Recent Posts

Pages: [1] 2 3 ... 10
1

   

      

http://www.activistpost.com/wp-content/uploads/2017/05/counterterrorism-300x158.jpg 300w, http://www.activistpost.com/wp-content/uploads/2017/05/counterterrorism-768x403.jpg 768w" sizes="(max-width: 777px) 100vw, 777px">By Claire Bernish


Indigenous water protectors and their non-Native American allies — who camped in North Dakota in close proximity to the Missouri River to oppose construction of the disputatious Dakota Access Pipeline — were likened to violent jihadist fighters by dubious mercenary international security firm, TigerSwan.


Obtained by The Intercept, internal TigerSwan communications “describe the movement as ‘an ideologically driven insurgency with a strong religious component’ and compare the anti-pipeline water protectors to jihadist fighters,” that outlet reports.


Worse, TigerSwan repeatedly described water protectors as “terrorists” — yes, literally.


Reports The Intercept:


One report, dated February 27, 2017, states that since the movement ‘generally followed the jihadist insurgency model while active, we can expect the individuals who fought for and supported it to follow a post-insurgency model after its collapse.’ Drawing comparisons with post-Soviet Afghanistan, the report warns, ‘While we can expect to see the continued spread of the anti-DAPL diaspora … aggressive intelligence preparation of the battlefield and active coordination between intelligence and security elements are now a proven method of defeating pipeline insurgencies.’



Members of the Standing Rock Sioux and Cheyenne River Sioux Tribes engendered the support of thousands of Indigenous Peoples and their supporters in encampments near Cannon Ball in an heroic effort to thwart Energy Transfer Partners’ Bakken pipeline project — but, for their prayerful, peaceful, and largely nonviolent actions to be equated with violent militants is, well, inexplicable.


According to The Intercept, a TigerSwan employee leaked more than 100 internal documents proving the firm led a multi-fronted campaign of pernicious surveillance of activists and water protectors. Over 1,000 documents given the outlet upon public records requests affirm in detail the colossal surveillance program.








TigerSwan — in obeisance to fossil fuel colossus ETP — employed a “militaristic approach to protecting its client’s interests but also the company’s profit-driven imperative to portray the nonviolent water protector movement as unpredictable and menacing enough to justify the continued need for extraordinary security measures. Energy Transfer Partners has continued to retain TigerSwan long after most of the anti-pipeline campers left North Dakota, and the most recent TigerSwan reports emphasize the threat of growing activism around other pipeline projects across the country.”


Between September 2016 and May 2017, TigerSwan regularly fed ETP ‘situation reports’ containing comprehensive updates by operatives in North Dakota, South Dakota, Iowa, Illinois, and Texas, including surveillance of activists and their planned protests — as well as detailed notes culled from social media.


Documents “also provide extensive evidence of aerial surveillance and radio eavesdropping, as well as infiltration of camps and activist circles,” The Intercept notes.


Water protectors and independent journalists indeed recounted extensive surveillance and communications breaches while in Standing Rock camps and at the Tribe’s Prairie Knights Casino — especially pertaining to social media and two-way radios — so much so, newcomers to the area were immediately warned they would be watched.


Beyond the internal TigerSwan communiqués, documents evincing coordination and shared intelligence between the FBI, Department of Homeland Security, the U.S. Justice Department, the Marshals Service, the Bureau of Indian Affairs, and a veritable cadre of state and local police — collectively deeming itself the “Intel Group” — reveal the real-time monitoring of the #NoDAPL movement on social media.


“Daily intelligence updates,” generated by TigerSwan and obtained by public records requests attest to this chimerical government-private alliance amongst the various law enforcement agencies and the security firm — whose “operatives comment frequently about their routine coordination and intelligence sharing with law enforcement.”


In an ominous portent for future protest actions, as The Intercept asserts, “The intel group went so far as to use a live video feed from a private Dakota Access security helicopter to monitor protesters’ movements. In one report, TigerSwan discusses meeting with investigators from North Dakota’s Attorney General’s Office.”


Names of ‘dozens’ of “well-known activists” — and even those thinly associated with opposition to Dakota Access — appear in the documents.


Reports shared by TigerSwan with the lengthy list of agencies read more like a comprehensive, collective, psychological evaluation — parsing out information such as the dynamics in the various camps, morale, infighting, and speculation on whether or not planned actions would be illegal or violent, including the potentiality weapons would come into play.


Photographs, license plates, and additional information identifying water protectors can also be found in the cache — along with a list of “persons of interest.”


Unsurprisingly, the Intercept notes, records exhibit attempted counterintelligence operations by TigerSwan, in the dissemination of posts to social media condemning actions by water protectors. Reports the outlet,



TigerSwan’s internal files describe its utilization of aerial surveillance, including use of helicopters and drones to photograph and monitor the pipeline opponents. The September 12 situation report notes that an operation by construction workers was ‘over-watched by a predator on loan to the JEJOC from Oklahoma.’ The TigerSwan contractor who provided the Intercept with the situation reports said he did not believe the company ever operated a predator drone, but metadata in images he shared pointed to a camera used by a commercially available Phantom 4 drone. One of the daily intelligence updates notes plans to obtain night-vision goggles, LRADs, body armor, and FLIR (forward looking infrared) cameras.


The reports also reveal a widespread and sustained campaign of infiltration of protest camps and activist circles. Throughout the leaked documents, TigerSwan makes reference to its intelligence-gathering teams, which infiltrated protest camps and activist groups in various states. TigerSwan agents using false names and identities regularly sought to obtain the trust of protesters, which they used to gather information they reported back to their employer, according to the TigerSwan contractor.



An October 3 report states,


Exploitation of ongoing native versus non-native rifts, and tribal rifts between peaceful and violent elements is critical in our effort to delegitimize the anti-DAPL movement.


Then, on February 19, plans for infiltration appear:


TigerSwan collections team will make contact with event organizers to embed within the structure of the demonstration to develop a trusted agent status to be cultivated for future collection efforts.





A terrifying report, dated May 4, evidences “a TigerSwan operative describes an effort to amass digital and ground intelligence that would allow the company to ‘find, fix, and eliminate’ threats to the pipeline — an eerie echo of ‘find, fix, finish,’ a military term used by special forces in the U.S. government’s assassination campaign against terrorist targets.”


Unapologetically, if farcically, militaristic language in the communications from TigerSwan paint the peaceful water protector movement as a finely-oiled machine on par with counterterrorism operations undertaken by nation-states — a tactic telling of brazen hostility by the firm toward activists whose sole concern continues to comprise protection of the water supply from contamination with noxious fossil fuels.


“At times, the military language verges on parody,” note the Intercept journalists, “as when agents write of protesters ‘stockpiling signs’ or when they discuss the ‘caliber’ of paintball pellets. More often, however, the way TigerSwan discusses protesters as ‘terrorists,’ their direct actions as ‘attacks,’ and the camps as a ‘battlefield,’ reveals how the protesters’ dissent was not only criminalized but treated as a national security threat. A March 1 report states that protesters’ ‘operational weakness allows TS elements to further develop and dictate the battlespace.’”


While the Intercept report goes into far greater detail on these phenomenally revealing communications, the fact TigerSwan — and, thus, the law enforcement and intelligence agencies making use of its reports — literally characterized water protectors as “terrorists” should not be blithely ignored.


Protest is and inarguably must remain a constitutionally-protected activity — period.


When myriad insidious government agencies partner with a firm known for shady, violent, and potentially illegal actions confronts a movement dedicated solely to nonviolent, prayerful actions, the ability to redress grievances through demonstration stands directly threatened.


Whatever your particular position on the Dakota Access Pipeline — and the fossil fuel industry, in general — to qualify activists as terrorists prognosticates the coming end to protest and resistance in the U.S.


This war on dissent, in all its fetid ugliness, leads only to resounding totalitarian rule; thus — if you value the shreds of freedom and liberty still clinging to existence in the United States — resentment toward the #NoDAPL movement and other protesters must, instead, be turned toward the arrogant rulers convinced The People are Enemy Number One.


Claire Bernish began writing as an independent, investigative journalist in 2015, with works published and republished around the world. Not one to hold back, Claire’s particular areas of interest include U.S. foreign policy, analysis of international affairs, and everything pertaining to transparency and thwarting censorship. To keep up with the latest uncensored news, follow her on Facebook or Twitter: @Subversive_Pen. This article first appeared here at The Free Thought Project.


   
2

   

      

http://www.activistpost.com/wp-content/uploads/2017/05/bombshell-is-300x174.png 300w, http://www.activistpost.com/wp-content/uploads/2017/05/bombshell-is-768x446.png 768w" sizes="(max-width: 775px) 100vw, 775px">By Bernie Suarez


Magical and logic-defying ISIS is not only suddenly living in caves in Afghanistan where they now project the illusion of perpetual existence just like “al Qaeda” but they are now conveniently in the Philippines where President Duterte had declared the U.S. his enemies in 2016. The ruling elite NEED ISIS to not only exist but to appear indestructible and permanently elusive in order to keep the ISIS script going. This is why the West and its allies have been supporting ISIS since day one with supplies and weapons without which they would not even exist today. This should be enough to anger every single American.


Why is all of this happening? Because it guarantees that the U.S. can continue rationalizing wars, government overthrows, invasions and more attacks throughout not only the Middle East but wherever they decide to retroactively give ISIS “credit” for “explosions” that take place anywhere in the world. Also, the perceived perpetual existence of ISIS guarantees the continued flow of BILLIONS of dollars to the Pentagon Slush Fund and much more. It’s a win-win for both the Neocons and the globalists attempting to overthrow Trump but also the Military Industrial Complex.



Given that information is freely and easily available today, anyone can see that the Islamic State or ISIS is nothing more than a convenient proxy army to serve the needs of the West and its allies. Denying this reality is a CHOICE made of ignorance. That selective ignorance is the reason why “ISIS” is alive and well in many people’s minds. This is a perfect dream scenario for the criminals who did 9/11 who to this day are still laughing at the idiots who still believe CIA’s creation “al Qaeda” did 9/11. Such is the political world we live in.


If you understand this ISIS script and how it’s being used to push the globalist new world order agenda and help the US Military Industrial Complex wage more and more war worldwide as the US destroys its enemies, help spread this information so that humanity can move forward based on truth not mainstream media lies and propaganda. This truth about ISIS will also help hold politicians accountable and give more voice to politicians like Representative Tulsi Gabbard in Hawaii.






Bernie is a revolutionary writer with a background in medicine, psychology, and information technology. He is the author of The Art of Overcoming the New World Order and has written numerous articles over the years about freedom, government corruption and conspiracies, and solutions. Bernie is also the creator of the Truth and Art TV project where he shares articles and videos about issues that raise our consciousness and offer solutions to our current problems. As a musician and artist his efforts are designed to appeal to intellectuals, working class and artists alike and to encourage others to fearlessly and joyfully stand for truth. His goal is to expose government tactics of propaganda fear and deception and to address the psychology of dealing with the rising new world order. He is also a former U.S. Marine who believes it is our duty to stand for and defend the U.S. Constitution against all enemies foreign and domestic. He believes information and awareness is the first step toward being free from the control system which now threatens humanity. He believes love conquers all fear and it is up to each and every one of us to manifest the solutions and the change that you want to see in this world because doing this is what will ensure victory and restoration of the human race and offer hope to future generations.


   
3

   

      

http://www.activistpost.com/wp-content/uploads/2017/05/terror-passport-global-research-300x171.jpg 300w, http://www.activistpost.com/wp-content/uploads/2017/05/terror-passport-global-research-768x438.jpg 768w" sizes="(max-width: 777px) 100vw, 777px">By Michel Chossudovsky


This article reviews the “mysterious” phenomenon of IDs and Passports of terror suspects routinely discovered (often in the rubble) in the wake of a terrorist attack.


In most cases the alleged suspect was known to the authorities.


Is there a pattern?  The ID papers of the suspect are often left behind, discovered by police in the wake of a terrorist attack.


According to government and media reports, the suspects are without exception linked to an Al Qaeda affiliated entity.   


None of these terror suspects survived. Dead men do not talk. 



In the case of the tragic events in Manchester, the bankcard of the alleged suicide bomber Salman Abedi was found in his pocket in the wake of the explosion. 








Legitimacy of the official stories? The UK is both a “victim of terrorism” as well as a “State sponsor of terrorism”. Without exception, the governments of the Western countries victims of terror attacks, have supported, directly or indirectly, the Al Qaeda group of terrorist organizations including the Islamic State (ISIS), which are allegedly responsible for waging these terror attacks. Amply documented Al Qaeda is a creation of the CIA. 


Below is a review of the circumstances and evidence pertaining to passports and IDs discovered in the wake of selected terror attacks, with links to Global Research articles and media reports (2001-2017). (This list is by no means exhaustive)


From NYC on 9/11 to Manchester, May 2017


In reverse chronological order


emphasis added


The Manchester Terror Attack,  May 2017.


Manchester Bomb Suspect Said to Have Had Ties to al Qaeda …







NBCNews.com–May 23, 2017 MANCHESTER, England — Salman Abedi, the 22-year-old British man … in a suicide-bomb attack, had ties to al Qaeda and had received terrorist training … was identified by a bank card found in his pocket at the scene of the ...



Manchester Attack as MI6 Blowback?


By Evan Jones, May 26, 2017









A bankcard has been conveniently found in the pocket of the … Daesh has claimed responsibility for the Manchester attack, but without …”




http://www.globalresearch.ca/wp-content/uploads/2017/05/Screen-Shot-2017-05-26-at-12.11.21-300x179.png 300w, http://www.globalresearch.ca/wp-content/uploads/2017/05/Screen-Shot-2017-05-26-at-12.11.21-768x458.png 768w, http://www.globalresearch.ca/wp-content/uploads/2017/05/Screen-Shot-2017-05-26-at-12.11.21-400x238.png 400w, http://www.globalresearch.ca/wp-content/uploads/2017/05/Screen-Shot-2017-05-26-at-12.11.21.png 1198w" alt="" width="503" height="300">

No image of the alleged bankcard is available.


Ironically, the suspect Abedi was first identified by Washington rather than UK police and security. How did they know who was the culprit 3 hours after the explosion? According to Graham Vanbergen:


In the early hours of the morning of the 23rd May – approximately 02.35BST   NDTV via the Washington Post stated quite categorically that:


“U.S. officials, speaking on the condition of anonymity, identified the assailant as Salman Abedi. They did not provide information about his age or nationality, and British officials declined to comment on the suspect’s identity.


This was published at a time when British police and security services were refusing to make any statements as to who they thought the perpetrators were because at the time, they were dealing with the immediate aftermath of the event.


Berlin Truck Terror Attack, December 2016.




The Berlin Truck Terror Suspect and the Curious Matter of ID Papers Left Behind


By WhoWhatWhy, December 22, 2016


The Berlin Truck Terror Suspect and the Curious Matter of ID Papers Left Behind. By WhoWhatWhy. Global Research, December 22, 2016. Who What Why 21 ….:




The suspect’s identity papers were found inside the truck used in Monday’s attack on a Christmas market, which left 12 people dead, German security officials said.


The suspect was known to German security services as someone in contact with radical Islamist groups, and had been assessed as posing a risk, Interior Minister of North Rhine-Westphalia Ralf Jaeger told reporters.



Berlin Truck Attack



Source: Daily Mail, July 15, 2016


The Nice Terror Attack July 2016





The Nice Terror Attack: Towards a Permanent State of Martial Law in … the alleged perpetrator is dead and conveniently left behind his ID.



Nice, 14th of July Massacre: Towards Martial Law? The Islamic State (ISIS-Daesh) Claims Responsibility?


By Peter Koenig, July 15, 2016




According to Peter Koenig in relation to the Nice terror attack:








During last night’s celebration of the French National Holiday, around 11 PM, a speeding truck plowed into a crowd of thousands who were watching the fireworks along the Mediterranean Boulevard Anglais. The driver of the truck, was simultaneously and  indiscriminately shooting into the crowd. He was able to run for 2 kilometers before being stopped by police, which instantly shot and killed him.


1000 Lumen Military Grade LED Flashlight – Free (Ad)


A horrendous terror attack, killing hordes of people, spreading pain, misery, fear and outrage in France, Europe – the world over.All indications signal the Big Script of yet another false flag; yet again in France.


The young truck-driver was identified as a 31-year-old Frenchman, resident of Nizza, with Tunisian origins. As in previous cases, ‘coincidence’ has it that his identity papers were found in the truck.


http://www.globalresearch.ca/wp-content/uploads/2016/07/Screen-Shot-2016-07-15-at-11.07.24-300x194.png 300w, http://www.globalresearch.ca/wp-content/uploads/2016/07/Screen-Shot-2016-07-15-at-11.07.24-400x259.png 400w" alt="" width="614" height="399">


The young man is instantly killed by the police. Dead people cannot talk. A pattern well known by now.



Paris Charlie Hebdo Terror Attack, January 2015







Police found the ID of Said Kouachi at the Scene of the Charlie Hebdo Shooting. Does this Sound Familiar?


By Dr. Paul Craig Roberts, January 10, 2015  



“According to news reports, police found the ID of Said Kouachi at the scene of the Charlie Hebdo shooting. Does this sound familiar? Remember, authorities claimed to have found the undamaged passport of one of the alleged 9/11 hijackers among the massive pulverized ruins of the twin towers.”



Paris Bataclan Terror Attack, November 2015




The Paris Terror Attacks and 911: Similar “Evidence” Makes it Suspicious


By Timothy Alexander Guzman, November 20, 2015 


The Islamic State (ISIS/ISIL) declared that it was responsible for the latest attacks in Paris as did Al-Qaeda who also claimed responsibility for 911. … However, there are similarities between the terror attacks in Paris and New York City on September 11th.


First, Syrian and Egyptian passports from two of the suicide bombers were found at the scene of the stadium attack in the northern part of the city. After both suspected terrorists detonated their explosive devices, their passports were still found.


This brings us back to the September 11th terror attacks where U.S. officials recovered a passport intact a few blocks from the World Trade Center which did belong to one of the hijackers,










Magic Passports Redux: Syrian Passport Allegedly Discovered on Paris Suicide Bomber


By 21st Century Wire, November 14, 2015





In the context of the enquiry about the Paris massacres, a Syrian passport was found next to one of the kamikaze bombers of Stade de France. After being pointed out as responsible for the attacks by President Hollande, ‘the Islamic State’ claimed that they had engineered the onslaught. The French executive, that had already stated that they wanted to take action in Syria allegedly against ISIS, but actually against Bachar El Assad, who ‘has to go’, sees in this a significant clue that comfort their military expedition.



London 7/7 Terror attack, July 7, 2004






http://www.globalresearch.ca/wp-content/uploads/2013/07/mi6-108x98.jpg 108w" alt="" width="51" height="46">

The 7/7 London Bombings and MI5’s “Stepford Four” Operation: How the 2005 London Bombings Turned every Muslim into a “Terror Suspect”


By Karin Brothers, May 26, 2017





On Tuesday, July 12th, Lindsay’s wife Samantha Lewthwaite had called police to report her husband Germaine (“Jamal”) missing.  Police searched their home immediately. The next day, on July 14th, police announced that they had Lindsay’s ID and he was the fourth bomber. Lewthwaite was incredulous and refused to believe the accusation without DNA proof.  The police identification was stunning because they had been claiming that all of the suspects looked Pakistani; there was no way anyone could mistake the big, black Lindsay for an Asian. What had police been looking at?




9/11 Terror Attacks: September 11, 2001






Was America Attacked by Muslims on 9/11?


By David Ray Griffin, September 11, 2016



9/11 Truth and the Joint Congressional Inquiry: 28 Pages of Misdirection on the Role of Saudi Arabia


By Dick Atlee and Ken Freeland, September 11, 2015


For years the 9/11 Truth movement (9TM) has been vainly pleading with ….. FBI agent Dan Coleman explains how the passport of 9/11 hijacker …



9/11 Contradictions: Mohamed Atta’s Mitsubishi and His Luggage


By David Ray Griffin, May 09, 2008


9/11 Contradictions: Mohamed Atta’s Mitsubishi and His Luggage … It also contained a Saudi passport, an international driver’s license, …








In the official version for 9/11 the FBI claimed that they found the unscathed passport of one of the pilots near one of the towers that were reduced to ashes by explosions whose heat melted even the steel columns in the buildings’ structure. The fourth plane’s crash near Shanksville also yielded a passport which, though scorched, still made it possible to read the person’s first name and surname and to see his ID photo. This is all the more disturbing as nothing at all was left in the crater, no part of the plane or of the people travelling in it, only this partly scorched passport.





Confirmed by Dan Rather CBS News, “a passerby found the passport of one of the hijackers” on the street just hours after the 9/11 attacks. (1′.23″)



According to Who What Why:


The Visa of Satam al-Suqami: This identify document of one of the alleged 9/11 hijackers somehow survived unscathed a few blocks from the twin towers, though the plane itself was virtually obliterated.


Visa belonging to Satam al-SuqamiVisa belonging to Satam al-Suqami


The Passports belonging to Ziad Jarrah and Saeed al-GhamdiThe passports of two alleged hijackers of United Airlines Flight 93 supposedly survived the fiery crash in Pennsylvania that left the aircraft itself charred and widely scattered—with one passport entirely intact.


Remains of Ziad Jarrah's visa.Remains of Ziad Jarrah’s visa.


Passport of Saeed al-GhamdiPassport of Saeed al-Ghamdi



The original source of this article is Global Research

Copyright © Prof Michel Chossudovsky, Global Research, 2017, republished at Activist Post with permission.

   
4

   

      

http://www.activistpost.com/wp-content/uploads/2017/05/nuclear-300x158.jpg 300w, http://www.activistpost.com/wp-content/uploads/2017/05/nuclear-768x403.jpg 768w" sizes="(max-width: 777px) 100vw, 777px">By Claire Bernish


A catastrophe far worse than Fukushima lurks in the United States, as the Nuclear Regulatory Commission used faulty data to estimate potentially ruinous risks of a nuclear-waste fire — one which could occur at any one of dozens of sites across the country.


“Published by researchers from Princeton University and the Union of Concerned Scientists,” the latter organization reports, “the article [in the May 26 issue of the journal Science] argues that NRC inaction leaves the public at high risk from fires in spent-nuclear-fuel cooling pools at reactor sites.


The pools — water-filled basins that store and cool used radioactive fuel rods — are so densely packed with nuclear waste that a fire could release enough radioactive material to contaminate an area twice the size of New Jersey. On average, radioactivity from such an accident could force approximately 8 million people to relocate and result in $2 trillion in damages.



Researchers warn darkly that the NRC’s recalcitrant refusal to enact crucial safety measures — including the use of dry casks to house contaminated waste — could have cataclysmic consequences for millions of people living near reactor sites.


And the NRC — a government entity unironically tasked with ensuring “the safe use of radioactive materials for beneficial civilian purposes while protecting people and the environment” — managed to shirk civic, environmental, and, arguably, ethical safety precautions by flatly dismissing viable potentialities.








“Using a biased regulatory analysis,” the Union of Concerned Scientists continues, “the agency excluded the possibility of an act of terrorism as well as the potential for damage from a fire beyond 50 miles of a plant. Failing to account for these and other factors led the NRC to significantly underestimate the destruction such a disaster could cause.”


Unsurprisingly — and nonetheless a damning testimony to egregiously skewed priorities — this inexcusable negligence through omission comes down to penny-pinching from the NRC’s slavish devotion to the nuclear power industry.








“The NRC has been pressured by the nuclear industry, directly and through Congress, to low-ball the potential consequences of a fire because of concerns that increased costs could result in shutting down more nuclear power plants,” paper co-author Frank von Hippel lamented, as quoted by the Union of Concerned Scientists.


Von Hippel, a senior research physicist at Princeton’s Program on Science and Global Security (SGS) at the Woodrow Wilson School of Public and International Affairs, sharply admonished the public not to ignore these potential nuclear holocausts-in-waiting, adding,


Unfortunately, if there is no public outcry about this dangerous situation, the NRC will continue to bend to the industry’s wishes.


Edwin Lyman, a senior scientist at the Union of Concerned Scientists and study co-author, noted the NRC has fecklessly permitted plant owners and operators “to pack spent fuel into cooling pools at much higher densities than they were originally designed to handle. This has greatly increased the risk to the public should a large earthquake or terrorist attack breach the liner of a spent fuel pool, causing the pool to rapidly lose its cooling water.


In such a scenario the spent fuel could heat up and catch fire within hours, releasing a large fraction of its highly radioactive contents. Since spent fuel pools are not enclosed in high-strength, leak-tight containment buildings, unlike the reactors themselves, much of this radioactive material could be readily discharged into the environment.


Sufficient supply of cooling water is, of course, imperative to prevent truly calamitous consequences from a meltdown, as happened in 2011 at Japan’s Fukushima Daiichi nuclear plant, when electronic systems operating reactor cooling systems failed.


But even that disaster would have been exponentially worse, had cooling water slipped low enough to expose reactor cores to the air — which very nearly occurred in Unit 4.


Caveman Survival Guide – Free Copy (Ad)


Fukushima experienced core meltdowns in three of six reactors, birthing a pernicious nuclear morass which scientists now estimate could take at least another four decades to resolve. A lesson for the world, the Fukushima disaster also forced the entire industry to examine safety programs and regulations with a fine-toothed comb.


Tellingly, the NRC indeed deliberated mandating several indispensable reforms — such as requiring plant owners to transfer waste from spent fuel pools to dry casks after five years, or prohibiting packing cooling pools as densely as in the past — but, in cost-benefit analysis, decided against any of the proposals.


In fact, researchers point out that in the NRC analysis, the impotent government agency also surmised “there would be no consequences from radioactive contamination beyond 50 miles of a fire. It also assumed that all contaminated areas could be effectively cleaned up within a year. Both of these assumptions are inconsistent with experience after the Chernobyl and Fukushima accidents.”


Lyman excoriated the NRC for its refusal to mandate relatively modest improvements — around $50 million per reactor pool — as well as the industry for rebuffing any suggestion of voluntary compliance with reforms found necessary in the study of the Fukushima fiasco.


“The consequences of a fire could be truly disastrous at densely packed pools, which typically contains much more cesium-137 — a long-lived, extremely hazardous radioactive isotope — than is present in reactor cores,” Lyman wrote.






My Princeton University co-authors have calculated, using sophisticated computer models, that a spent fuel pool fire at the Peach Bottom nuclear plant in Pennsylvania could heavily contaminate over 30,000 square miles with long-lived radioactivity and require the long-term relocation of nearly 20 million people, for average weather conditions. Depending on the wind direction and other factors, the plume could reach anywhere from Maine to Georgia.


My co-authors estimate the financial impact on the American economy of such contamination could reach $2 trillion: ten times the estimated $200 billion in damages caused by the release of radioactivity from the damaged Fukushima Daiichi plant.



Worse, many nuclear power plants in the United States have not aged well, some stand in disrepair or in desperate need of improvements to bring them in line with advancements made over decades, while others — like perpetually-troubled Indian Point Energy Center, thirty miles from the heart of New York City — must simply be shut down.


Von Hippel, Lyman, and Michael Schoeppner, a former postdoctoral researcher at Princeton’s SGS and third co-author of the paper, portend utterly disastrous consequences from the NRC’s astoundingly toothless — if not eminently reckless — stance with the nuclear power industry.


“In far too many instances, the NRC has used flawed analysis to justify inaction, leaving millions of Americans at risk of a radiological release that could contaminate their homes and destroy their livelihoods,” Lyman opined.



“It is time for the NRC to employ sound science and common-sense policy judgments in its decisionmaking process.”


Claire Bernish began writing as an independent, investigative journalist in 2015, with works published and republished around the world. Not one to hold back, Claire’s particular areas of interest include U.S. foreign policy, analysis of international affairs, and everything pertaining to transparency and thwarting censorship. To keep up with the latest uncensored news, follow her on Facebook or Twitter: @Subversive_Pen. This article first appeared here at The Free Thought Project.



   
5

   

      

http://www.activistpost.com/wp-content/uploads/2016/12/bigbrotherobama2-1024x576-1-300x169.jpg 300w, http://www.activistpost.com/wp-content/uploads/2016/12/bigbrotherobama2-1024x576-1-768x432.jpg 768w, http://www.activistpost.com/wp-content/uploads/2016/12/bigbrotherobama2-1024x576-1-777x437.jpg 777w, http://www.activistpost.com/wp-content/uploads/2016/12/bigbrotherobama2-1024x576-1-180x101.jpg 180w, http://www.activistpost.com/wp-content/uploads/2016/12/bigbrotherobama2-1024x576-1-260x146.jpg 260w, http://www.activistpost.com/wp-content/uploads/2016/12/bigbrotherobama2-1024x576-1-373x210.jpg 373w, http://www.activistpost.com/wp-content/uploads/2016/12/bigbrotherobama2-1024x576-1-120x67.jpg 120w" sizes="(max-width: 777px) 100vw, 777px">By Will Porter


In the waning years of the Obama administration, the National Security Agency (NSA) swept up and reviewed the communications of Americans to an extent previously unknown, in direct violation of the Constitution and its own revised guidelines, recently unsealed documents reveal.


The NSA is authorized to collect intelligence on foreigners under section 702 of the Foreign Intelligence Surveillance Act (FISA). With this type of intelligence collection, it is virtually inevitable that Americans’ communications will be incidentally intercepted; however, there are procedures in place to keep those communications protected and anonymous.


Typically, when an American citizen is swept up in NSA surveillance, they are supposed to be “masked” to protect their identity, but there are large loopholes in place that allow the NSA to spy on Americans without a warrant or any probable cause whatsoever.



When the NSA conducts what is known as “upstream collection” of Internet communications, it is impossible to target a single email, instead sweeping up “packets” of data containing several messages. The NSA is supposed to sift through the data packets and discard all but the targeted email(s).








That alone poses some privacy issues, as before they are discarded the NSA can momentarily see the contents of the communications, but, when coupled with the NSA’s targeting practices, the problem expands to a serious violation of American constitutional rights.


Before the “sift and discard” procedure takes place, upstream collections are stored in databases which the NSA uses when it seeks intelligence on a particular target. To find what it is looking for, the agency enters key terms, known as “selection terms,” usually an email address or phone number related to the target. However, for years American intelligence agencies have not only looked at communications to and from a targeted individual, but any communication related to the target. That means the NSA has a much wider berth to analyze Americans’ communications.


In summary, the NSA incidentally collects and stores intelligence on Americans when conducting surveillance on foreign targets. The information is supposed to either be masked or discarded, but the way the NSA uses its databases allows the agency to get around the rules and essentially spy on American citizens.


But that is only the beginning.


In 2011, FISA procedures for the masking of American citizens’ identity were proving insufficient, most notably the use of identifiers of Americans as “selection terms” in NSA database searches. This prompted a rule change that “categorically prohibited NSA analysts from using U.S.-person identifiers to query the results of upstream Internet collection,” a FISA court opinion said.


RFID Scan Blockers – Available for Free (Ad)


After that change in procedure, the NSA was not supposed to use American selection terms in searching through its database of intercepted communications, but the agency did not follow the rules. The use of American identifiers was so widespread after the 2011 revision that by the time the Obama administration came to an end, the scope of the violations had still not been determined.


“The rules from 2011 forward were simple: Do not use American identifiers,” writes National Review’s Andrew McCarthy. “Yet NSA used them — not once or twice because some new technician didn’t know better. This violation of law was routine and extensive, known and concealed.”


There was a three-fold increase in NSA data searches about Americans in 2011, the same year the masking procedures were supposed to be revised and improved.


According to internal documents obtained by Circa’s John Soloman and Sara Carter, the illegal spying may involve up to 5 percent, or one in 20, of all NSA database searches derived from upstream collection, what amounts to a massive quantity of data.


The Obama administration was aware of the abuses, but did not disclose them until late October 2016, just months before the former president left office.


Under a court deadline to renew surveillance authorities under FISA, officials in the Obama administration apparently stalled and stonewalled to such an extent that the court would accuse the administration of “an institutional lack of candor” regarding “a very serious Fourth Amendment issue.”


In an attempt to ensure that only foreign communications are targeted, Trump’s DOJ has proposed a new change in procedures which have been approved by the FISA court. That change would eliminate searches that pertain to anything about the target in question, limiting the NSA to searching only for people in direct communication with the target.


Adding to the list of unauthorized wars in seven countries, an unprecedented crackdown on whistle blowers, other NSA spying abuses, targeting political enemies with the IRS and a number of other scandals, the Obama administration has left behind quite the legacy.





Delivered by The Daily Sheeple


We encourage you to share and republish our reports, analyses, breaking news and videos (Click for details).


Contributed by Will Porter of The Daily Sheeple.


Will Porter is a staff writer and reporter for The Daily Sheeple. Wake the flock up – follow Will’s work at our Facebook or Twitter.


Image Credit: Truthstream Media


   
6

   

      

By Vin Armani


In this video, Vin Armani discusses a clever new strategy to put the government in direct competition with private non-profits to deliver social services with Dan Johnson, director of the Tax Revolution Institute. Dan Johnson is the Executive Director of the Tax Revolution Institute. Prior to joining the Tax Revolution Institute, he was the Founder of People Against the NDAA (PANDA), which he grew into one of the largest civil liberties movements in America, and served as President of the Solutions Institute, an activist training center.




Learn more about Tax Revolution Institute at http://www.TaxRevolution.us


Watch the full broadcast here
Live free and succeed outside the rigged system! Join Counter Markets!


Vin Armani is the host of The Vin Armani Show on Activist Post, TV Star of Gigolos on Showtime, Agorist entrepreneur and co-founder of Counter Markets. Follow Vin on Twitter and subscribe on YouTube. Get the weekly podcast on iTunes or Stitcher. Vin is available for interviews at email Vin (at) VinArmani.com.


   
7

   

      

http://www.activistpost.com/wp-content/uploads/2017/05/syria-military-300x169.jpg 300w, http://www.activistpost.com/wp-content/uploads/2017/05/syria-military-768x433.jpg 768w, http://www.activistpost.com/wp-content/uploads/2017/05/syria-military-777x437.jpg 777w, http://www.activistpost.com/wp-content/uploads/2017/05/syria-military-180x101.jpg 180w, http://www.activistpost.com/wp-content/uploads/2017/05/syria-military-260x146.jpg 260w, http://www.activistpost.com/wp-content/uploads/2017/05/syria-military-373x210.jpg 373w, http://www.activistpost.com/wp-content/uploads/2017/05/syria-military-120x67.jpg 120w, http://www.activistpost.com/wp-content/uploads/2017/05/syria-military.jpg 1456w" sizes="(max-width: 777px) 100vw, 777px">By Brandon Turbeville


The Syrian military has just made massive gains in the eastern desert areas of the country, foreshadowing a major assault on ISIS positions in the east and southeast and thus an attempt to lift the ISIS siege on Deir ez-Zour. To put it plainly for those who do not follow the Syrian crisis closely, this is a huge deal.


As Ziad Fadel of Syrian Perspective reported,


Complete collapse of of terrorists south of Homs-Palmyra highway. Both ISIS and US/UK/Jordan/GCC/Israel trained terrorists were utterly defeated and expelled from the vital Syrian desert triangle area. The SAA and allies are now securing all key points while clearing them from mines and IEDs. So far the area liberated in the past 3 days accounts to almost 5,000 sq kms, a large and vital area, a fundamental step to free all the Syrian desert from terrorism. Villages, hills and sites that were confirmed liberated so far are listed below:




Al Rus hills
Khanazir
Mount Sawwanat al-Muhassah
Mount Qannas
Jabal al-Abdah
Jabal Butum
Mount Unaybah
Mount Nasrani
Bīr Khān ‘Unaybah
Mount Ghanem
Mount Khulah
Sudaryet al-Bayda Hills
Mount Ghantus
Mount Rimah
Jabal al Bhadah
al Bhadah village
Mount Busayri
Busairy crossroad
Jabal Zuqaq Khalayil
Jabal Khunayzir
Jabal Ruwaq
Jabal an Naqnaqiyah
Jabal Umm Jurn
Jabal Tabaq
Jabal Wa‘riyah
Jabal al Qal`
Jabal at Tabaqah

Khunayfis village, phosphate mines and production facilities
Mount Suwanet al-Hamra

As Sawwanah Ash Sharqiyah village, phosphate mines and production facilities.

Al ‘Ulayyaniya villages, hill and surrounds
Tall al Fira’i
Jabal Furū‘ Ţārāt al ‘Alb
Air defense batallion – northwest of Zaza crossroad

In addition, according to Syper, the SAA has also announced a new operation, Operation Grand Dawn, which is essentially an offensive toward the Syria-Iraq border near Anbar province and Syria-Jordan border near al Tanf. As Fadel writes,



The logistics will be much shorter between Damascus, Palmyra and the Syrian desert due to the liberated roads and hills.








The offensive toward the Iraq-Anbar border and Syria-Jordan was announced and is on going as we speak, and is named “Operation Grand Dawn”. Thousands of soldiers will be liberated from maintaining such a large defensive perimeter, and will be sent to the new front lines in the Syrian desert. Expect a very rapid advance toward T3, T2 and Humaymah, this is a large desert area under ISIS and NATO/GCC/Jordan/Israel backed terrorists. With this large and bold move, the SAA and allies will be in a prime position to control the borders with Iraq and Jordan, as well as toward the liberation of Der ez Zor from the desert area (SW of Der ez Zor city).



While these new advances are clearly good news, what seems likely is that there is now a major direct confrontation between Syrian forces backed by Russia and the United States brewing. After all, it is important to remember that it is the Syrian Army’s progress toward al Tanf that prompted the United States to bomb a Syrian military convoy only days ago. Having now announced an official operation heading toward the border crossing, there is little doubt that the SAA will be attempting to liberate territory currently occupied by the United States and its terrorists.


Given that the SAA is likely to initiate their assault with the backing of Russia, the confrontation could very well escalate from 0 to 100 quickly.


The only logical response by the United States is thus to back away, remove its troops and intelligence assets and let the Syrian military and Russia take care of ISIS themselves. As it stands, the United States is illegally occupying Syria and thus any confrontation between the two or three powers should be considered a confrontation that was initiated by the occupying powers.





Notably, the announcement of the operation and the major progress made by the SAA was followed by reports of an Israeli drone attack against the Syrian military in the Golan region, killing three Syrian soldiers. It seems unlikely that the drone strikes were not related to the Syrian military’s progress in the East of the country. It goes without saying that we will be following these developments closely.


1000 Lumen Military Grade LED Flashlight – Free (Ad)


Brandon Turbeville – article archive here – is the author of seven books, Codex Alimentarius — The End of Health Freedom, 7 Real Conspiracies, Five Sense Solutions and Dispatches From a Dissident, volume 1 and volume 2, The Road to Damascus: The Anglo-American Assault on Syria, The Difference it Makes: 36 Reasons Why Hillary Clinton Should Never Be President, and Resisting The Empire: The Plan To Destroy Syria And How The Future Of The World Depends On The Outcome. Turbeville has published over 1000 articles on a wide variety of subjects including health, economics, government corruption, and civil liberties. Brandon Turbeville’s radio show Truth on The Tracks can be found every Monday night 9 pm EST at UCYTV. His website is BrandonTurbeville.com He is available for radio and TV interviews. Please contact activistpost (at) gmail.com.


This article may be freely shared in part or in full with author attribution and source link.


Image Credit


   
8

   

      

http://www.activistpost.com/wp-content/uploads/2017/05/seth-rich-300x158.jpg 300w, http://www.activistpost.com/wp-content/uploads/2017/05/seth-rich-768x403.jpg 768w" sizes="(max-width: 777px) 100vw, 777px">By Derrick Broze


After a dizzying week of unsubstantiated claims and anonymous rumors, it’s time to look at what we actually know about Seth Rich’s murder. 


On Tuesday May 16, Fox5 in Washington D.C. released a report claiming that Democratic National Committee staffer Seth Rich was in contact with WikiLeaks prior to his murder in July 2016. The report claimed a private investigator hired by Rich’s family has found tangible evidence of a connection to Rich and WikiLeaks. According to D.C. police, Rich was shot twice in the back as part of a botched robbery in D.C.’s Bloomingdale neighborhood. He has been suspected as the possible source for the DNC leaks which began last summer during the presidential campaign.


The news report was quickly debunked or hailed as proof (depending on where or if you fall along the left/right political paradigm) of Rich’s connection to the leaks. Wheeler initially stated he had seen evidence “on Rich’s laptop that confirms he was communicating with WikiLeaks prior to his death.” However, within 48 hours Wheeler backed off his claims, at one point telling CNN, “I only got that [information] from the reporter at Fox News.”



Only days after Wheeler backed off his claims, Fox News officially denounced the story promoted by Wheeler and an apparent “anonymous federal investigator.” Fox News writes:


On May 16, a story was posted on the Fox News website on the investigation into the 2016 murder of DNC Staffer Seth Rich. The article was not initially subjected to the high degree of editorial scrutiny we require for all our reporting. Upon appropriate review, the article was found not to meet those standards and has since been removed. We will continue to investigate this story and will provide updates as warranted.


The New York Times and other deadstream outlets were quick to point the finger on various “far right” and “conspiracy theory” websites for reporting on the developments. The Times claimed “Mr. Assange was trying to protect his reputation” and that Alex Jones, the founder of Infowars, is trying to sell more Fluoride Shield supplement.


Meanwhile, Seth Rich’s parents and brother released statements asking researchers to drop the case. In an op-ed for the Washington Post, the Riches accuse media outlets of using their son’s memory for their own political gain. “We ask those purveying falsehoods to give us peace, and to give law enforcement the time and space to do the investigation they need to solve our son’s murder,” they wrote.








Aaron Rich, Seth’s brother, also wrote a letter to Porter Berry, executive producer of “Hannity,” demanding that he force host Sean Hannity to stop promoting theories about his brother’s death. “As the family, we would hope to be the first people to learn about any such evidence and reasons for Seth’s death,” Aaron Rich wrote in the letter which was viewed by CNN. “It is a travesty that you would prompt false conspiracy theories and other people’s agendas rather than work with the family to learn the truth.”


The pleas from the family and the retraction of the Fox story did not slow down the pursuit for more information related to Seth Rich’s murder. The continued interest in the story was due in part to statements made last week and over the weekend by Internet entrepreneur Kim Dotcom. Dotcom tweeted that he had evidence tying Seth Rich to WikiLeaks. He tweeted, “If Congress includes #SethRich case into their Russia probe I’ll give written testimony with evidence that Seth Rich was @Wikileaks source.” Dotcom then promised to release a full statement on Tuesday after conferring with his legal team.


The statement was released on Tuesday as promised, but it provided no new information and only further fueled the abundant speculation into whether or not Seth Rich was connected to WikiLeaks in any way.  “I KNOW THAT SETH RICH WAS INVOLVED IN THE DNC LEAK,” read a statement on Kim.com.” I know this because in late 2014 a person contacted me about helping me to start a branch of the Internet Party in the United States. He called himself Panda. I now know that Panda was Seth Rich.”


How to Disappear Off the Grid Completely (Ad)


Dotcom goes on to claim that “Panda” was working on voter analytics tools and wanted to change the political system from within. He said that he would be willing to provide a full statement in person to the U.S. Congress upon receiving a guarantee from Special Counsel Mueller that he would be allowed to travel unmolested from New Zealand to the United States.


Dotcom’s less than revealing statement was met with a mix of hope, disappointment, and attacks from establishment media. The Washington Post published a story accusing him of attempting to hack Seth Rich’s Gmail account to plant false evidence of a WikiLeaks connection.





The Post stated that Seth Rich’s Gmail account received a new alert in the last week from Mega.com, a website created by Kim Dotcom. “The latest revelation — that a hacker from New Zealand may have been trying as recently as this week to hack into Rich’s email — offered fresh evidence that the conspiracy theory is false,” The Post writes. “Dotcom, it seemed, may have been willing to create a fake archive of emails from Rich to “prove” his role in the DNC hack.”


Dotcom responded with his own open letter warning the Rich family and spokesman not to defame his name in their attempt to silence researchers. “I remain prepared to assist in the investigation, as I have said. While I want to show understanding to the family in this difficult time, I also maintain that what I have said is true and will be substantiated upon investigation.” Dotcom addressed what he called false statements from WaPo and Fox News. Dotcom continues to tweet about Seth Rich and is calling for a crowdfunded investigation into his death.





Kim Dotcom also encouraged his followers to support Texas Representative Blake Farenthold, “the lawmaker who has called for a real investigation into the murder of #SethRich.” Activist Post will continue to post developments if they come.


At this point it’s important to recognize that the only piece of “evidence” which point towards Seth Rich being involved with the DNC leaks and WikiLeaks rest on a couple of curious comments from Julian Assange and Twitter chat logs that are purported to have taken place between Robbin Young, a former Playboy model and actress, and the apparent hacker behind the leaks, Guccifer 2.0. In these direct messages Young and Gufficer converse about the origin of the DNC leaks. Readers should note that these messages have not been independently verified, but they can be viewed in their entirety on Young’s website.


We are left with the statement from Dotcom, comments from Assange, a discredited report, and unconfirmed chat logs. It is possible Rod Wheeler and Fox were threatened and told to stop reporting on Rich’s murder. Possible, yet lacking in evidence. There are still loose threads to be explored by researchers with the skill, time, and resources. For the rest of us, it may be important to focus on the fact that the U.S. government still has not conclusively proved that the 2016 Presidential Election was “hacked” by the Russian government.


Derrick Broze is an investigative journalist and liberty activist. He is the Lead Investigative Reporter for ActivistPost.com and the founder of the TheConsciousResistance.com. Follow him on Twitter. Derrick is the author of three books: The Conscious Resistance: Reflections on Anarchy and Spirituality and Finding Freedom in an Age of Confusion, Vol. 1 and Finding Freedom in an Age of Confusion, Vol. 2


Derrick is available for interviews. Please contact Derrick@activistpost.com


This article may be freely reposted in part or in full with author attribution and source link.


Image Credit: The Free Thought Project


   
9
Huffington Post General Discussion / DHS Boss: Stay In Your Homes
« Last post by administrator on May 26, 2017, 08:06:42 PM »

   

      

http://www.activistpost.com/wp-content/uploads/2017/05/john-kelly-300x167.jpg 300w, http://www.activistpost.com/wp-content/uploads/2017/05/john-kelly-768x427.jpg 768w, http://www.activistpost.com/wp-content/uploads/2017/05/john-kelly-180x101.jpg 180w, http://www.activistpost.com/wp-content/uploads/2017/05/john-kelly-260x146.jpg 260w, http://www.activistpost.com/wp-content/uploads/2017/05/john-kelly-120x67.jpg 120w" sizes="(max-width: 777px) 100vw, 777px">By Kurt Nimmo


It’s dangerous out there. US trained and Saudi funded Wahhabi terrorists are lurking in the shadows, according to John Kelly, Trump’s boss over at the Department of Homeland Security and the former commander of United States Southern Command.


“I was telling [Fox host] Steve [Doocy] on the way in here, if he knew what I knew about terrorism, he’d never leave the house in the morning,” Kelly said on Fox & Friends, according to The Hill.


Kelly said terrorism is “everywhere. It’s constant. It’s nonstop. The good news for us in America is we have amazing people protecting us every day. But it can happen here almost anytime.”



Here’s what Kelly didn’t tell you: the number of Americans who died worldwide in terrorist attacks in 2015 was eight while the minimum number who died after being struck by lightning was 29.


In 2009, nearly half a million Americans died from heart disease, while cancer killed 575,339, and chronic respiratory disease claimed 143,382 lives, according to the U.S. Centers for Disease Control.








“The chances of being killed in a terrorist attack are about 1 in 20 million. A person is as likely to be killed by his or her own furniture, and more likely to die in a car accident, drown in a bathtub, or in a building fire than from a terrorist attack,” notes this life insurance website.


Maybe Kelly should warn Americans about the danger of driving cars or the hazard posed by sofas, but that wouldn’t feed into the terror narrative which is primarily a scare tactic to get Americans to support bombing foreign lands, which in turn creates terrorists like Salman Abedi, who killed people because he was upset about Syrian and Libyan Muslims slaughtered by the Trump and his rehashed coalition of the willing.


Kelly’s remarks remind me of Ice-T’s “Shut Up, Be Happy,” narrated by Jello Biafra.



Kurt Nimmo is the editor of Another Day in the Empire, where this article first appeared. He is the former lead editor and writer of Infowars.com. Donate to ADE Here.


   
10

   

      

http://www.activistpost.com/wp-content/uploads/2017/05/augmented-reality-flight-300x169.jpg 300w, http://www.activistpost.com/wp-content/uploads/2017/05/augmented-reality-flight-768x432.jpg 768w, http://www.activistpost.com/wp-content/uploads/2017/05/augmented-reality-flight-777x437.jpg 777w, http://www.activistpost.com/wp-content/uploads/2017/05/augmented-reality-flight-180x101.jpg 180w, http://www.activistpost.com/wp-content/uploads/2017/05/augmented-reality-flight-260x146.jpg 260w, http://www.activistpost.com/wp-content/uploads/2017/05/augmented-reality-flight-373x210.jpg 373w, http://www.activistpost.com/wp-content/uploads/2017/05/augmented-reality-flight-120x67.jpg 120w" sizes="(max-width: 777px) 100vw, 777px">By Nicholas West


It appears that air travel is going to be the new frontier for high-tech privacy invasion taking place in the name of security, efficiency and convenience … and now “customer service.”


There was a time not long ago where rumblings about facial recognition and other forms of biometric identification for use in travel was dismissed as a science fiction that could not be achieved and that most people would not tolerate it if biometric ID ever became a reality. As I covered last week, this is science fiction no longer as airports around the United States and the world are beginning to implement biometrics at varying degrees of scale with little to no resistance from the traveling public.



It behooves us, then, to look at another trend that has been taking shape slowly but surely: augmented reality.








Google and Microsoft both have been investing heavily in augmented reality applications. Google, of course, has their Google Glass which has been met by a lukewarm reception at best, but the general idea to merge smartphone applications into a wearable interface is still being pursued with enthusiasm.


Microsoft began its foray into augmented reality in the entertainment arena. Now, however, it serves as an illustration of how this technology can spread into the lives of people who might have zero natural interest in video game or “smart” applications. According to News.com.au they might be subjected to it on future flights, as stated by Jonathan Glenister:


The Microsoft HoloLens allows you to combine holograms with the physical world around you … We worked with the Air New Zealand cabin crew to trial a Microsoft HoloLens application. The app uses cognitive services and surfaces relevant data about the passenger, their preferences and their journey.


The “data” about the passenger and their “preferences,” it turns out, is set to be incredibly invasive:



through advanced facial technology, he is able to recall details about a passenger’s destination, allergies, and even the time since they got their last beverage.
It even assesses the passenger’s mood. You can see his mood change from “anxious” to “calm” as the flight attendant addresses his concerns.

HoloLens was introduced to the public in 2016 as a concept for developers and businesses that carried a steep price tag of $3,000. It is interesting to see how the initial concept as covered by Mashable last year in the first video dovetails with how it is likely to be used by airlines, as shown in the second video. Essentially, as with all smart technology, it moves from a one-way consumer-directed application, to a two-way data collection system of tracking and surveillance. It is also worth keeping in mind that air travel is no longer a type of willing contract with a private company; under the umbrella of anti-terrorism, governments will also be very interested in this additional data and are likely to have easy access to it if requested.



RFID Scan Blockers – Available for Free (Ad)



The general concept that is being undertaken is to introduce a world of “Hyper-reality” where our everyday experience becomes overlaid with data points on everything from credit score, to social media presence, to consumer reports and preferences. It’s only in the testing phase at this point but, as we should know by now, the old maxim that “what the mind can conceive, it can achieve” was never truer than in today’s world of exponential growth in computing. To see where all of this could be heading, here is one possible future as augmented reality expands …






With two intelligence agency-connected tech behemoths like Google and Microsoft investing so vigorously in augmented reality, a “smart” future appears to be on the way sooner rather than later. And as government is now openly embracing a Minority Report-like future of pre-crime high-tech surveillance systems with an emotional component, we should probably ask ourselves if we are willing to accept these tests and how open we are to becoming the subjects.


Hat Tip: Technocracy.News


Nicholas West writes for ActivistPost.com. He also writes for Counter Markets agorist newsletter.


This article may be freely republished in part or in full with author attribution and source link.


   
Pages: [1] 2 3 ... 10