer, especially for the online magazine“New Eastern Outlook”, where this article first appeared.


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   
            


Free ebook How To Survive the Job Automation Apocalypse


Free ebook How To Get Started with Bitcoin: Quick and Easy Beginner’s Guide




      








Activist Post Daily Newsletter

         




   Email address:
   



     Yes - I consent to receive emails
   



   

Leave this field empty if you're human:


Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

      

Share
Tweet
Pin



Previous post


      
   

23

      

By Michael Snyder


Farmers in the middle of the country are about to get hit by what could potentially be the worst October blizzard in U.S. history.  According to USA Today, “the massive size and intensity of this snowstorm is unheard of for October”.  In other words, we have never seen anything like this in the month of October ever before.


Such a storm would have been disastrous enough in a normal year, but this has definitely not been a normal year for Midwest farmers.  As I detailed extensively in previous articles, endless rain and horrific flooding made planting season a complete and utter nightmare for many Midwest farmers this year.  Millions of acres did not get planted at all, and planting was seriously delayed on tens of millions of other acres.  As a result, corn, soybeans and other crops are simply not ready to be harvested in many parts of the Midwest, and now an unprecedented winter storm is barreling directly toward our heartland.


This is a very, very serious situation.  Normally, most corn in the Dakotas and Minnesota is considered to be “mature” by now, but this year we are facing a completely different scenario.


         



      

According to the latest USDA Crop Progress Report, only 22 percent of the corn in North Dakota is considered to be “mature” at this point…



Many farmers continue to wait on the sidelines to get into the fields. With freezing temperatures, heavy snowfall, and high winds set to hit the northern Plains this week, the corn in North Dakota is only 22% mature vs. a 75% five-year average, according to Monday’s USDA Crop Progress Report.


Also, South Dakota corn is rated 36% mature vs. an 80% five-year average. Minnesota farmers have a corn crop that is just 39% mature vs. an 83% five-year average.



And now here comes an “all-out blizzard”.


In case you are wondering, I am not the one that put such an extreme label on this storm.  In fact, Accuweather is specifically using that term to describe this historic storm…



An unusually far-reaching snowstorm for early October will stall, strengthen and evolve into an “all-out blizzard” over the Dakotas and then will send a blast of cold air across much of the Plains and Midwest.


Heavy snow has already fallen on the northern Rockies and was progressing southeastward along with a charge of cold air. Snow and slippery travel were also being reported in parts of Washington state, including around Spokane where new daily snowfall record for Oct. 8 was set. Spokane International Airport recorded 3.3 inches of snow Tuesday, shattering the previous record for the day, which was a trace set in 1981.



It is crazy that Spokane is already getting snow.


According to Yahoo News, that snowfall already makes this the “third-snowiest October” that the city has ever experienced…


Spokane, Washington, was one town that was hit particularly hard by the snow on Tuesday. A record-breaking 3.3 inches of snow fell, the first measurable snow in the month of October since 2001. It also made this month the third-snowiest October on record, following 3.9 inches in October of 1975 and 6.1 inches in October of 1957.


Ultimately, a few inches of snow is not that big of a deal.


But once this storm reaches the middle of the country, it is going to dump up to 2 feet of snow on some of our most important agricultural areas…



A general 6-12 inches is forecast over much of the Dakotas. However, a large swath of 12-24 inches is likely with an AccuWeather Local StormMax™ of 30 inches likely from north-central North Dakota to central and northeastern North Dakota.






Cities that could end up with 2 feet of snow include Bismarck, Jamestown and Devils Lake, North Dakota, as well as Mobridge, South Dakota, and Winnipeg, Manitoba.



Needless to say, that much snow at this time of the year is going to be absolutely devastating for many farmers.


And we are being told that this coming storm actually has “two parts”.  After the first part strikes, the second part is going to come rolling through on Friday and Saturday…



The storm will have two parts, the first of which is targeting the northern and central Rockies and High Plains on Wednesday into Thursday. The second part will bring snow to the eastern and central portions of the Dakotas and western Minnesota by week’s end.


“Near-blizzard to full-fledged blizzard conditions are possible across portions of central North Dakota Friday afternoon into Saturday morning,” the weather service in Bismarck said. “Expect high impacts and dangerous to impossible travel conditions.”



I can’t even imagine how corn and soybean farmers are going to feel once their unharvested fields are buried under two feet of snow.


As I keep warning, weather patterns just continue to become more extreme, and many believe that what we have witnessed so far is just the beginning of our problems.


There is one more thing that I would like to mention before I wrap up this article.


Do you remember the “Perfect Storm” that we witnessed in the Atlantic Ocean back in 1991?  Hollywood made a big movie about it, and that film ended up making more than 300 million dollars worldwide.




American Natural Superfood - Free Sample



Well, according to Accuweather a very similar storm is now developing in roughly the same location…


Interestingly, around the same time in 1991, the “Perfect Storm” was in the making over the western Atlantic Ocean. There are some similarities to the pattern this week with a smaller storm taking shape and stalling just off the mid-Atlantic and New England coasts.


I found this to be particularly interesting, because I wrote an article about “the perfect storm” that is about to hit America just a few days ago.  If you missed it, you can find my article entitled “The Book Is About To Close On The Late Great United States Of America” right here.


We live in truly unprecedented times, and things are about to start getting really crazy out there.


So get prepared for “the perfect storm” while you still can, because time is quickly running out.



About the author: Michael Snyder is a nationally-syndicated writer, media personality and political activist. He is the author of four books including Get Prepared Now, The Beginning Of The End and Living A Life That Really Matters. His articles are originally published on The Economic Collapse Blog, End Of The American Dream and The Most Important News. From there, his articles are republished on dozens of other prominent websites. If you would like to republish his articles, please feel free to do so. The more people who see this information the better, and we need to wake more people up while there is still time. Of course the most important thing that we can share with people is the gospel of Jesus Christ, and if you would like to learn more about how you can become a Christian I would encourage you to read this article.


Image credit: Pixabay


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   
            


Free ebook How To Survive the Job Automation Apocalypse


Free ebook How To Get Started with Bitcoin: Quick and Easy Beginner’s Guide




      








Activist Post Daily Newsletter

         




   Email address:
   



     Yes - I consent to receive emails
   



   

Leave this field empty if you're human:


Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

      

Share
Tweet
Pin



Previous post


      
   

24

      

By B.N. Frank


In 2007, former Vice President Dick Cheney was so worried that someone would try to murder him by hacking his wireless pacemaker that he had the antenna turned off (see 1, 2).  He wasn’t wrong to worry.  Over the years, the potential for pacemaker hacking has been reported by many experts.  In 2017, the FDA recalled almost ½ million pacemakers due to hacking concerns.


It makes NO sense that the FDA continues to approve wireless medical devices and doctors continue to prescribe them.  Electromagnetic Interference(EMI) seems to be a possibility with cell phone radiation – even the FDA says so.  Even a maker of wireless toothbrushes say so.


Now that 5G small cell technology is being forced on communities worldwide despite NO SCIENTIFIC EVIDENCE THAT IT IS SAFE and plenty of research that says it isn’t (see 1, 2, 3, 4) it seems reasonable that people with pacemakers and everyone else should be concerned.


         



      

From ABC3WEAR



5G cell phone antennas are coming to Pensacola, wireless companies like AT&T and Verizon said this will bring faster internet to the area.


But this has raised concerned with many people living in Pensacola.


Jeff Morris, Pensacola resident, said his main concern is his own health.


“I have a pacemaker and I know that I am not supposed to be anywhere close to high radio frequency equipment of any kind,” said Morris.


Cell phone towers emit radio frequency radiation.


Dr. Natalia Hernandez, Cardiac Electorophysiologist with Baptist Health said there is not enough research to support that 5G or any cell phones tower frequencies impact pacemakers.


“At this point we don’t have enough data to suggest that there is a negative impact, as with new technology we’ll just have to keep an eye on it and see how it involves in the future,” said Hernandez.



Wow.  I wonder how many of Dr. Hernandez’s patients will be comforted by her “keep an eye on it” approach.  Thank God not all doctors feel that way:


5G is an untested application of a technology that we know is harmful; we know it from the science. In academics, this is called human subjects research. – Dr. Sharon Goldberg




Activist Post reports regularly about 5G exposure research, risks, and opposition.  For more information, visit our archives and the following websites.



5GCrisis
5GExposed
5G Information
The 5G Summit
Whatis5G.Info
Electricsense
Electromagnetic Radiation Safety
Environmental Health Trust
My Street, My Choice
Physicians for Safe Technology
Scientists for Wired Tech
TelecomPowerGrab.org
Wireless Information Network


Image credit: Pixabay


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   

25

      

By MassPrivateI


A new Senate bill would create a real-time national driver surveillance program that would allow law enforcement to know anything and everything about a driver at the click of a button.


A recent article in WCVB Channel 5 revealed that the “Safe Drivers Act” is designed for one purpose and that is to share everything a motorist has ever done with law enforcement nationwide.


Outside the Danvers branch of the Registry of Motor Vehicles on Tuesday, Congressman Seth Moulton publicly announced legislation he’s filed in hopes of making it easier for traffic safety officials to share information about drivers across state lines.


How Moulton plans to make it easier to share drivers’ personal information with law enforcement across the country is frightening.


         



      

The ultimate goal of the bill is to help lead to the creation of a national, real-time data sharing program, Moulton’s office said.


Apparently, knowing a driver’s Social Security Number, address, date of birth, checking their driving record and running their name against a national criminal database is not enough.


There are few places in America that do not use Automatic License Plate Readers to track our every movement and even that does not appear to be enough for Big Brother’s insatiable desire to know everything about everyone.


The Salem News revealed that the bill would “incentivize states” into creating a national real-time driver sharing program.


Moulton said, “the goal is to incentivize states to modernize their systems and work together to make sure their databases are compatible to improve communication on dangerous drivers.”


WCVB Channel 5 explains how the U.S. DOT would offer states more than $50 million to help create a national real-time data sharing program.


Moulton’s bill would also create a $50 million competitive grant program that would allow states to bid for additional grant money and would enable the U.S. Department of Transportation to connect states that have similar modernization needs.


One has to ask, why would states need bribes grant money to help create a national driver surveillance program?


According to The Salem News, this bill would also give law enforcement, real-time alerts of every driver.







Massachusetts Governor Charlie Baker has also called for the creation of a nationwide system to alert states when one of their drivers incurs a violation that could trigger a suspension in another jurisdiction.



Will Amber Alerts become a thing of the past? Because this bill would give law enforcement real-time alerts about every driver.


I wonder if they will be called Bad Driver alerts?


The Safe Drivers Act is a privacy nightmare


H.R. 4531 would also give law enforcement access to videos of accidents a driver was involved in and much more.


Developing or acquiring programs to identify, collect, and report data to State and local government agencies, and enter data, including crash, citation or adjudication, driver, emergency medical services or injury surveillance system, roadway, and vehicle, into the core highway safety databases of a State.


Collecting and storing court judgements of any auto accident a motorist has been involved in will give law enforcement unprecedented access to a motorist’s driving records.


It would link core highway safety databases of a State with such databases of other States or with other data systems within the State, including systems that contain medical, roadway, and economic data.




Brave - The Browser Built for Privacy



Calling this a national, real-time data sharing program really doesn’t do it justice. It should be renamed and called a real-time national driver surveillance program.


You can bet that this bill will be modified to monitor motorists in ways that we haven’t dreamed of yet, making the “Safe Drivers Act” even more of a privacy nightmare.


By storing and tracking everything a motorist has ever been involved in, we are turning every driver into a suspected criminal, and that scares the you-know-what out of me.


Americans do not need or want another national surveillance program. We already have a national ID program called Real-ID, which gives law enforcement an unprecedented look into everyone’s personal lives.



You can read more at the MassPrivateI blog, where this article first appeared.


Image credit: Pixabay


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   
            


Free ebook How To Survive the Job Automation Apocalypse


Free ebook How To Get Started with Bitcoin: Quick and Easy Beginner’s Guide




      








Activist Post Daily Newsletter

         




   Email address:
   



     Yes - I consent to receive emails
   



   

Leave this field empty if you're human:


Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

      

Share
Tweet
Pin



Previous post


      
   

26

      

By Brandon Smith


As I write this, news feeds are buzzing with questions and confusion over the October US/China trade talks. In September there was a massive propaganda campaign within the mainstream media to push the notion that a deal with China was imminent, which boosted markets otherwise on the verge of a plunge due to a hailstorm of bad financial news. This media campaign also indicated to me that there would be no deal in October – best case, there will be an announcement of “progress” and a temporary pause in tariffs, which will fall apart once again in a month’s time. Worst case scenario, the talks will falter before they ever really begin. Either way, the trade war will continue well into next year.


As I predicted in my article ‘The Ugly Truth About The Trade War’ in September:


…Every couple of months the trade war deal hype is recycled and every couple of months the markets are hit with renewed disappointment. The latest trade talks are set for October and if they happen at all, it is unlikely they will result in anything of significance. At most, they will be heralded as the “start of a great deal” and both sides will claim “progress was made”, and then, once again, nothing will happen and the conflict will accelerate. You would think people would have figured it out by now, but the investment world learns very slowly and functions solely on blind hope. At the very least, economic analysts are starting to realize that no deal is coming and that the situation is only going to get more tense. In fact, it is designed to get more tense…


         



      

The trade war is only one of many major distractions being implemented at this time. While Trump plays his role for the globalist establishment as a bumbling populist villain and a Herbert Hoover clone, the sheer scope of events is becoming quite epic. This crash must be treated slightly different from the crash of 2008, because if we are to predict the pace of the implosion, we have to measure the number of geopolitical signals rather than just the financial signals.


That is to say, the globalists will trigger a Lehman Moment when there is enough geopolitical tension to keep the public mesmerized. In this way, they hope to conjure a “perfect storm”, one that can be blamed for the crisis they created. It would seem that as we close in on the end of 2019 we are very near to the avalanche…


Here I would like to briefly cover a number of developments that have accelerated in the past couple of weeks and give my take on what they mean to the liberty movement and the economy at large. Some people might question the idea that these events have economic implications. I suggest they look at the bigger picture. Much of what is happening today is engineered by the establishment not only as cover for the financial downturn, but also as partial fuel for collapse.


Trump/Ukraine Impeachment Circus


As I noted in my last article, Trump cannot be anti-globalist while working directly with global elites on a daily basis. The impeachment farce, like Russiagate, is carefully crafted 4th Generation warfare designed to keep leftists rabidly extreme while pushing conservatives fearful of a leftist takeover into the waiting arms of Trump, a puppet of the banking elites beholden to the Rothschild family for saving his fortune in the 1990s. The elites have no intention of getting rid of Trump at this time – he is too useful to them and their script, which requires an unstable conservative nationalist anti-globalist that eventually destroys the American economy.


Free Live Interview With America’s #1 Futurist October 15th — Register HERE.


The impeachment proceedings are far more likely to blow back on Joe Biden and remove him from the Democratic primaries, opening the door to an alternative candidate (probably Elizabeth Warren). With Bernie Sanders much too old and heart attack prone, Warren makes the most sense as the establishment choice for the 2020 Dem candidate.


Talk of Hillary Clinton entering the race as a kind of Cracker Jack candidate seems like Kabuki theater to me. Warren’s scandals are rather minor compared to Clinton’s, and really, the leftists don’t care anyway. Her lying about being fired from a job in the 1970s for a pregnancy will be forgotten well before November, especially in the event that we are in the middle of a 2008-level economic crash. Liberty movement activists should not get too worked up about Clinton, they should focus more on Warren, and overall, they should stop deluding themselves into thinking that the election matters in the slightest.


As for Trump’s impeachment, it will probably fall apart by the end of the Democratic primaries, but this in no way secures Trump’s presidency (for those that still actually think that Trump is on the side of the liberty movement). Trump’s role as president will only continue so long as the US economy limps forward. If we do see a Lehman moment before the election, then Trump is slated to be removed from office.


The only wild card scenario I could see taking place in terms of the impeachment is that it hangs on until the election and throughout the economic downturn, and is shockingly successful. In this case, Trump would be removed from office (potentially) just before he was about to lose the election anyway. Why would the establishment make such a move? Because it would galvanize both the left and the right into a possible widespread conflagration; more so that merely replacing Trump with someone like Warren.


Believe it or not, there are actually a minority of dummies in the liberty movement that want to fight a civil war over Trump. I suggest that it would be a strategic disaster to fight a civil war over a banker puppet that is TRYING to take credit for the market bubble and by default the crash. It would be the fastest way for the liberty movement to lose all credibility.   If we do end up in a war, it should not be in the name of Trump and should be focused on the banking elites, not the Democrats.   Beyond this, if the elites need a distraction and scapegoat for their controlled demolition of the economy, a mindless left/right civil war would be more than enough to do the trick.


US/China Trade War On The Edge Of Something More Dangerous


The trade war has lasted for around 22 months; far longer than most analysts in the mainstream and alternative media predicted. Do not be surprised if it goes on until the end of 2020, or perhaps even longer. The conflict (like Trump) is FAR too useful to simply get rid of at this time


There are some analysts out there that assume that the globalists want to keep the current system propped up. They assume that the elites need it to continue, or they will “lose their power”. I wish it was that easy. Sadly, these people have been blinded by a narrow view of events and history. The elites are VERY AWARE of the consequences of what they are doing, and they absolutely intend for those consequences to happen. In order for them to build their “new world order”, the old world order has to be dismantled.


Part of this process will eventually require the end of the US dollar’s world reserve status and it’s replacement with a basket currency system and a eventually a cashless society, as has been openly discussed by globalist institutions like the IMF.




Declare Your Independence!
Profit outside the rigged system! Protect yourself from tyranny and economic collapse. Learn to live free and spread peace!
Counter Markets Newsletter - Trends & Strategies for Maximum Freedom




   #mc_embed_signup {clear:left; font:14px Helvetica,Arial,sans-serif; text-align: center; padding-bottom: 15px; }
         .cmhead{color: rgb(255,199,27); text-shadow: 1px 1px 3px rgba(0,0,0,0.5); text-align: center; font-size: 250%; font-family: sans-serif; font-weight: 700;}
         .cmsubhead{color: rgb(255,255,255); text-align: center; font-size: 150%; font-family: sans-serif;}
         .cmformhead{color: rgb(30, 29, 29); font-size: 160%; font-family: sans-serif; margin-bottom: 10px;}
         #mc_embed_signup form { display: inline-block; background-color: #FFF; background-color: #FFF; margin-top: 20px; border-color: rgb(31, 31, 31);
    outline: none;
    background-color: rgb(255, 255, 255);
    opacity: 1;
    border-width: 3px;
    border-style: solid;
    border-radius: 5px;
    width:70%;
}
#mc_embed_signup input.email  {width: 90%; }
#mc_embed_signup input.button { width: 93%; background-color: rgb(246, 137, 34); border-bottom: 3px solid rgba(0,0,0,0.2); font-size: 160%;}
#mc_embed_signup .button:hover {background-color: #e67409;}
   /* Add your own MailChimp form style overrides in your site stylesheet or in this style block.
      We recommend moving this block and the preceding CSS link to the HEAD of your HTML file. */



   
         
Claim Your FREE Issue Today!
   
   


   





I can’t think of a better way for the elites to kill the dollar than to spark off a trade war with China until China uses the “nuclear option” as the largest importer/exporter in the world and abandons the dollar in global trade. With China dropping the dollar, numerous other nations will follow their lead in order to maintain ties to their manufacturing base. China has already begun dumping US treasuries exponentially. People tracking the trade war should understand that the final outcome if the trade war continues will be the end of the dollar’s reserve status.


Dollar advocates and fanboys will cry “No way!”, but they will be proven wrong in due course.


The Turkey/Syria/Kurdish Debacle


Over a year ago the Trump Administration pronounced the end of US troop involvement in Syria. This action was applauded by conservatives and liberty advocates as a sign that Trump was finally going to follow through on his campaign promises to stop the endless wars in the Middle East. Of course, it was announced only a week later that US troops would be staying where they were.


Now, we see the propaganda narrative that Trump is “fighting the establishment” yet again as he returns with ANOTHER declaration that US troops will be removed from Syria, this time in the face of a potential Turkish invasion in the region. I’m not sure how, but the Q-cult is spinning this move as a “Win” for Trump, perhaps because the Republican establishment is stating it is against the move. Already, Trump has been walking back his statements and indicating that troops will indeed be staying in Syria (but still not interfering in the ethnic cleansing of our Kurdish allies by Turkey).


This merely shows that nothing Trump says can be taken seriously and that we should wait and see what ACTUALLY happens in the coming weeks. In all likelihood, a Syrian “withdrawal” is meant to trigger a separate agenda, and this agenda may include an economic or shooting war with Turkey.


I have said for many years, long before the Syrian civil war was instigated by western covert agencies, that Syria represents a key component for a wider war in the Middle East. With so many interests involved in Syria, from the US to Iran to Russian to Turkey, one conflict in the region could spread into many conflicts. At the very least, it looks like my prediction in January that Turkey would leave NATO by the end of 2019 might be proven correct.


Brexit Confusion


I continue to see the Brexit storm in the UK resulting in a “No Deal” outcome, or, a bad deal outcome that looks a lot like a No Deal. I believe the Brexit itself, while noble in the movement that supports it, is actually a highly beneficial situation for the globalists IF it ends in a ‘No Deal’. The mainstream media and multiple elites have set the narrative that a No Deal will result in fiscal calamity. Of course, the elites have already ensured economic calamity by creating and then popping the Everything Bubble; but as with Trump in the US, they need someone to blame in Europe for the damage that is about to be done to the public.


The Brexit movement and sovereignty activists are the intended scapegoats. While the intricacies of parliamentary gymnastics in the UK are difficult to track, so far it appears that Boris Johnson will seek to follow through with Brexit at the end of this month. While there is a potential for a three month extension, I still see no indication that Johnson plans to acknowledge it. Even more interesting is that the EU is hell bent on refusing any deal, all while painting the Brexit campaign as uncompromising. It’s as if the European establishment WANTS a No Deal…




Avoiding The Eye - Ships Free Today!



This makes sense on a surface level, as any good deal that ends with the British leaving the EU might encourage other nations to leave the supranational union as well. A No Deal ending in disaster for the UK and parts of Europe would inspire Europeans to want even more centralization.  As the new head of the IMF stated this week, nations must ‘unite to halt the global economic slowdown’.  In other words, give up your sovereignty or you will be made to suffer.  But going much deeper, a No Deal blamed for an economic crash would also set up sovereignty activists in Europe as the bad guys, all while the banking elites elude any scrutiny.


The Perfect Storm?


I have to say, even more so than 2016, 2019/2020 is shaping up to be the most unstable time period in modern world history. I do not think this is a storm of coincidences. The evidence does not support this notion. Rather, the evidence shows a deliberate agenda of destabilization, one that serves the interests of a globalist minority that functions much like an organization of guerrillas, or terrorists. One of the primary goals of any guerrilla war is to covertly undermine the infrastructure and economy of a system so that the population is forced to adapt to a new way of thinking – and the globalists already have a particular ideology in mind.


In other words, chaos is useful in that it can be exploited to frighten or manipulate the public psyche. The most important target of a war is the mind of the enemy. Everything else is peripheral. Killing an enemy is not enough. There are always more to replace the ones you kill. But if you can trick the enemy into giving up, or thinking just like you do, or even trick him into admiring you, then your enemy becomes your slave without knowing it. No one will replace him, and thus, there are no more opponents to fight you. This is the path to total victory that the globalists most desire.



If you would like to support the work that Alt-Market does while also receiving content on advanced tactics for defeating the globalist agenda, subscribe to our exclusive newsletter The Wild Bunch Dispatch.  Learn more about it HERE.


After 8 long years of ultra-loose monetary policy from the Federal Reserve, it’s no secret that inflation is primed to soar. If your IRA or 401(k) is exposed to this threat, it’s critical to act now! That’s why thousands of Americans are moving their retirement into a Gold IRA. Learn how you can too with a free info kit on gold from Birch Gold Group. It reveals the little-known IRS Tax Law to move your IRA or 401(k) into gold.  Click here to get your free Info Kit on Gold.


You can contact Brandon Smith at: [email protected]


Image credit: Pixabay


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   
            


Free ebook How To Survive the Job Automation Apocalypse


Free ebook How To Get Started with Bitcoin: Quick and Easy Beginner’s Guide




      








Activist Post Daily Newsletter

         




   Email address:
   



     Yes - I consent to receive emails
   



   

Leave this field empty if you're human:


Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

      

Share
Tweet
Pin



Previous post


      
   

27

      

By Aaron Kesel


The fifth of November only happens once a year, quickly approaching, activists who associate themselves with the decentralized leaderless Anonymous collective are beginning to organize together for rallies across the world. So grab a sign, print out your paper Guy Fawkes mask, (provided for convenience in this article) and get ready to remember the fifth of November.


This year activists from all over the world plan to partake in the march highlighting human rights abuses, the rise of the surveillance state, the dangers of losing our internet and our ever decreasing freedom of speech and press.


Image


         



      

Specifically, Anonymous has vowed to at least in part dedicate its march to WikiLeaks Founder journalist Julian Assange, who faces a trial for extradition to the United States early next year. If extradited Assange will face up to 175 years in prison for simply publishing information that was in the public’s best interest, charged under the Espionage Act for his publishing of the Iraq/Afghanistan war logs and Cablegate publications — something that many journalists, activists and lawyers agree will set a precedent for journalism as a whole. CandlesForAssange, a movement of activists in support of the WikiLeaks publisher, are hosting Anonymous’ Million Mask March locations on its own website, urging protesters to print out a paper Assange mask and hold it up on a stick while protesting.



28
Huffington Post General Discussion / The Rise of Internet 2.0
« on: October 10, 2019, 02:24:33 AM »

      

By George Gilder


“The computer of the future will be as portable as your watch and as personal as your wallet. It will recognize speech and navigate streets, collect your mail and your news.”


I wrote that in 1990 in my book Life After Television.


Seventeen years later, the iPhone was announced in California to the amazement of the world.


How did I know that smartphones would exist almost two decades before the first device launched?


Simple. I followed the advice of Caltech’s Carver Mead: “Listen to the technology and find out what it is telling us.”


But what now?


         



      

The iPhone has become so mainstream that I see 3-year-olds brandishing the devices like action figures or toy dolls.


Well, based on what I’m hearing in the technology world today, the next phase of growth will involve a complete restructuring of the internet.


And it’s the basis for my newest book Life After Google, a title that happens to feature what I believe to be the first casualty of the new internet infrastructure.


A New Paradigm is About to Emerge


No one can argue Google’s impressive growth. It grew a company from nothing to a $700 billion market cap behemoth.


It has dominated in the world of search and cloud computing.


We live in the Google era. There’s no doubt about that. But that era is coming to an end.


Free Live Interview With America’s #1 Futurist October 15th — Register HERE.


I chose Google to highlight the problems with the current internet infrastructure because the company is fundamentally flawed.


Indeed, we already know that its advertising business is not sustainable.


Did you know that 30% of your payments for smartphone services go to download ads that you don’t want to see? And only 0.06% of these smartphone ads are clicked on?


According to surveys, 50% of these clicks are made in error. That means only 0.03% of ads are actually desired.


This is a catastrophe.


And it’s not a viable business. Google is coming to the end of the line in smartphone advertising.


Of course, advertising isn’t Google’s only business. It also offers search and solutions — where, through artificial intelligence and the company’s increasing accumulation of big data, it can answer all your questions.


But that is where Google becomes downright delusional.


Fundamentally Flawed


In my book, I call Google out as “neo-Marxist.”


Hear me out…


The key error of Marxism was Karl Marx’s belief that the Industrial Revolution of the 19th century was final attainment. That the problem of productivity and wealth creation had been solved forever.


And from then on, the only challenge would be how to distribute wealth, rather than how to create it.




Declare Your Independence!
Profit outside the rigged system! Protect yourself from tyranny and economic collapse. Learn to live free and spread peace!
Counter Markets Newsletter - Trends & Strategies for Maximum Freedom




   #mc_embed_signup {clear:left; font:14px Helvetica,Arial,sans-serif; text-align: center; padding-bottom: 15px; }
         .cmhead{color: rgb(255,199,27); text-shadow: 1px 1px 3px rgba(0,0,0,0.5); text-align: center; font-size: 250%; font-family: sans-serif; font-weight: 700;}
         .cmsubhead{color: rgb(255,255,255); text-align: center; font-size: 150%; font-family: sans-serif;}
         .cmformhead{color: rgb(30, 29, 29); font-size: 160%; font-family: sans-serif; margin-bottom: 10px;}
         #mc_embed_signup form { display: inline-block; background-color: #FFF; background-color: #FFF; margin-top: 20px; border-color: rgb(31, 31, 31);
    outline: none;
    background-color: rgb(255, 255, 255);
    opacity: 1;
    border-width: 3px;
    border-style: solid;
    border-radius: 5px;
    width:70%;
}
#mc_embed_signup input.email  {width: 90%; }
#mc_embed_signup input.button { width: 93%; background-color: rgb(246, 137, 34); border-bottom: 3px solid rgba(0,0,0,0.2); font-size: 160%;}
#mc_embed_signup .button:hover {background-color: #e67409;}
   /* Add your own MailChimp form style overrides in your site stylesheet or in this style block.
      We recommend moving this block and the preceding CSS link to the HEAD of your HTML file. */



   
         
Claim Your FREE Issue Today!
   
   


   





What does this have to do with Google?


Well, Google is just repeating Karl Marx’s error with the new technology.


Google believes that its artificial intelligence, its machine learning, its robotics, its algorithmic biology, its search, itssolutions, constitute a new final achievement of human beings.


In fact, I’d take it one step further. Google’s Marxism is even more grandiose than Karl’s original vision.


Google imagines a singularity where the machines will eclipse the human minds and allow all of the rest of us to retire on beaches and collect a guaranteed annual income.


In other words, robots are running the world. While the leaders of the revolution — like Sergey Brin and Larry Page — fly off with Elon Musk to some remote planet in a winner-take-all universe.


Again, this is delusional.


And not just because of the diminishing returns of big data. (The cost to store all of that data vs. the profits it generates.)


The flaw I’m talking about involves the human condition.


Machines Will Reach an Insurmountable Limit


You see, these big cloud data centers and artificial intelligence can only address a deterministic problem. Meaning the outcome is always determined by inputs. There can be no surprise. No entropy.


A deterministic problem can be solved by a machine. But they are irrelevant to information.


Ultimately, information is defined by surprise. It’s unexpected bits. And surprise is the essence of human creativity. Surprises in a machine represent a breakdown. It’s bad news when your machine starts  surprising you.




Brave - The Browser Built for Privacy



Of course, Google people try to simulate creativity in machines by introducing randomness to the machines. And they pretend that that is inherently creative. But they’re subtracting information rather than adding it.


Machines do not essentially think. They don’t know anything. There are systems of gates, of dumb components. They lack this creativity which is epitomized in only unexpected bits. The surprising results that human minds and imaginations can generate.


Google believes that with big data, it can predict everything. All the answers can be extracted from the company’s aggregations of big data.


But imagining that some technology that you’ve come up with is the final technology — one that will end the human adventure — is absurd.


Indeed, Google’s era will come to an end. Sooner than many think.


But what comes after?


What will be the new backbone of the internet that allows for spontaneity and creativity to flourish once again?


The blockchain. Yes, the same technology you associate with Bitcoin now.


Blockchain and related cryptographic technologies are about to lead a creative insurgency — one that will provide several profitable opportunities in the months ahead.


In fact, I’m revealing a few breakthrough strategies for profiting from the coming paradigm shift in the coming weeks.


Image credit: CoinTelegraph


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   
            


Free ebook How To Survive the Job Automation Apocalypse


Free ebook How To Get Started with Bitcoin: Quick and Easy Beginner’s Guide




      








Activist Post Daily Newsletter

         




   Email address:
   



     Yes - I consent to receive emails
   



   

Leave this field empty if you're human:


Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

      

Share
Tweet
Pin



Previous post


      
   

29

      

By B.N. Frank


EWG’s tip sheet serves as a good resource for parents who provide their kids with cell phones despite warnings indicated by many health experts including the American Academy of Pediatrics:


It’s probably not news to you that cellphone use may be harmful to you and your kids. Studies have found a possible link between cellphone radiation and brain and heart tumors, not to mention a range of symptoms associated with screen time addiction. With kids headed back to school in a matter of weeks, and wireless devices becoming more common in classrooms, how can parents limit the electromagnetic field exposure that comes with use of tablets, phones and other wireless devices?


         



      

Here are nine ways to decrease your kids’ EMF exposure:




Encourage airplane mode. Ask your kids to put their phones into airplane mode whenever they’re in class or just not using their phone. This will stop the phone from emitting EMF signals.


Focus on younger kids. Younger kids are most vulnerable to the harmful effects of radiation, so it’s important to keep devices away from them as much as possible, scaling back their use of wireless devices as toys. (If they do play a game on a device, make sure they do so in airplane mode.)


Use wires. Stick to ethernet wires when available.


Promote the use of headphones. The more distance between your kids’ bodies and their cellphones, the better. If you’re worried that headphones and earbuds could damage their hearing because of loud music, look for parent controls that will let you set a maximum volume level. 


Limit use at night. Establish a nightly cutoff time, and don’t let your kids take their phone to bed. This will not only lower their EMF exposure but also to improve their sleep. They should never sleep with their phone under their pillow. (Here are other ideas for lowering EMF exposure at home.)


Engaging with your kids’ school. Lots of great lifetime habits begin at school, and that can include safer cellphone use. In fact, school policies can play a role in helping minimize your children’s exposure. Questions to ask your kids’ school administrators or teachers:



What’s the current policy regarding in-school use?
Are kids told to put their phone into airplane mode at the start of every class?
How are educators helping parents and children learn about safer uses of technology?



Remember the router. Wi-Fi routers also emit EMF radiation. Make sure to locate your home’s router away from where kids spend time, and away from their bedroom. Some experts suggest turning off the router at night to minimize EMF.


Carry safely. The best place to carry a cellphone is in a bag. Boys and young men in particular should avoid carrying their device in their front pocket, because of the possible effect of radiation on male fertility. Girls and women should avoid putting their phone in their bra, and pregnant women should limit their cellphone use altogether.


Don’t forget Bluetooth. Bluetooth transmits EMF, although at lower levels compared to cellphones. So consider sticking with old-school wired earbuds, and if your children have Bluetooth-enabled devices, teach them to take the earbuds off when they aren’t using them.


https://www.youtube.com/watch?v=FRPnXsEVGUY


The good news is that every day there seem to be more reports about schools banning cell phones and kids embracing this.  Hooray!


What would be really great is if EWG also started recognizing that utility Smart Meters ALSO expose children and everyone else to harmful EMF and they finally STOP ENDORSING THEM because THEY ARE NOT BENEFICIAL to customers (see 1, 2, 3, 4, 5, 6, 7, 8, 9) and THEY ARE REALLY BAD for the environment.  Hint hint!











American Natural Superfood - Free Sample



Activist Post reports regularly about all sources that emit harmful Electromagnetic Radiation aka “Electrosmog”.  For more information, visit our archives and the following websites:



Wireless Information Network
Center For Electrosmog Prevention
Electromagnetic Radiation Safety
EMF Safety Network
Environmental Health Trust
National Association for Children and Safe Technology
Parents for Safe Technology
SafeTechForSchools
Scientists for Wired Tech
Coalition to Stop Smart Meters
SmartMeterHarm
Smart Grid Awareness
StopSmartMeters.org
Take Back Your Power

 



Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   
            


Free ebook How To Survive the Job Automation Apocalypse


Free ebook How To Get Started with Bitcoin: Quick and Easy Beginner’s Guide




      








Activist Post Daily Newsletter

         




   Email address:
   



     Yes - I consent to receive emails
   



   

Leave this field empty if you're human:


Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

      

Share
Tweet
Pin



Previous post


Next post


      
   

30

      

By Gennie Gebhart and Jacob Hoffman-Andrews


Stop us if you’ve heard this before: you give a tech company your personal information in order to use two-factor authentication, and later find out that they were using that security information for targeted advertising.


That’s exactly what Twitter fessed up to yesterday in an understated blog post: the company has been taking email addresses and phone numbers that users provided for “safety and security purposes” like two-factor authentication, and using them for its ad tracking systems, known as Tailored Audiences and Partner Audiences.


Twitter claims this was an “unintentional,” “inadvertent” mistake. But whether this was avarice or incompetence on Twitter’s part, the result confirms some users’ worst fears: that taking advantage of a bread-and-butter security measure could expose them to privacy violations. Twitter’s abuse of phone numbers for ad tracking threatens to undermine people’s trust in the critical protections that two-factor authentication offers.


         



      

How Did Your 2FA Phone Number End Up in Twitter’s Ad Tracking Systems?!


Here’s how it works. Two-factor authentication (2FA) lets you log in, or “authenticate,” your identity with another piece of information, or “factor,” in addition to your password. It sometimes goes by different names on different platforms—Twitter calls it “login verification.”


There are many different types of 2FA. SMS-based 2FA involves receiving a text with a code that you enter along with your password when you log in. Since it relies on SMS text messages, this type of 2FA requires a phone number. Other types of 2FA—like authenticator apps and hardware tokens—do not require a phone number to work.


Activist Post Recommended Book: The Age of Surveillance Capitalism


No matter what type of 2FA you choose, however, Twitter makes you hand over your phone number anyway. (Twitter now also requires a phone number for new accounts.) And that pushes users who need 2FA security the most into an unnecessary and painful choice between giving up an important security feature or surrendering part of their privacy.


In this case, security phone numbers and email addresses got swept up into two of Twitter’s ad systems: Tailored Audiences, a tool to let an advertiser target Twitter users based on their own marketing list, and Partner Audiences, which lets an advertiser target users based on other advertisers’ marketing lists. Twitter claims the “error” occurred in matching people on Twitter to these marketing lists based on phone numbers or emails they provided for “safety and security purposes.”


Twitter doesn’t say what they mean by “safety and security purposes,” but it is not necessarily limited to 2FA. In addition to 2FA information, it could potentially include the phone number you have to provide to unlock your account if Twitter has incorrectly marked it as a bot. Since Twitter forces many people into providing such a phone number to regain access to their account, it would be particularly pernicious if Twitter was using phone numbers gathered from that system for advertising.


What We Don’t Know




Declare Your Independence!
Profit outside the rigged system! Protect yourself from tyranny and economic collapse. Learn to live free and spread peace!
Counter Markets Newsletter - Trends & Strategies for Maximum Freedom




   #mc_embed_signup {clear:left; font:14px Helvetica,Arial,sans-serif; text-align: center; padding-bottom: 15px; }
         .cmhead{color: rgb(255,199,27); text-shadow: 1px 1px 3px rgba(0,0,0,0.5); text-align: center; font-size: 250%; font-family: sans-serif; font-weight: 700;}
         .cmsubhead{color: rgb(255,255,255); text-align: center; font-size: 150%; font-family: sans-serif;}
         .cmformhead{color: rgb(30, 29, 29); font-size: 160%; font-family: sans-serif; margin-bottom: 10px;}
         #mc_embed_signup form { display: inline-block; background-color: #FFF; background-color: #FFF; margin-top: 20px; border-color: rgb(31, 31, 31);
    outline: none;
    background-color: rgb(255, 255, 255);
    opacity: 1;
    border-width: 3px;
    border-style: solid;
    border-radius: 5px;
    width:70%;
}
#mc_embed_signup input.email  {width: 90%; }
#mc_embed_signup input.button { width: 93%; background-color: rgb(246, 137, 34); border-bottom: 3px solid rgba(0,0,0,0.2); font-size: 160%;}
#mc_embed_signup .button:hover {background-color: #e67409;}
   /* Add your own MailChimp form style overrides in your site stylesheet or in this style block.
      We recommend moving this block and the preceding CSS link to the HEAD of your HTML file. */



   
         
Claim Your FREE Issue Today!
   
   


   





Twitter’s post downplays the problem, leaving out numbers about the scope of the harm, and details about who was affected and for how long. For instance, if Twitter locked you out of your account and required that you add a phone number to get back in, was your phone number misused for advertising? If Twitter required you to add a phone number when you signed up, for anti-spam purposes, was your phone number misused? When is an email address considered “fair game” for ad targeting and when is it not?


Twitter claims it “cannot say with certainty how many people were impacted by this.” That may be true if they are trying to parse finely who actually received an ad. But that’s an excessively narrow view of “impact.” Every user whose phone number was included in this inappropriate targeting should be considered impacted, and Twitter should disclose that number.


2FA is Not the Problem


Based on what we know, and what else we can reasonably guess about how Twitter users’ security information was misused for ad tracking, Twitter’s explanation stretches the meaning of “unintentionally.” After all, the targeted advertising business model embraced by Twitter (and by most other large social media companies) incentivizes ad technology teams to scoop up data from as many places as they can get away with—and sometimes they can get away with quite a lot.


The important conclusion for users is: this is not a reason to turn off or avoid 2FA. The problem here is not 2FA. Instead, the problem is how Twitter and other companies have misused users’ information with no regard for their reasonable security and privacy expectations.


What Next


Twitter needs to come clean about exactly what happened, when, and to how many people. It needs to explain what processes it is putting in place to ensure this doesn’t happen again. And it needs to implement 2FA methods that do not require giving Twitter your phone number.





Brave - The Browser Built for Privacy



Gennie conducts and manages research and advocacy for the Electronic Frontier Foundation on consumer privacy, surveillance, and security issues.


Jacob is a lead developer on Let’s Encrypt, the free and automated Certificate Authority. He also works on EFF’s Encrypt the Web initiative and helps maintain the HTTPS Everywhere browser extension.


This article was sourced from EFF.org


Subscribe to Activist Post for truth, peace, and freedom news. Follow us on Minds, Twitter, Steemit, and SoMee. Become an Activist Post Patron for as little as $1 per month.


Provide, Protect and Profit from what’s coming! Get a free issue of Counter Markets today.


   
            


Free ebook How To Survive the Job Automation Apocalypse


Free ebook How To Get Started with Bitcoin: Quick and Easy Beginner’s Guide




      








Activist Post Daily Newsletter

         




   Email address:
   



     Yes - I consent to receive emails
   



   

Leave this field empty if you're human:


Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

      

Share
Tweet
Pin



Previous post


      
   

Pages: 1 [2] 3 4 ... 641