Странице

субота, 23. јун 2018.

Simina Mistreanu - China’s Social Credit Laboratory

PREUZETO SA:
http://foreignpolicy.com/2018/04/03/life-inside-chinas-social-credit-laboratory/



Life Inside China’s Social Credit Laboratory

The party’s massive experiment in ranking and monitoring Chinese citizens has already started.

APRIL 3, 2018
RONGCHENG, CHINA — Rongcheng was built for the future. Its broad streets and suburban communities were constructed with an eye to future expansion, as the city sprawls on the eastern tip of China’s Shandong province overlooking the Yellow Sea. Colorful billboards depicting swans bank on the birds — one of the city’s tourist attractions — returning there every winter to escape the Siberian cold.
In an attempt to ease bureaucracy, the city hall, a glass building that resembles a flying

петак, 22. јун 2018.

[Knjiga (Eng)] Frank L. Britton - BEHIND COMMUNISM

BEHIND COMMUNISM By Frank L. Britton (Probably published in 1952)

Russian Bolshevik Revolution
Soon these hordes of returning Jews would exercise the power of life and death over 150 million Christian Russians. Soon every factory, every government bureau every school district, and every army unit would function under the gimlet eye of a Jewish Commissar. Soon the blood of human beings would be oozing from under the doors of communist execution chambers as tens of thousands of Christian men and women were butchered like cattle in a slaughterhouse. Soon five million landowners would be deliberately starved to death as part of a premeditated plan. Soon a move would be under way to exterminate the gentile leader class of the entire nation by murdering every Christian factory owner, and lawyer, and government leader, and army officer, and every other person who had been, or might be, a potential leader. Soon the standing population of the slave labor camps would exceed 15 million. Soon every church and cathedral would be gutted and every priest and preacher would become a criminal in his own community. Soon Russia would have a zombie-proletariat docile, willing to work, easily controlled, incapable of revolt ... Such was the "romance" of the Bolshevik revolution.

Knjigu u PDF formatu, 65 strana, možete preuzeti ovde

Knjiga je mogla da se preuzme sa sajta Daryl Bradford Smith-a "IAmTheWitness.com", sve dok Daryl nije morao, zbog promene francuskog ustava, da zatvori sajt 2016. godine. Evo šta Daryl Bradford Smith kaže o tome:

понедељак, 04. јун 2018.

Government Surveillance - 6 Things You Need To Know

PREUZETO SA

https://www.cloudwards.net/prism-snowden-and-government-surveillance/



PRISM, Snowden and Government Surveillance: 6 Things You Need To Know


obr2By Lavanya Rathnam — Last Updated: 19 Apr'17

Edward Snowden, one of the most famous whistleblowers of our times, brought to light the many surveillance programs and other snooping activities of the U.S. government. This former intelligence officer revealed top secret documents to Glenn Greenwald of The Guardian and Laura Poitras, a freelance journalist, in May 2013 at a hotel in Hong Kong.
The many documents that he gathered from U.S. intelligence agencies like the NSA show the depth and breadth of surveillance programs that have been in place since 2007. It also showed the role of corporations, governments of other countries and lawmakers in furthering and legitimizing these surveillance programs.
Privacy enthusiasts, including us at Cloudwards.net, were shocked by some of these programs. Here’s a quick look into some of the surveillance schemes that Edward Snowden blew the whistle on back in 2013.

PRISM

Probably Snowden’s biggest revelation was concerning a program called PRISM, under which the National Security Agency (NSA) accesses emails, documents, photographs and other sensitive users’ data stored in major companies.
Documents leaked by Snowden show that Facebook, Google, Microsoft, Yahoo, PalTalk, AOL, Skype, YouTube and Apple give the NSA direct access to its users’ information. According to the documents, Dropbox also joined this list (one of the many reasons we recommend our readers stick with secure alternatives to this service).
PRISM was launched from the ashes of President George W. Bush’s domestic surveillance programs, which were abandoned due to lawsuits, disclosures in the media and widespread protest.
Due to past controversies, this program was given the legal go-ahead by the U.S. Congress when it passed the Protect America Act in 2007. Also, the FISA Amendments Act of 2008 gave legal immunity to private companies that cooperated voluntarily with U.S Intelligence agencies.
Microsoft became PRISM’s first partner in 2007 and the NSA began collecting vast amounts of data from its servers. Other companies joined the program in due course. In 2008, Congress gave the Justice Department authority to compel a reluctant company to “comply” with the needs of PRISM. This means that even companies that were not willing to join the program voluntarily had to do so at the behest of a court order.
This gave the NSA access to even more information. Soon, PRISM became a leading source of raw material for the NSA, as it accounted for one in every seven intelligence reports. PalTalk, for example, is much smaller when compared to the other companies on the list, but it provided substantial intelligence during the Arab Spring and the ongoing Syrian civil war.

Wiretapping

court order shows that Verizon was ordered to provide the details of all calls, on a daily basis, to the NSA. This included calls that were made within the U.S. as well as between the U.S. and other countries.
This order was granted by the secret Foreign Intelligence Surveillance Court to the FBI on April 25, 2013. Under this order, Verizon has to provide the numbers of both parties on a call, location data, call duration, time of the call, International Mobile Subscriber Identity (IMSI) number and any other unique identifiers.
In addition, the court order explicitly forbids Verizon from disclosing to the public the existence of FISA order or this request from the FBI. The terms of this order complies with the “business records” provision of the Patriot Act.
A report in The Wall Street Journal shows that this court order was sent to AT&T and Sprint Nextel too. This arrangement with the country’s three largest phone companies means that the NSA gets a record of almost every call that is made.
To top it, some documents show that the NSA can crack cellphone encryption, so it can easily decode the content of intercepted calls and messages.
The report also states that the NSA made a similar arrangement with Internet service providers to obtain data about emails and browsing history of all individuals. A recent decision by the U.S. Senate will compound this breach of privacy by ISPs, as they will not just be working with the NSA but also with commercial third parties to sell customer data.
Besides wiretapping and ISP spying, credit card transactions are also cataloged and stored in NSA’s servers for analysis.

Tempora

The British intelligence agency, the Government Communications Headquarters (GCHQ) works closely with the NSA in a program called Tempora.
Under this program, GCHQ monitors the world’s phone and Internet traffic to gather information on emails, calls, facebook messages and browsing history by tapping directly into the transatlantic fiber optic cables that land on the shores of the UK. All this data and intelligence is shared with the NSA. In fact, more than 850,000 NSA employees and private contractors like Snowden had access to the GCHQ database.
A report shows that in 2012 alone, the GCHQ handled 600 million phone calls a day by tapping into 200 cables. Since each cable can carry 10GB of data per second, this agency had access to about 21 petabytes of data every day.
This collection is legal, as the Regulation of Investigatory Powers Act (RIPA) allows the GCHQ to collect information without a warrant. As a result, Tempora gives the British spying agency the “biggest Internet access” among a coalition called “Five Eyes,” which comprises Australia, Canada and New Zealand, besides the UK and the U.S.

Tailored Access Operations (TAO)

When the NSA is unable to break encryption codes, it uses an elite hacker team called Tailored Access Operations, or TAO for short. This team hacks into computers worldwide and infects them with malware to access the computer’s stored content.
The NSA is believed to use this tactic when it needs detailed information on a specific target or when it’s unable to break an encryption code.

Dishfire

Another surveillance program called Dishfire collects almost 200 million text messages from across the world and uses them to extract data such as location, contact networks and credit card details.
Using this information, the NSA could extract people’s travel plans, financial transactions and more. In addition, another program called “Prefer” conducts an automated analysis of these text messages on all individuals, even those who were not under the suspicion of any illegal activity.
For example, on an average, the NSA was able to extract information related to 1.6 million border crossings and over 800,000 financial transactions through text-to-text payments using “Prefer.”

SOMALGET

The NSA is intercepting, recording and storing all calls made in the Bahamas under a program called SOMALGET, a top-secret program that is implemented without the knowledge or consent of the Bahamian government.
A report by The Intercept showed that the U.S. Drug Enforcement Administration opened a backdoor to the country’s cellular network, thereby giving the NSA covert access to all mobile calls. In fact, SOMALGET is a cutting-edge tool that allows the NSA to store the actual content of every conversation, not just the metadata.
This program is a part of a larger program called MYSTIC, under which the U.S is secretly monitoring the telecommunication systems of other countries like Mexico, the Philippines and Kenya.
The NSA is using MYSTIC to gather personal data on mobile calls placed in countries that have a population of more than 250 million people. It is gaining access to these networks through the interception mechanism covertly installed by American companies that operate in these countries. According to some classified documents, the agency is seeking more funding to expand its surveillance program to other countries.

Final Thoughts

From the above facts it’s clear that the NSA is keeping a constant watch over your activities. With the help of large corporations and lawmakers, the government knows every little thing you do. Even information you access, store and use is recorded in NSA’s facilities, thereby giving you little to no privacy in your everyday life.
Such programs show how surveillance practices have shifted from individual suspicion in favor of a large and systematic practice of collecting mass data. Given this, the onus is on you to protect your privacy in a methodical way.

четвртак, 31. мај 2018.

[Video (Eng)] Bought Documentary (2015, HD)

THE TRUTH BEHIND VACCINES, BIG PHARMA & YOUR FOOD
http://www.boughtmovie.com/
https://www.imdb.com/title/tt3485752/


Protiv čovečanstva se vodi rat. Duhovni, hemijski, biološki, kulturni.
'Bought' je dokumentarac o farmako i prehrambenoj mafiji i korporativnoj državi.
Bez subtitlova, 720p.


недеља, 22. април 2018.

[Video (Eng)] FRANKENSKIES Documentary

www.FrankenSkiesTheMovie.com
www.ActualActivists.com

FrankenSkies is an 80 minute social change documentary regarding the Geoengineering/Chemtrail agenda that affects every living being on earth. An impeccably timed eye opening exposé, the film reveals the campaign to normalize chemical cloud formations via atmospheric aerosol dispersals.


среда, 18. април 2018.

[Video (Eng)] GMO A Go Go!

An animated short by Kirk Rutter and Paul Davies


Poor Johnny doesn't like "healthy" food. What could possibly persuade him to eat all his "veggies"?


среда, 11. април 2018.

[Knjiga (Eng)] Gary Kah - En Route to Global Occupation (1992)


A high ranking government liaison exposes the secret agenda for world unification.
As mentioned earlier, World Union joined with World Good-will - a creation of Lucis Trust-in 1961. Lucis (or Lucifer) Trust is an offshoot of the Theosophical Society, which is plugged into the highest levels of Freemasonry. Past and present members of Lucis Trust include: Robert McNamara, Donald Regan, Henry Kissinger, David Rockefeller, Paul Volcker, and George Shultz - the same crowd that runs the Council on Foreign Relations and the Trilateral Commission.
Besides the CFR/WCPA connection existing through Lucis Trust and World Union, the WCPA has at least four CFR members directly in its ranks. They include current CFR members Gerard Piel, Dr. Kenneth B. Clark, and Dr. Glenn T. Seaborg, who are all WCPA honorary sponsors; and Ramsey Clark who is a former CFR member. Jesse Jackson's affiliation with the two groups must also be considered. In addition to this, one must not forget that the CFR is the real power behind the United Nations, having conceived the organization. More than 20 percent of the WCPA's honorary sponsors are identified with that organization.

At first, the Antichrist will be remarkably successful in keeping peace on the planet This is because most of the world's conflicts were incited by his followers. With the prince of darkness now in power, his followers will cease fomenting wars, giving him credibility among the people as a genuine peacemaker.

Knjigu na engleskom jeziku možete preuzeti kao fotokopiju originalne knjige sa archive.org ili kao čist tekst sa ove_veze .

четвртак, 15. март 2018.

[Video (Eng)] Farmed Norwegian Salmon World’s Most Toxic Food

Svo zlo dolazi iz Monsanta (Bayer)

38:25
I've discovered that ETHOXYQUIN has a power to cross blood-brain barrier. This barrier has very important function. It exists as a physicall means to protect the brain from toxic substances. No foreign substance for the human body is supposed to pass thru it.

понедељак, 26. фебруар 2018.

[Video (Eng)] Ex CIA Agent Tells It All


I always have to say this: the United States Constitution is the supreme law of the land; it supersedes every other law in the U.S. criminal justice system and the judicial branch. That's worth remembering. When the US government violates the Constitution they are committing multiple felonies based on the foundation of our government; we must always remember that.
...
It is almost too late to stop what is now a post constitutional government. The people are no longer ruling - in our country the government in the tyrannical form is now of ruling the people by subversion, force and fear. Sadly that's what we have today.

"Post constitutional government" - postoji li tačniji opis savremenih država?