Media Articles from 2019
Will Google get away with grabbing 50m Americans’ health records?
by Julia Carrie Wong
Posted December 8, 2019
Google’s reputation has remained relatively unscathed despite behaviors similar to Facebook’s. This could be the tipping point.
Few things are certain in the American healthcare system – except for the paperwork. The tedious ritual of signing forms authorizing new providers to access our medical history is the result of a rarity for Americans: thanks to the first amendment, we have few rights and little expectation of privacy, except when it comes to our medical records. Even doctors who have our best interests at heart must get permission to access our data under the Health Insurance Portability and Accountability Act (Hipaa).
So it was truly shocking to learn this week that a business partnership between Google and Ascension, a major hospital chain and health insurer, has resulted in the transfer of 50 million Americans’ most intimate medical records to the Silicon Valley company, without the knowledge or consent of those 50 million patients. Even more alarming, the records are not de-identified, and a whistleblower disclosed to the Guardian serious concerns about the program, including that individual staffers have downloaded patient records. More…
The US HIPPA laws are very specific about privacy protection for medical records.
It will be very interesting to see if Google (and the Ascension hospital chain) are prosecuted for this blatant violation of patient health records. Or will the system protect Google because it is a member of the “protected class”?
You Have Been Hacked
by Stephen Wunderli
Posted November 24, 2019
Most of us don’t give much thought to our online privacy, and if we do it’s with some mild annoyance. We know we are being tracked, our shopping habits catalogued, our likes and dislikes logged, even our political inclinations are recorded somewhere. It’s easy to brush off until we consider what would happen if all that data collected was somehow used against us.
Used against us in “an Enemy of the State” kind of way?
Possibly. But more likely in a way that is manipulative or exploitative. To understand, we need to review how the Internet works. We all have our connections: phones, laptops, desktops. These have a unique address or phone number so that when any activity from that device goes out to the Internet, it can be traced back to the device. When we visit a site we are actually accessing another computer, or a room full of computers. Every site attaches a secret tracking code on your device so they know where you go next, and where you went before you arrived. Most sites track your selections, the articles you read, the ads you click on. They add that to the information you enter. Everything you do online is stored in a big data cloud somewhere. Some of the information you even agreed to share. More…
Leaked ABC News Insider Recording Exposes Epstein Coverup “We had Clinton, We had Everything”
By Joe Martino
Posted November 19, 2019
We’ve covered the Jeffrey Epstein story in deep detail starting about 4 years ago. In this new story, an ABC news insider leaked a videotape to Project Veritas showing Amy Robach on a ‘hot mic’ talking about an interview she had done with Virginia Roberts (Giuffre) 3 years ago.
As Robach states, the interview was a bombshell and brought attention to many high profile individuals involved with Jeffrey Epstein’s activities.
The story she had was shelved by ABC news due to pressures from Buckingham palace, because of the Prince Andrew Allegations, and Alan Dershowitz, one of Epstein’s top defense attorneys. Who at ABC had the story shut down? No one knows yet, but hopefully we will soon so we can gain more insight as to what is happening here.
Think for a moment, why are Prince Andrew and Bill Clinton not the centre of a massive investigation given all the information there is on them? Why are ‘average citizens’ treated differently than these high profile figures who can get away with anything? Is this the world you wish to support and live in? More…
An ABC insider has leaked a video of Amy Robach talking about how ABC shelved her bombshell Epstein story that involved an interview with Virginia Roberts Giuffre. The implications of this story were huge.
Why would mainstream media and Buckingham palace not want you to know that the Royals and political figures you vote for and idolize are pedophiles? Is it time we break the illusion?
The End of Accountable Government Is Close at Hand. Julian Assange and the CIA
By Dr. Paul Craig Roberts
Posted November 16, 2019
For about 70 years the CIA has been undermining a free press. It began with Operation Mockingbird, a Cold War operation against communism. The CIA recruited journalists into a propaganda network. The CIA paid journalists to write fake stories or to publish stories written by the CIA in order to control explanations that served the agency’s agendas. Student and cultural organizations and intellectual magazines, such as Encounter, were suborned into the CIA’s propaganda network. Thanks to the German journalist, Udo Ulfkotte, we know that every European journalist of any significance is a CIA asset.
What is astonishing about the CIA’s destruction of Julian Assange is the silence of American law schools and bar associations, the silence of universities, the absence of student and labor union protests, the absence of any protection of Assange’s rights from courts as the last news organization willing and capable of holding governments accountable for their crimes is destroyed openly in full view of the law schools, intellectuals, bar associations, courts, and print and TV media. More…
We Have No Reason to Believe 5G Is Safe
By Joel M. Moskowitz
Posted November 14, 2019
The telecommunications industry and their experts have accused many scientists who have researched the effects of cell phone radiation of “fear mongering” over the advent of wireless technology’s 5G. Since much of our research is publicly-funded, we believe it is our ethical responsibility to inform the public about what the peer-reviewed scientific literature tells us about the health risks from wireless radiation.
The chairman of the Federal Communications Commission (FCC) recently announced through a press release that the commission will soon reaffirm the radio frequency radiation (RFR) exposure limits that the FCC adopted in the late 1990s. These limits are based upon a behavioral change in rats exposed to microwave radiation and were designed to protect us from short-term heating risks due to RFR exposure.
Yet, since the FCC adopted these limits based largely on research from the 1980s, the preponderance of peer-reviewed research, more than 500 studies, have found harmful biologic or health effects from exposure to RFR at intensities too low to cause significant heating. More…
This Scientific American article explains why 5G wireless technology may not be safe for human health. There are numerous other publications that show clear cause for concern, and the industry has not even conducted any safety testing.
How are technologies like this, which have clear biological effects, allowed to rollout without any appropriate safety testing?
What Is a VPN, and Why You Need One
By Max Eddy
Posted November 6, 2019
Have you ever logged onto a public Wi-Fi network and gotten a creeping sense of dread, wondering what someone, somewhere might be able to see of your online activity? That’s entirely reasonable, considering the forces arrayed against your privacy. With a virtual private network (VPN), you can protect your information from prying eyes and regain a measure of privacy online.
When you switch it on, a VPN creates an encrypted tunnel between you and a remote server operated by a VPN service. All your internet traffic is routed through this tunnel, so your data is secure from prying eyes along the way. Because your traffic is exiting the VPN server, your computer appears to have the IP address of said server, masking your identity and location. More…
This article is well written and presents some excellent information, but fails to mention that you should never use a “free” VPN service. If it is “free”, how are they funding their service? They must be selling your data, which totally defeats the purpose of having a VPN in the first place, and could leave you even worse off than before.
Democracy Is Now a Hindrance to the Imperial State
by Charles Hugh Smith
Posted October 23, 2019
If we review the mechanics of our “democracy,” we find that swapping which party controls Congress doesn’t really change the policies of The Imperial State, the central state that oversees America’s global commercial and geopolitical empire.
The corporate mass media is the PR machine for the Imperial State. If the state seeks to sell the public a war of choice, the media dutifully pounds the drums of war. If the Imperial State decides to disempower a president or other elected official, the media will hound the elected official until he/she is disgraced or buried, too busy fighting off the ceaseless media propaganda to function. The mass media excels at ruthlessly mocking political targets, reducing their stature in the public eye and undermining their “soft power.”
As for presidents: as long as the prez follows the Imperial minders’ orders, everything will be fine. Cross the minders and you’re out. More…
Yes, your phone could be listening to you. Here’s what you can do.
by Trish Tobin
Posted October 20, 2019
Your phone could be listening to you – hearing what you say and then pushing ads according to what it thinks your interests are.
This is the analysis of at least one expert, Dr. Peter Henway, senior security consultant for cybersecurity firm Asterisk, whose conversation with VICE sparked a flurry of online investigation of the listening-phone phenomenon.
You may have suspected it already. Let’s say you’re sitting with a friend at a cafe, your phone is on the table and you’re talking about some totally random topic – like growing geraniums. Then, within hours, you’re seeing ads for geranium seeds on your social media pages.
How does this happen? Here’s how, according Henway: Your phone is, in fact, always listening. More…
Our phones are being used as surveillance devices by both governments and corporations.
Corporations are always looking to increase profit margins. So all incentives are in place for them to sell your data to governments. Consider how this effectively bypasses constitutional protections because the government can claim that it is corporations, not the government violating the Constitution.
End The Illusion Films
End The Illusion Blog
This is a huge part of our problem as a nation. Rather than having well defined principles and defending them, we tend to pick personalities we like and then cheer them on as uncritically as our favorite sports teams.
Web of Debt
The Shocking Truth about Our Money System and How We Can Break Free!
This site is designed for people who wish to follow important events, but do not have time to do a lot of reading. If you follow this site for a period of time, the daily fresh stories in different categories will over time provide you with an understanding of the “big picture” by showing you both the problems and the solutions. Hopefully this will inspire you to listen to your inner wisdom and become part of the solution.