"Eric was so naïve that he believed the Chinese when they said they would not implement Dragonfly and Social Credit for years. Actually, they will have complete control of everyone in China in two years. The plan is to have sterilized all Americans with 5G by that time and have control of all technology in America through these systems. The following is a transcript of an interview with a Google/Facebook/DARPA insider that was conducted with a member of the Anonymous Patriots, a citizen journalist group aligned with the American Intelligence Media. The person interviewed wishes to remain anonymous and for purposes of the interview will be called Jane Doe. This conversation took place on July 1st, 2019. -AIM ANONYMOUS PATRIOT (PATRIOT): Thank you for agreeing to this interview. Perhaps we could start with why you decided to have this conversation and why now. JANE DOE: I decided to contact your group after a friend of mine sent me a recent exposé on Mark Zuckerberg that you did. I thought it was timely, honest, and was pertinent to the crisis we are in concerning Eric Schmidt’s total sell out to China through advanced technology stolen from Google, Facebook, WhatsApp and other digital platforms that have come to aggressively control all Chinese. I believe Eric’s evil program, Dragonfly, has already been implemented in America. I am calling him out for his lies and his complete control by the Chinese Communist Party. Eric has lied so much lately and has admitted that he created the Social Credit System now ruling China for a ruthless totalitarian government that has Eric controlled and manipulated by President Xi Jinping and his central committee. In May of this year, Eric said that he also bifurcated the Internet for China so that there will soon be two different Internets – one controlled by America and one by China. These things are immoral and wrong and must be stopped. PATRIOT: Those are very big accusations and assertions that you have made. Frankly, why should we believe your story? How do you know these things about Eric? JANE DOE: I have known Eric since his days at Bell Laboratory when he wrongfully got credit for the rewrite of Lex, lexical analyzers. I was working for the Defense Advanced Research Projects Agency (DARPA) at that time and took an interest in this opportunist. I liked his spunk and guts and no small amount of looking after number one. When Eric went on to Sun Microsystems and again gleaned the credit for projects he didn’t create, I decided to find out what made him tick. Yes, I chose Eric as a lover to figure out what made him so successful. Eric has always cheated on his wife with many, many women and no small amount of men. I was just another one. But once he moved to Novell and tanked the company, I did him a favor by inviting him to a Highlands Group forum. For those of in your audience who might who don’t know about the Highlands Group, it works out of the Naval Intelligence Net Assessment Office and basically is the international group of corporations, venture capitalists, military and corporate intelligence, and the CIA’s In-Q-Tel agency that uses SAIC and Leidos as their corporate arm. Highlands Group was run by Andrew Marshall for decades and essentially this group assessed new patents, DARPA/In-Q-Tel projects, and military desires for new weapons. We all called Andrew Marshall, Yoda, because he was basically the “head warlord” of America, globalist corporations, and the world in general. PATRIOT: Wow. OK. I am coming to believe you and the person who recommended that I interview you. No one else could possibly know those details about those super-secret groups So, let me get this straight. You were Eric Schimdt’s lover and introduced him to the most notorious warlords in the world who you worked for when you were in DARPA? JANE DOE: Correct. PATRIOT: OK. And then you got mad at Eric because he, in your opinion, is selling out America to Chinese domination through the Internet and Eric’s new program called Dragonfly? Is that right? JANE DOE: Yes. Eric’s Dragonfly has already put 33 million Chinese in a more-or-less “digital prison” because of a Social Credit Score determined by online digital use. In America this is also already going into place. Eric worked with the Atlantic Council, donations from the Open Society Foundation, and the Cambridge Digital Forensic Investigation Laboratory to control the Internet before the 2012, 2016, and 2018 elections. Eric did this in 2012 and 2016 through Groundworks and other high-tech start-ups. I hate Hilary Clinton and Obama. They both were controlled by Eric and his controllers. Americans don’t even know that Eric, who wishes to be the king of the digital world, has already brought these programs from Europe and China to the Internet to control Americans. I have such a long history with Eric and his fake cyber king friends in Silicon Valley, that I don’t have time to tell all of it to you. For instance, the aggressive 5G attack on Americans came through Eric and Hillary using Richard Walker, again, as a shill for Broadcom working with Qualcomm to roll out endless poisonous 5G antennae broadcasters throughout America. Broadcom is China and the plan was to sterilize every American exposed to 5G before any studies could be done. Then, China conquers America without firing a shot. Eric donated $1.5 billion to create for Hillary the U.S. Digital Service which tried to control the 2016 presidential election results. Eric believes that during the 2020 election he will be able to make all of the systems work together to elect a Democrat. Eric hates Trump and more than anything wants him destroyed. Trump stands in the way of Chinese domination. As a matter of fact, Trump is ruining Eric’s big plans. PATRIOT: You have my attention – What is Eric’s Big Plan? JANE DOE: That is simple. Total Chinese control of the world. Digital “world peace” Eric calls it. You see, Eric is being worse than blackmailed by the Chinese. It is horrible what they have done to Eric and his two daughters, the only people he cares about on the planet. Eric doesn’t love his wife and never did. The Chinese poisoned Alison – that’s his daughter – over time to control Eric. That is why he agreed to create Dragonfly and the digital “vocational training” program Eric created to torture Chinese Muslims to death. So far, over 1.5 million Chinese Muslims have died being reprogrammed. Eric is directly responsible for those deaths and the brutal control of the Chinese people by Eric’s Social Credit System. Even though I refuse to talk to Eric now because he is too far gone, like Jim Breyer and Uri Milner, I know his thoughts and his current dilemma. It is a Chinese torture created just for Eric, like they did to control Jim and Uri by giving them everything they ever wanted – unimaginable wealth, sex with everything, uncontrolled power – and then they add the insurance policy of poisoning the person and their family and keeping the antidote secret, slowing doling it out to stop certain death. Unfortunately, Eric tried to keep some control and Communists don’t like that so the antidote for Alison stopped and she passed away. But this was after the Chinese forced Eric to work with North Korea. PATRIOT: Are you speaking about that well-reported trip of Eric and his daughter Sophie to North Korea? JANE DOE: Yes. That was completely faked. Sophie even wrote an alleged “diary” of the entire experience to claim there was no “business” done between her dad and North Korea. Eric actually took Sophie into insane danger to get her first dose of the antidote that the Chinese had poisoned Alison, Sophie and Eric with. Then, they informed Eric that during the trip they had poisoned him also. Thus, Eric gave the North Koreans the Google android phone software and they immediately claimed to have invented it themselves and called it Arirang. Everybody knows Eric sold out America on that deal but only a very few of us know why. PATRIOT: Why did the North Koreans agree to work with the Chinese on this poisoning issue? JANE DOE: Well, the Chinese poisoned Alison and Sophie in America through food. Eric was aware of this and refused to work with the Chinese on their plan to have Wi-fi beamed from the type of satellites Eric had already designed for the U. S. military. So, after they demanded that Eric come to North Korea for Sophie’s antidote, they not only blackmailed him into giving the Google android program, but they also made Eric agree to sneak into China and create a number of programs for them to gain global digital dominance. Eric 100% believes the Chinese will rule the world in ten years. What China doesn’t know is that Eric had planned to rule the world in twenty years, so they were in conflict. Eric has the plans we developed for DARPA, Motorola, and Boston Dynamics to build an undefeatable robot warrior. It was a DARPA project called “Atlas.” In a strange way, Eric is like Count Dooku from Star Wars, who was a good character who went bad by building his own robot army and clone army to fight against everybody. Count Dooku went rogue, just like Eric. But Eric is being manipulated by the Chinese who have perfected the art. No one wins against the Chinese. That is why Eric decided ten years ago to back the Chinese with high-tech IP theft that made the Russian, Uri Milner one of the wealthiest men in the world. Eric and Uri stole the IP from Facebook, Google, E-Bay, Amazon and others to make Tencent, Baidu, Molotok, 24×7, and Mail.ru – which were instantaneous hits. Uri, who represents the Communist Chinese Central Committee was even allowed to trade on the London Stock Exchange. Eric hated this and always was jealous of Uri and Jim Breyer who basically run their own “kingdoms” in China. Eric has often said he wants to be “Eric Khan.” Nothing crazy about that, is there? PATRIOT: This is the most shocking and amazing story I have every heard. Then, why did Eric lie about Dragonfly and Muslim extermination in China? JANE DOE: Eric was so naïve that he believed the Chinese when they said they would not implement Dragonfly and Social Credit for years. Actually, they will have complete control of everyone in China in two years. The plan is to have sterilized all Americans with 5G by that time and have control of all technology in America through these systems. Then, with 5G in place, the Atlas warrior robot army will be finished and can move in to disarm all Americans and arrest those who resist. America will simply become a vassal of China due to our digital addictions, which were planned from the beginning. PATRIOT: I don’t understand how Eric became so rich that he owns a piece of every digital pie at this point. JANE DOE: That’s the way of the military as they create mythical cyber geniuses as facades for Silicon Valley corporations and then allow those idiots to buy into the next DARPA no-bid government contract that eventually becomes a monopoly subsidized by the government. Jim Breyer from Accel Partners, John Doerr from Kleiner Perkins, and Sir Michael Moritz from Sequoia Capital, and the other standard venture capital companies always knew ahead of time who was the “chosen one” for the next big venture. At DARPA, we used taxpayer money up front to pay for people like Larry Brin and Sergey Page to win the DARPA contest. Then, we make sure that the insider traders from the Highlands Group know about the next start-up that will make an Initial Public Offering (IPO) with assets of millions but will immediately bump up to a company worth billions. Thus, Eric took a borrowed 100 million and bet on the next Highland Group sure bet – Facebook. Then Eric withdrew his billions after the IPO and went on from there to buy up every insider Highlands Group start-up that he could. After that, he was the Council on Foreign Relations chosen cyber-lord and nothing could stop him. Eric gets placed on any board he wants with a wink. Why you ask? Because he is the ultimate high-tech insider trader. PATRIOT: That’s how he came to control Facebook, but how did he get control of Google? JANE DOE: What I am about to tell you has seldom ever been said out-loud. Brin and Page were stooges. They were chosen because they would lie, not because they invented something. They were given a top-secret DARPA program called Memex which we had used as the best search engine we could develop. It was all military and the “dark web” at first. We used it to sucker in the enemy unbeknownst to them and then subliminally brain-wash them attempting to create behavioral outcomes through digital dopamine reward systems and adrenalin excretions. It worked like a charm, so the CIA’s In-Q-Tel agency suggested we give the system out to everyone in the world and see if we can’t control the world globally through digital addiction and manipulation. Again, it worked like a charm so we created the fake National Science Project that Brin and Page participated in. They simply did the best job of the dozen people involved but they didn’t invent anything, they simply used Memex and made it commercial. Facebook and Zuckerberg did the same thing with Lifelog, which was another DARPA/In-Q-Tel project that needed a boy-genius as the front-man. Mark was simply used. I find it amazing how easily people are lied to effectually. Eric is one big fat lie. Mark, Jim, Elon, Peter, and the whole gang got their inventions from DARPA and In-Q-Tel’s theft of patents. I know, I was there in the meetings. PATRIOT: So, are you evil too? JANE DOE: Yes, in a way I fell into the same evil trap but for different reasons. I actually was naïve and thought I was doing it for my country. I only found out after years in DARPA what was really going on. It actually comes down to a handful of people who control the world. I happen to know most of them. No one does anything without tech support and I was at the heart of high-tech innovation at DARPA, Motorola, Boston Dynamics, Facebook Building 8, and many other “skunkworks” projects for Lockheed, Boeing, BAE and others. Yes, I am one of those cyber warlords, but I did it in good faith, until I found out the whole truth just months ago. That is why I feel I have an obligation to spill the beans and let the powers that stand for honesty, morality and truth to finally have their day. I have seen too much to let Eric and the gang sell us out to China and sterilize every American in the process. The whole system of DARPA weaponization of patents and inventions must stop immediately. Letting Andrew Marshall and his warlords weaponize every invention must stop now. I will keep speaking out against this evil group of people, with Eric at the head. There are many others I can name because I was essentially one of their bosses, so I have a great deal of first-hand experience with these cyber fakes, most of whom are total tech idiots and embarrass the profession every time they open their mouth and lie. PATRIOT: So, what happens to Eric if he doesn’t do China’s bidding? JANE DOE: They will stop giving him the antidote and he and his daughter Sophie will meet the same fate as Alison did. They lie and say Alison died from a long-standing illness. This is nonsense. PATRIOT: Sorry I am slow on the uptake with some of my questions, but frankly, I am taken aback by your honesty and all that you are saying. Unfortunately, I still don’t understand why Eric went with the Chinese offers to begin with. JANE DOE: At first, it was money. Eric has always said he won’t stop even after becoming a trillionaire. Eric believed his buddy Henry Kissinger pronouncement that America has lost its place as the globally dominate force to China due to the high-tech revolution and Chinese IP theft. So, Eric thought his connections to China and his buddies Jim and Uri would make him a trillionaire. But, there was a much more nefarious reason Eric aligned with China. China allows Eric to experiment on life-extension research using aborted baby tissue and organs. Everyone knows that the number one thing Eric thinks about is longevity. He wants to live forever but believes he already has the technology to live to 180. He has said this many times to the press. Think back to his off-shore laboratories on huge ships where he was experimenting on things that are illegal in America. Well, guess what? They aren’t illegal in China, as long as you are a favorite of the Communist Central Committee. Eric, like most of the cyber-kings, are obsessed with extending their life indefinitely. They often say it is their intent to live in a body for hundreds of years and then move to an Artificial Intelligence host after that. They sit around thinking about their infinite money, but lack of immortality. Let me make this clear. These are idiots who are psychopaths with delusions of grandeur. They are little boys in a sandbox. Until I came along, it was almost all boys except for Hillary Clinton. The boys were afraid of dying. I think that is because they are afraid of karma and the consequences of their lies and despicable actions. The ones I know don’t sleep without sleeping pills due to being awake all night plotting their take over of the world. Well, Eric’s plans of world domination pale against the efforts of Communist China. The Central Committee will simply eat Eric alive and spit him out as they have done to countless people before him. Don’t get me wrong, Eric is very useful to China right now. He is the head architect of the digital totalitarian Chinese Communist State. He will live forever in history as an evil and ghastly man. History won’t know about the poisoning. Eric, like all the aging world conquers, uses transfusions of younger blood to extend his life. He has tried everything that money can buy to extend his life. And then, he is taken down by his greed for wealth and power by the Chinese with some unknown powder they put in his food. This is funny because the old Chinese kings were also obsessed with extending their life and putting mercury in their food. The mercury actually shortened their lives. I think the same thing happened to Eric and it is sad the Chinese are so brutal that they also included his daughters. But no cruelty is beyond the Chinese government. I have never had anything to do with China. That is, except for the shared weaponized inventions of the Highlands Group. But I gained no money from the decades of work I did in that area. I was never there for personal gain. Eric often said he would leave his wife and divorce her so we could be together forever. Personally, I am a Christian and I don’s share most of Eric’s crazy beliefs; even though he preached them to me for decades. I don’t believe, and haven’t for over a decade, hardly anything Eric says. He talks like George Soros as a divinely anointed king of the world whose mission is for the sake of all of humanity when it is simply childish desires that evaporate at death. I don’t want China to have our technology. I was shocked to find out that China was allowed to hack into every government system – even DARPA. China and Russia were given the IP that was weaponized by the Highlands Group. That is when I left and moved into private industry, with the help of Eric and the gang. But now, I want to focus on human-based technology driven by human intelligence for the benefit of humans. Eric is all about AI and believes that perhaps he will become the AI of the Internet in the future. He actually entertains such thoughts. Just one word comes to mind – megalomaniac. And personally, I don’t want to be on any ship that he is at the helm of. Eric is going down and I hope, with honest people coming forward, he will take China with him. PATRIOT: Wow. My brain needs oxygen. What you are describing is my worst fears about Silicon Valley – more like a nightmare. And you have been right in among the war demons and the goblins who makes the weapons. You seem so sweet and nice. After speaking with the anonymous source of my last expose, I expected you to be the witch of the virtual world of war. Really, DARPA and the whole thing. I have only ever spoken to one other person who has attended Highlands Group forums and she said those people were pure evil and could burn a hole through you with their demonic eyes. Cold-hearted, blood-thirsty warlords, plain and simple. JANE DOE: Well, she was right. I couldn’t have described it better. Sitting with the international think tank that assures continued war is breath-taking. I didn’t know that weapons dealers, both conventional and virtual, sit around and calculate the deaths that will arise from going forward with a new project. But DARPA is a death machine; pure and simple. I worked for the death lords to keep America safe and free but those old, naïve beliefs of mine have long gone to the wayside. I really have no justification for any of those programs. Now remember, when I say those DARPA projects, I am referring to taxpayer funded weaponization of the Internet, Facebook, PayPal, Google, Twitter, Gmail, YouTube, Amazon, Netflix, Microsoft, Apple, etcetera. It disgusts me to know what I know about those fake corporations and their take-over of the world. I helped create those programs. I had no idea they would all go out of control. I am trying to rectify those mistakes right now. PATRIOT: Can we stop the overthrow of free speech by Google, Alphabet, Facebook, etc.? JANE DOE: I don’t know. It may be too late. Stopping the spread of Broadcom/Qualcomm was a good start. But then they gave the software out to many companies and the $40 billion yearly subsidizing of 5G may be the end of America as we know it. I am encouraged by the actions against Huawei, ZTE, Lenovo, Chinese semi-conductors and micro-chips, and other such actions. But China marches on no matter how many troops may die. China is basically the worst enemy we have ever had now that Eric, through Alphabet, Boston Dynamics, Motorola, and his 5G spy satellites built for the U. S. military are in the hands of Chinese totalitarians. I really don’t know. If we listen to Eric, and I am never going to speak to him again personally, you would hear him tell America that we have two years before his Chinese plan to dominate America kicks in. If 5G goes in, Eric’s robots and the Internet of Things will control America. I know that sounds harsh but remember that Eric told us Dragonfly and the Chinese Social Credit System would only be partially functional in a few years. Lie. It is fully functional now and killing people as we speak. Eric knows this. So, if Eric says the America Social Credit System will rule America in 10 years, you can bet it is more like two or three years. He is building Chinese controlled robot warriors as we speak. The U. S. military has already put Atlas, our robot warrior, into active duty. So, when you ask me about the future, even though that is my business, I cannot predict it. PATRIOT: So, are you saying Eric’s plans to dominate America are already in place? JANE DOE: Yes, I’ve already mentioned his election rigging activities, but his Digital News Service controls all main stream media outlets. Eric owns the program that runs Avid and Isis Management, the system that filters every word on 127 media outlets. That’s why the news is the same wherever you look, Eric’s program scrubs the news. Eric created a dozen look-alike programs for Europe where his programs have effectively stopped free speech. But it is not about the old systems, it is about the new ones and Eric controls research and development for dozens of the largest corporations. No digital innovations go without his approval and perhaps funding if he knows it will become a government monopoly. Eric and Jim Breyer haven’t been wrong in over a hundred start-ups they have funded. Amazingly good odds don’t you think? Insider trading. Personally, I never had any money to invest or I could be rich. I never went for the money, just the power. Woman power is what I am about. Those Silicon Valley boys were simply toys in my hands. Eric thought he was MANipulating me, when in fact, I was manipulating him – once I saw the light. And now, I am shinning a bright light on his corruption and plans. These evil plans must be stopped, and I personally can’t do it myself. I believe that Facebook and Google have a short life-expectancy at this point. Their corruption and lies have been outed. That is why it is OK for me to speak the truth I experienced. PATRIOT: I am overwhelmed. What can a simple person due to help? JANE DOE: It is more simple than people think but it must come from every person on the planet. Simply reject big-tech. Slow it down by not buying it, using it, or allowing it to be used on children. Protect yourself, these are serious, deadly weapons you call your smart phone, I-pad or computer. Technology as war has advanced faster than humans have developed in morality. We are doomed to blow ourselves up if we keep making war-toys and putting them in the hands of people like Andrew Marshall and Eric Schmidt. These boys can’t help themselves. They want more, and more without any consequences. That is why all this evil goes on in small groups that most people don’t know exist. If people knew, they would hang the traitors who give American IP and trade secrets to our enemies just to feed the war machine. Eric has become one of those war machines and I want to see someone stop him. He is out of control. PATRIOT: I want to thank you for what you are doing. This is truly patriotic – even if a little late in the game. I personally, have hope because of people like you. Everyone can wake up. It is not a sin to sleep. I could go on asking you questions endlessly but I feel I have already been blessed by the time you have so willingly given. Seriously, I, we, can’t thank you enough. We will do what we can. I will transcribe this and submit it up to the boss and if they believe you and the information can be properly vetted, I hope I can get your message out to many people. Of course, I would like to reflect on this rather upsetting information and then write down a bunch of questions for you. JANE DOE: I would be happy to answer any questions that I can through this secure line and, right now, only through you until we see where this goes. I just want to help stop the madness. I feel I owe the American people that. I never really saw myself as a patriot, but I guess I might be one. PATRIOT: Thank you again for blowing my mind. I will be working hard to find supporting material in the open media to amplify what you have told me today. I will submit them with this interview and perhaps we can get this thing to go viral and we can stop the truly evil plans of Eric and his gang. Any parting comments? JANE DOE: I can’t tell you how this makes me feel. I am not one for sentiment but I feel a huge weight lifting off my chest. I am pleased with my decision to have no further working with the companions of darkness. A new day needs to come when lies are like mill-stones around the neck of the liar. Post Interview Notes Support material that we found that supports Jane Doe’s interview: Eric Schmidt illegally donated $1.5 billion to the Hillary campaign that she did not declare. This is proof of the 2016 presidential election meddling by Schmidt. https://qz.com/823922/eric-schmidt-played-a-crucial-role-in-team-hillarys-election-tech/ https://qz.com/520652/groundwork-eric-schmidt-startup-working-for-hillary-clinton-campaign/ https://www.dailymail.co.uk/news/article-2371719/Googles-Eric-Schmidts-open-marriage-string-exotic-lovers.html Corrupt practices of Google under Eric Schmidt command: https://www.forbes.com/sites/scottcleland/2012/01/20/the-evidence-googles-systematic-theft-is-anti-competitive/#1eec5b807d62 What made Steve Jobs hate Eric Schmidt: https://gizmodo.com/what-really-made-steve-jobs-so-angry-at-google-5941817 Civis Analytics From Wikipedia, the free encyclopedia Civis Analytics is an Eric Schmidt-backed data science software and consultancy company founded by Dan Wagner in 2013.[1] Wagner served as the Chief Analytics Officer for Barack Obama’s 2012 re-election campaign.[citation needed] Civis Analytics helps businesses “understand their data, use that data to make predictions, and get recommendations on what steps to take next”.[1] Civis works with Fortune 500 companies and the country’s largest organizations, including Verizon, Airbnb, Discovery, FEMA, Boeing and the American Red Cross.[2] In the last few months Eric Schmidt, the gaffe-prone CEO of Google, has made public statements that make us question whether the company’s slogan still is “Don’t be evil.” In interview after interview, Schmidt has made tactless comments on especially sensitive and controversial topics such as online privacy and net neutrality. As CEO, one of Schmidt’s largest roles is to act as a spokesperson for the company, but that ironically seems to be his Achilles’ heel. Here are some of his more recent faux pas.
Famous Eric Schmidt quotes:“We know where you are. We know where you’ve been. We can more or less know what you’re thinking about” “If you have something that you don’t want anyone to know maybe you shouldn’t be doing it in the first place” “Every young person one day will be entitled automatically to change his or her name on reaching adulthood in order to disown youthful hijinks stored on their friends’ social media sites” “Our policy is we try things, we celebrate our failures” “Just remember when you post something, the computers remember forever” “You can trust us with your data” “Washington is an incumbent protection machine… The Laws Are Written by Lobbyists“ “I actually think most people don’t want Google to answer their questions, they want Google to tell them what they should be doing next” “We are willing to get it one way or another, with or without deal” “We Want People To Be More Logged Into Google” We Want People To Be More Logged Into Google – Eric Schmidt “Computers will clearly handle the things we aren’t good at, and we will handle the things computers clearly aren’t good at” “The Internet of things will augment your brain” Don't believe any of this? Then you haven't been paying attention. Does this sound way too far out beyond belief? Then you haven't been paying attention. Is this really true? It just may be a sounder approach to believe that there's sufficient supporting evidence appropriately vetted that generally a greater portion of this interview is. It's time to wake up and be part of the solution. Former Lover Exposes Eric Schmidt
#5G #5GIsAMassExtinctionEvent #5GKills #GoogleIsEvil #EricSchmidt #DARPA #Dragonfly #SocialCreditSystem #Facebook #StopTechnocracy #SkyNet #ElectionMeddling
0 Comments
' So how do you survive in the American surveillance state? We’re running out of options.' By John W. Whitehead June 10, 2019 “You had to live—did live, from habit that became instinct—in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinized.”—George Orwell, 1984 Tread cautiously: the fiction of George Orwell has become an operation manual for the omnipresent, modern-day surveillance state. It’s been 70 years since Orwell—dying, beset by fever and bloody coughing fits, and driven to warn against the rise of a society in which rampant abuse of power and mass manipulation are the norm—depicted the ominous rise of ubiquitous technology, fascism and totalitarianism in 1984. Who could have predicted that 70 years after Orwell typed the final words to his dystopian novel, “He loved Big Brother,” we would fail to heed his warning and come to love Big Brother. “To the future or to the past, to a time when thought is free, when men are different from one another and do not live alone— to a time when truth exists and what is done cannot be undone: From the age of uniformity, from the age of solitude, from the age of Big Brother, from the age of doublethink — greetings!”—George Orwell 1984 portrays a global society of total control in which people are not allowed to have thoughts that in any way disagree with the corporate state. There is no personal freedom, and advanced technology has become the driving force behind a surveillance-driven society. Snitches and cameras are everywhere. People are subject to the Thought Police, who deal with anyone guilty of thought crimes. The government, or "Party," is headed by Big Brother who appears on posters everywhere with the words: "Big Brother is watching you." We have arrived, way ahead of schedule, into the dystopian future dreamed up by not only Orwell but also such fiction writers as Aldous Huxley, Margaret Atwood and Philip K. Dick. “If liberty means anything at all, it means the right to tell people what they do not want to hear.”―George Orwell Much like Orwell’s Big Brother in 1984, the government and its corporate spies now watch our every move. Much like Huxley’s A Brave New World, we are churning out a society of watchers who “have their liberties taken away from them, but … rather enjoy it, because they [are] distracted from any desire to rebel by propaganda or brainwashing.” Much like Atwood’s The Handmaid’s Tale, the populace is now taught to “know their place and their duties, to understand that they have no real rights but will be protected up to a point if they conform, and to think so poorly of themselves that they will accept their assigned fate and not rebel or run away.” And in keeping with Philip K. Dick’s darkly prophetic vision of a dystopian police state—which became the basis for Steven Spielberg’s futuristic thriller Minority Report—we are now trapped in a world in which the government is all-seeing, all-knowing and all-powerful, and if you dare to step out of line, dark-clad police SWAT teams and pre-crime units will crack a few skulls to bring the populace under control. What once seemed futuristic no longer occupies the realm of science fiction. Incredibly, as the various nascent technologies employed and shared by the government and corporations alike—facial recognition, iris scanners, massive databases, behavior prediction software, and so on—are incorporated into a complex, interwoven cyber network aimed at tracking our movements, predicting our thoughts and controlling our behavior, the dystopian visions of past writers is fast becoming our reality. Our world is characterized by widespread surveillance, behavior prediction technologies, data mining, fusion centers, driverless cars, voice-controlled homes, facial recognition systems, cybugs and drones, and predictive policing (pre-crime) aimed at capturing would-be criminals before they can do any damage. Surveillance cameras are everywhere. Government agents listen in on our telephone calls and read our emails. Political correctness—a philosophy that discourages diversity—has become a guiding principle of modern society. “People sleep peaceably in their beds at night only because rough men stand ready to do violence on their behalf.”―George Orwell The courts have shredded the Fourth Amendment’s protections against unreasonable searches and seizures. In fact, SWAT teams battering down doors without search warrants and FBI agents acting as a secret police that investigate dissenting citizens are common occurrences in contemporary America. And bodily privacy and integrity have been utterly eviscerated by a prevailing view that Americans have no rights over what happens to their bodies during an encounter with government officials, who are allowed to search, seize, strip, scan, spy on, probe, pat down, taser, and arrest any individual at any time and for the slightest provocation. “The creatures outside looked from pig to man, and from man to pig, and from pig to man again; but already it was impossible to say which was which.”―George Orwell, Animal Farm We are increasingly ruled by multi-corporations wedded to the police state. What many fail to realize is that the government is not operating alone. It cannot. The government requires an accomplice. Thus, the increasingly complex security needs of the massive federal government, especially in the areas of defense, surveillance and data management, have been met within the corporate sector, which has shown itself to be a powerful ally that both depends on and feeds the growth of governmental overreach. In fact, Big Tech wedded to Big Government has become Big Brother, and we are now ruled by the Corporate Elite whose tentacles have spread worldwide. For example, USA Today reports that five years after the 9/11 terrorist attacks, the homeland security business was booming to such an extent that it eclipsed mature enterprises like movie-making and the music industry in annual revenue. This security spending to private corporations such as Google, Amazon, Microsoft and others is forecast to exceed $1 trillion in the near future. The government now has at its disposal technological arsenals so sophisticated and invasive as to render any constitutional protections null and void. Spearheaded by the NSA, which has shown itself to care little to nothing for constitutional limits or privacy, the “security/industrial complex”—a marriage of government, military and corporate interests aimed at keeping Americans under constant surveillance—has come to dominate the government and our lives. At three times the size of the CIA, constituting one third of the intelligence budget and with its own global spy network to boot, the NSA has a long history of spying on Americans, whether or not it has always had the authorization to do so. Money, power, control. There is no shortage of motives fueling the convergence of mega-corporations and government. But who is paying the price? The American people, of course. Orwell understood what many Americans, caught up in their partisan flag-waving, are still struggling to come to terms with: that there is no such thing as a government organized for the good of the people. Even the best intentions among those in government inevitably give way to the desire to maintain power and control over the citizenry at all costs. As Orwell explains: The Party seeks power entirely for its own sake. We are not interested in the good of others; we are interested solely in power, pure power. What pure power means you will understand presently. We are different from the oligarchies of the past in that we know what we are doing. All the others, even those who resembled ourselves, were cowards and hypocrites. The German Nazis and the Russian Communists came very close to us in their methods, but they never had the courage to recognize their own motives. They pretended, perhaps they even believed, that they had seized power unwillingly and for a limited time, and that just around the corner there lay a paradise where human beings would be free and equal. We are not like that. We know what no one ever seizes power with the intention of relinquishing it. Power is not a means; it is an end. One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship. The object of persecution is persecution. The object of torture is torture. The object of power is power. Now you begin to understand me. “The further a society drifts from truth the more it will hate those who speak it.” ― George Orwell How do you change the way people think? You start by changing the words they use. In totalitarian regimes—a.k.a. police states—where conformity and compliance are enforced at the end of a loaded gun, the government dictates what words can and cannot be used. In countries where the police state hides behind a benevolent mask and disguises itself as tolerance, the citizens censor themselves, policing their words and thoughts to conform to the dictates of the mass mind. Dystopian literature shows what happens when the populace is transformed into mindless automatons. In Ray Bradbury’s Fahrenheit 451, reading is banned and books are burned in order to suppress dissenting ideas, while televised entertainment is used to anesthetize the populace and render them easily pacified, distracted and controlled. In Huxley’s Brave New World, serious literature, scientific thinking and experimentation are banned as subversive, while critical thinking is discouraged through the use of conditioning, social taboos and inferior education. Likewise, expressions of individuality, independence and morality are viewed as vulgar and abnormal. And in Orwell’s 1984, Big Brother does away with all undesirable and unnecessary words and meanings, even going so far as to routinely rewrite history and punish “thoughtcrimes.” In this dystopian vision of the future, the Thought Police serve as the eyes and ears of Big Brother, while the Ministry of Peace deals with war and defense, the Ministry of Plenty deals with economic affairs (rationing and starvation), the Ministry of Love deals with law and order (torture and brainwashing), and the Ministry of Truth deals with news, entertainment, education and art (propaganda). The mottos of Oceania: WAR IS PEACE, FREEDOM IS SLAVERY, and IGNORANCE IS STRENGTH. All three—Bradbury, Huxley and Orwell—had an uncanny knack for realizing the future, yet it is Orwell who best understood the power of language to manipulate the masses. Orwell’s Big Brother relied on Newspeak to eliminate undesirable words, strip such words as remained of unorthodox meanings and make independent, non-government-approved thought altogether unnecessary. To give a single example, as psychologist Erich Fromm illustrates in his afterword to 1984: The word free still existed in Newspeak, but it could only be used in such statements as "This dog is free from lice" or "This field is free from weeds." It could not be used in its old sense of "politically free" or "intellectually free," since political and intellectual freedom no longer existed as concepts.... Where we stand now is at the juncture of OldSpeak (where words have meanings, and ideas can be dangerous) and Newspeak (where only that which is “safe” and “accepted” by the majority is permitted). The power elite has made their intentions clear: they will pursue and prosecute any and all words, thoughts and expressions that challenge their authority. This is the final link in the police state chain. “Until they became conscious they will never rebel, and until after they have rebelled they cannot become conscious.”—George Orwell Americans have been conditioned to accept routine incursions on their privacy rights. In fact, the addiction to screen devices—especially cell phones—has created a hive effect where the populace not only watched but is controlled by AI bots. However, at one time, the idea of a total surveillance state tracking one’s every move would have been abhorrent to most Americans. That all changed with the 9/11 attacks. As professor Jeffrey Rosen observes, “Before Sept. 11, the idea that Americans would voluntarily agree to live their lives under the gaze of a network of biometric surveillance cameras, peering at them in government buildings, shopping malls, subways and stadiums, would have seemed unthinkable, a dystopian fantasy of a society that had surrendered privacy and anonymity.” Having been reduced to a cowering citizenry—mute in the face of elected officials who refuse to represent us, helpless in the face of police brutality, powerless in the face of militarized tactics and technology that treat us like enemy combatants on a battlefield, and naked in the face of government surveillance that sees and hears all—we have nowhere left to go. We have, so to speak, gone from being a nation where privacy is king to one where nothing is safe from the prying eyes of government. In search of so-called terrorists and extremists hiding amongst us—the proverbial "needle in a haystack," as one official termed it—the Corporate State has taken to monitoring all aspects of our lives, from cell phone calls and emails to Internet activity and credit card transactions. Much of this data is being fed through fusion centers across the country, which work with the Department of Homeland Security to make threat assessments on every citizen, including school children. These are state and regional intelligence centers that collect data on you. “Big Brother is Watching You.”―George Orwell Wherever you go and whatever you do, you are now being watched, especially if you leave behind an electronic footprint. When you use your cell phone, you leave a record of when the call was placed, who you called, how long it lasted and even where you were at the time. When you use your ATM card, you leave a record of where and when you used the card. There is even a video camera at most locations equipped with facial recognition software. When you use a cell phone or drive a car enabled with GPS, you can be tracked by satellite. Such information is shared with government agents, including local police. And all of this once-private information about your consumer habits, your whereabouts and your activities is now being fed to the U.S. government. The government has nearly inexhaustible resources when it comes to tracking our movements, from electronic wiretapping devices, traffic cameras and biometrics to radio-frequency identification cards, satellites and Internet surveillance. Speech recognition technology now makes it possible for the government to carry out massive eavesdropping by way of sophisticated computer systems. Phone calls can be monitored, the audio converted to text files and stored in computer databases indefinitely. And if any "threatening" words are detected—no matter how inane or silly—the record can be flagged and assigned to a government agent for further investigation. Federal and state governments, again working with private corporations, monitor your Internet content. Users are profiled and tracked in order to identify, target and even prosecute them. In such a climate, everyone is a suspect. And you’re guilty until you can prove yourself innocent. To underscore this shift in how the government now views its citizens, the FBI uses its wide-ranging authority to investigate individuals or groups, regardless of whether they are suspected of criminal activity. “Nothing was your own except the few cubic centimetres inside your skull.” ― George Orwell Here’s what a lot of people fail to understand, however: it’s not just what you say or do that is being monitored, but how you think that is being tracked and targeted. We’ve already seen this play out on the state and federal level with hate crime legislation that cracks down on so-called “hateful” thoughts and expression, encourages self-censoring and reduces free debate on various subject matter. Say hello to the new Thought Police. Total Internet surveillance by the Corporate State, as omnipresent as God, is used by the government to predict and, more importantly, control the populace, and it’s not as far-fetched as you might think. For example, the NSA is now designing an artificial intelligence system that is designed to anticipate your every move. In a nutshell, the NSA will feed vast amounts of the information it collects to a computer system known as Aquaint (the acronym stands for Advanced QUestion Answering for INTelligence), which the computer can then use to detect patterns and predict behavior. No information is sacred or spared. Everything from cell phone recordings and logs, to emails, to text messages, to personal information posted on social networking sites, to credit card statements, to library circulation records, to credit card histories, etc., is collected by the NSA and shared freely with its agents in crime: the CIA, FBI and DHS. One NSA researcher actually quit the Aquaint program, “citing concerns over the dangers in placing such a powerful weapon in the hands of a top-secret agency with little accountability.” Thus, what we are witnessing, in the so-called name of security and efficiency, is the creation of a new class system comprised of the watched (average Americans such as you and me) and the watchers (government bureaucrats, technicians and private corporations). Clearly, the age of privacy in America is at an end. “If you want a picture of the future, imagine a boot stamping on a human face—for ever.”--Orwell So where does that leave us? We now find ourselves in the unenviable position of being monitored, managed and controlled by our technology, which answers not to us but to our government and corporate rulers. This is the fact-is-stranger-than-fiction lesson that is being pounded into us on a daily basis. It won’t be long before we find ourselves looking back on the past with longing, back to an age where we could speak to whom we wanted, buy what we wanted, think what we wanted without those thoughts, words and activities being tracked, processed and stored by corporate giants such as Google, sold to government agencies such as the NSA and CIA, and used against us by militarized police with their army of futuristic technologies. To be an individual today, to not conform, to have even a shred of privacy, and to live beyond the reach of the government’s roaming eyes and technological spies, one must not only be a rebel but rebel. Even when you rebel and take your stand, there is rarely a happy ending awaiting you. You are rendered an outlaw. So how do you survive in the American surveillance state? We’re running out of options. As I make clear in my book Battlefield America: The War on the American People, we’ll soon have to choose between self-indulgence (the bread-and-circus distractions offered up by the news media, politicians, sports conglomerates, entertainment industry, etc.) and self-preservation in the form of renewed vigilance about threats to our freedoms and active engagement in self-governance. Yet as Aldous Huxley acknowledged in Brave New World Revisited: “Only the vigilant can maintain their liberties, and only those who are constantly and intelligently on the spot can hope to govern themselves effectively by democratic procedures. A society, most of whose members spend a great part of their time, not on the spot, not here and now and in their calculable future, but somewhere else, in the irrelevant other worlds of sport and soap opera, of mythology and metaphysical fantasy, will find it hard to resist the encroachments of those would manipulate and control it.” WC: 3183 Read more ABOUT JOHN W. WHITEHEADConstitutional attorney and author John W. Whitehead is founder and president of The Rutherford Institute. His new book Battlefield America: The War on the American People is available at www.amazon.com. Whitehead can be contacted at [email protected]. Publication Guidelines / Reprint PermissionJohn W. Whitehead’s weekly commentaries are available for publication to newspapers and web publications at no charge. Please contact [email protected] to obtain reprint permission. The Omnipresent Surveillance State: Orwell's 1984 Is No Longer Fiction
#PoliceState #Surveillance #Privacy #4thAmendment #GeorgeOrwell #StopTechnocracy #ThoughtPolice George Orwell on Massive Steroids! Do not willingly give up your DNA! The FBI is abusing ancestry genealogy websites by tapping into their DNA data. What’s worse, these companies are giving up users’ data under presumed consent that is buried in their terms and conditions, according to several reports. FamilyTreeDNA is the first company known to be cooperating directly with the FBI to give its agents access to its genealogy database, according to a BuzzFeed report. A FamilyTreeDNA spokesperson told BuzzFeed that FamilyTreeDNA’s agreement with the FBI gives the agency the ability to search more than a million genetic profiles — the majority of which were given by their customers without knowledge of the company’s relationship with the FBI. As part of the arrangement, FamilyTreeDNA has further agreed to test DNA evidence and identify the remains of deceased individuals in violent crimes for the FBI in its own laboratory. In a statement, FamilyTreeDNA said that customers have the ability to opt out of matching features in their account settings. Doing so would prevent law enforcement from accessing their genetic information, but it also means a user would be unable to find potential family members through the service. According to Gizmodo, the company also seems to admonish those who choose to opt out by suggesting that it could be a “moral responsibility” to give up their private health information to the FBI. However, the fact of genealogy companies are being subpoenaed by law enforcement isn’t a secret. In fact, it’s in the disclosures on their websites -- FamilyTreeDNA, AncestryDNA, and 23andMe. Forensic magazine reports that the FBI had previously had access to FamilyTreeDNA’s database before the partnership with the FBI. After news broke that the FBI was accessing user data, FamilyTreeDNA announced that it would allow its customers to bar law enforcement from accessing their data, Engadget reported. As an interesting corporate connection to make, one of the co-founders of 23andMe, Anne Wojcicki, is married to Google’s Sergey Brin. Unsurprisingly, Google Inc. also backs the DNA analysis company. Last year, Drug giant GlaxoSmithKline invested US$300 million in the DNA-testing company in a deal that should raise eyebrows. A drug company working together with a DNA database company … what could possibly go wrong? Under the deal, GSK has exclusive rights for four years to use 23andMe’s DNA database to develop new medicines using human genetics. Activist Post reported last year Houston police launched a pilot program with the company ANDE to test a machine called Rapid DNA that runs DNA tests in under two hours. Local news station KHOU11 reported, “This rapid DNA is the future. It comes down to when mathematicians stopped using abacuses and started using calculators. It’s that important to criminal justice,” said Lt. Warren Meeler, Houston Police Department, Homicide Division. As part of the test program, proper protocol for using the technology has been to swab each piece of evidence twice. First, the Houston Forensic Science Center (HFSC) takes an official sample for the lab, then Houston police take a second sample for the trial machine. Rapid DNA results can’t be used in court, and the technology is only used for investigations in Houston, according to the news outlet. The technology has some forensic scientists worried about whether it should be used at crime scenes, warning about the accuracy of the technology. “I think everybody is comfortable that if there is a high concentration of DNA from a single source, so an oral swab from an individual, we’re confident the instruments produce good data. The questions start to come in circumstances where we’ve got touch DNA — smaller quantities of DNA, more mixtures, there’s more people on that doorknob that I’m swabbing – there I’m not sure anybody knows yet,” said Dr. Peter Stout, President and CEO of the Houston Forensic Science Center. However, further research shows that Houston isn’t the only city using rapid DNA, police departments across the country—have rolled out their own pilot programs to test these miniature portable DNA lab machines that originate from the DHS. “Rapid DNA, a newly commercialized technology developed by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T), addresses these challenges by greatly expediting the testing of deoxyribonucleic acid (DNA) that is the only biometric that can accurately verify family relationships. This technology can be used on the scene of mass fatality events, in refugee camps around the world, or at immigration office,” the DHS’s website reads. Police departments in Maryland, Pennsylvania, South Carolina, Florida, Utah, Arizona, Texas, California and in Delaware are or will be using DHS’s Rapid DNA. An article in ProPublica warns that “over the last decade, collecting DNA from people who are not charged with — or even suspected of — any particular crime has become an increasingly routine practice for police.” Congress enacted the “DNA Identification Act of 1994” authorizing the FBI to maintain a centralized, national DNA database and to develop a software system to allow for the sharing of information within and between states for law enforcement. By 2004, the resulting system – the Combined DNA Index System (CODIS) – connected the databases of all fifty states, which at that time were limited to profiles from those convicted of serious, violent crimes. Signed into law by President George W. Bush on October 30, 2004, the “Justice For All Act” greatly expanded the CODIS system, allowing collection of DNA from all federal felons and further enabling states to upload to CODIS profiles from anyone convicted of a crime according to a secret congressional WikiLeaks document entitled: “DNA Evidence: Legislative Initiatives in the 106th Congress.”. On January 5, 2006, a barely noticed piece of legislation entitled the “DNA Fingerprint Act of 2005” was also signed into law by President George W. Bush, that severely expanded the government’s authority to collect and permanently retain DNA samples. The bill slipped through virtually unnoticed because the law was, buried in the back of the Violence Against Women Act (VAWA) reauthorization bill. Unbeknownst to the public, the bill granted the government authority to obtain and permanently store DNA from anyone who is arrested as well as non-U.S. citizens detained under federal authorities like Border Control and DHS. In December of 2015 nearly 10 years later, results from a rapid DNA device were submitted as evidence in a successful murder prosecution for the first time attempted murder case in Richland County, South Carolina. (That article now has been curiously deleted from Reuters and is only available on archive.org) A bill before Congress, introduced on December 2015 by Sen. Orin Hatch, R-Utah, called for profiles collected by Rapid DNA devices to be connected to the FBI’s Combined DNA Index System, or CODIS, the software and national database that stores DNA profiles from federal, state and local forensic laboratories. During a Senate committee hearing on the Rapid DNA Act of 2015, disgraced former FBI Director James Comey said that passage of the bill “would help us change the world in a very, very exciting way. It will allow us, in booking stations around the country, if someone’s arrested, to know instantly—or near instantly—whether that person is the rapist who’s been on the loose in a particular community before they’re released on bail and get away or to clear somebody, to show that they’re not the person.” In 2017, Sen. Charles Grassley (R-IA) introduced “the SECURE Act” (S. 2192) on December 5th. The bill largely borrows from two other federal bills--H.R. 3548 and S. 1757 The Rapid DNA Act of 2017, S.139 and HR.510 passed last year, amended the DNA Identification Act of 1994, allowing previous hurdles to be surpassed by the new technology. The bill was sponsored by U.S. Senate sponsor Senator Orrin Hatch (R-UT) and lead co-sponsor Senator Dianne Feinstein (D-CA) as well as House sponsor Congressman James Sensenbrenner (R-WI) and lead co-sponsor Congressman Eric Swalwell (D-CA), along with 12 Senate and 24 House co-sponsors for their support, Business Wire reported. “Today marks a landmark day in more efficiently fighting crime and supporting law enforcement,” stated Robert Schueren, President and CEO of IntegenX. “IntegenX products have already enabled numerous DNA profile uploads to our nation’s DNA database (CODIS). We look forward to the updated FBI guidelines, and subsequent CODIS uploads from the booking environment.” In 2017, President Trump signed into law the Rapid DNA Act, which, enables police booking stations in several states to connect their Rapid DNA machines to CODIS, the national DNA database. But CODIS isn’t only shared by the states. We learn from a Plus D WikiLeaks release, that the DNA information processing and telecommunications system was gifted to Argentina in 2009 by U.S. Ambassador Earl Wayne, according to a cable. The system was gifted to “help the province solve crimes and exonerate innocent suspects.” “On the very topical issue of crime and personal security, the Ambassador helped launch the province’s participation in the Combined DNA Indexing System (CODIS). CODIS, an automated DNA information processing and telecommunications system, was donated by the FBI,” the cable reads. Meanwhile, another WikiLeaks Plus D cable talks about “specialized training and state of the art equipment donations enabling Colombian forensic labs to investigate human rights violations more effectively. These donations included the enhancement of DNA analyzers and the CODIS database; upgrading of the Integrated Ballistics Identification System (IBIS); updating of forensic imaging and document analysis systems; upgrading of the automated fingerprint identification system; and the design and installation of a wireless network providing inter-agency connectivity and information sharing,” according to the cable, entitled: “SUPPORTING HUMAN RIGHTS AND DEMOCRACY: THE U.S. RECORD IN COLOMBIA 2004-2005.” This leads us to several questions. First, how many more countries were given access to the CODIS system; is this DNA database shared amongst countries in an agreement similar to the Five Eyes spying arrangement, or did the U.S. sell the software similar to the infamous PROMIS software? And, like PROMIS (Inslaw scandal), does this software have a backdoor for U.S. intel agencies to access other countries’ DNA data? These are all questions we should find ourselves asking. Even the DHS is looking into using the Rapid DNA technology for immigration purposes to stop adults fleeing with kids and ensure that they are their actual relatives. But later the DHS postponed the technology in 2015 to develop a stricter protocol for its use, Nextgov reported. “The implementation of the program has been postponed until new voluntary consent forms are developed as well as operational protocols for translation,” Department of Homeland Security spokesman John Verrico told Nextgov in an email. DHS documents obtained by the EFF state that the military may be interested in using rapid DNA in the future to reveal information about individuals such as their sex, race, health, and age. In a 2013 privacy impact assessment for Rapid DNA pilot testing, the DHS stated that the portion of DNA analyzed by the devices does not reveal any “sensitive information about an individual, and will not, under any circumstances, be used for decisions based on those criteria.” The EFF disagrees with Comey and the DHS, and has previously stated that the test pilot DNA program “may create controversy,” according to internal documents obtained by the Electronic Frontier Foundation civil liberties group. In a high priority e-mail from 2011, a DHS officer wrote to colleagues that “if DHS fails to provide an adequate response to media inquiries regarding RapidDNA quickly, civil rights/civil liberties organizations may attempt to shut down the test program.” There are already numerous issues with keeping a DNA data bank. Privacy and civil rights advocates and watchdog groups have argued against the practice in California of retaining DNA from legally innocent people, thereby violating constitutional privacy rights, Mercury News reported. Further, forensic labs (including the FBI) have shown flaws over the last few years exposing shoddy laboratory procedures including – grossly inaccurate testimony by law enforcement, and, in a few cases, outright false documentation or mixing up of results. DNA has been constantly linked to the wrong person similar to facial recognition biometric data. If that’s not all reason enough for us to be skeptical about these systems, in 2015, the FBI found DNA data errors within its own national CODIS database, The Washington Post reported. In another case, familial DNA was the culprit responsible for a false positive on a murder in Idaho. This resulted in Michael Usry in a police station with an FBI agent cotton swabbing him as he was completely confused by what was happening, Wired reported in 2015. While genetics might be able to identify a felon, forensic scientists and lawyers agree that the information gathered can’t be able to gather more than that. As the Supreme Court wrote in its Maryland v King decision to allow DNA collection, this issue is “open to dispute.” Forensic magazine notes the dangers of a DNA database, stating its a threat to “medical privacy.” These genetic databases are an absolute gold mine for law enforcement. I am not sure anyone can argue that catching serial killers and rapists, or using CODIS for tracking missing children is bad; however, problems start to arise when these genetic databases are used to target people for deportation or sweep up the completely innocent in its dragnet. Along with facial recognition, DNA databases are the first step towards an Orwellian society where the government knows your whereabouts, at all times. It’s a nightmarish outlook for our future; but what’s worse in some instances, like in the form of DNA, we are being tricked to give up our freedoms and privacy. As a CRS Congressional “think tank” report warned: “future DNA collection cases might raise graver Fourth Amendment privacy concerns than previous cases.” The FBI plans to begin rolling out Rapid DNA to more police departments slowly in 2019, according to a Washington Post report. “Our goal in 2019 is to be able to have a pilot project done where we actually develop a DNA profile in a booking station, with no human review, and have it electronically enrolled and searched in the national database,” Thomas Callaghan, chief biometric scientist for the FBI Laboratory, told the news outlet. “We have to ensure that the quality that’s done in a lab can be done in a booking station. Everyone's DNA is unique and emits that unique frequency that can be captured with the right type of technology. Now tie that in with 5G. 5G and the future 6G already on the plans will likely be able to identify anyone by their DNA frequencies. If 5G is allowed to be installed in the U.S, and worlwide there will not be any way to protect privacy, location, activities, etc. Tracking and monitoring of every person will be 24/7 where their DNA is stored such as in the CODIS darabase becomes the new Orwellian reality. Do not willingly give up your DNA! And toss those monitoring devices such as Echo and Alexa in the trash while you are at it. Ancestry Websites Giving FBI Access to DNA; WikiLeaks Reveals CODIS Database Gifted to Other Countiries; DHS Rolling Out Rapid DNA Nationwide
#RapidDNA #DNA #CODIS #5G #6G #DHS #Privacy #4thAmendment The importance and the need in protecting your privacy is a growing challenge in today's world where having the tools and knowledge to prevent spying are critical actions all need to take. Have any or enough steps in protecting your privacy been taken while online? What does one need to do for adding protection? Excellent suggestions that you can utilize are presented here. Ed. By: Jack Warner, General Manager, Techwarn Have you ever wondered if someone is spying on you online? Do you believe the government is secretly watching you? Apart from malicious hackers actively prying into your business or intelligence agencies eavesdropping on your online communications, certain privacy breaches may entirely be self-inflicted. Ever downloaded a free VPN service or clicked on a spammy ad? Chances are your malware-ridden computer is selling you out every moment. This article will show you the key techniques that third parties might be snooping on your online activities and how to shut them out. Surveillance by Governments It is almost certain that your government is spying you. For example, the NSA or National Security Agency in the U.S. is legally collecting private data in the following ways:
The Tempora Program in the U.K. can intercept internet traffic for the purpose of surveillance in partnership with the NSA and the country’s telecom companies. However, these are only the programs that we are aware of due to leaked information. Therefore, it is also possible that other secret programs are spying on you in different ways. Internet Connections That Are Unsecured You may use security software or a firewall to secure your network and computers, and you probably have an authenticated connection with your ISP. However, are you sure that the path your data takes when it is transmitted over the internet is secure? The answer is likely ‘no’ unless you are using a VPN. You know when data packets reach their destination when sent or received online. However, you cannot tell which networks the data passes through on the way to its destination, and who could have made a copy. So, if your internet traffic is not secure, it might be spied on right now by government agencies or other parties. Malware You may be being spied on if there is any malicious software on your computer. The following types of malware can steal your data:
Tracking Cookies from Third Parties Cookies are gathered by web advertising distribution networks from your browser any time you view one of their ads. These cookies include information like your browser’s unique identifier or your IP address which can be used to identify you. You will see ads from big distributors on multiple sites, and they get a cookie each time. This allows them to track your internet activity more effectively and better target their ads. Many commercial websites now warn visitors that they use cookies to improve the experience for their users. Whether this is classed as spying or not depends on one’s perspective, but they could certainly be considered a sneaky violation of your privacy. Protective Measures You Can Take If you are not happy with the above, here are some protective measures you could take to minimize the chance of being spied on or your data tracked.
Are You Sure No One is Spying On You?
#InternetSecurity #Cybersecurity #VPN #InternetPrivacy #Techwarn #NASA #SecuritySoftware |
Archives
September 2020
Categories
All
|