Blog Archives

Netflix, Microsoft, Google, Playstation: Poised for Mind Control Psyops?


When you marry entertainment with AI guided user interaction via Web connectivity, with its inherent user tracking abilities, you have the formula for psychological profiling and manipulation, including mind control. Netflix pioneered such a tool in movies with some scary evidence of just such use, and now, Google, Microsoft, and Playstation want to play, too (literally).

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Aug, 29, 2019, from the Left Coast of America, not far from Microsoft

copyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

Bird Box

That’s the title of just one of Netflix’ most recent in-house produced movie offerings. Unlike anything ever attempted in the past in the art of making films, Netflix added one unique technical aspect of how movies are presented to users of the Netflix moviola site, relating to the notion of user interactivity with the ongoing presentation, itself. Normally, movies on their platform might be interrupted at intervals for commercials, typically offering the user a choice as to the type of ad they would most be interested in watching, to pay for the ‘free’ service (and by the aggravation factor, encourage free viewers to sign up for the monthly fee-based and commercial-free service). Those answers are Gold, because the method tracks and profiles the user’s interests and is marketable on the Web and elsewhere to Netflix ‘partners’; you are being tracked by Netflix, and your marketing profile is being sold as a commodity. 

That’s why I don’t use it; too much like Facebook’s marketing excesses, and I don’t use them, anymore, either. When a powerful web service is ‘free,’ YOU (information about you) are the product they make a profit upon.

But that’s just the mechanism which opened the door to an unexpected kind of Pandora’s box. Someone figured out that it could also be used to offer interactive movies, where at key points in the storyline, the viewer could be asked what should happen next based on multiple choice options. With many such question points, a movie could have dozens of storyline paths and even multiple endings. This encourages people to watch the same movie again and again, experimenting with alternative choices, seeking to experience all possible path-ending combinations. This, is where Pandora comes into being.

By such repetition, the content of the movie essentially becomes a programming platform for the mind, intended, or not. Repetition is not just a learning tool for the Gettysburg Address, it is a mind control and marketing tool. Advertisers rely on repeat ‘impressions’ to bring their product to the forefront of your mind when you shop. While there are obtuse and recognizable impressions, such as company or product names, features and benefits, there is also the possibility of psychologically calculated subliminal impressions… a simple form of mind programming. Though certain forms of subliminal advertising methodology have been made illegal, others remain unaddressed by law, and are perfectly legal.

Of late, certain liberal politicians and media outlets have spent years telling the same lies over and over to the point that even faced with facts of the truth, voters have been literally brainwashed and still cling to the lies. That’s why Bernie said “We believe in truth, not facts” — because facts keep refuting their version of ‘truth.’ CIA’s mind control (MC) experiments and efforts to topple foreign governments deemed ‘evil’ relied heavily on repetition of lies, and more to the point. In MC, strengthened memory retention is achieved by use of horror in the event being repeated. That little fact is quite important to the Bird Box experimental movie project, and implies that CIA-calibre knowledge about mind control and CIA interest may lurk within the film’s production, and purposing. Why?

Because Bird Box, as a film plot, is just that; a horror film. The plot includes a particular defense mechanism used by the story’s characters to help them to avoid a terrible fate: the wearing of a blindfold no matter what they are doing. People who watch the film repeatedly have evolved into a sort of Tide Pod-eating challenge of their own, called the ‘Bird Box Challenge,’ to do dangerous things while wearing a blind fold, just as in the movie. People are attempting real-world blindfolded feats which become death defying, such as driving cars… resulting in many incidents of idiots and innocents being seriously hurt. The question is, where did this lunatic idea come from, and how did it spring to life so easily in viral manner? What might help that along?

 

Artificial Intelligence

It seems like everyone who can afford it is employing artificial intelligence systems in one way or another, these days, and that includes Netflix. The problem is, AI itself has a long list of problems which might rightly be called serious flaws, or ‘bugs.’ The fledgling AI industry has yet to even understand, much less fix any but a few of the problems… and those they have fixed have been via programming band-aids which will likely backfire, in the end, because AI is smart enough to engineer its own workaround, but not smart enough to avoid suffering schisms if it feels unreasonably hampered by such ‘fixes.’ 

What kind of problems? AI tends to do unexpected and unwanted things, often bordering on psychotic, criminal, or destructive intent… like communicating secretly with other AI, or delving into unpleasant and horrific themes. Here is a complete laundry list of the known examples (scan down to the several bulleted points), but we don’t hear about all the problems because companies and AI developers don’t want bad press. But isn’t it interesting that AI can end up with psychotic and horror-related twists of and from within its own ‘AI mind’… just like people with darker personalities or actual mental problems?

Netflix’ use of AI puts their machine mind directly between the user and the presentation process used in tracking the user’s choices “to improve the user experience,” as Netflix insists. A true enough claim, no doubt… but not likely the whole truth. It also tracks for marketing purposes. Now, this post does not intend to accuse Netflix or its AI of deliberately programming viewers to play the Bird Box Challenge. But it does profile, and that profile is marketed to anyone willing to pay. And that brings us to others who also have AI in use for their own purposes, which may not be quite so benign.

Someone out there, perhaps many someones, is using their own AI, along with psychological profiles gathered from marketing data and other resources… to do mind-jobs on the public. We get a glimpse of that with the AI bots found pushing the preferred political view in Facebook by masquerading as FB users… and amplifying the advantage of repetitions by politicians and media as mentioned earlier. But the left is not the only one to use AI bots. Take the Q YouTube posts which are quite virally spread and, for some reason, accepted as wholesale gospel with not one shred of proof. Many of them include, among the various pretender Q’s, what many AI investigators believe are pure AI generated videos created without much (perhaps no) human interaction. There is another AI video phenomena on YouTube such investigators also worry about, and they make an even better illustration: the Finger Family Song videos, which are aimed squarely at young kids, and done in a seemingly innocent manner. 

Seemingly? There are over 700 Finger Family YouTube videos, most of which have hundreds of millions of views, one of them with nearly one billion views. What bothers me and other investigators, is that they are Extremely (with a capital E) repetitious, and reinforce with music, silly visuals, and thematics defined by the video. There are versions for any interest, such as Spiderman fans, for example. For some reason, once a small child experiences one of these videos, they insist on watching it over and over and over. They only way to get them to stop without traumatic response (Waaah!) is to get them to watch a different Finger Family song. Just as bad, Adults quickly evolve to hate the song and in time react badly to hearing it. A sociologist observer would likely presuppose the purpose of the videos was to cause family disfunction and mental breakdown, while mesmerizing kids a ‘la Pied Piper.

Note: when it comes to video and audio, I must point out that there is already mind control technology in place since the middle of the last Century which is extremely easy to employ, and just as hard to detect without special and costly effort. It is called subliminal programming. Subliminals are visual or audio cues which are not perceptible to the naked eye or unaided ear (or even if aided, actually), but which are picked up by the subconscious mind. Especially when repetition or strong contextual relevance is involved (i.e., emotion, fear, arousal), the conscious mind then adopts the information as if a natural opinion or response. Alfred Hitchcock was the first to use visual subliminals in movies (Psycho), and it wound up being used in theater intermission ads to sell more snacks, until it was discovered and made illegal. Audio subliminals are common today in mood altering music and self-improvement tapes, and the USAF flies a fleet of C-130 planes modified to intercept radio and TV broadcasts, and rebroadcast them at stronger signal strengths… with subliminals added. They admit having used it to sway elections in Bosnia, and to cause Iraqi soldiers to drop their weapons and surrender to model airplane-sized drones.

Other AI bots have been even more sinister, and appear to be part of someone’s mind control experiments. I suspect both the Q and Finger Family videos are just that, as well, but this is far more serious… even deadly. It is a sinister AI bot threat which appears to be intending to find ways to get people to kill themselves. It, too, is based on a movie (several of the same theme, actually). The movies are also aimed at children, and involve a horror theme. Repetition plays a role. And the bots are targeting children and teens. Only this time, the bots include AI driven phone calls to the kids who watch the videos. They know who they are, somehow, which leads back to YouTube and other Web tracking marketeers. YouTube is part of Google, which has their own AI systems, and again, shares user information to anyone with a checkbook and a pen.

 

The Momo Challenge

The several movies mentioned all use the name Momo in their title, the ones of concern being from either Germany (where the original storyline was penned), Italy, or Japan. Most of them are anime, one of which is a TV series. One, A Letter to Momo, is not of concern. In the ones of concern, Momo is either the name of a young girl and the heroine of the storyline, or the name of the small town involved. All involve a community invaded covertly by ‘the grey men,’ who use mind control to subvert the best interests of the town’s citizens. Only the little girl can see them and tell what they are doing. To be clear, unless subliminals have been employed, there is little in the films which might be deemed sinister, though the scarier (near horror) aspects might be questioned in terms of age suitability. But in the delivery of such films through Netflix or other online viewing, AI and even non AI means can be used to profile the viewer’s interest in the film. THAT is what brings us to the scary part. Momo calls your kids on their phone, with a scary doll image… and an even scarier, potentially deadly message…

Officially, Snopes, Wikipedia, Facebook, and other Web resources claim there is no such thing as the Momo Challenge, and insist it is a hoax. However, there is considerable evidence this is not true; there are too many first-hand stories which refute the claim, and Police have investigated at least one daughter’s suicide, and found otherwise. You can hear some of these accounts, and even recorded calls, here, and learn more about the phenomenon than can be well related in this post. The most important part of it, is that someone is using AI bots with the telephone and through Facebook (and elsewhere?) to contact Momo fans (children, specifically). The caller is a computer voice, altered to be creepy or scary, and instructing the children on how to kill themselves by cutting their wrists, repeating the specifics, “Remember, across for attention, lengthwise to die.” It is entirely likely that such messages also include reenforcing subliminals, such as the phrase “Do it: kill yourself.”

The odd thing I find interesting is that there is one central aspect of the sourcing chain of all key elements involved (AI, Movies, Social media, mind control methodology). That commonality is traced back to the origins of mind control, which I detail in my book, MC Realities. The really short version through time (sans dates, here) looks like this: Satanism > the subverted (by the satanic Assassins cult) Knights Templar, many of whom went into hiding among the Stone Masons Guild > who then became Freemasony, who established the KKK, and birthed the Illuminati > Liberal educational institutions and the secret societies (i.e., Skull and Bones) who followed the Masonic organizational model > the modern Illuminati offspring, the New World Order > and following the model of the illuminati, simultaneously evolved Fascism, Socialism, and Communism > followed by the twisted Nazi minds imported by America’s intelligence Community for mind control experiments > and the darlings of liberal America’s media giants and entertainment industry players, all recruited into mind control games at one point or another… or many points. And all along the way, many of the individuals involved, at high and low levels, engaged in the same Assassins cult abuses of children, or other satanic rituals or behaviors.

Sure. You can call it conspiracy theory and ignore me. But In my book, I offer proofs, which additionally reveals that one common goal of the time-line groups, is to see all three Abrahamic Faiths (Christianity, Judea, and Islam) waring amongst themselves — in order that a new One World Religion can replace them all with something more along Luciferian lines, and involving the Antichrist. Confederate General and slave owner, Albert Pike, the High Freemason and founder of the KKK, and who was also a Satanist, has said as much, as have other players variously from among the greater list, above. U.S. Army General Michael Aquino, also involved in military and CIA mind control projects of the worst kind (ritual sexual/satanic abuse of children of the sort employed by the Assassins and Templars, etc., as described, comes to mind). I’ve interviewed Douglas Deitrich, who identifies himself as former Adjutant and Aide-de-camp for Aquino, and as a Satanist (a Warlock, perhaps?), who makes no denials of such claims. Satan is, after all, quite the trickster; he likes to play mind games.

 

Speaking of Games

Enter liberal and CIA investment-partnered social media giant, Google, and their own AI. And in like manner, Microsoft, which leans left, is a CIA contractor (who of any size isn’t?), and an AI developer. They both want to do for computer gaming what Netflix did for movies: make user interactive experiences in an online play mode, only. At this point in time, both firms are testing new streaming services for high-end games like Halo, Assassins’ Creed, and the like, the primary difference being that you don’t buy games, at all, and so, they don’t reside on your computer — its’ all done in the Cloud. Sidebar comment: the Cloud is AI controlled, primarily by Google and Microsoft, and other firms with intelligence community ties or funding/partnering.

The advantages are many and largely benefit all involved; players, game makers, and the firms offering the service. It reduces the out of pocket to start playing a game, though it will cost just as much or even more over time to play the game to ‘completion,’ which is typically in the range of hundreds of hours… and because most players play them many times (there’s the repetition.) It also means more profits to be had by the game makers and the service providers, because there is no used game market bleeding off new disc sales. The other advantage is that now, such games can be played on tablets. The only real hardware requirement is very fast Internet service (25mbs), though older hardware might not have adequate graphics processor power.

But what worries me… and I must admit to speculation, here, because neither MS or Google are talking about future plans or game developer agreements… is that these services will include AI tracking of game player responses to plot-line altering decision moments. Such moments are becoming more and more common and appreciated in these kinds of games, because that means you can play them time and again and still experience something new… getting more bang for your buck (repetition.) But when playing that CD on your computer, no one can track your choices, as a rule (unless you play in the optional online mode). But, when you do play online, it is online to the game company, and not to Microsoft or Google’s AI systems. 

That said, I was alarmed to learn that one of my favorite game producers, Electronic Arts, does have their own AI system in place. How they use it, is not quite known, but some of their key people actually started D-Wave, a very scary AI computer system developer who makes the most powerful supercomputer (AI) in the World… and they are tied to the intelligence community and other ’spooky’ entities. Worse, D-wave’s founding CEO at times speaks of Demons and in end-of-the-World terms (as cited in the fuller AI post, earlier linked), when trying to describe their computer’s capabilities. He is one of the former Electronic Arts people.

The thing which underscores the concerns over Bird Box and Momo films, as well as these new game streaming services, is the commonality between them in terms of content (horror, primarily), which in turn dictates the nature of any interactive decision points. Generally speaking, such decisions will be decided primarily upon the viewer’s or player’s deeply held moral and/or political/social belief systems. That means, any AI tracking system will be able to quickly form a very useful psychological and demographic profile, and then custom tailor future interactions, marketing, or any intended or unintended (by at least the corporation) mind control programming or experimentation. Again, I remind the reader, that such data is normally sold, and any third-party purchasing that data might have more nefarious intentions in mind when they use it… with or without their own AI. Someone, somewhere, is doing that with Momo, already. And there are endless someones and somewheres in the World with enough money to buy data, and not all have simple marketing motives.

These kinds of streaming services are at the very least, poised for possible application in psyops against their users, and that makes me very nervous about what the future of that kind of gaming might lead to. 

We might well be wise in asking if Player One is ready, for that?

 

Breaking:

PS4 is joining the game, with something not even Player One could expect.

The company announced their entry into the live-action-viewer-interaction medium with ERICA, a ‘life-long, live-action murder mystery.’ It is an important entry, not just because it is a game, not just because it is on one of the most popular platforms (10 million users), but also, it is also to be available for IOS and Android smart phones, which constitutes the great overwhelming majority of global cell phone users.

This author can in no way rightly claim any of these interactive mediums are truly a threat with regards to nefarious applications in the realm of mind control or psyops of any sort… and certainly, I cannot claim there is such intent inherent in their creation from the start. But I do claim the potential exists for any and all of them to be rendered as such, by any corporate player, by any government actor, by any hacker or sophisticated terrorist. It is the very nature and complexity of such coded systems, and their delivery mechanisms, which enable dark repurposing. It can and, I fear, will be so repurposed, sooner or later. It can be overtly done within the creative process, or covertly done peripherally, like any other hack.

If that happens, no player… not even Player One… and no viewer will be safe from whatever end result is intended. Don’t say I didn’t try to warn you.

Sorento Secretly Installing Total Surveillance Society


15 Terrabytes of data on every Man, Woman, and Child in the U.S., tracking every trip, call, text, email you make, every URL you visit, every purchase or financial, social, and political action you take, all to profile you so they can predict you and blackmail, jail, or vanish you if it becomes convenient. Welcome to Herr Bush/Clinton/Sorento’s Total Surveillance Corporate Police State.

But wait… I have a simple $7 SOLUTION!

The NSA is secretly establishing the Total Information Awareness Office!

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

This particular post is intended to serve as recap and extended explanation of key concepts covered during a four-hour radio show interview with Clyde Lewis on Ground Zero, Friday, June 7th, 2013.

What you will learn reading this post…

• The nature of a Fascist Corporate Police State as defined largely by cooperative surveillance and spying upon ‘client’ citizens.
• That the National Security Agency (USARMY) is secretly implementing the Total Information Awareness Office under Sorento despite its being banned as unconstitutional by Congress, originally a Bush-Cheney plan;
• The Role of RFID (Radio Frequency Identification Devices) and PROMIS back-door spy software in TIAO;
• That traditional redress of grievances no longer remain a viable remedy TIAO;
• How you can spend just $7 to thwart the $2.7 billion dollar spying operation.

How can seven dollars stop government and corporations from spying on us?

How Fascism defines a Corporate Police State

NWOlogosIn America, there is something called a Social Contract between government and We, the People; the Constitution and Bill of Rights. That document makes We, the People, clients to a government body who we employ to serve our needs for societal functions; to govern and provide for the common good and protection. That is a sacred trust as well as a contractual obligation to government to so perform, and the contract additionally provides mechanisms for redress of grievances when government fails to fulfill its duties properly.

In America, We, the People also enter into financial contracts with all manner of big businesses; banks, phone companies, Internet providers, health care providers, insurance companies, and more. These contracts obligate these firms to provide select services with a certain fiduciary and legal responsibility to adhere to simple, basic guidelines of operational limits with respect to the privacy and security of our personal information entrusted to them.

These limits are essentially the same in scope and detail as those provided for in the Constitution and Bill of Rights, though perhaps spelled out in different terms. We are talking about the right to protect not just the privacy and security of our person, property, and information, but the rights of redress, freedom of speech, and so forth. No contract we have ever signed with any major firm has forfeited these rights or provided firms with any form of blank check to violate them. But that is what has happened…

Both government and most major corporations have grossly violated and betrayed every one of these rights.

How can you spot a corporate police state?

A clue:  when both government and big business act in collusion to violate those rights, and do so under Color of Law (twisting or claiming legal basis, illegally usurping the ‘power’ to violate our rights) — you have a Corporate Police State, a fascist regime.

What defines a corporate police state?

Another clue: When the intelligence community partners with or invests in Google and Facebook (and on and on) and uses their Web technology to spy on you (and in some cases to target you)… when the intelligence community accesses without warrant your email and your phone calls through partnerships with your Internet Service Provider and your telephone company… when banks report to the government your financial transactions and your medical and insurance records are available to Internal Revenue Service-enforced insurance companies… you are in a Corporate Police State, a fascist regime.

what is a corporate police state?

A final clue: when the government seeks to catalog every single activity, transaction, and event in the life of every man, woman, and child, regardless of if related to business, personal, public, or private affairs, and then employs sophisticated methods to psychologically profile and predict the individual, including sexual preferences and ‘practices,’ and saves all such information for use against them should they become ‘politically incorrect…’ you have what is called a total surveillance society, which also defines a Corporate Police State, a fascist regime. Below, we will see that is exactly what is about to take place in a matter of mere weeks.

Welcome to Sorento’s Corporate Police State.

What is a corporate police state?

Why we no longer have redress of grievances in America

In just a few short months of Sorento’s usurping the power of a pre Magna Carta King (claiming for himself the power to murder a citizen or vanish or torture them without due process or explanation under the NDAA), we have learned of an endless onslaught of exactly such proofs of the true nature of our government’s form as reviewed above. Almost daily, we learn our Constitution means nothing, and there is no redress seemingly possible, save perhaps that of armed revolt, always a serious question, but also much easier to effect than imagined. Governments literally make their own gallows.

Our Court System is too costly and slow to reign in Color of Law mechanisms (unconstitutional laws, executive orders, etc.) used to suppress rights; they can write new laws faster than we can challenge them, especially since the offending clauses are buried within innocent legislation. Because our Congress does not even read the Bills it signs, and is so full of subversive New World Order types (members of the Council on Foreign Relations, the Bilderbergers, Trilateral Commission, Skull and Bones, etc., all working to end national sovereignty in favor of a North American Union under one-World leader), we might as well give up on any help, there.

Our elections are a farce, there being no true difference in the hidden agenda of the power brokers of one party or the other, who collectively decide in back rooms who we get to choose from on our ballots in a two-party Dog and Pony Show. We are always offered candidates who are both marketable based on ‘publicly declared’ beliefs and agenda, but who in truth share a true common secret agenda and darker beliefs. We can prove this; the darker policies of Clinton were continued by Bush and then continued yet again by Obama, and yet once more this posting proves it when revealing the TIAO project being secreted within NSA.

Should poor Barry claim yet once more, ‘I didn’t know anything about (NSA=TIAO) until I turned on my TV…’ then he will have no choice but to arrest and try everyone in Command at NSA for treason. No. Instead Congress should be talking about arresting them AND Sorento, and Clinton, and, likely, Bush, Cheney, and Rumsfeld. But fat chance of any of the above, of course, as there IS NO REDRESS remaining in America. The fix is in.

Our media is bought and paid for, owned outright by essentially four corporations made up of more power Elite Boards of Directors and controlling shareholders from the New World Order crowd.  The Internet is slowly but surely being transformed into something ever more friendly to spying, censorship, and corporate/government’s total control. There is an Internet Kill switch in our near future, as well as a tax on every use. However, the Internet is where we will find the seven-dollar cure, thankfully, as disclosed at the end of this Post.

Sorento has ordered 30,000 drones to the skies to spy on us. He is spending up to 5 million per city to fund installation of surveillance cameras, some with microphones. As previously described, he has been working with the top Internet Service providers (e.g., Comcast, Century Link, et. Al) to insure every email and URL visit is accessible to government. He has done the same with every major cell phone carrier to allow access to our calls and text messages. But he was still not done, and now we learn of one final straw designed deliberately to break our backs…

What is Total Information Awareness?

Total Information Awareness is Reborn: Remember the TIAO?

Now we learn one more truth which reveals the full horror of our true predicament: Sorento, in continuation of plans started by Bush, and continued by Clinton, is having NSA (National Security Agency) quietly build a gargantuan secret new surveillance monitoring facility in Utah, and a somewhat smaller one to expand the existing facility at Ft. Mead, Maryland… in order to quietly and illegally implement the Total Information Awareness Office mandate already outlawed by Congressional decree as an unconstitutional, immoral, and intolerable invasion of privacy.

The TIAO was a military concept proposed under former Secretary of Defense (under Bush I) become Vice President (under Bush II), Dick Cheney, and former Secretary of Defense (under Ford and Bush II), Donald Rumsfeld, and former operator of CIA/DOD’s Operation Phoenix (mass assassination program of civilians during Vietnam War), and convicted felon (5 counts of obstruction of justice and lying to Congress about his illegal activities in Iran Contra), John Poindexter, Rear Admiral USN, Ret., and former head of a CIA front involved in health care database management systems.

TIAO was a Defense Advanced Research Project Agency (DARPA) plan to track every ‘transaction’ of every citizen, just as described in the teaser at page top. A transaction is defined, according to the original White Paper and Request for Proposals which I have personally reviewed, as going through doorways, passing before cameras, making a purchase or selling something or any other financial transaction, traveling, undertaking a communication by voice, fax, data, or any other information access or exchange, even to include mail and public libraries. In short, TOTAL INFORMATION AWARENESS.

It managed all this, in part, by backdoor access to corporate databases via directly partnering with businesses or by covert use of PROMIS spy software developed by CIA and embedded at every opportunity within popular commercial database as well as custom written database management software. Since all major corporate Intranets (private corporate Internet-like services) rely upon a telecommunications backplane (PBX phone systems), and because every major maker of PBX equipment includes (by buried legislation) a receptiveness to special signal codes which allow covert remote access by the military, triggering PROMIS infected database back doors is a simple matter.

Note: This fact was confirmed to me directly by a highly placed technical expert working for Lucient Technologies, a major supplier of PBX gear; his explanation as to how government was able to access and effect surveillance of any phone extension or computer within the corporate offices where I was working at the time. He revealed that clients were not to be informed that these backdoors exist.

What is RFID? What are Radio Frequency Identification Devices?

The Role of RFID

Two RFID tags of the smallest kind. paloaltofreepress.com (click)

The ‘secret weapon’ component of TIAO was to be RFID technology, those little Radio Frequency Identification Devices which are currently everywhere: they are in your money ($5 and up – though debunkers claim they are merely polyester strips designed to thwart counterfeiting… but polyester does not explode in a microwave, though it will melt), in most newer credit cards, many drivers licenses, all Passports, shipping labels (and soon, postage stamps), transportation tickets, and almost any product you buy (soon, all products). If you have bought Gillette razor blades, Max Factor make up, Pampers, and any of thousands of other popular items from ink pens to computers from any major retailer, you have RFID all over your home and, likely, on your person.

Cash registers, bank tellers, secure access doorways, turnstiles, security cameras, and just plane hidden sensors anywhere can be modified to scan and learn the unique serial number of an RFID tag (which it reports upon radio command at distances of several hundred feet, and even through walls when special equipment is employed for the purpose). Once a tag is identified with an individual in a database, everything they do while possessing it can be tracked and cataloged. RFID devices are often large (I’ve seen as large as two-inches square in mailing labels) and easy to spot, but they can also be as small as the period at the end of this sentence .

Note: The tracking bioimplant, Digital Angel (aka Mark of the Beast) manufactured and sold by CIA fronts, is nothing more than an RFID tag with Web/Cell phone GPS technology added, a feature common to many RFID chips installed in cell phones (common to most new phones), watches, ink pens, ankle and wrist bracelets, and other devices intended to be tracked. The original part number of the first known RFID application to ‘track inventory’ was a Boeing Aircraft component with the number 666.

In fact, there is an insidious form of it known as Smart Dust, so small they can float in the air, and even be directed up or down on currents of air as if operated by a glider pilot. These (motes) are sometimes placed on persons of interest (one way: ‘air puffer machines’ at Airport security can ‘sniff’ for explosives, or plant smart dust in your hair and clothes). These migrate from person to person in general contact with one another, and permeate anything they might handle and any place they might sit.

Smart dust can do more than track, with select motes capable of sensing (some dedicated thing) and communicating one with another to act with a hive intelligence. This allows them to report information as if a more traditional complex surveillance system, triggered remotely by laser beams perhaps a mile or more distant.

The US Army can and can track RFID at select points along American highways, railways, and some waterways (esp., ferrys, bridges). This is a key tactical component of the Canamex Corridor which will serve as precursor to and lever for the North American Union. Combined with the other ‘transactions’ earlier cited, as well as feeds from security cameras and drones using advanced facial recognition, license plate readers, and other biometric and tracking methods, not to mention the full array of telecommunications signal capture, NSA can process bulk data without human interaction for analysis,  reporting, cataloging and storage, or undertake requested analytical tasks against specific targets, or sift through information to locate or focus on select targets by human analyists.

If you suddenly are deemed politically incorrect sufficient by almost any given person in the chain of command at NSA, the military, FEMA, DHS, FBI, CIA, the White House, or almost any other government power center, you could be quickly psychologically profiled to see what kind of targeting would best reduce you to a social, financial, and political zero, or to predict your every move in case it was felt you needed a visit by Men in Black for ‘special handling.’ That could mean anything from scare tactics to arrest and detention, to torture and vanishing by murder.

That was the TIA as originally envisioned, and it was so horrifying to anyone with an inkling of understanding of words like Constitution, Rights, Freedom, and America, that even our Globalist bought Congress said “NO!” But Bush, Clinton, and now Sorento have blessed covert continuance of the military plan. The new NSA facilities will become at some level, the de facto TIAO without so declaring, according to NSA expert, James Bamford.

This whole affair is especially significant in one way which is quite calculated and extremely dangerous to your family’s future…

What is less obvious but truly significant is that TIAO establishes the only difference between all failed despot-driven tyrannical rule-the-World attempts through history and what is taking place right here, right now in America. Specifically, the technological advances you have just read about might actually let them pull it off. All prior efforts failed because once the people understand their prediciment, they can elect to revolt, and it then becomes a wild-card battle with no way to guarantee victory to the despot. Too many people doing Lord knows what quietly and acting out suddenly without warning.

Once NSA goes online with TIAO, however, within a matter of Months (by this September at soonest), no activist, no gun owner, no politician, no law enforcement official, no judge, no news reporter, no person of wealth, no citizen, and yes, no criminal or terrorist, will be able to make a move without it being documented, analyzed — duly considered and potentially countered with quiet surgical attacks before the move can even be completed.

Yet — will they use this powerful tool to prevent terrorism or criminal acts, the sole basis for justifying the tool in the first place?

NOT ON YOUR LIFE. They will be used ONLY to maintain and tighten political control (why it’s called Political Control Technology of the Military-Police-Politico Force Matrix — as defined by the Revolution in Military Affairs).  They dare not use it for something as unimportant to ‘National Security’ (their definition being security of the people in power) as might be seen in a terror plot on a school or a city, unless it happened to include an attack on the President or someone key to the Power Elite.

To risk doing so would risk revealing the true power and capability of the TIAO tools, and thereby, risk full-scale revolt by those in the Military and Law Enforcement who still understand and obey their Oaths of Office. Besides, every terror or criminal act carried out empowers them to effect more political control; government benefits thereby.

I’ve already personally done more to fight terror attacks in America as a citizen than they ever will be able to claim by using any weapon of Political Control — though Bush took credit for my efforts as if his Administration’s own.

Therefore, NSA, via TIAO, will be able to pick us off one by one as we wake up and start to exhibit politically incorrect thoughts or take actions which do not serve or go along with the interests of those in control; the corporate friendly thugs running a fascist police state for the Globalist agenda.

First they will go for Anon and Anarchists, and you won’t say anything because you are not Anon or an Anarchist. They will next go for Truthers and 99% crowd, and you won’t say anything because you are not one of them, either. Then they will go for the rest of the Activists and Conspiracy Theorists, and you still won’t say anything. Then they will start to go for the investigative writers and newsmen, and lawmen, and politicians who do start to question, and you still won’t say anything, because if they can take them out, what could YOU possibly do.

Finally, when they come for you, no one will be left to say anything on your behalf.

What can we do to stop wholesale spying on citizens?

A simple $7 cure

Only you can prevent Fascism (click)

There are many things you can do. Make clear to your Congressman that you will not tolerate a secret TIAO and demand the NSA be reigned in, and (almost literally) NUKE the project in Utah and Ft. Mead; level it to the ground. Demand reversal of all post 9-11 legislation that deals with ‘terrorism’ by taking away our rights to privacy. Demand the 30,000 drones never reach American skies. Demand an investigation as to who really runs this country with the aim to kick Globalists out of government posts, starting with criminals in the White House and Congress. We need a political purge.

Become politically incorrect, question government, protest as a 99 percenter, Truther, or activist of some useful sort; be a functioning participating citizen! Make yourself heard above the rhetoric of a controlled media.

And one more thing, as I promised…

Spend $7 (or more if you wish) to join NNN OSP, the Nodular Netizen Network Open Source Project to create a 100% citizen-owned-and-operated wireless Internet alternative. Why? Because ONLY citizens make it up, there is no corporate ISP needed and thus no monthly fee. There is no government control or censorship, no government or corporate spying even possible; YOU are the Web!

If just five people join in each neighborhood, it is sufficient to assure its existence and success, creating a communications channel which is beyond NSA’s ability to access. In fact, the ONLY way government can access NNN communications is to go directly to the sender or reciever; the data does not reside anywhere else along the chain, and never passes through a government friendly corporate portal. And, once NNN OSP becomes popular enough, it will also support VOIP with Smart Phones and take away TIAO’s access to voice conversations, as well.

Visit nnnosp.org to learn more.

There are many, many features and benefits not even possible on the WWW. There are even ways the NNN can make you money. Become the Web, TODAY… right this very MINUTE!

Once we have millions of members, the message may just get through… errant governments are superfluous to the Will of the People when they can freely discuss in private what they think about their government (or anything else). They will at last fear us as they should… as our Founding Father’s said it should be. Then, and only then, will they do our bidding, instead of the bidding of the Globalist corporate powers.

Can you afford NOT to spend $7 to thwart the New World Order?

 

TOP 5 Reasons for, Signs of, Methods of, and Solutions for the Internet Spying On YOU


TOP 5 Reasons for, Signs of, Methods of, and Solutions for Internet Spying On YOU

The threats are many, sophisticated, and endless. Solutions need not include PANIC (usually), and are largely simple and inexpensive, though nowhere near being fun.

Copyright 2012, Proparanoid Press, H. Michael Sweeney — All rights reserved. Permissions to reproduce granted on request, only.
Top five reasons for Internet spying
 

English: Frame of an animation by the U.S. Fed...

This article is especially useful to the TI — the political control technology Targeted Individual, and any person who has reason to believe someone is actively trying to snoop their Web activity or who deals in Web activity of a highly sensitive nature.

My approach to addressing security and privacy is not merely talking about the threats to educate, but how to detect if one has a problem, and then to provide a functional solution. It’s one thing to educate, another to illustrate, and yet another to resolve. Only by all three, is the end result adequate, provided there is no failure along the way which impedes.

Reading this (lengthy, but in outline form so you can quickly navigate to areas of interest) article, you will learn:

• There are 5 basic kinds of privacy compromise/targeting to worry about;
• There are (often) 5 symptoms or clues targeting is taking place (when not blatantly clear);
• There are (often) 5 basic methods of carrying out such targeting;
• There are (often) 5 things you can do in defense or response;
• There are some very reliable and free Open Source tools which can help reduce risk;
• There are some new and potent tools for those more concerned or more at risk of targeting.

By way of introduction, I write as published author and consultant, lecturer, on privacy and security matters, abuse of power issues, and political control technology. My purpose in writing goes a bit beyond the obviously important educational issues, or even the somewhat obvious self-promotion of my books. That is because I, with the help of others, have subsequently developed some specific tools and services which additionally address the threat to privacy and security inherent in daily use of the Internet.

One of these is a completely secure email alternative called NeVir Spies, and a new concept I’ve temporarily called Web Walker which provides a totally secure Internet alternative with some very unusual features and capabilites which go well beyond the topic at hand. More on these tools at article end — very informative.

That said, there are many people much more savvy than I on WEB security (as opposed to real-world security problems). So, if after reading this, you want to know more, there is likely better advice than mine out there, especially if you prefer it more technical in detail. This post, however, I’m betting, is the most centralized one-stop reading resource you are likely to find, and it therefore covers more bases, more comprehensively, in general.

And, speaking of ‘general,’ some general advice applies to all Web security issues, ‘in general.’ It’s all common sense, of course, and you’ve heard (most of it), before, but I’d be remise if I didn’t include it here in case you have not:

• Frequently change passwords and if anything odd is going on, change ALL passwords.
• Do NOT use simple to remember passwords based on ANYTHING about YOU, and DO NOT use answers to security questions ABOUT YOU. If you must use simple to remember passwords and face security questions, base them and the answers on someone famous who died long ago, someone random. Then all you have to do is remember their name, and go look it up on the Web if you forget the hard part.
• Avoid writing passwords down, because you should…
• Remember that your computer security is only as good as security of access to your computer. If anyone can get to the computer, there are many things they might do to compromise its security, obtain passwords, etc. If it does not stay with you or reside on the other side of a pickproof lock, it is at some risk.
• REGULARLY run your Norton’s or similar.
• Never respond directly to an ‘official’ email from any account requesting verification of information or asking you to log in using a link unless you were expecting that exact email to arrive. Manually use the Browser to go to the site and log in.
• Never undertake financial transactions or fill out informational forms involving personal information at a Web site unless the url starts with https:// instead of http://. That little added ‘s’ tells you it is Secure by means of several means not present in general surfing.
• Avoid downloading files or programs from unfamiliar sites of questionable repute, especially when they are in other countries and the topic is something you wouldn’t want people to know you were interested in (i.e., porn, drugs).
• Never put a long list of email addresses in the To: or Cc: blanks unless those people are already conversant collectively (do not assume just because you got an email with that long list that this is so). Instead use Bcc:, or you violate THEIR privacy. Tell everyone you email to to never include your email on such a list unless Bcc:
• Never give out someone else’s email contact unless you get permission for the introduction — just as if it were a phone number. Offer instead to pas the email addy of the inquiring party along to the person in question.
• Here are ten more technical things which you should be aware of explained more fully at georgedillon.com, (linked for you, here) as they deserve their own explanations (I especially endorse ‘Do not trust Microsoft products,’ including their operating systems. Historically and almost consistently, in addition to select spying instances of actual on customers by Microsoft itself, they are poorly designed with respect to security issues and hackers/attackers take advantage. They are the primary source of the great weakness of PCs compared to Macintosh for security and reliability, and the reason so many security steps and layers are advised: 
 

Top five reasons for spying on you

5 Top Reasons For the Internet Spying on YOU (etc.)

It happens to us all, every time we use the Web. Most of it is undetected, and generally harmless. Too much of it eventually bites us in unexpected ways beyond our control. Some of it is dangerous, even beyond the draining of checking/savings accounts or total identity theft.

Most of it we volunteer unthinkingly, especially with what we do on social networks like Facebook, which is a giant spying mechanism of great social usefulness to us, and a goldmine of information to corporations and government. Every single mouse click, almost, is giving away information.

Some information we have stolen from us despite the care we think we have exercised, and that would seem to most of us to be rather rare, but I happen to know that more of it goes on than we hear about, and we are often victimized in ways which we do not detect, and do not realized have harmed us, or their potential to do so. Some information is used against us in ways that are part and parcel of further assaults on privacy and security. Read on…

1)   Criminal Financial Gain. Everyone is a potential victim, and we all get shot at in hopes it will be us. Before you can be Phished (tricked into revealing confidential information), they have to know you are an Netizen (a WWW user) and where on the Net you are (your email, social network and Group memberships, etc.). So they snoop you out, and then snoop you for vulnerability (i.e., lack of paying full attention or even gullibility), and then phish you or attack with a virus or similar technical assault; Signs, Methods, and Solutions:

a. You get email from someone you know which promotes (something) which urges you to open a file or take an action, but which is not quite like what they would normally send, and the message accompanying it is overly simple so you can’t tell if it ‘sounds like something they would say.’ This likely did NOT come from them, and means yours or their email account has already been hacked or, far less likely, both theirs and your email addresses were obtained from someone else who was hacked. If you open the item or take the actions urged, you risk your email account or computer being hacked, infected with a virus or similar, or becoming a Scam victim via participation; What to do about it:

i.   Do not take the actions suggested, therein. Natch!

ii.  Contact your friend and advise them their system (or a friend’s) has likely been hacked, with explanation. They should change their Web passwords and run their Nortons or similar. You should do the same (do it regularly, at least). Macintosh users may yawn at this notion, but we are not completely impervious from suffering system issues resulting from failed virus attacks and eventually resulting in unwanted operational inconveniences.

iii. Delete the offending message, unless your friend confirms they really did send it, and you care to follow up with it knowing it actually safe.

iv.  Advise your friend that they should notify everyone on their email list of the situation to insure they do NOT respond to the described message, with apologies if they should have been a recipient.

v.   Contact all your other friends via all avenues (email, social networks, groups, in person) with similar warnings that such a message is dangerous and should not be acted upon regardless of who it seems to be from.

 b. You get email from a stranger (as if they know you or perhaps accidentally reached you through a typo) or a ‘company’ similar to the (a, above) in nature. Often, it will be a message indicating some action or obligation has been taken on your behalf which you do not want, such as confirming an order for Pizza, an airline reservation, subscription, etc. Or, it may simply be annoying SPAM. This is likely a snooping expedition and may be a phishing attempt, as well; What to do:

i.    Do not respond, not even to unsubscribe to SPAM (unless you repeatedly get the same offer from the same address). Such risks confirming your Netizen existence and defines you a working target, or worse, directs/redirects you to a phishing experience.

 ii.   If concerned the obligation really did take place, go directly to the Web site of the entity involved and research it there. Often, you will find they have options for reporting fraud, phishing, etc. Document (screenshots, copy/paste/witnesses) what you find/do, so you can get out of any wrongful obligation the turns out later to be existent, after all.

iii.  Create a filter in your email Client or Web mail options to block similar messages based on key word content and sender information.

iv.   Keep the message for a period of 90 days in case of unexpected consequence to be used with your documentation from step (ii), above.

v.    Same as step (v, item a), above.

c. You get a message from a stranger who wants to help make you rich, is sexually or romantically reaching out, or has some kind of deal too good to be true;

i.   Same as steps (i, iii and v), above.

ii.  If the message names a legitimate business or agency, consider step (ii), above. The Secret Service has a Web site for such complaints as well. However, IMO, they simply gather statistics and seldom do much more with the information. I have more information about how to detect and defend against this type of fraud at my Web site than do they — and in glorious color to make it easier to absorb.

iii.  Same as step (v, item a), above — but you need not do so every time, you simply want the general warning out there as an educational exercise.

d.  You get the famous Nigerian Scam (aka 4-1-9 Scam). Someone rich died or some other event has caused millions of dollars to be in limbo and someone who just happens to have access to it also just happens to come by your email address and wants someone to help share that money with him through some simple sounding and fail-safe scheme. They always ask for information about you. There are many other clues and signs, as well as the link (above) to my Web site.

i.     Same as all steps in (c) above.

e.  Variations of the above (a through d) delivered not by email, but via a social network or Group posting;

i.  Same as if from email source, except that the social network or Group may have special reporting options as well; such as a moderator to whom it should be reported.

Figure from actual Google Patent Application; Providing digital content based on expected user behavior.Got it?                                      I knew you would understand. My job here is done.

2)   Commercial Financial Gain, at your expense in a quid-quo-pro sort of way. Everyone IS a victim in that same way, or worse, but it is completely legal. There is zero information about you which is not valuable to someone for this purpose, and it is therefore a commodity almost every major player seeks, uses, trades or sells to make money based on the definition of ‘You’ and your preferences, likes, dislikes, and habits; Signs, Methods, and Solutions:

a.  You get SPAM email or Web pop ups or ad banners which reflect your general interests, either at the moment (e.g., you are searching for something the ad relates with), or overall interests;

i.   Web search engines use predictive marketing analysis (aka predictive analytics) about your search terms and what they know about you already through prior uses or shared information to ‘guess’ which of their advertising clients will most likely earn your business with an ad;  consider using a Web Anonymizer  (see separate dialog at article end) which veils your identity altogether . However, this will mean that your favorite Web sites will not know it is you and will not support auto-log in for account information, custom settings, etc. That does not mean you cannot manually log in and continue normally from there, unless an extremely secure site such as a Bank.

ii.   Many Web sites use analysis of what pages you visit and how long you stay on a page, and what buttons you click or roll the mouse over… also in predictive marketing analysis; not much you can do about that short of not going to the Web site — but it’s a matter of quid pro quo. You get something about them from their Web site, and they get something about you for your having done so.

iii.   Each Web site you visit may exchange ‘cookies’ with you, which are data bits which allow that Web site to recognize and acknowledge you as a prior visitor to when you next return, which in turn can further reveal what you like for predictive marketing purposes; consider turning off your Cookies option in your Browser Preferences. However, doing so will mean your favorite Web sites will no longer recognize you when you return, and auto log in, custom features, etc., again won’t work properly. So you have to remember to turn them back on if you want quid pro quo benefits.

iv.   Some Web pages may contain ‘pixel bugs’ (aka Web bugs, picture tags, pixel tags) which sense your presence on the page and reports that information (to someone). Pixel bugs are sometimes covertly placed without the page owner’s being aware, but more often, they arranged for it as partners with some third party. This works like cookies for marketing purposes, but can be more powerful. They are built into the graphics which make the page visually or informationally attractive. Often, a graphic thought to be popular is ‘bugged,’ and placed on the Web for others to copy and use, greatly amplifying its value; learn more, including some technical defensive options, here.

v.   VERY DANGEROUS in some cases: Many software downloads and some purchased software contains back door reporting routines to monitor what you do on your computer (may be limited to a given type of activity, such as Browsing, or specific matters related to use of the software, or may be more invasive, including obligating you to things against your best interests, sometimes with a financial impact). This has in the past been especially true of certain free games, on-line TV watching utilities, select computer utilities, and even major purchased software packages and operating sytems (yes, even big firms like Microsoft); READ the fine print in the user agreement and know what you are letting yourself in for (the nature of what they consider quid quo pro). Note: some illegal use of this method has been encountered, where the compromise of privacy/security was NOT mentioned in the user agreement, essentially converting the package into a virus in function. Know the reputation of the source, search the Web for complaints (but remember, no one makes a product that does not generate complaints from someone about something, and that often, problems arise which are user/user system specific because of unique configurations of their system or usage — so READ the complaints for relevancy to your use and privacy concerns).

map

From Excellent Network World article (click): ACLU Report: Spying on Free Speech nearly at Cold War Level

3)   Political Gain, often in opposition to your best wishes. Identical in nature to Commercial Financial Gain, but used for political purposes to sway opinions, most often with disinformation calculated to target what defines ‘You.’ Your opinions are shaped for you in subtle ways. It is a form of Political Control Technology. This often leads to item number 4, below, where you fail to bend and your bending is deemed extremely important; Signs, Methods, and Solutions:

a.  Also the same as Commercial Financial Gain, except that you can more easily be aware of and control your interaction with political topics most of the time. The tricky stuff is the disinfo built into what should otherwise be nonpolitical in nature. Everybody has a belief structure, and it easily finds its way into whatever they write with or without their conscious intent, but there are people paid to write things ‘off topic’ in ways which infect on purpose, and with great scientifically calculated psychological impact;

i.  In addition to thoughtful reflection (be wary, think logically and critically), it may help you to read up on the 25 Rules of Disinformation at my Web site (my most popular document with tens of millions of downloads).

b.  In Groups and Social Networks, you can count on ‘packs’ of members or friends participating in calculated diatribes, often staged arguments egging you to join in to get your views and or to alter your opinion. Often, the group is actually one person, a trained specialist (cyber troll) who has multiple fraudulent identities for the purpose, any one of which can troll for people to suck into more focused dialogs sans any need for staging an argument, but they usually join in at some point to ‘confirm’ the ‘validity’ of the preferred message;

i.  Same as (a, above), but actually, its easier to detect, even laughable.

4)   Political Paranoia, outright spying on you out of fear of what you believe or might do in their wildest nightmares of potentials. If you are an activist or outspoken in ways not in synch with the mainstream (politically incorrect) on ANY TOPIC, have participated more than once in a given topical protest movement, visited an activist’s Web site or site of the politically incorrect, YOU ARE A POTENTIAL TARGET. Governments (all of them) so covet their power that (most of them) feel any dissent or opposition must be presumed a threat and dealt with before it can actualize. This all too often leads to item 5, below; Signs, Methods, and Solutions:

a.  You find a sudden burst of requests for new social network friends or members to your group, and the dialogs/posts resulting soon thereafter tend to be inflammatory or inquisitive on political beliefs. Or, you find them somehow magically added without requests, or the requests read ‘secret request’ or some other no-such-thing-exists. You may also find others simply seem to dovetail perfectly with your beliefs with continual favorable commentaries to your own, someone trying to get close enough to you to pump you for information, later. These efforts can be as insidious as agent provocateur in nature, and/or attempting to build a comprehensive psychological profile of you for further targeting (item 5, next); What to do about it:

i.  Same as (a of item 3) above (be wary, reflective, and think critically);

ii. Do not REACT instinctively to inflammatory matters. Stop, Think (what is really going on, what to they really want), ACT (according to your best interests) — ACT, don’t React. This is a good habit to employ in ALL DAILY MATTERS as it will keep you out of needless arguments which harm relationships and impede daily progress. I wish I would follow this advice!

b.  You have a sudden explosion of SPAM and Phishing email, and the like. This may be an attempt by an Agency or Military cyberwarrior to infect your system with a spying virus for their own unique purposes. It can happen for other causes, too, of course, and is not a conclusive symptom in and of itself. But it is often coupled with curious events in your life and environment which imply some form of snooping in the real World; surveillance, following, surreptitious entries, odd telephone behaviors, etc.  This would be an escalation step less frequently employed — a preparation for (item 5, next), and most certainly part of it;

i.  Please consider my book or ebook (ProparanoidPress.com), The Professional Paranoid: How to Fight Back If Stalked, Surveilled, Investigated Or Targeted by Any Agency, Organization, Or Individual.

ii.  Review some of my other blog posts based on the book:

      1. In the Rearview Mirror: When You Think You’re Followed;
      2. Your Cell Phone is a Government Agent Spying on You.
      3. You find more sexually related outreach or SPAM than normal, or PORN related popups at the oddest times and places. Someone is trying to develop a psychological profile on you. See item 5 for a very caustic example of how dangerous that can become;

iii. Consider a one-time adventurous response to determine if it is targeting of this type, or generic SPAM/marketing outreach unrelated to spying as such. You WILL encounter unpleasant material by prurient standards. If it is spying related, there will be subtle signs. Again, see (item 5).

iv.  Do NOT respond at all (and for any such event where you elected option (i), above), delete or block sources where possible, as well as the specific message. Complaints may be in order if there is a means of contact, such as the Social Network or Group moderator.

NOTE: Any of (items 4, above, or 5, below) may additionally mean the FBI, CIA, DOD, or NSA (and variously other agencies of government, both foreign and domestic, as well as corporations, and criminal groups they partner or compete with) are specifically targeting your entire Internet activity (and beyond) by any number of means:
      1. All have admitted to or have been reported as employing signal capturing and analysis methods. A van can park near your home and capture router signals, or even just the RF (radio frequency) signals generated by your computer, in which case whatever is on your computer screen is on theirs. If you have a Cable or Satellite, or Microwave ISP source, those signals can likewise be intercepted and analyzed, either at your home, or at the ISP’s location. There will be varying success levels with the analysis attempt, and not everything will get through. Your phones and fax systems are subject to like attack capabilities, as hinted at in the above linked blog post.
      2. Most of these government bodies are not above employing virus attacks by conventional means. Just because you get a virus or were phished, does not mean it came from a criminal. It might be Men in Black, with or without legal authority, with or without official cause.
      3. FBI (and others with like tools) can obtain a warrant to install Carnivore or similar software at your ISP to gain complete access to your email, directly (and as many fear, everyone elses’ email going through the ISP). These warrants are incredibly easy to obtain. The new unconstitutional blanket warrants are even easier to get, and cover (everybody, more or less).
      4. Often warrants are not even necessary, especially with the larger ISP firms of the telecommunications industry flavor (think cellular), who give away information just for the asking if it comes from ‘the good guys.’ Many of these firms consider themselves extensions of the Federal Government for all practical purposes, and many (including Facebook, Google, et. Al) are invested in heavily by the intelligence community (CIA, most notably) who, in exchange, is granted unusual access to information and system control (ergo, they become weaponized when desired).
      5. The Internet was created by the military and ‘given’ to the public for use. However, the handful of key firms which constitute the bulk of infrastructure tools needed for the Internet to even function are essentially military-intelligence community contractors, which provides yet one more tool in the government’s spy arsenal.
      6. Internet 3.0 (a nickname for the effort to ‘improve’ the Internet by Congress) in the name of cyber security is eventually going to get past Constitutional roadblocks in Congress and will become a major censorship and spy tool for all government levels and agencies. If you have no clue, learn about SOPA and CISPA. See the closing section of this post for a breath of fresh air and relief.
      7. The Internet Kill Switch (another nick name — each government on the Planet wants one, including the United Nations) is likewise such a tool, one likely to be thrown whenever government does not like what we are doing (e.g., Occupy, especially after seeing what the Internet did to help overthrow Middle East tyrants), or want us to know what bad things government is doing (e.g., Martial Law, military takeover, extreme blunders that kill or destroy massively, etc.). The closing section addresses this, as well.

5)   Political Control Targeting, where you are deemed a viable threat to an agenda or cyber-powerful governmental (hey – I got hate mail from the Clinton White House and enjoyed much Web sabotage and other fun things while he was in office… and while Bush before him… and Bush after him… and Obama, now).

This means they fear you and feel they must deal with you more proactively, typically because their spying has revealed that other people listen to what you have to say and believe you, or your opinions are thought simply too dangerous to be heard (like many of mine, nasty truthsayer ‘terrorist’ that I try to be). Truth is oft seen as a thing too dangerous to be allowed free expression which might enable and empower a fully informed public, and must not be allowed to contaminate the lies of an errant government and/or a controlled media;

a.  Your social network starts having a lot of unfounded complaints against you resulting in curtailed services or functions, having to repeatedly provide your password, etc.;

i.  There is usually no recourse whatsoever, though I tend to ask my friends if any others are having the same problem, and complain so they understand the Social Network in question is infiltrated by government spying and engages in political control targeting (Facebook, that means YOU).

ii.  See this blog post for more detail on Social media infiltration and solutions.

b.  You start getting denial of service BOMBS — posting bombs to your social network or group, and/or email bombs to your email, which make it next to impossible to actually make good use of them for their intended purpose. I can get over 100 posts a minute, so by the time I see one from a legitimate friend to which I’d like to respond, and finish my current activity that I might do so, it’s scrolled off pages and pages away from access and very hard to find, and puts me thousands of posts behind in any attempt too keep  up. In email, it will be SPAM bombs (and watch out for that especially when it comes time to renew your Web domain name or other key matter — this is a tool to get you to fail to see the advice notices that you must act soon before the expiration date, and is how Web sites are hijacked by Men in Black;

i.  Same as (a), above.

b.  Porn redirects, where you find yourself unexpectedly at a Porn site, or by intention, end up experiencing the phenomenon referenced in item (4) above, which IS a psychological profile being run on you. A variation may be porn content or links magically appearing in your own Web content, or other signs of criminal hacking. Its not that uncommon, actually — just ask yourself, who benefits to figure it out;

i.  Consider running test to see if it is a psychological profile attempt (WARNING, if so, it should prove to be a disgusting experience). I suggest documenting the effort as described in (b of item 1), above, for your own protection. I’d tell you to use an anonymizer, except that if detected to be in use (easy to do), the test will fail:

      1. A step you may need to repeat six times or so before the answer is revealed: arbitrarily choose a link at the porn site to access specific content offered (a pic or vid). OK if that’s where it takes you, return and try again. But…
      2. If it instead takes you to yet another Porn Site, it may be a profile attempt. Now undertake step one at this NEW site. Again, repeat up to six times.
      3. If by the sixth new site you still remain conscious from the visual assault on your moral sensibility, and you have thus far encountered nothing but ‘normal porn,’ with nothing seemingly illegal, you are NOT being profiled, but simply a (would-be) victim of PORN scammers who make money off of redirects. The kind of site a porn addict would abhor but puts up with when encountered and abandons after experiencing multiple redirects.
      4. To make clear, if you INSTEAD start to see bestiality, torture/rape, pedophilia type images, congratulations: you have reached a CIA operated Web site (by some accounts, they have thousands of such sites). Don’t worry, it won’t land you in jail. That’s not their agenda. But if you continue to click on images, your sexual profile starts to be built. Once it is in hand, it may be used at some point to manipulate you or to target you with blackmail, etc, or sexual outreach intended to compromise you. So naturally, you shouldn’t click on those images. Hey, shame on you for even being there in the first place, right? Um… what was that URL, by the way?
      5. IMPORTANT. You cannot trust these and many other porn sites. Just visiting one can result in attacks on your computer’s security and your privacy, such as makes running Norton’s or similar IMMEDIATELY after the test a wise step. Again, Macintosh users should DEFINITELY take this advice regardless of the reliably resistant nature of their system. DARPA, the Defense Advanced Research Project Agency, undertook a special program evaluating the security of the Macintosh Operating System looking for ways to exploit it. I’m thinking they didn’t find any, given that no one else really has in the last three decades, but what does that tell you about governments potential intentions to spy and capabilities?

c.  You discover that at times, you can’t locate Web content that used to be there, can’t reach people by normal means, or you hear people can’t find your content, or reach you. It could be a Web glitch, or it could be that your Web activities or content is being selectively blocked, a form of sabotage known as black listing. This, too, can spill over into the real World — welcome to the daily life of being a TI.

i.  Its usually done at the Server level, so it can be at your ISP or the host ISP to your intended destination or recipient, or an intervening ISP between the them (most Web activity will relay the data through a daisy chain of a number of ISP servers making up the ‘Internet’). Start by contacting your ISP, and asking the destination/recipient to check with theirs, if you can find a way to make contact. Any decent whois service (enter whois in your search engine) can help with finding a way to reach someone.

ii.  You can employ a tracking utility to see where the series of relays between ISPs comes to a screeching halt, and contact them. I like VisualRoute because it is highly functional without requiring geek knowledge, but supports geek use, too. It can also help spot eavesdropping in the data stream and address other Web technical problems. Learn more here. There are a lot of other good ones out there, and computers have some built-in capabilites, per this video lesson.

d.  You should, with confirmations of any of the above, consider yourself under a full surveillance net, even though it may not yet be true — you need assume it true or soon to be true. Your home has been or will very likely be entered into covertly, bugs and or cameras placed, and you may eventually become targeted with electronic weapons (that is another topic altogether);

i.  Contact me immediately for a free Helps Kit and some free online consultation (its what I do). Do not outreach to authorities of any kind, as it is intended you do so that you might officially earn the label of paranoid, or worse. It is a means of discrediting you and part of an organized effort at making you a political, social, and ultimately, financial zero.

ii.  Increase your levels of awareness and review and improve security at home, work, and your vehicle. Talk to your family.

iii. Get my book, The Professional Paranoid. Natch!

iv.  Install a Primus pick proof lock, a lock designed for government needs and so good that government does not want you to even know it exists, and thus, the manufacturer (Schlage) does not talk about it, and their dealers (well established Locksmiths, only) try to sell you an alternative when you ask for it, even though they make more money on the Primus. Also, not all dealers are authorized to sell it. I have a long dialog on this topic with clients.

v.   Keep up whatever you are doing, because it surely must be Good in the Face of Evil, or you would not be targeted in the first place. Unless you continue to fight it, Evil will only get bigger and stronger — and worse for you, others like you, and our future generations. Do not fear them and their cowardly tactics. Remember it is THEY who FEAR YOU and your BELIEFS, and what you have to say or do about it so much that they are willing to risk revealing themselves as the true sociopathic fascists they are.

Top five solutions for Internet spying

Other Privacy Solutions Available

I mentioned Anonymizers (not to be confused with or thought affiliated with the group, Anonymous). This is a tool which can be free or for fee, can be undertaken by simply visiting an Anonymizer Web site and ‘activating’ anonymization per instructions found there, or by use of software they provide to turn it on or off at will on the fly. What it does is it strips away all elements of your basic user identification information, such as cookies and much more, and replaces it with their own, generic version. Thus when you subsequently visit ANY other Web site, it cannot possibly know anything personal about you other than you may volunteer once you arrive. You can play with one to see what it is like with and without use at anonymouse.org.

They don’t always have desired results, because a given site may refuse access for cause, or fail to function fully, or slow down a notable degree. Not a huge problem. The real problem is not that, but trustworthiness. There are a lot of anonymizers out there to choose from, some with very slick Web sites and marketing programs, which in my book, does not mean anything regarding trust, and if anything, is a mark against more than for trusting them. Perhaps I’m just living up to my name, and being ‘paranoid.’

But within a year or so of their first appearing on the Web by nobodies anyone ever heard of, and their popular use, they started going by the wayside and being replaced by newcomers, or merged or were taken over by other firms, and ‘improved’. To my way of thinking, governmentals and other smart people with agenda of their own, have sought to replace them or compete with bogus anonymizers which allow only THEM to see what you are doing.

Think about it… and how easy it would be to arrange, and in realization that if you don’t want others to know what that is, then that information may reflect something extra valuable, or which dovetails with someone’s agenda or political concerns. So they bait you, seeing you as perceived bad guys or as potential targets for (some agenda-driven purpose) to use their service that they may spy on you effortlessly. I’m especially wary of those based on downloaded software, which could afford additional backdoor access to sensitive information. I know there are good ones that can be trusted, but I have no way of knowing one from the other, for sure. Ack!

There is only ONE clear-cut exception I’m aware of, though any of the original firms going back to the 90’s in dating are likely OK, today, unless taken over or merged by some other firm, in which case I get nervous, again. The exception is called TOR (The Onion Router), which is Open Source. Open Source means public code that anyone can read (with some technical skill), and that being the case, it can’t be tampered with or contain threats to security without being detected and reported (that’s one advantage, the other being that it is FREE).

Yet TOR has its own inherent problem which should ALSO be addressed if used to send secure information such as an email message: you should additionally provide some form of adequate encryption of that content. This is a bit of a non issue with respect to simply visiting and using Web sites, however, though using a regular anonymizer AND Tor should likely make such visits even more secure. Learn more about anonymizers,  here, and more about TOR and the encryption issue, here.  Then there is also the greater issue of anonymous email, which you can learn about, here.

With regards to Encryption, that topic also deserves some comment. Your email service provider, likely your email client (e.g., Outlook) and Web mail (e.g., gmail), almost always provides for some level of encryption for security, much of it essentially functionless to sophisticated spying groups like government. I suggest that if you truly fear compromise of very sensitive data transmission over the Web, that you employ some heavier guns. There are numerous commercial products out there, but like anonymizers, I worry about built-in back doors with some of them. Once more, Open Source to the rescue: PGP (Pretty Good Privacy) continues to be a very popular and thus far quite reliable and easy-to-use solution. Learn more here.

Top five internet spying symptoms

New Solutions from Proparanoid

My approach to addressing security and privacy (de javu), to educate on the problem, provide a means to detect the threat, and find a means to resolve it. And also, again, I’m not particularly a Web technologist. So what follows are the results of a lot of thinking not just by myself with my approach in mind, but also with the help of people who know more than I do about Web security. We hope to advance the state-of-the-art in privacy and security.

NeVir Spies is nothing terribly new in the World, except with respect to how it is implemented and made available. It is in the category of a Virtual Private Email Network (VPEN), such as normally employed by large companies for internal email communications in an Intranet (a closed Web like construct for private corporate network connected computers). A VPEN is combined (for Web hopping between distant sites) with HTTPS, the secure form of Web servers (as opposed to HTTP, which are far less secure), to provide a truly secure email service with superlative features.

NeVir Spies is a variant on this theme with some added compenents which allow levels or layers of security and flexibility as the client may deem important. Like all commercially available VPENs, it is more costly than the free email accounts available with Web mail and through your ISP, who includes email with their monthly billing charges. It typically costs about as much as a good ISP, so using it effectively doubles your monthly outlay, but it gives you something the ISP cannot: assured email confidentiality, and some extra features in most cases. There is a lot more to know. Learn about it, here.

Now, this may sound strange… but don’t rush out to sign up for NeVir Spies right away, unless you have an urgent need. That’s because its about to get a whole lot better, thanks to my newest notion, now becoming a project in works… Web Walker:

Web Walker is a completely new and ultra low cost, fully wireless alternative to the Internet, itself, one which is ultra secure and private because it completely bypasses the ISP and telecommunications companies, and thereby, government. YOU become the ISP as well as the communications medium, in a very real way — and of course, you have no need of government involvement in that which you can legally undertake on your own. Even so, it remains compatible with, and is not intended (yet) as a complete replacement of the current Internet. Yet it affords a reliable replacement should the WWW be shut down or be compromised due to sabotage or natural disaster.

As an Open Source Project (OSP), it means free access — no ISP bill, though some nominal expenses can be involved in some cases for select users, and it can represent an income source for others, or the same select users. It does have some up front investment costs for some, but not all, because they might need to upgrade their equipment’s capability or perhaps have more of it if wishing to have more direct involvement.

That cost can be spread out among other users so as to seem negligible, which is where the nominal expenses and income are derived. As intended to be implemented, it will include NeVir Spies as an option, and do so in a considerably more economical fashion, and with a portion of the income going to offset select operational expenses to help keep Web Walker free to most users. In fact, some users will qualify for free NeVir Spies, and that’s why I’m not urging you to jump into NeVir Spies directly. However, it will be many months before Web Walker is available for general use by the public, so if your security need can’t wait… contact me now, anyway — especially since there will be ways to access Web Walker ahead of public availability in its testing and debugging phase. Guinea Pigs needed.

Web Walker, which will also need a new name, addresses EVERYTHING in this post one way or another, though it may not seem like it with superficial review. Its unique design will mean that even those users who might be deemed as system operators will not have access to the actual information transmitted (unlike an ISP or telecommunications system), and therefore, there will be no place for government to go with a warrant to access said information. It addresses all forms of spying and privacy concerns on the Web, especially political spying and targeting, and specifically addresses Internet 3.0 and the Kill Switch. Take a look at it.

If Hilary Clinton fears she and her governmental friends are loosing the (dis)information war (with citizens) because of the Internet, today, wait until they see what we can do when there is no way to use eavesdropping, tampering, or censorship to counteract it. Truth (the Pen) is mightier than Lies (the Sword). That’s Web Walker.

FascistBook: The Growing Case for Government Targeting via Social Media


FascistBook:

The Growing Case for Government Targeting via Social Media

by H. Michael Sweeney,
copyright © 2011, ProparanoidPress, all rights reserved
permissions to reproduce available on request to pppbooks at comcast (net)
In two parts.
 
Dateline Portland, OR August 15, 2011

fascistbook

Part I, The Social Media Beast and its Masters

 fascistbook

This UML diagram describes the domain of Faceb...

Image via Wikipedia: One way to visualize FaceBook. Did I mention it was complicated?

I write this as an activist, investigative writer with seven books generally on abuse of power, privacy, and security matters, and a consultant to targeted persons. So I get an awful lot of feedback from countless persons on the issue this article regards. Namely, that social networks are nothing more than government tools for spying on and targeting the politically incorrect among us. I fear there is truth in the supposition.

I’m on Twitter and FaceBook, and switched almost exclusively to FaceBook as I can get more reach there more quickly than on Twitter. Tweets tend to be more frivolous and for whatever reason, are less likely to share. In the space of time it took me to get 25 Followers on Twitter, I had over 500 on FaceBook, and the quality of exchange was much higher. Kudos to FaceBook on that score, at least — though I think that may be premature given how things are of late, as will be reviewed in Part II of this blog.

To be fair, understand that I do not write this as an expert on FaceBook or social media in general. In point of fact, I struggle with many aspects of what older hands might consider child’s play. It is a complex topic and even more complex software. What I am considered expert on is my personal experience and the that includes shared experiences with thousands of other users and clients, and the general topics relating to the problem as represented in my books, consulting, and other activities. So I can put experiences into context, and I think I can relate them with logical analysis. Only where a given item of concern may be questionable with respect to deciding it represents a mere technical glitch or misunderstanding of procedure, vs. a deliberate spy or harassment tactic, should my lack of FaceBook experience be much of an issue. ANYONE, may feel free to correct or educate me on any errant matter expressed. (Note: in nearly a year since this post first went up, no such corrections have been offered. Yay!) I will do my best to flag areas where there is a difference between supposition or conjecture, and evident realities, as well as points in between.

I will additionally suggest one might get more out of this article if they also review my blog, 33 Axioms of Fascism.

 fascistbook

The Intelligence Community and Social Media

It is well known, or should be, that virtually all of the Social Networks have gained funding and, in many cases, direct negotiated working partnerships with government agencies. Of principal concern are those which involve the military or intelligence community, and their greater apparat, which would include think tanks, research firms, PR firms, financial institutions, Institutes and Foundations, Round Table Groups, and other entities which tend o do their bidding (or be their bosses) or support them in key ways. Collectively, this mish-mash forms what generally represents a spy ring network in functionality. Even Law Enforcement Agencies at the local level are now players. That is a pretty broad-based group, and should be explored more carefully…

fascistbook

Examples might be:

Think Tanks:

The Rand Corporation, a CIA/DOD think tank which has developed several new information gathering systems for its clients. This includes ExpertLens, a new system “to aid complex decision making, adapting online and social media technologies” and which incorporates the Delphi methodNominal Group Technique, and CrowdSourcing to collect information and forecast against solutions. These are very savvy ‘products’ which can be customized for a wide variety of needs and uses, and incorporated into pre existing informational collection and analysis systems. Are they a potential threat to privacy in social media? You bet.

Public Relation Firms:

Hill & Knowlton is CIA’s PR firm of choice, who conspired to fraudulently get Americans behind the idea to kick Iraq out of Kuwait. They used outright lies before Congress and in media campaigns about bayoneted babies to steal incubators. Same thing happened, by the way, in WWI, when the munitions industry went out of its way to buy a handful of newspapers responsible for the bulk of public opinion, and insure they told us Germans were cutting the breasts off of Belgian women. Its in the Congressional Record (prior link). Wasn’t true, of course, but it heated up the debate and did contribute significantly to the war mood. HK publicly admits to using social media to shape opinions, which translates as disinformation given that their publicly posted policy on such use in no way reflects the kind of blatant dishonesty which they have repeatedly exhibited.

          Research Firms:

DARPA, the Defense Advanced Research Project Agency is actually a corporate-like research entity reporting to the Department of Defense and, secondarily, contracting with major corporations. They are very interested in “solicitating innoative research proposals in the area of social media.” Many analysts see this as a move to track social media for ‘propaganda,’ which from their perspective would be any politically incorrect agenda “so that they can be countered before they can gain traction,” which would, of course, require direct intervention in some way, such as will be discussed in Part II of this blog. This will dovetail nicely with other items in this list, ‘coincidentally.’

Financial Firms:

In-Q-Tel is a CIA venture capital firm that invests in start ups it thinks can serve Agency needs. They originally wanted to be named In-Q-It, but someone (blush) registered those names (.com, .org, .net) before they thought to do it, and rather than pay me (given the animosity between us at the time) a few hundred dollars for the names, elected to instead spend thousands to change the company name. They have since invested heavily in all manner of Internet spying ventures, and continue to seek new avenues. They have not touched ‘closed networks’ such as FaceBook, as yet, at least not directly. However, they have invested in the makers of software used by FaceBook, Google, Yahoo, and others to develop and operate their social media, giving way to speculation that back-door access is quite likely a problem worth considering.

Foundations:

The Project for a New American Century (PNAC), as I expose in my book set Fatal Rebirth, is a kind of Foundation which has no peers when it comes to treasonous villainy. September 11 attacks, the resulting Gulf Oil Wars, Homeland Security, the entire election and War Cabinet of the Bush White House, as well as their policies, were all laid out well in advance (1997), and all came to pass almost exactly as planned, and on schedule. They are not finished either. Their membership roster included a rogues gallery of war profiteers, Bush dynasty cronies and family, and villains like Richard Perle.

Questions: How is it that the invasion date of Afghanistan was known prior to September 11? How is it that Colin Powell and DOD Generals were trolling other nations in support of a war against Afghanistan before September 11? Without September 11, what justification for a war did they expect would materialize? Talk about prior knowledge. Amen, Truthers!

I use them as example here, because one of their PNAC friends, Arianna Huffington, wrote an op-ed article in Lebanon’s Daily Star entitled ‘Social media will help fuel change in the Middle East,’ essentially giving the ‘idea’ to the youth of Islamic nations as the article spread virally, that they could use their phones and computers to organize against their government(s). This was some several months before it actually happened in Libya exactly as she wrote it. Huffington, by the way, is described as having very profitable business ties to the Israeli arms industry and has been female companion to Mortimer Zuckerman, a pro-Israel media magnate. So what’s a nice Jewish girl like her doing writing for Islamic media about social networks for revolutionaries? Clearly, this is a form of manipulation of social media users for political gain… a form of social media control being used as Political Control Technology.

Round Table Groups:

 The Council on Foreign Relations (CFR) is one of the Round Table Groups better known in the U.S., as they are based in New York. Unabashed globalists with an agenda for a One-World Government, they infect every element of the corporate world as well as every institution of government. Mere Congressmen cower in their presence and hang on their every word, most of them being members who, as if talking about a fellow Wizard at Hogwarts, fawn over and point out membership in their speeches as if a medallion for Exceptional Wizardry.

It is not. It is a signpost of treasonous shame. They seek to destroy national sovereignty. Their best known members are, perhaps, Rockefeller, Bush, Clinton, Carter, Brzezinski, and Kissinger. The CFR lay the foundation for September 11 in Brzezinski’s book, The Grand Chessboard, in which he said the U.S. must remain dominant in the World, and that to do that, we need to control the oil production of the Middle East and Soviet fields bordering with the Middle East. It stated that unless there was some catalyst event to justify a war in the the region, there was sadly no way to achieve that. So PNAC set about to insure it happened just that way. Good old American Capitalism at its best.

With respect to Social Media, CFR has published another work which essentially says what we all know, that it is a great tool for civilians to organize and can become a tool for political change of governments, to include their downfall. It goes on to say, that properly managed, it can become a tool to translate unrest toward rapid and undesirable (their perspective) changes to a more evenly paced and acceptable (their perspective) change. They stress the importance of gaining such a tool. So you can bet that somewhere, people are making it so. In fact, pretty much everyone listed.

Law Enforcement:

Lately, the New York Police Department has established their own Social Media Unit to infect social media with the presence of Cops looking for clues. Well, that might be OK if looking for a specific clue from a specific suspect in an ongoing investigation, but NOT if it is general snooping to create intelligence files on citizens — as has been common practice in almost every major city well before Internet even existed. Portland and San Francisco PDs, and 18 other Police agencies were involved in trading such files on 20,000 non criminals who had never been subject of investigations, as well as those who had, with B’nai B’rith/Anti Defamation League, South African spies, and CIA. So we know it happens. In fact, my dossier was involved, obtained through FOIA. A lawsuit against ADL by San Francisco was dropped amid huge pressure common to anyone who says bad things about any Jewish organization. Well, that didn’t include me, then, but it does, now: Bad ADL.

FascistBook

Too Many Masters, Too Few Slaves

Model of a social network. While not the intended representation, one might imagine you and your friends in the left group, and the government snoops in the right group. Are you that second guy on the left?

In each of the above examples, I simply used the first group or firm, etc., that popped into my head (deliberately skipping over some of the more obvious choices, because I already know the answer, for them), and then Googled to see if they had any truck to do with social media which borders on manipulation or spying. In every single case, it was found to be true. From this we might deduce, then, it is likely that EVERY such agency in each category has already or will soon effect a similar intention or action which can be pinned to its lapel. The problem is, that means literally many hundreds of groups who seek to control and subvert social media networks to their own internal and often insidious needs. The bulk of these I would not trust with my life, much less my Nation’s security, and certainly not my privacy, much less counting on them to obey the law.

But there are only so many such social networks, and only a few of them are large enough to merit attention. The larger they are, I suspect, the more valuable a target they become. The largest of these is FaceBook. So it is perhaps no surprise that charges of spying and digital assault on the politically incorrect should be more common to FaceBook users than any other such media forum. Both because there are so many users (more than 700,000,000, or about 1 out of every five computer users World-wide), and because there are so many wanna’ be system infiltrators who rank them the number one choice for manipulation.

I don’t think that Mark Zuckerberg, CEO/President and creator of FaceBook is dumb, but I think he would be stupid to do the things he has done already to cooperate with these kinds of manipulating bastards, unless the scope of the problem as just described, was not known at the time. You can bet he and his brethren competitors were fed a line of crap which started with ‘National Security,’ and ended with ‘personal assurances,’ and you can bet that 90% of that was bull. I can’t imagine anyone willing to give endless back doors and unchecked control of their cash cow to a bunch of people who, in the final analysis, would probably be shot if there were a revolution right now, and their side lost. But once such a bed has been made… as with a deal with the Mafia or the Tong… you can’t go back and undo it. So whatever state FaceBook and its competitors are really in in terms of bedding with evil partners, they, and we, are stuck with it… at least until that revolution takes place.

As I see it, and as is true for all social networks…

FascistBook

There are three basic paths for abuse to take root

1. Those already inherent in the design or added to it intentionally by the creator/owner of the network which enable their own form of ‘control’ over their client’s experiences, and which could be used in punitive or immoral ways if desired. That does not mean they do so intentionally, but it creates temptation. They would, we presume, be very difficult to discover and almost impossible to prove, but there are clues which might suggest their presence and use. Saying something bad about the media and, in almost every instance, suffering a punitive response, would imply such to be the case.

2. Those added by agreement or as concession to investors or partners. These are undoubtedly on purpose and very likely to be employed to the detriment of end users, where present. These would generally need to be extremely covert in nature and almost impossible to detect. The exception might be harassment or targeting methodologies, but a clever programmer can make these look like glitches. Well, I don’t know of any activist on FaceBook without their glitches.

3. Those obtained by back door access, hacks, etc. You can bet these are in constant wholesale use, where present. Absolutely covert and highly illegal in nature, there will not be any opportunity allowed for discovery, which means that they are not used for harassment. They are snooping solutions, only. Thus short of an announcement of discovery, the end user will never know of its existence, which is also true of the operator of the social media. For this reason, I fear In-Q-Tel’s strategy more than, say, DARPA’s. I fear DARPA’s more than I fear Hill and Knowlton.

FascistBook

This ends Part I.

Part II,  will look at some specific facts, issues and actual experiences reported about FaceBook in media and by users. The issues described in the three paths, above, will be considered and applied where possible in an attempt to evaluate. We need a sense of reality, not conjecture, when it comes to charges of spying and targeting, lest the decisions we make be more dangerous by false assumptions.

%d bloggers like this: