Whistleblowers vs. The State

[Social]
Whistleblowers vs. The State
by Carey Wedler
Posted March 13, 2017

government ignores crimes but goes after the messengerImmediately after Wikileaks released thousands of documents revealing the extent of CIA surveillance and hacking practices, the government was calling for an investigation — not into why the CIA has amassed so much power, but rather, into who exposed their invasive policies.

Putting aside the fact that, according to popular American mythology breaking the law is a patriotic duty, the government and politicians’ reactions are both hypocritical and habitual.

When Chelsea Manning revealed damning evidence of U.S. war crimes in Iraq, including soldiers directly targeting Reuters news staff, the response was not to investigate who allowed those crimes. Rather, Manning was subject to a military tribunal and issued multiple life sentences, a cruel and unusual punishment reversed only in President Obama’s last days in office amid his attempts to salvage his abysmal human rights, transparency, and whistleblower record. More…

Welcome Aboard, But First US Marshals Will Scan Your Retina

[Social]
Welcome Aboard, But First US Marshals Will Scan Your Retina
by Jeffrey Tucker
Posted March 13, 2017

irus scanners at airportWe had already been through boarding pass checks, passport checks, scanners, and pat downs. At the gate, each passenger had already had their tickets scanned and we were all walking on the jet bridge to board. It’s at this point that most people assume that it is all done: finally we can enjoy some sense of normalcy.

This time was different. Halfway down the jetbridge, there was a new layer of security. Two US Marshals, heavily armed and dressed in dystopian-style black regalia, stood next to an upright machine with a glowing green eye. Every passenger, one by one, was told to step on a mat and look into the green scanner. It was scanning our eyes and matching that scan with the passport, which was also scanned (yet again).

The scene reminded me of movies I’ve seen, like Hunger Games or 1984. It’s chilling and strange, even deeply alarming to anyone who has ever dreamed of what freedom might be like. It doesn’t look like this. More…

WikiLeaks’ New CIA Leak Destroys Democrats Case Against Russia Election Hack

[Political]
WikiLeaks’ New CIA Leak Destroys Democrats Case Against Russia Election Hack
By Dave Lindorff
Posted March 12, 2017

WikiLeaks bringing you the truthThe so-called Deep State and Democratic Party campaign to demonize Russia for allegedly “hacking the US election,” and delivering the country into the hands of Donald Trump suffered a huge and probably mortal blow this week with the release by WikiLeaks of over 7000 secret CIA documents disclosing secret CIA hacking technologies.

The case being made against Russia as being the source of leaked emails of the Democratic National Committee and of Clinton Campaign Chair John Podesta — documents that proved that the DNC had been corrupting the primary process in favor of corporatist candidate Hillary Clinton and undermining the campaign of Vermont Senator Bernie Sanders, and that also revealed the embarrassing contents of Clinton’s highly paid secret speeches to a number of giant Wall Street banks — had always been tenuous, with no hard evidence ever presented. All the intelligence agencies would say was that they had a “high degree of certainty,” or “strong reason to believe” that the Russians were the source of the deeply damaging documents late in the campaign season. More…

Vault 7: CIA Hacking Tools Revealed

[Politics]
Vault 7: CIA Hacking Tools Revealed
by WikiLeaks
Posted March 11, 2017

CIA spys on US citizensVault 7 Summary: Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones. More…

Judge to FDA: The Government Must Pull Aside Curtain on GE Salmon

[Justice]
Judge to FDA: The Government Must Pull Aside Curtain on GE Salmon
By Jessica A. Knoblauch
Posted March 11, 2017

genetically engineered salmon riskyRecently, a U.S. District Court judge took the U.S. Food and Drug Administration (FDA) to task for withholding government documents related to the agency’s approval of genetically engineered (GE) salmon. The judge’s decision is a big win for public transparency, but it’s also a small step toward finally doing a proper evaluation of the risks posed by GE animals—which could one day end up on our dinner plates.

Even though this is the first time any government in the world has approved a GE animal for commercial sale and consumption, so far the FDA has taken a lackadaisical approach to evaluating the salmon’s potential for harm to wild salmon and the environment. If the GE salmon were to escape, it could threaten wild salmon populations by outcompeting them for scarce resources and habitat, by mating with endangered salmon species, and by introducing new diseases. More…

Peak Freedom – Orwellian CIA Leaking Sieve Vault-7 Hacking Tools Exposed by Wikileaks

[Political]
Peak Freedom – Orwellian CIA Leaking Sieve Vault-7 Hacking Tools Exposed by Wikileaks
by Nadeem Walayat
Posted March 11, 2017

CIA domestic spyingRecently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.

“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones. More…

Page 5 of 77« First...34567...102030...Last »

End The Illusion Films

End The Illusion Blog

Quotable Sayings

our belief system has created huge inequality

This belief system of winner take all has led to the inevitable: You are set against each other in the upward struggle to reach the top, or near the top. Some of you do. The rest of you, who are not in the winners’ circle, are altogether disappointed and have a sense of failure.

Andrea Seiver

_____________________________
_____________________________

The Shocking Truth about Our Money System and How We Can Break Free!

.

Great story on why we need to remove ALL of our elected government representatives

This site is designed for people who wish to follow important events, but do not have time to do a lot of reading. If you follow this site for a period of time, the daily fresh stories in different categories will over time provide you with an understanding of the “big picture” by showing you both the problems and the solutions. Hopefully this will inspire you to listen to your inner wisdom and become part of the solution.