Translate
GPA Store: Featured Products
Showing posts with label INTERNET. Show all posts
Showing posts with label INTERNET. Show all posts
Monday, April 22, 2013
Tuesday, June 14, 2011
Friday, June 3, 2011
New Decentralized Currency Stimulating Underground Barter Economy
New grassroots cyber currency, the Bitcoin, may provide the perfect vehicle to operate outside the establishment economy and snub the all-powerful banking cartels -- it's decentralized, quasi-anonymous, and its supply is regulated by an algorithm to actually create deflation over time.
Eric Blair
Activist Post
The masses are beginning to understand that the greatest threat to human freedom is the international banking cartel and their debt-based monetary system. Together with governments, they squash any manifestation of a free marketplace and personal freedom. Between runaway money printing, corporate cartel control, subsidies and taxes, and regulations and fees; the free market is nothing more than an ideology -- for now.
As the "Too Big to Fail" private banks consolidate even further with the help of their central baking partners and government puppets, it would seem that they form an all-powerful cartel. They force us to use their monopoly money to pay for all necessary goods and services. They track every economic transaction to plunder as much manufactured taxes and fees as possible. Income taxes are extracted to prop up the debt-based system, the Wall Street casino, the domestic surveillance prison, and endless wars. And on top of that, the consumer is ravaged by increasing inflation. Indeed, the system smashes personal and economic freedom.
![]() |
Source: BitcoinMe.com |
Activist Post
The masses are beginning to understand that the greatest threat to human freedom is the international banking cartel and their debt-based monetary system. Together with governments, they squash any manifestation of a free marketplace and personal freedom. Between runaway money printing, corporate cartel control, subsidies and taxes, and regulations and fees; the free market is nothing more than an ideology -- for now.
As the "Too Big to Fail" private banks consolidate even further with the help of their central baking partners and government puppets, it would seem that they form an all-powerful cartel. They force us to use their monopoly money to pay for all necessary goods and services. They track every economic transaction to plunder as much manufactured taxes and fees as possible. Income taxes are extracted to prop up the debt-based system, the Wall Street casino, the domestic surveillance prison, and endless wars. And on top of that, the consumer is ravaged by increasing inflation. Indeed, the system smashes personal and economic freedom.
Thursday, December 9, 2010
The Trust Crisis with Regulating Net Neutrality
Activist Post
Since it was reported that Google and Verizon are close to a deal on so-called "net neutrality," the policy debate has heated up in Washington. Of course the debate has very little to do with the actual mechanics of how net neutrality will work, rather who will get the control to regulate it.
However, now that the FCC has abandoned negotiations on a "net neutrality" compromise, it is looking like the Congress will ultimately establish the rules -- handed down to them by their corporate masters. It seems the Elite's fight over who controls the dial has been decided. One thing is for sure, whoever controls the speed dial on the Internet will control the entire Web and subsequently all flow of information.
This is where the problem lies: the American people don't have any trust in their government, regulatory agencies, or corporations. In fact, it seems that these three entities typically work in unison to establish profit and power guarantees that can only be described as monopolistic cartels where power corrupts, and absolute power corrupts absolutely. We the people have lost our voice in nearly all legislation or regulation debates. And doing away with net neutrality -- the people's last bastion of free speech -- is the endgame for the power of the people.
Why do we need Net Neutrality protections? What is Net Neutrality?
Yes, broadband companies have real bandwidth concerns, and the telecom industry is losing money to the likes of Skype and Vonage. It is also looking like cable companies and video stores are nearly obsolete because of the expansion of the Internet. But we, the little guy, the blogger, the info-warrior, the casual web-surfer don't really give a shit about that. What we care about is free neutral access to all information and our privacy while getting that information.
It's unfortunate that those industries couldn't adapt fast enough to take advantage of the free market the Web has to offer. Just like the free market collapsed on General Motors and the banks, that tends to happen when the free market rejects your activities. In a real fee market those companies would die, and others in the industry would either adapt or end up just like them. That is how the free market self-regulates.
Globalist and heavyweight propagandist Rupert Murdoch is so confident that people will soon be forced to pay more for information, that he's already built in the pay infrastructure to his media empire's websites.
Back when Murdoch first announced these plans, which were going to limit the sharing of content from his sites, Arianna Huffington, founder of The Huffington Post, publicly made fun of him saying, "he obviously doesn't know how the Internet works."
That may be true, but given his status in Elite circles, I'm willing to bet he knows exactly how it'sgoing to work once the new control grid is in place.
Buy 1 Get 2 Free at Botanic Choice Buy 1 Bottle and Get 2 FREE (select items), plus Free Shipping on $25+ Expires 12/31/2010
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
It is time to Wake Up! You too, can join the "Global Political Awakening"!
Print this page
Since it was reported that Google and Verizon are close to a deal on so-called "net neutrality," the policy debate has heated up in Washington. Of course the debate has very little to do with the actual mechanics of how net neutrality will work, rather who will get the control to regulate it.
However, now that the FCC has abandoned negotiations on a "net neutrality" compromise, it is looking like the Congress will ultimately establish the rules -- handed down to them by their corporate masters. It seems the Elite's fight over who controls the dial has been decided. One thing is for sure, whoever controls the speed dial on the Internet will control the entire Web and subsequently all flow of information.
This is where the problem lies: the American people don't have any trust in their government, regulatory agencies, or corporations. In fact, it seems that these three entities typically work in unison to establish profit and power guarantees that can only be described as monopolistic cartels where power corrupts, and absolute power corrupts absolutely. We the people have lost our voice in nearly all legislation or regulation debates. And doing away with net neutrality -- the people's last bastion of free speech -- is the endgame for the power of the people.
Why do we need Net Neutrality protections? What is Net Neutrality?
Yes, broadband companies have real bandwidth concerns, and the telecom industry is losing money to the likes of Skype and Vonage. It is also looking like cable companies and video stores are nearly obsolete because of the expansion of the Internet. But we, the little guy, the blogger, the info-warrior, the casual web-surfer don't really give a shit about that. What we care about is free neutral access to all information and our privacy while getting that information.
It's unfortunate that those industries couldn't adapt fast enough to take advantage of the free market the Web has to offer. Just like the free market collapsed on General Motors and the banks, that tends to happen when the free market rejects your activities. In a real fee market those companies would die, and others in the industry would either adapt or end up just like them. That is how the free market self-regulates.
Globalist and heavyweight propagandist Rupert Murdoch is so confident that people will soon be forced to pay more for information, that he's already built in the pay infrastructure to his media empire's websites.
Back when Murdoch first announced these plans, which were going to limit the sharing of content from his sites, Arianna Huffington, founder of The Huffington Post, publicly made fun of him saying, "he obviously doesn't know how the Internet works."
That may be true, but given his status in Elite circles, I'm willing to bet he knows exactly how it'sgoing to work once the new control grid is in place.
Buy 1 Get 2 Free at Botanic Choice Buy 1 Bottle and Get 2 FREE (select items), plus Free Shipping on $25+ Expires 12/31/2010
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
Print this page
Thursday, November 4, 2010
The "Internet of Things" is on the Way
Technofascism Blog
In case many of you have been doing more important things than paying attention to the latest techno-apocalyptic developments, such as growing your own food, or stocking up on supplies, you may not have heard of the “Internet of Things.” And what is the “Internet of Things?” Well, from the perspective of the vast spy agencies, the internet has one fatal flaw: if you’re not on it, they can’t spy on you. Bummer. So, to get around this little inconvenience of privacy, the latest push is to get every physical object in the world online. That’s right. Everything from your car, to your toaster, will eventually be connected and controllable through the internet. It seems that the Gods on Mount Olympus have had such great success with the virtual world that they now want to bring everything into it. And that means more control for them and less freedom for everyone else.
Read Full Article
RELATED ARTICLE:
Downloading Humans: The Hive Group Philosophy
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
It is time to Wake Up! You too, can join the "Global Political Awakening"!
Print this page
In case many of you have been doing more important things than paying attention to the latest techno-apocalyptic developments, such as growing your own food, or stocking up on supplies, you may not have heard of the “Internet of Things.” And what is the “Internet of Things?” Well, from the perspective of the vast spy agencies, the internet has one fatal flaw: if you’re not on it, they can’t spy on you. Bummer. So, to get around this little inconvenience of privacy, the latest push is to get every physical object in the world online. That’s right. Everything from your car, to your toaster, will eventually be connected and controllable through the internet. It seems that the Gods on Mount Olympus have had such great success with the virtual world that they now want to bring everything into it. And that means more control for them and less freedom for everyone else.
Read Full Article
RELATED ARTICLE:
Downloading Humans: The Hive Group Philosophy
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
Print this page
Monday, September 27, 2010
Feds Want to Make It Easier to Eavesdrop Online
BILL SEEKS TO EXPAND GOVERNMENT'S WIRETAPPING POWER
By Emily Rauhala, Newser Staff
![]() |
The feds say online wiretaps will keep us safe. (Shutterstock) |
(NEWSER) – The feds want to overhaul wiretappingregulations to expand their ability to eavesdrop online, reports the New York Times. The Obama administration plans to submit a bill to Congress next year that would require all service providers to be technically capable of wiretapping the communications they enable, from encrypted BlackBerry emails to Skype messaging. Law enforcement types say their surveillance capabilities are "going dark" as everybody—from mob bosses to drug cartels—turns away from telephones.
Officials point to the case of the failed Times Square bomber, who was discovered to have communicated online via a service that didn't have the ability to intercept his messaging; even if investigators had caught wind of Faisal Shahzad's plans before the attempt, their ability to wiretap him would have been delayed. Of course, not everybody agrees. Listening in online threatens the “Internet revolution,” says a rep from the Center for Democracy and Technology. “They basically want to turn back the clock and make Internet services function the way that the telephone system used to function.” And, says one prof, forcing firms to find ways to "unscramble" encrypted messages could backfire. “I think it’s a disaster waiting to happen,” he says. “If they start building in all these back doors, they will be exploited.”
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
Print this page
Sunday, September 26, 2010
Will Stuxnet Malware Be Used In False Flag Attack?
Kurt Nimmo
Infowars.com
September 25, 2010
Infowars.com
September 25, 2010
Iran has admitted today that Stuxnet malware has infected its industrial computer system.
“An IT official of Iran’s mines and metals ministry told the Mehr news agency that 30,000 computers belonging to industrial units have already been infected by the virus,” reportsDeutsche Presse-Agentur today. “Mahmoud Alyaie told Mehr that the Iranian industrial control systems are made by Siemens and the Stuxnet is designed to attack exactly these systems and transfer classified data abroad.”
“Stuxnet has the ability to take advantage of the programming software to also upload its own code to… an industrial control system,” explains Symantec, the anti-virus software company. “Stuxnet can potentially control or alter how the system operates.” Symantec figures from August show 60 per cent of the computers infected by Stuxnet are located in Iran, up from 25 per cent in July.
On Friday, Max Fisher, writing for The Atlantic Wire, said cybersecurity officials report the malware is “widely disseminated” and “establishes a new precedent in the sophistication and threat of cyberwarfare.” The officials said the software has embedded itself across computer systems at a number of power facilities and factories over the past year. “It’s unknown who created it, to what end, and what exactly Stuxnet would have done if it had not been discovered,” writes Fisher.
The malware is not spread over the internet. It must be manually inserted on a network computer by an external device such as a USB drive.
Since the software is now being used against the primary target of the globalists, Iran, it should be a no-brainer who created it — the Pentagon.
On the other hand, Richard Falkenrath, a principal at Chertoff Group and a Bloomberg Television contributing editor, believes the malware was designed and unleashed by Israel. Falkenrath told Bloomberg that the worm is so sophisticated that only the resources of a nation-state would be able to produce it. See the Bloomberg video here.
In August, the Senate Homeland Security and Governmental Affairs Committee claimed the Pentagon was the victim of a cyber attack.
“This latest revelation underscores the scary reality of how vulnerable we really are to cyber criminals, terrorists, and nation-states seeking to use technology to steal from us or do us harm,” said Sen. Tom Carper of Delaware.
Carper, who is the chairman of the Homeland Security’s Federal Financial Management Subcommittee, said the attack underscored the need for legislation he co-sponsored with Homeland Security Chairman Joe Lieberman. Carper and Lieberman’s legislation would establish the office of cyber policy in the White House.
The law, if passed, would also establish a National Center for Cybersecurity and Communications within the Department of Homeland Security that would enforce cybersecurity policies across the government and would include mission creep into private sector cybersecurity.
In July, a Senate committee approved the Protecting Cyberspace as a National Asset Act. It would give Obama an internet “kill switch.”
The Wall Street Journal published an article today warning that “cyber espionage” has increased against governments and companies around the world in the past year.
“More than 100 countries are currently trying to break into U.S. networks, defense officials say. China and Russia are home to the greatest concentration of attacks,” reports the Journal.
In response to the alleged threat of increased cyber tomfoolery, the Pentagon’s Cyber Command is scheduled to be up and running next month.
In May, the Pentagon said it would consider a military response in the case of a cyber attack against the United States. The Pentagon’s cyber command is now led by Lieutenant General Keith Alexander, head of the National Security Agency.
In addition, the Obama administration has designated cyber security as a “critical national asset” and has stepped up efforts to combat the drastically overstated threat, including the creation of Homeland Security SWAT teams to respond to cyber attacks on critical infrastructure.
The illegal covert war against Iran aside, the hype over the Stuxnet worm provides an excellent opportunity for the government to ramp up its police state efforts against the American people. Most folks are not concerned about ineffectual underwear and barbeque grill propane tank non-bombers, but they stand up and take notice when the lights and water go out.
Is it possible there is a Stuxnet false flag attack right around the corner?
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
Print this page
Thursday, September 23, 2010
Proposed Law Would Allow Justice Department to Shut Down Websites
Kurt Nimmo
Infowars.com
September 23, 2010
Infowars.com
September 23, 2010
The Senate Committee on the Judiciary will consider action today on a bill entitled Combating Online Infringement and Counterfeits Act, ostensibly designed to allow the Justice Department to combat copyright infringement. “The legislation authorizes the Justice Department to file a court order against the domain name and seek an order from the court stating that the domain name is being used to access a website that is engaging in illegal activities,” reports TechNewsDaily.
![]() | ||
|
In addition,the bill contains provisions to block sites with domain names and TLDs (top-level domains) that are maintained by overseas companies, which are immune to US laws.
The bipartisan legislation “amounts to the Holy Grail of intellectual-property enforcement,” writes David Kravets for Wired. “Websites eligible for Justice Department targeting – if the measure is approved – must be ‘dedicated to infringing activities,’ according to the text’s language. A site can be ‘subject to civil forfeiture’ if it’s ‘primarily designed’ as a pirate site with ‘no demonstrable, commercially significant purpose or use’ other than to distribute pirated or counterfeited wares,’” according to Kravets.
Congress and the Obama administration, however, have demonstrated antipathy toward the idea of a free and open internet regardless of copyright infringement. Earlier this year, Senator Joe Lieberman pushed theProtecting Cyberspace as a National Asset Act, legislation designed to give Obama dictatorial power to shut down the internet under the rubric of national security.
“Senators pushing the bill rejected the claim that the bill was a ‘kill switch’ for the Internet, not by denying that Obama would be given the authority to shut down the Internet as part of this legislation, but by arguing that he already had the power to do so,” Paul Joseph Watson reported on June 25, 2010.
As Philip Giraldi notes, the government continues to invent excuses to intervene into the internet. All of these “arguments for intervention are essentially themselves fraudulent and are in reality being exploited by those who favor big government and state control,” writes Giraldi. “The real reason for controlling the internet is to restrict access to information, something every government seeks to do.”
In July, a hosting company pulled the plug on Blogetery, a blog website, after the FBI told the hosting service that a blog on the site had posted bomb-making information. “Sources close to the investigation say that included in those materials were the names of American citizens targeted for assassination by al-Qaeda. Messages from Osama bin Laden and other leaders of the terrorist organization, as well as bomb-making tips, were also allegedly found on the server,”CNet News reported on July 19.
“The extreme response implies a possible presumed terrorist connection, but it is important to note that no one was charged with any actual offense, revealing that the government can close down sites based only on suspicion,” writes Giraldi.
On Wednesday, senior Obama administration officials argued that “al-Qaeda inspiration… has become increasingly accessible through the Internet, and English-language Web sites are tailored to address the unique concerns of U.S.-based extremists,” according to the Washington Post.
Is it possible, in the event the Combating Online Infringement and Counterfeits Act is enacted, the government will use the law to shut down disfavored websites, using the excuse of copyright infringement?
In 2009, the great-grandson of John D. Rockefeller, nephew of banker David Rockefeller, and former Senate Intelligence Committee Chairman Jay Rockefeller said the internet not only represents a threat to national security, but also said we would all be better off if the technology had never been invented.
The Combating Online Infringement and Counterfeits Act is the latest effort by the government to control and eventually roll back the free and open internet under the guise of protecting copyright. In 2008, Alex Jones detailed government efforts to shut down the internet and kill off the most effective technology ever devised to spread truth and counter government and corporate media propaganda.
Fresh food that lasts from eFoods Direct (Ad)
Live Superfoods
Print this page
Tuesday, September 14, 2010
Big Sis To Get Expanded Role In Policing Internet
Paul Joseph Watson
Infowars.com
September 14, 2010
Infowars.com
September 14, 2010
Two cybersecurity bills that would hand President Obama the power to shut down parts of the Internet in the event of a national emergency have now been merged into a single unified piece of legislation that Democrats will try to pass before the end of the year, with the Department of Homeland Security being given a larger role in policing the world wide web.
Janet Napolitano’s DHS will be handed broader authority to determine how to handle potential cybersecurity threats. Photo: Center for American Progress. | |
Under the new draft bill, which is a combination of the two versions originally crafted by Senators Joe Lieberman and Jay Rockefeller, Janet Napolitano’s DHS will be handed broader authority to determine how to handle potential cybersecurity threats.
“DHS will get expanded authorities. I think that’s clear,” said James Lewis, a cybersecurity expert with think tank Center for Strategic and International Studies, who has studied the new bill.
An expanded role for Homeland Security would be somewhat ironic given the fact that the DHS itself recently failed an extensive cyber-security audit conducted by the agency’s own Inspector General.
“The DHS US-CERT office is currently plagued by at least 600 vulnerabilities that could compromise sensitive data, including 202 which have been classified as high-risk,” reported TG Daily.
Homeland Security’s failure to adequately secure its own internal network will lead to questions about why the agency should be given vast new authority to secure America’s cyber assets and the public Internet.
Democrats want to get the bill passed within the next four weeks, although “sticking points” could delay the legislation, according to a Senate aide familiar with the bill. However, lawmakers are determined to put the package up for a vote before the end of the year.
“Senate Majority Harry Reid has put the measure on his list of top-priority bills to get through the Senate this year,” sources told MoneyControl.com.
Lieberman’s version of the original bill includes language that would hand President Obama the power to shut down parts of the world wide web for at least four months with no congressional oversight. The combined version appears to shift that responsibility to DHS, who under the pretext of a national emergency could block all Internet traffic to the U.S. from certain countries, and close down specific hubs and networks, creating an ominous precedent for government regulation and control over the Internet.
Cybersecurity legislation is being promoted as a vital tool to defend the nation’s critical infrastructure against cyber- terrorism. However, as we have highlighted, the threat from cyber-terrorists to the U.S. power grid or water supply is minimal. The perpetrators of an attack on such infrastructure would have to have direct physical access to the systems that operate these plants to cause any damage. Any perceived threat from the public Internet to these systems is therefore completely contrived and strips bare what many fear is the real agenda behind cybersecurity – to enable the government to regulate free speech on the Internet.
As we reported back in March, the Obama administration’s release of the Comprehensive National Cybersecurity Initiative, a government plan to “secure” (or control) the nation’s public and private sector computer networks, coincided with Democrats attempting to claim that the independent news website The Drudge Report was serving malware, an incident Senator Jim Inhofe described as a deliberate ploy “to discourage people from using Drudge”.
Fears that cybersecurity legislation could be used to stifle free speech were heightened when Senator Lieberman told CNN’s Candy Crowley that the real motivation behind the bill was to mimic the Communist Chinese system of Internet policing.
“Right now China, the government, can disconnect parts of its Internet in case of war and we need to have that here too,” said Lieberman.
As we have documented, the Communist Chinese government does not disconnect parts of the Internet because of genuine security concerns, it habitually does so only to oppress and silence victims of government abuse and atrocities, and to strangle dissent against the state, a practice many fear is the ultimate intention of cybersecurity in the United States.
—
Paul Joseph Watson is the editor and writer for Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a fill-in host for The Alex Jones Show. Watson has been interviewed by many publications and radio shows, including Vanity Fair and Coast to Coast AM, America’s most listened to late night talk show.
Live Superfoods
Sunday, September 12, 2010
Unusual Volume of Call Contracts Traded, Suspicion Rises
Shepard Ambellas and Alex Thomas
The abnormally high volume of call contracts that were traded in the last few days is highly suspicious and should be investigated. Before 9/11 we saw the sell off of American Airlines stock and in the weeks leading up to the BP oil spill we saw the same with Goldman Sachs. While this could simply signify a buyout of Qwest by another entity, we can not rule out the possibility that this is a positioning play for a future false flag cyber attack, used to shut down the internet and move to what is known as the internet 2 system.
The ruling elite have eagerly awaited the launch of the internet 2 system. They want nothing more then to implement the total systematic dismantlement of the internet to stop the flow of real information to the people of the world.
Further research of the internet 2 reveals that Qwest has a big hand in this new system, a system that is intended to be a total and completely controlled, limited, and monitored form of the internet, allowing only massive corporate websites to operate on a subscription type basis. The internet 2 will be a glorified cable TV service, essentially letting you surf only what the government allows you to.
Alternative news sites will be a thing of the past as the uncontrolled media, due to the lock down of the internet, no longer has the ability to survive.
At the very least we need this information to go viral, the more people who are aware of these deals the better. We might be able to stop or derail a future event by spreading this information to all our personal contacts. The use of social networks such as Twitter, Youtube, and Facebook can be an extremely effective tool.
Montagraph has already done some impressive ground work on the situation. Please check out the interview Monty did with investigative reporter DallasGoldBug:
Unusual volume of call contracts was traded today. There were 576,683 call contracts traded compared to the ten day average volume of 58,125 contracts. On the put side, 41 put contracts exchanged hands. Today’s traded Put/Call ratio is 0.00. There were 14065.44 calls traded for each put contract.
The following alerts were raised:
- Unusual Call Volume
- Low Put/Call Ratio
- 3 Month Record High Call Volume
- Unusual Call Volume
- Low Put/Call Ratio
- 3 Month Record High Call Volume
The ratio skew implies that investors are hedging their positions in anticipation of a stock move. Today’s unusual volume activity confirms that traders are rebalancing their portfolios.
Shares of Qwest Communications International closed at $5.83 in the previous trading session and opened today at $5.82. Q is currently trading at $5.82, down $0.01 (-0.17%) in today’s trading session. The shares of the stock are trading between $5.79 and $5.86. Today’s volume of 20,740,102 shares is less than the average volume of 28,253,200 shares. The technical momentum Relative Strengh Index indicator shows overbought conditions. Q is trading above the 50 day moving average and higher than the 200 day moving average. The stock’s 52 week low is $3.30 and 52 week high is $5.85.
Thursday, September 9, 2010
NSA: U.S. Must Secure the Internet
Ubergizmo
According to National Security Agency (NSA) Director Gen. Keith Alexander, the United States federal government has the overarching duty and responsibility in securing the Internet to safeguard against cyber-criminal activities. Top military officials concurred with Alexander, but the government still has yet to provide details of how it intends to tackle Internet security issues. According to site Threat Post, Alexander "expressed confidence that the country's information security apparatus was up to the task, but acknowledged the difficulty of securing the Internet, a network that many security experts see as hopelessly broken and flawed by design."
The government has been victim of a number of cyber attacks in recent years, the most notable one being an attack by way of an infected USB key. While Alexander's Gov. 2.0 Summit speech helps to highlight that Internet security, both internally and externally, will be a key government issue moving forward, it is unlikely that Alexander will be successful at mitigating criticism against the government for not being responsive enough to cyber-security vulnerabilities.
According to Alexander, the comprehensive actions of the NSA and other government entities involved on cyber-security will need to resepct the civil rights of citizens. "Our citizens take a lot of interest in the government's activities in this area, and I have an obligation to the law and the American people to ensure everything we do preserves and protects their rights while protecting our interests," says Alexander.
RELATED ARTICLE:
Live Superfoods
It is time to Wake Up! You too, can join the "Global Political Awakening"!
According to National Security Agency (NSA) Director Gen. Keith Alexander, the United States federal government has the overarching duty and responsibility in securing the Internet to safeguard against cyber-criminal activities. Top military officials concurred with Alexander, but the government still has yet to provide details of how it intends to tackle Internet security issues. According to site Threat Post, Alexander "expressed confidence that the country's information security apparatus was up to the task, but acknowledged the difficulty of securing the Internet, a network that many security experts see as hopelessly broken and flawed by design."
The government has been victim of a number of cyber attacks in recent years, the most notable one being an attack by way of an infected USB key. While Alexander's Gov. 2.0 Summit speech helps to highlight that Internet security, both internally and externally, will be a key government issue moving forward, it is unlikely that Alexander will be successful at mitigating criticism against the government for not being responsive enough to cyber-security vulnerabilities.
According to Alexander, the comprehensive actions of the NSA and other government entities involved on cyber-security will need to resepct the civil rights of citizens. "Our citizens take a lot of interest in the government's activities in this area, and I have an obligation to the law and the American people to ensure everything we do preserves and protects their rights while protecting our interests," says Alexander.
RELATED ARTICLE:
Live Superfoods
Tuesday, August 31, 2010
Government Think Tank Calls For Infiltrating Conspiracy Websites
Paul Joseph Watson
Infowars.com
Monday, August 30, 2010
Infowars.com
Monday, August 30, 2010
Furious that state involvement in major terror attacks is being exposed to a wider audience than ever before via the Internet, a UK think tank closely affiliated with the Downing Street has called for authorities to infiltrate conspiracy websites in an effort to “increase trust in the government”.
“A Demos report published today, The Power of Unreason, argues that secrecy surrounding the investigation of events such as the 9/11 New York attacks and the 7/7 bombings in London merely adds weight to unsubstantiated claims that they were “inside jobs,” reports the London Independent.
In other words, the fact that the overwhelming amount of evidence indicates that both 7/7 and9/11 were “inside jobs” of one form or another, and that huge numbers of people are now aware of this via the increasing influence of the Internet, is hampering efforts to commit more acts of terror, therefore the government needs to change its strategy.
In the report, Demos, “Recommends the Government fight back by infiltrating internet sites to dispute these theories.” One of the tools Demos already employs to “fight back” against conspiracy theories is by labeling anyone who challenges the government’s official story as an extremist or a terrorist recruiter.
The strategy mirrors that advocated by White House information czar Cass Sunstein, who in a 2008 white paper similarly called for conspiracy websites to be infiltrated and undermined in order to dilute their influence. In the same report, Sunstein also called for taxing conspiracy theories (any viewpoint that differs with the official version) and outright banning free speechthat the authorities disapproved of.
What Demos and Sunstein are essentially calling for is classic “provocateur” style infiltration, updated for the 21st century, that came to the fore during the Cointelpro years, an FBI program from 1956-1971 that was focused around disrupting, marginalizing and neutralizing political dissidents, often using illegal methods.
The fact that governments on both sides of the pond have been caught over and over again habitually lying about everything under the sun, allied to a compliant corporate media that has aided authorities in covering up their misdeeds, has prompted a complete collapse in trust from the people, an effect that is now seriously hampering the state’s efforts to enlist implied consent, with millions of people rebelling against the system through civil disobedience and non-compliance in a myriad of different ways.
That’s why Demos, a mouthpiece for the British authorities, is desperate to infiltrate “conspiracy websites,” ie groups of people who broadcast the truth, in order to “increase trust” in a government that has lost all credibility.
As we have documented, governments all over the world, most notably the U.S. and Israel, already employ teams of agents whose sole job revolves around infiltrating and subverting websites that publish the truth about government corruption and atrocities.
Demos is a front for the insidious Common Purpose network, a group that Lt Cdr Brian Gerrish has exposed as playing a fundamental role in the advancement of Britain’s role in the new world order. Julia Middleton, Chief Executive of Common Purpose, sits on Demos’ advisory council.
Demos was founded in 1993 by marxists Martin Jacques and Geoff Mulgan, and was seen as being closely affiliated with Tony Blair’s Labour government. Mulgan went on to work inside Downing Street in 1997. Current British Prime Minister David Cameron also works closely with Demos and has given speeches at the group’s events.
Demos has routinely acted as a platform for elitists who wish to drastically alter society, eliminate freedoms, and sacrifice British sovereignty in pursuit of global government. On August 9, 2006, British Home Secretary Dr John Reid, another former marxist, gave a speech at a Demos conference stating that Britons “may have to modify their notion of freedom”, claiming that freedom is “misused and abused by terrorists.”
Demos is partnered with numerous other globalist organizations from government and industry, including IBM, The Carnegie United Kingdom Trust, and Shell International. The organization’s logo includes an all-seeing eye within its design.
Although the group poses as an independent think tank, Demos is little more than a public relations firm for the British government and security services. Its efforts to demonize conspiracy theories in order to “increase trust in the government” is a transparent ploy to do the bidding of its masters, by demonizing anyone who challenges a corrupt, lying state and its nefarious activities as an extremist and a potential domestic terrorist – contributing to the chilling process which seeks to crush free speech on the Internet.
—
Paul Joseph Watson is the editor and writer for Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a fill-in host for The Alex Jones Show. Watson has been interviewed by many publications and radio shows, including Vanity Fair and Coast to Coast AM, America’s most listened to late night talk show.
Subscribe to:
Posts (Atom)