Survivalist News Network

Cybersecurity Expert John McAfee Issues Warning About Those Cell Phone “Presidential Alerts”

By Mac Slavo

With the push of a button and at the direction of President Donald Trump, a “Presidential Alert” was sent to all cellphones across America at 2:18 p.m. ET yesterday.

The message was the first test of what many are calling the “Presidential Alert” system, a new way to notify Americans across the country of national emergencies.

Continue Reading >>

The Reason the Sunspot Observatory Was Closed Has Been Revealed, and it is Disturbing

By Mac Slavo

A few days ago, it was reported that the Sunspot Solar Observatory in New Mexico was closed on September 6, and the reason was not revealed, leaving many to speculate.

We pointed out that the timing of the “security issue” which caused the closure was odd, considering the sun’s current activity as it heads into its solar minimum cycle. 

Continue Reading >>

80% of Americans Living in Danger Zones

By Owen Sullivan

There are few things we take for granted more than our nation’s food supply.

Every single day, it ticks away in the background, unseen and unappreciated — a creaking behemoth of production and distribution.

Through these channels, millions of pounds of food are funneled silently to our supermarket shelves… only to be bought in a matters of days… and replaced so quickly you’d hardly notice they were gone in the first place.

But what if the supply suddenly stopped?

What if tomorrow morning, a city like Chicago — with a population of 2.7 million people — was cut off from all outside production?

How long would the food already in the city last?

The numbers don’t look good.

Sticking with supermarkets for a moment, the average store only keeps about three days’ worth of food on location at any one time.

This tight three-day window is just big enough to give stores ample supply to restock every night — but small enough to minimize storage and rotting.

However, this three-day estimation is 100% based on consumer activity during a regular shopping week. It doesn’t take into account how folks change their behavior in a crisis.

If there were a catastrophic event that stopped the production of food — be that an EMP that fried the national grid or an extreme global weather event that devastated our infrastructure — folks would know about it.

And the first thing they would do is stock up on as much food as they can.

The first day, there would be a frantic run on the stores. And between violent looting and legitimate sales, I doubt there would be anything left to sell on day two.

Now, depending on how much food you manage to grab… and how well you are able to ration… you might be able to make those supplies last for a couple of weeks.

But once that food is gone… there’s no more food coming… and there are 2.7 million people in the exact same boat as you.

Feeding the Beast

A city is a strange beast when you think about.

80% of all Americans live in danger zones, packed into high-rise buildings and cramped, narrow homes. We live on top of each under and under each other, trying to squeeze as many people into a few square miles as possible.

The idea is the more people in one place, the more opportunity. But the reality is… it leaves us all vulnerable.

Because “the beast” is so dense with people, it needs to consume an enormous amount of food… But with all the space taken up with offices and apartments blocks, there’s no room to actually produce any food.

So meat, produce, fish, and fast food are shipped in from the surrounding farmlands and factories across the country — and even imported from overseas.

But if you take away those supply lines… the beast starves… and it starves fast.

Experts estimate if our national grid were shut down — and the supply lines were severed — 90% of the entire country would die of starvation and disease in the first year.

Ninety percent of Americans dead in a single year. All because we’ve become too dependent on automation, machinery, and factories to feed our ballooning population.

Surviving in a Post-Collapse City

Trying to feed a city is a fool’s errand.

Ideally, everyone in city bounds would have a 90-day supply of food stockpiled to create a buffer of a few months to allow for lines of distribution to be re-established.

But you can’t expect other folks to be as well prepared as you are. And that makes a city one of the most dangerous places to be during a collapse.

Even if you have ample supplies and maybe even a method of producing your own food (more on that tomorrow), the vast majority of your 2.7 million neighbors do not. And in a post-collapse situation, they will do anything to get their hands on them.

At the end of the first week, things are going to start getting violent. And it’s only going to get worse from there. And I’m not just talking about roving gangs of violent youths here.

I’m talking about everyone. Starvation will make a perfectly normal person a heck of a lot more open to the idea of getting violent. They’ll do anything to survive and protect those they love. And they won’t care if that means hurting innocent people.

Living outside the city is a much more sensible option — especially if you can find a small town surrounded by farmland. That way you can’t be cut off from the food supply if the distribution channels go down.

If you have to live in the city because of work or relatives, I recommend being prepared to defend yourself and getting out of dodge at the first sign of trouble.

We’ll discuss this idea more tomorrow. And take a look at a single strategy for feeding your family and establishing strong financial footing in a post-collapse economy.

 


Hijacked Airliner Outflies F15 in Suicide Spree

source: VT

Sputnik/Moscow: On Friday, an aircraft mechanic stole a Horizon Air passenger plane from Seattle’s international airport, performing a series of aerial stunts before crashing on a small island southwest of the city while being pursued by F-15s. In light of the dramatic but strange story, Sputnik has put together a list of similarly odd hijacking incidents.

Friday’s incident was well documented by video, which showed the dramatic pursuit, as well as footage from the crash site. According to the Seattle Times, the hijacking was “not a terrorist incident,” but a case involving a 29-year-old Pierce county resident and Horizon Air mechanic with “suicidal” intentions. The Bombardier Dash 8 Q400, with no one other than its hijacker pilot on board, crashed on Ketron Island, a sparsely populated island about 40 km southwest of Seattle. No other victims were reported.

Hijacking at the Dawn of the Aviation Age

Skyjackings started not long after commercial aviation itself began gaining acceptance. On September 25, 1932, in one of the earliest reported hijacking incidents in aviation history, a Panair do Brasil Sikorsky S-38 seaplane was hijacked by three men opposed to the Brazilian coup of 1930, who took a company employee hostage and managed to take off despite the fact that none of the men knew how to fly a plane. Following a short flight, the commandeered aircraft crashed in the city of Sao Joao de Meriti, killing everyone onboard.

© Wikipedia / Michael Sprague
Sikorsky S-38 at an airshow.

 

Skyjacking Where the Hijacker Became the Sole Survivor

On July 16, 1948, a Cathay Pacific Airways PBY Catalina flying boat was hijacked during a flight between Macau and Hong Kong, with the incident often described as the first-ever proper commercial skyjacking. The plane was taken over by a four-man gang, who planned to force it down in a remote location and hold its wealthy passengers hostage until a ransom was paid. However, as the hijack attempt began, Dale Cramer, the American pilot at the helm of the plane, refused to hand control over the plane to the would-be hijackers. Chiu Tok, the gang’s leader, shot Cramer, who fell onto the controls, sending the plane careening into the sea. Two nearby fishermen witnessed the incident and searched the plane for survivors, finding an unconscious man later identified as Wong Yu-man, one of the would-be hijackers. The criminal spent three years in prison for his crime. The other 25 passengers and the crew of the ill-fated flight were killed.

© Wikipedia / SkagitRiverQueen
Firefighting variant of the PBY Catalina, file photo.

 

Youngest-Ever Skyjacker Steals Plane and Goes Scot-Free

On November 10, 1969, 14-year-old Cincinnati resident David Booth skipped school and hijacked a Delta Airlines DC-9 on route to Chicago after airlines refused to cash a check he stole from his father and planned to use to buy a ticket to Boston to see his brother. Fearing severe punishment from his father, Booth pulled a knife on a young female passerby in the airport, dragging her to the plane, where he was engaged in an hour-and-a-half long standoff with the police. The standoff ended with Booth handing over the knife. Too young to be prosecuted, the teenager was sentenced to six months in a home for troubled teens. Forty years after the incident, Booth attempted to contact his hostage to apologize, only to find out that she died of cancer in 1996.

Thanksgiving Skyjacking of Legends

Between 1968 and 1972, in an era which would become known as a “golden age” of American skyjackings, over 130 planes were illegally commandeered over US airspace. The vast majority of these cases were resolved by authorities, with their perpetrators caught and imprisoned. However, the November 24, 1971, Thanksgiving skyjacking by a man identifying himself only as “D.B. Cooper” proved an exception and would go on to inspire nearly a dozen copycats. Cooper jacked a Northwest Orient Airlines Boeing 727-100 flying out of Portland to Seattle, passing the flight attendant a note saying he had a bomb in his briefcase and demanding $200,000, four parachutes, and a fuel truck. After touching down in Seattle, the hijacker released all the passengers and a flight attendant and continued on toward Reno. During the flight, Cooper opened a door toward the rear of the plane and jumped out. Although the FBI believes he was killed in a heavy rainstorm, his body was never found, and the case remains unsolved to this day.

© Wikipedia / FBI
DB Cooper’s Wanted poster

 

Dramatic Copycat ‘D.B. Cooper’-Style Skyjacking

On June 23, 1972, in a copycat crime modeled after the Cooper caper, Martin J. McNally hijacked an American Airlines Boeing 727 bound for Tulsa from St. Louis, demanding $502,500 in cash. Hearing live news reports about the hijacking, David J. Hanley, a 30-year-old businessman, drove his Cadillac into the airport and crashed into the 727’s nosegear, lodging his vehicle under the fuselage. Undeterred, McNally transferred to a second 727, took off, and jumped out of the plane over Indiana. The police later found his loot bag and gun, covered in McNally’s fingerprints, eventually leading to his arrest. On May 24, 1978, McNally, now imprisoned, and fellow inmate Garrett Trapnell, another would-be skyjacker who stuck up a plane in January 1972, attempted to break out of Illinois’ Marion Federal Prison using a stolen helicopter to be commandeered by Trapnell’s girlfriend. The attempt was foiled when the chopper’s pilot shot and killed the woman using her own gun.

© Wikipedia / Alain Rioux
An American Airlines Boeing 727, file photo.

 

Skyjacking for the Lord

On May 2, 1981, a 55-year-old Australian named Laurence James Downey hijacked an Aer 

Lingus Boeing 737 on route from Dublin to London by dousing himself in gasoline and heading to the cockpit with a cigarette lighter, threatening to set himself on fire anddemanding to be taken to Iran. After being told that the plane did not have enough fuel for the journey, Downey agreed to divert to Le Touquet, northern France, for refueling. During the layover, the hijacker demanded that Pope John Paul II release the so-called third secret of Fatima, a religious document shrouded in mystery, which the Vatican held off on publishing until the year 2000. While Downey was negotiating with authorities, French special forces stormed the aircraft and apprehended him. No one was injured in the incident. Downey was sentenced to five years in jail.

© Wikipedia / Eduard Marmet
An Aer Lingus Boeing 737 similar to the one hijacked by Downey.

 

Hijacker Surrenders Weapon in Exchange for More Beer

On June 21, 1985, Stein Arvid Huseby, a 24-year-old Norwegian man, boarded a Braathens SAFE Boeing 737-205 in Trondheim on route to Oslo, threatening the crew with an air gun and falsely claiming that he had placed explosives throughout the plane. After landing in Oslo, the aircraft was surrounded by police, and negotiations for the plane’s 116 passengers and 5 crewmembers began. Throughout the hijacking, Huseby grew increasingly inebriated, consuming the plane’s entire beer supply and demanding more from authorities, gradually letting out some of the passengers in the process. After Huseby agreed to give up his air gun in exchange for more beer, police stormed the plane and he was taken into custody. The troubled young man, who had a history of mental problems, and issues with alcohol abuse, expressed regret for his actions, which he said were meant to attract government attention to the issue. He served three years in prison and five years of preventative supervision. No one was hurt in the incident.

© Wikipedia / Michel Gilliand
Braathens SAFE Boeing 737-205 LN-SUG at Paris-Charles de Gaulle Airport

 

Stealing a Plane for Love

On March 29, 2016, Seif Eldin Mustafa took over an EgyptAir Airbus A-320-200 on route from Alexandria to Cairo with 63 passengers and crew onboard. Claiming he was wearing an explosive belt (later revealed to contain mobile phones but no explosives), Mustafa forced the plane to be diverted to Cyprus. After landing, everyone except a group of seven passengers and crew was freed, with the disgruntled passenger demanding to see his estranged wife, who lives in Cyprus, and demanding asylum in the country. The standoff ended peacefully, with the hijacker surrendering and being arrested. Egyptian officials branded Mustafa an “idiot,” saying that while “terrorists are crazy … they aren’t stupid. This guy is.”

A man named Seif Eldin Mustafa, who was arrested after he hijacked an EgyptAir flight, which was forced to land in Cyprus on Tuesday, gestures as he is transferred by Cypriot police from a court in the city of Larnaca, Cyprus March 30, 2016.


This Friday The Grid Gets Hacked. You Could See The BIG Cyber Attack in the US History. “90% Of Americans Could Die As A Result Of A Power Outage”

By Mac Slavo

The Ransomware that began spreading across the globe on Friday is still going with more computers reportedly being affected today by new variants of the virus.

What we’ve learned is that the attack hasn’t just taken down personal computers, but core government and business networks affecting everything from health care systems and transportation in Europe, to ATM withdrawals in China.

It’s massive, to be sure. But in the grand scheme of things, up to this point, it has been a fairly minor inconvenience.

Continue Reading >>

Massive Global Cyber Attack Using NSA Hacking Tools Takes Down 45,000 Computers Across 74 Countries: “A Scale Never Seen Before”

By Mac Slavo

They’re calling it one of the biggest global cyber attack in history. Unprecedented in scale, Kaspersky Labs reports that some 45,000 devices have been compromised across 74 countries.

According to reports, America’s own National Security Agency (NSA) developed the very tools that have been used to break into computers around the world. The exploit, named “EternalBlue,” was released by a hacking group earlier this year and put up for sale.

It appears that someone took them up on the offer and is now using it to deliver Ransom Ware to target computers:

A hacking tool known as “eternal blue”, developed by US spies has been weaponised by the hackers to super-charge an existing form of ransomware known as WannaCry, three senior cyber security analysts said. Their reading of events was confirmed by western security officials who are still scrambling to contain the spread of the attack. The NSA’s eternal blue exploit allows the malware to spread through file-sharing protocols set up across organisations, many of which span the globe.

Continue Reading >>

World War 3 Warning: “They Are Preparing For What Comes Next… The Citizen Will Be The Last To Know”

By Mac Slavo

A new video released by the hacktivist group Anonymous. They send a World War 3 warning via their official Youtube channel, warns of a coming global war that will catch most of the world’s citizens off-guard.

All the signs of a looming war on the Korean Peninsula are surfacing… we’re watching as each country moves strategic pieces into place… but unlike past world wars… although there will be ground troops the battle is likely to be fierce, brutal and quick.

It will also be globally devastating on the environmental and economic levels.

This is a real war with real global consequences… With three super powers drawn into the mix… Other nations will be coerced into choosing sides.

The citizen will be the last to know…

Continue Reading >>

Alert: Your Cell Phone is Spying on You! 4 Ways to Block Your Cell Phone and Prevent Being Monitored

By Jeremiah Johnson

“We are all just prisoners here…of our own device…” – “Hotel California,” by The Eagles

ReadyNutrition Guys and Gals, this piece is on the heels of an article released by RT News on 3/8/17, entitled “85% of World’s Smart Phones ‘Weaponized’ by CIA.”  The article is a very disturbing report; however, it isn’t something that just “surfaced” out of the zone of unpredictability.  The basis for the report stems from the recent WikiLeaks release of the CIA-documents and information that just occurred.  Here is an excerpt from that article:

 “Google’s Android operating system, used in 85 percent of the world’s smart phones, including Samsung and Sony, was found to have 24 ‘zero days’ – the code name used by the CIA to identify and exploit vulnerabilities for the purpose of secretly collecting data on individuals.  The techniques allow the CIA to access data from social messaging platforms, including WhatsApp, Weibo and Clockman before encryption, according to WikiLeaks.  Both audio and message data were vulnerable to the exploit through the CIA’s exploitation of gaps in the OS.”

Now mind you, Readers, this piece is not a “news article,” although this event was just reported on 3/8/17.  The purpose of this article is to serve as a “wake-up” call, in case you haven’t taken the measures already outlined in previous articles to protect yourself from your own devices tracking, recording, and (essentially) “spying” upon you.  You may research past articles on electronic security that you can do, and this piece is a “refresher” that will enable you to secure yourself…. from your own equipment.

4 Ways to Block Cell Phone and Prevent Being Monitored

As mentioned in times past, Mylar can be your best ally.  Mylar is simple to use, affordable, and it works at blocking the signals going to and from your happy cell-phone tracking and recording device.  Here are some inexpensive sources for the Mylar:

  1. Chip/Snack bags: An infinite variety of sizes are available, and you will have to gauge what size you use after taking the size of your phone/device into account.
  2. Mylar in the form of “ponchos” or “space blankets”: these are a little more expensive than the chips, but only slightly so. You will end up with more Mylar to use, and the pieces you cut will not need to be cleaned off of salt and other detritus as with the chip bags.
  3. Freezer bags: Also in a variety of sizes, such as ones that hold up to 30 lbs. of food/ice (for a laptop-sized device) or just a small 1’ x 1’ bag, such as a lunchbag-cooler size.
  4. Another thing to do is to place your device inside of an ammo can (military issue). In doing so, make sure the rubber gasket around the mouth seals efficiently for a tight seal.  There are other containers that can be used; however, you may have to reinforce the seams with something such as Aluminum HVAC duct tape (available for about $15 per roll from your local Home Depot), and cover them over.  With the ammo cans, the container is contiguous with only the lid needing that rubber gasket that works.

How to Test for Protection

There is a way to test it out with your phone to see if you have the protection.  Take your chip bag or bags.  If they’re small, be advised that you will need about three complete layers around the cell phone.  Also, place your phone in a plastic Ziploc bag before putting them into the chip bags.  This will keep them clean just in case you missed wiping all of the stuff out of them.  Wiping out the bags can best be accomplished with a dry paper towel: the oils, salts, and other filth will be caught up by the towel.  Just remember to cover/swipe the entire inside surface of the bag.

Then turn your phone on, and turn up the volume of its ring all the way.  Next, roll/wrap up your phone and fold it over in at least three complete layers of Mylar.  Then use your house phone/landline/etc. to dial your wrapped-up cell phone’s number, and hold the wrapped-up phone close to your ear.

If you did the job correctly, you will not hear a thing.  Also, make sure you only ring it 3 times.  Any more than that and it may go to a voice-mail/other function, that will send it stored to your cell phone after you unwrap it as a missed call.  This way it will not ring it, and the call will have been cancelled.

Remember what General David Petraeus mentioned about the “Internet of things?”  Well, those days are upon us.  So, what else?  You’ll have to figure out the best method for making your layers work and last a long time.  You can take the chip bags, cut them open with scissors, and make three premeasured layers.  Form a pouch, and cover them inside and out with duct tape.  Then you just slip in your phone, and secure the top (fold it over) with whatever type of clamp or clip works for you.

The continuous signal your cell phone sends out (every 4 seconds) will be interrupted.  Inconvenient?  No.  Coordinate with your family members when you will call and talk to them beforehand.  Emergency?  Pull the phone out of the pouch and use it.


Bottom line: It is a discipline that will have to be followed to enable your privacy…from your own device.


99% of all people carry that thing around with them everywhere.  They’re hooked to it more closely than a fetus to the umbilicus: they can’t function without it.  But the point I’m making is this: Do you own the phone, or does it own you?

You can accomplish the same thing with your laptops and other “smart” toys…your palm-pilots, blackberries, cameras, and all of the other damnable devices that have made you an unwitting prisoner to the powers and systems that set them in place…not for your “technological convenience,” but for the very purposes of control, dominion, and surveillance over you.

Ammo cans work.  The Mylar (when cleaned and fashioned properly) will work.  Now you just received confirmation that it is happening, and I’ve given you methods to use to stop it from happening to you.  The methods work.  I have tested and used them myself.  So, without further ado, figure out how much material you need and make one of these pouches for yourself.  Your privacy is guaranteed under the 4th Amendment from illegal searches and seizures by the government.  That right, however, needs to be exercised by action.  So, finish those Doritos, clean out that bag, and wrap that phone up!  We’d love to hear of any tips or improvements you have come to trust.  Keep fighting that good fight, and send us your comments!  JJ out!


Jeremiah Johnson is the Nom de plume of a retired Green Beret of the United States Army Special Forces (Airborne). Mr. Johnson was a Special Forces Medic, EMT and ACLS-certified, with comprehensive training in wilderness survival, rescue, and patient-extraction. Mr. Johnson is an ardent advocate for preparedness, self-sufficiency, and long-term disaster sustainability for families. He and his wife survived Hurricane Katrina and its aftermath. Cross-trained as a Special Forces Engineer, he is an expert in supply, logistics, transport, and long-term storage of perishable materials, having incorporated many of these techniques plus some unique innovations in his own homestead.


.

.


 

‘Russian Hackers’ Penetrate US Power Grid with ‘outdated Ukrainian malware’

By Jim W. Dean

[ Editor’s Note:  This Russian hacking story is turning into a Three Stoogies movie rerun. Experienced Intel people, even those who are not intimate code people know that setting up blinds, dead ends and pasties as diversions for hacks is a operational staple.

When VT was running down our own hack attack, tracing the packets back, the trail was running through major university and some defense contractor servers where endless fingers could be in the pie. But with more digging the trail ended at a US military base where “training” was done for doing this very thing.

Continue Reading >>

Evidence Scrubbed, Pizzagate Is a Worldwide Citizen Investigation Now

source: shtfplan.com

Editor’s Comment: The evidence is now overwhelming – whatever the full truth of the matter, something is very, very suspicious about the “pizza code” that has been discovered in the leaked Podesta emails that many believe is connected to a ring of pedophilia activity. Independent researchers have been scouring the web for supporting information, and have pieced together a disturbing pile of circumstantial evidence connecting many of DC’s most powerful to lewd comments, references to illegal sex acts and child trafficking, dark art and more. It is very likely that this could go to the very top, where powerful people are protected by people with ranking positions inside the power structure.

Continue Reading >>

Beware These 20 Fake News Sites

By Chris Campbell

As you may’ve heard, there’s a digital witchhunt being waged against “fake” news on the Interwebs. Since everyone else is doing it, we thought we’d release our hounds and let you know who the most heinous offenders are.

We’ll show you the full list of the top – 20 fake news sites in just one moment. This list might not be what you expect. (Or, heck, it might be exactly what you’re expecting.)

And, no, it isn’t the list published recently by Melissa Zimdars, an assistant professor of communication at Merrimack College in Massachusetts. Zimdars released the list below to her class on a Google Doc entitled, “False, misleading, clickbait-y and satirical ‘news’ sources.”

Continue Reading >>

WW3 Has Begun, And It Is Digital: Cyberattacks Took Down Major Sites

By Mac Slavo

Get ready – it seems that this will be an October Surprise to remember.

The Internet is under attack through the United States and UK… and there is every reason to think that more is coming.

Reports confirmed that a distributed denial of service attack (DDoS) was carried out against the company Dyn, and disrupted much of the East Coast, and later the West Coast and other parts of the U.S. as well, taking down hundreds of major websites – including Paypal, Twitter, Spotify, Netflix, Amazon, Tumblr and Reddit and more.

It took hours for many of them to come back online.

According to USA Today:

At least two successive waves of online attacks blocked multiple major websites Friday, at times making it impossible for many users on the East Coast to access Twitter, Spotify, Netflix, Amazon, Tumblr and Reddit.

[…]

The cause was a large-scale distributed denial of service attack (DDoS) against Internet performance company Dyn that blocked user access to many popular sites standstill.

Dyn … confirmed the attack, noting that “this attack is mainly impacting US East and is impacting Managed DNS customers in this region. Our Engineers are continuing to work on mitigating this issue.”

Here’s a log of updates for the attacks on Dyn Managed DNS infrastructure:

Speculation is that this could be a test run for larger attacks – and public demonstration of just how vulnerable Internet connected systems are. Things are coming to a head very quickly, and there is no telling what will happen as the U.S. election approaches. As the San Jose Mercury News reported:

“Say, not to panic anybody, but what if the (attacks) today were practice for 11/8 ?” high-profile pundit Keith Olbermann tweeted.

A hacking collective calling itself “New World Hackers” are taking credit – and they are based out of Russia and China, so there is little doubt that it will fuel the narrative for more war, tighter security and an age of online instability as the new world (where the dollar is no longer king) is sorted out. According to the Associated Press:

Members of a shadowy hacker collective that calls itself New World Hackers claimed responsibility for the attack via Twitter. They said they organized networks of connected “zombie” computers that threw a staggering 1.2 terabits per second of data at the Dyn-managed servers.

“We didn’t do this to attract federal agents, only test power,” two collective members who identified themselves as “Prophet” and “Zain” told an AP reporter via Twitter direct message exchange. They said more than 10 member participated in the attack. It was not immediately possible to verify the claim.

[…]

The collective has also claimed responsibility for cyber attacks against Islamic State. The two said about 30 people have access to the @NewWorkdHacking Twitter account. They said 20 are in Russia and 10 in China. “Prophet” said he is in India. “Zain” said he is in China. The two claimed to be taking “good actions.”

Perhaps, this major blackout of Internet services may even be a self-inflicted wound to make the establishment look like the victim, rather than the aggressor that Hillary’s legacy represents. Wikileaks has to be hurting her campaign, and it is difficult to say exactly how far things are going to reestablish credibility and take control of the situation.

Right now, Julian Assange is reportedly surrounded by police forces outside the Ecaudorian embassy in London – and his personal future, and that of Wikileaks remains up in the air. Only days ago, his Internet access was cut, with Ecuador under diplomatic pressure by the U.S.

Further Internet attacks are now pending, and it seems everything is potentially exposed. There is no way to be certain how massive future attacks could be – but the largest potential event would likely be an EMP, sending out an electromagnetic pulse powerful enough to take down the electric grid and fry virtually all unprotected electronics.

Individuals can and should prepare on two fronts – stored food and supplies necessary to sustain your family/group for a minimal of several weeks without power and essential services. People can also protect electronic equipment – primary or backup – in a Faraday cage (which will guard against EMP).

Additionally, emergency cash and alternative currency (such as gold and silver) reserves should kept on hands; identity protection measures should be put in place and all accounts, documents, paperwork and other sensitive items should be written down, photocopies and/or stored offline (on a USB, for example). A more detailed check list can be found here. Extra caution should be used with electronic banking and online payment systems.

The shadow government and its military forces have been preparing for extremes in all areas. Things are happening now that we have warned about for years – the cyber dimension of war means that everyone is on the battlefield:

The attack is “consistent with record-setting sized cyberattacks seen in the last few weeks,” [said Carl Herberger, vice president of security at security company Radware]

[…]

Others worried the attack could be from a nation-state rather than simply an individual seeking to wreak havoc.

“This not just an instant job, this is something that was probably worked on for weeks if not for months by really competent people,” he said. (source)

The power to shut down commerce, communication and news feeds could either start – or stop – the kind of 21st Century war that is only now taking shape.

In what is perhaps a bit of planned irony, or a tip off to the perpetrators of this attack, video surfaced of Hillary Clinton in 2010 (as Secretary of State) blathering on about the importance of cyber security and intelligence protection.

Empty words indeed.

In hindsight, no one could have done more to expose the United States’ secrets than the Madam Secretary herself – emails and more make this clear.

Will any of this stop her, or will she take power in spite of it all?


 

OTHER USEFUL RESOURCES:

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com


 

VIDEO: The New World Order Attempts To Hijack Anonymous

by Dylan Charles

“Sovereignty is responsible for every war, bloodshed and terror that has ever inflicted humankind…Human beings must unite under one world government and constitution. Giving their voice and power to one government and one authority.” – the Organization now calling itself ‘Anonymous’

By virtue of the appeal of anonymity, the resistance group known as ‘Anonymous’ has become a worldwide phenomenon. Since anybody with basic knowledge of hacking or content creation, and with any motive, can rightfully claim to be part of this structureless organization, Anonymous is now more of a creative commons brand than anything.

“…“Anonymous,” which is a loosely associated international network of “hacktivists.” Anonymous has no real command structure and is largely a collective of ideas. Nonetheless, it has been associated with several DDoS (distributed denial-of-service) attacks on high profile government, corporate, and religious targets. Their unofficial mascot is the image of Guy Fawkes.” [Source]

The FBI spent years dismantling the core group of hacktivists responsible for the formation of the original group, incarcerating much of the primary brain trust which made Anonymous (Anon) a serious threat to government and corporate actors. However, Anonymous’ branded use of the Guy Fawkes mask, as popularized by the movie ‘V’ for Vendetta, helped them to achieve international household recognition. The brand is now synonymous with civil disobedience and electronic resistance, and in this loosely bound way, the organization lives on.

“The movement is still there, and they’re still yacking on Twitter and posting things, but you don’t hear about these guys coming forward with those large breaches… It’s just not happening, and that’s because of the dismantlement of the largest players.” – Austin P. Berglas, assistant special agent in charge of the FBI’s cyber division in New York

The beauty of Anon has always been its adaptive application of leaderless resistance to a technology driven world, however, there appears to be an attempted coup taking place, and Anonymous as a headless social justice movement is being hi-jacked by a group of unknowns claiming this brand as theirs to promote a privately funded political party with a highly suspicious platform advocating for a one world government.

 

“Today we officially announce the unification of all people who have used the anonymous mask and its representation to protest and stand up for change. The way that the anonymous icon and name has been used by a few through fear and intimidation ends today.” – THumP®

World, Meet ‘THumP®’

Now armed with the trademarked names, the Voice of Anonymous™, and, THumP®the co-opting of the Anonymous brand was recently introduced to the world in a 40 minute, professionally staged video announcing the public launch of The Humanity Party (THumP®).

“In March of 2015, various Anons discreetly met via the Internet and Skype to vote on a Board of Directors to lead the movement. The Board appointed one of its Anons as its Voice of Anonymous™.” – THumP®

It appears the days of the synthesized robotic voice that has become synonymous with Anon are over, and from now on…

“… it’s only gonna be this one voice of this one character who decides to put on a costume that looks almost like he’s in the KKK. And he has some sort of Masonic symbols on it, he’s got these creepy clown gloves and some sort of Abba wig on, and so suddenly he’s gonna be the voice of Anonymous.” [Source]

The video presentation features a messianic Guy-Fawkes-mask-wearing, leader-type figure, dressed in white leather emblazoned with a Freemason logo modified to present the letters ‘A’ an ‘V.” The use of secret society symbolism, such as the Freemason logo is ubiquitous in modern media, representing, in actuality, the very organizations and forces that Anonymous had always been resisting.

During the introduction to the video, the viewer is nonchalantly instructed to only pay attention to this voice, to accept it as the authorized, official Voice of Anonymous™, and to ignore any others.

“From today on, it will be easy to determine whether a message that is posted on the internet, or through any other venue of social media, is authorized by the official voice of Anonymous… In the future, listen for and pay particular attention to the distinct nature, authority and power of the voice of Anonymous. Do not listen to any other computer generated voice, that makes threats and disrupts peace, and does not act rationally.”

The THumP® Plan – Make Everything Great Again

Who runs THumP®?

According to the website, it will be managed by, “The collective will of people who give their voice and support to what THumP® is trying to accomplish.” 

And, what exactly is THumP® trying to accomplish?

In a press release dated June, 20th, hosted by 24-7pressrelease.com, reporting from Salt Lake City, Utah, the following was posted for public consideration:

“Establish and promote the possibility of a ONE World Government and a new Constitution that guarantees and provides worldwide basic human rights to ALL people of Earth. These inalienable human rights include the Five Basic Necessities of Life (“FBNL”): free healthy food and water, secure and safe housing, basic clothing, health and mental care, and education.

Introduce a plan to unify capitalistic and socialistic agendas and ideologies to provide the FBNL free of charge.

Promote peace and unity through education and common sense disclosures, thereby providing unprecedented evidence that the world’s major religions have been, are, and will continue to be the cause of the world’s social ills.

Unparalleled and unique, The Humanity Party does not accept donations of any kind. The movement relies on individual Anons throughout the world to use individual peaceful and legal means through social and Internet media to spread its message.” [Source]

As stated here and in the PR video, their primary goals are to abolish borders and national sovereignty, ban religion, to establish a global government that will protect the environment, protect animal rights and human individuality, while providing for everyone, the FBNL. To accomplish this, the US Constitution will be modified.

“There is only one nation that is fully structured and endowed with the infrastructure, government, world influence, technology, means, and military might needed to step forward and save this world: the United States of America.” – THumP®

Other key tenets of their platform, include: the need for individuality and diversity, the end of nationalism and national sovereignty, the abandonment of tradition, ideology, patriotism and prejudices, and the demonization of math, science and intellectualism. All of which are presented as opponents of human intelligence.

If we are all united behind this platform, why will state violence and ‘military might’ be necessary to enforce it?

 

As justification of the policies proposed, the video spends considerable time positioning the world’s incredible problems as the result of adults, while extolling the virtues of the minds of ‘little children,’ who, according to THumP®, have had their intelligence replaced with knowledge by grown ups:

“We were forced to accept the adult way. Their way. Regardless of how we felt about it. To impress the adults and be accepted by them, we learned their ways. Accepted their Gods. and Applied their values to ourself. We learned their science…” – THumP®

The message is directed at the younger demographic of today’s activists, capitalizing on their justifiable anger at the establishment, and dumbing down complex issues to meet an overtly neo-liberal agenda. The video also comes off as anti-family, eerily reminiscent of the disturbing picture painted by George Orwell in1984 of an all-powerful government who destroys the family by turning children into agent’s and tools of state ideology.

Repackaging the New World Order

These aims are suspiciously similar to the long-standing goals of world elite and powerful families who control the breadth of international banking and global industry. This is the ‘1%’ that Anonymous has combated in the past, and it includes the people, groups and institutions oft-referred to as the Illuminati, or the New World Order (NWO).

For a more complete understanding of the NWO’s platform, see Dr. John Coleman’s 1983 breakdown, 21 Goals of the Illuminati and The Committee of 300. Dr. Coleman’s comprehensive, research-based list includes the following tenets:

  • To establish a One World Government.
  • To bring about the utter destruction of all national identity and national pride.
  • To suppress all scientific development except for those deemed beneficial by the Illuminati.
  • To bring about the end to all industrialization.
  • To introduce new cults and continue to boost those already functioning.
  • To cause a total collapse of the world’s economies and engender total political chaos.
  • To organize a world-wide terrorist apparatus.

THumP® is propositioning young people to adopt the endgame of the elite, while posing as the resistance. This kind of psychological operation has been seen before, most notably in the production of the Koni 2012 pre campaign which aimed to engineer public support for military interventionism in Africa.

The Humanity Party also fails to acknowledge taxation as theft, calling instead for a fair tax, then blames global inequality not on a corrupt oligarchy, but on the masses of people who support governments around the world by voting. Making a statement of defense for the 1%, THumP®says:

The humanity party does not support attack or reforms that punish the wealthy for doing what all people on earth wish they could do, have financial security for themselves or their dependents… Because of the desire of the 99% to also become wealthy the people of earth are justifying supporting current governments that are set up and established to cater more to the needs of the 1% than to the needs of the majority. This is the fault of the people who elect and support their governments.” –THumP®

As declared, the party does not accept donations, yet they are funded well-enough to produce studio quality staged video, professional press-releases, websites and videos. This would indicate that is privately funded, meaning that funds are coming from people who can afford to invest in propaganda, the 1%. A phone number on their site is from an area code in Pennsylvania.

Alive After The Fall Advice : Do you want to learn how you can cope with a food shortage, a mass pandemic a natural disaster or any other type of emergency situations? Stay safe. Stay prepared.  Watch this FREE video!

 

Resistance is Futile, Said Anonymous, Never

The THumP® campaign may be interpreted as, “Resistance is futile. So if you can’t beat ’em, join ’em.” The future of Anonymous as a resistance organization is in question.

“Anonymous doesn’t even exist anymore. All the actual hackers behind it have been arrested. It has since been pseudonym government agencies use to disclose their enemies’ personal information without it looking like obvious government involvement. All recent anonymous attacks have not been on oppressive governments but rather the opposite, their enemies.” [Source]

What are your thoughts on this operation and its meaning to true global civil resistance to state tyranny? Is this legitimate? Is it another propaganda campaign of the global elite, or another Soros operation? Is this somehow linked to Trump, Clinton and Sanders?

“Anyone who is so naive as to believe the most powerful government on earth will not crush any who pose a real threat to that power, should not be active, but rather, at home studying political history.” –Louis Beam

Take a look at the promotional presentation for The Humanity Party and the attempted hi-jacking of Anonymous by The New World Order:

OTHER USEFUL RESOURCES:

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without

 


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com 


 

 

 

Facebook Accused Of Listening To Everything You Say — Here’s How To Stop It

By Jay Syrmopoulos

Recently, an expert has come out to claim that Facebook may be listening in on your conversations. Kelli Burns, a mass communication professor at the University of South Florida, believes the app might be using people’s microphones to gather data on the content of people’s conversations.

Facebook admits that the app is capable of listening to what’s happening around it — but claims the feature simply identifies what people are listening to or watching as means of conveniently posting about it.

Currently, the feature is only available in the U.S. and has been available for a couple of years according to Facebook, although recent warnings from Burns have drawn renewed interest.

According to a report in The Independent:

Professor Burns has said that the tool appears to be using the audio it gathers not simply to help out users, but might be doing so to listen in to discussions and serve them with relevant advertising. She says that to test the feature, she discussed certain topics around the phone and then found that the site appeared to show relevant ads.Though Professor Burns said she was not convinced that Facebook is listening in on conversations – it may have been that she was searching for the same things that she chose to discuss around the phone – but she said that it wouldn’t be a surprising move from the site.

The claim chimes with anecdotal reports online that the site appears to show ads for things that people have mentioned in passing.

Facebook accused of listening to everything you say and collects audio information from users – but that the two aren’t combined, and that no audio data is stored or correlated with advertising.

“Facebook does not use microphone audio to inform advertising or News Feed stories in any way. Businesses are able to serve relevant ads based on people’s interests and other demographic information, but not through audio collection,” said Facebook in a recent blog post. “We only access your microphone if you have given our app permission and if you are actively using a specific feature that requires audio. This might include recording a video or using an optional feature we introduced two years ago to include music or other audio in your status updates.”

Although Facebook claims they do not listen in on conversations, the catch here is that Facebook does have access to your phone’s microphone — as giving permission to access your microphone is a requirement to be able to download the site’s mobile app – thus giving the company the ability to access your phone’s mic at any time.

According to a report in Forbes:

This is not the first time Facebook was accused of listening to conversations using smartphone microphones. Reddit user NewHoustonian started a discussion last year about whether the Facebook app was listening to conversations for advertising purposes. NewHoustonian started off the discussion with a post — which has since been removed — about how he suspects the Facebook app was listening to him because he started seeing pest control ads after talking to his girlfriend about killing a cockroach. That Reddit thread now has over 1,700 comments in regards to Facebook listening to conversations and several of those comments refer to similar experiences.

Additionally, police in Belgium have warned citizens to not use Facebook’s recently added Reactions feature if they are concerned about safeguarding their personal privacy.

Whether or not Facebook is actually listening is debatable, but the ability to listen certainly exists given the fact that each person with the mobile app has already given the company permission to access their phone’s microphone. Thankfully, there is an easy solution for those that don’t trust the social media giant with access to their microphone.

One simple way is to uninstall the app altogether and simply access Facebook from the mobile site itself, thus never having to give any permissions to access your data or microphone.

Another fix is to turn off the microphone in a phone’s settings, which is relatively easy to do. Since this is done at the operating system level, doing so will mean that Facebook loses the ability to access your microphone completely.

On an iPhone this can be done by entering the app’s settings, going to privacy and then switching the slider for the microphone to the off position; on an Android phone, go to settings and then privacy, App permissions, Microphone, and from there you can change the permissions that the Facebook app is given.

 

While Facebook claims that they may not be actively listening to your conversations, the idea that you have given permission for the company to access your microphone and text message data simply by downloading and installing the app is certainly disconcerting for those completely unaware that they have given such privacy-shattering permissions to Facebook.

 

OTHER USEFUL RESOURCES:

 

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without

 


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com 


 

 

Don’t Discuss Personal Information In Front Of Samsung Smart TVs

Samsung has confirmed that its “smart TV” sets are listening to customers’ every word. The company warn customers not to discuss about personal information in front of TVs.

“Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party.”

Continue Reading >>

Obama Says It’s “Insane” For Millions of Americans On Watchlists To Own Guns

Back in 2011 we facetiously noted that innocent Americans were being added to terror watchlists and No-Fly lists at an alarming pace. So much so, we opined, that by 2020 every person in the United States would be deemed a terrorist and that the entire world would be on a government watchlist by 2025.

Continue Reading >>

Watch: The Drone Defender: “The First Portable, Accurate, Rapid-To-Use Counter-Weapon To Stop Hostile Drones In Flight”

By Mac Slavo

Earlier this year a remote controlled drone quadracopter was flown onto the White House lawn in a security breach that left the Secret Service embarrassed and looking like amateurs. The national security apparatus immediately went into overdrive looking for ways to mitigate future threats posed by the new robotic technologies and it’s not hard to see why.

Continue Reading >>

Report: Could North Korea Launch An EMP Attack Against the United States In October?

 

Most are aware of the tense situation that exists between North Korea, South Korea, and the United States.  You all probably know that Kim Jung-Un, the son of and successive dictator of deceased Kim Jung-Il is just as much of a power driven megalomaniac as his departed father. 

Continue Reading >>

Here’s How You’ll Die When the SHTF and How to Prevent Your Untimely Demise

When it hits the fan…I mean REALLY hits the fan in a permanent kind of way, the most likely outcome is death.

That’s not pretty, and I’m well aware of it. I always try to be positive and optimistic, because for me, preparedness is the ultimate act of optimism, but sometimes we have to look at the numbers and face some things that are pretty terrifying. The first reality check is that some research says that only 3 million Americans are preppers. 

Continue Reading >>

7 Key Events That Are Going To Happen By The End Of September

7 Key Events That Are Going To Happen By The End Of September

This article was originally published by Michael Snyder
at End of the American Dream on June 11th, 2015

Is something really big about to happen?  For months, people have been pointing to the second half of this year for various reasons.  For some, the major concern is Jade Helm and the unprecedented movement of military vehicles and equipment that we have been witnessing all over the nation. 

Continue Reading >>

14 Things You Must Do TODAY to Survive the Coming Economic Collapse

Yesterday, The Common Sense Show issued a breaking news alert as to the possible use of multiple IED type of devices based upon the reports of a highly credible source(s). The Common Sense Show is pleased to announce that arrests have been made in conjunction with this event and eventually I will be able to provide more details.

Continue Reading >>

Windows 10 is spying on almost everything you do

Here’s how to opt out …

Windows 10 is amazing. Windows 10 is fantastic. Windows 10 is glorious. Windows 10 is faster, smoother and more user-friendly than any Windows operating system that has come before it. Windows 10 is everything Windows 8 should have been, addressing nearly all of the major problems users had with Microsoft’s previous-generation platform in one fell swoop.

Continue Reading >>

Witness the rise of One World Trade Center

Watch and share this commemorative time-lapse movie, highlighting progress at the World Trade Center site from October 2004 to September 2013. Witness the rise of One World Trade Center, including the installation of the spire, bringing it to a staggering height of 1,776 feet. Hundreds of thousands of high definition images were captured over the past 9 years and hand-edited for this special time-lapse movie.

Continue Reading >>

Over 2200 Architects & Engineers Crush The ‘Official’ 9/11 Commission Report

9/11 Truth – A set of words that have become one of the most popular subjects of the past decade both on and off the internet. A subject that has become so popular and that has educated so many people that polls suggest more than 50% of the world doesn’t believe the official story put out by the American Government in the “9/11 Commission Report.”

Continue Reading >>

9/11 evidence to go public in Danish and UK courts

Expert witnesses to the ‘terror’ events at the World Trade Center in 2001 prepare to appear for the first time at the Danish High Court 

Expert witnesses on the events of 9/11 in 2001 which triggered the global “War on Terror” are set to give evidence in public for the first time in a Danish court with testimony which casts doubt on the official narrative of what is probably the most significant global event in post-WWII history. 

Continue Reading >>

An Act of War: CIA Leak Gives “Incontrovertible Evidence” That 9/11 Was State Sponsored

 


If you have ever questioned the official narrative for the September 11th attacks then you have, without a doubt, been dubbed a conspiracy nut by the establishment media and those who hang on their every word.

Like the Warren Commission report on the JFK assassination, the 9/11 Report assembled by a Congressional investigation is unraveling and being revealed for what it really is – nothing more than a cover story.

This is no longer a conspiracy theory… it’s conspiracy fact.

Continue Reading >>

9/11: A Conspiracy Theory: Everything You Ever Wanted To Know In Under 5 Minutes

Numerous questions about the events of September 11, 2001 remain unanswered. Much of what happened that day has been kept secret by government investigators or was simply never even considered for the official 9/11 Commission Report, despite the fact that hundreds of people have been involved in independent investigations

Continue Reading >>

US State Department Says ‘ Conspiracy Theories Exist in the Realm of Myth’

The US State Department’s America.gov web site, which purports to engage international audiences on issues of foreign policy, society and values, has dedicated a special section to conspiracy theories and misinformation, claiming:

“Conspiracy theories exist in the realm of myth, where imaginations run wild, fears trump facts, and evidence is ignored. As a superpower, the United States is often cast as a villain in these dramas.”

Continue Reading >>

The Creator of This Amazing Internet Privacy Device Has Been Silenced: “Effective Immediately We Are Halting Further Development”

Data collection and invasive monitoring of American citizens has been at the forefront of government activities for decades. After revelations by Edward Snowden in recent years, the fringe conspiracy theorists who warned of Big Brother surveillance and had been laughed at by the general population were finally proven right.

But despite the literal hundreds of thousands of pages of information about government snooping and the Congressional

Continue Reading >>

Texas Firefighter Take Down Would-Be Robber

 

 

Note to self: if you plan to rob a store (which you shouldn’t!), first make sure the huge firefighting former active duty Marine has left the store.

Firefighters are used to putting out blazes, but a member of a Texas department snuffed a robbery attempt last month.
Surveillance video from Midlothian, Texas on June 26, shows a robber push the former active duty Marine, Daniel Gaskey aside as he pulls out a knife and demands money from the clerk.

Continue Reading >>

Cop Caught on Tape Extorting Driver for Fundraiser: “Buy These Tickets or I Take Your Car”

 

 

It seems the no-pressure sales method wasn’t working.

Instead, a Philadelphia cop was caught on camera using the threat of force to insist that two guys he pulled over during a traffic stop buy tickets for a fundraiser to support the families of fallen first responders.

Continue Reading >>

Republicans vote to end NSA bulk phone metadata surveillance program

The Republican National Committee has passed a resolution pushing conservative lawmakers to put an end to the National Security Agency’s blanket surveillance of American citizens’ phone records.

Continue Reading >>

Snowden obtained nearly 2 million classified files in NSA leak – Pentagon report

Edward Snowden downloaded 1.7 million intelligence files from US agencies, the most secrets ever to be stolen from the US government in a single instance in the nation’s history, according to lawmakers who have viewed a classified Pentagon report.

Continue Reading >>

Eyes everywhere: NSA’s second tier spying partners identified

Denmark, Belgium, the Netherlands and several other EU countries were named among “third party partners” in the NSA-led global signal intelligence program, a new leak submitted by journalist Glenn Greenwald to Danish TV reveals.

Continue Reading >>

GCHQ spoofed LinkedIn site to target global mobile traffic exchange and OPEC – report

gchq-spying-linkedin-belgium_siThe UK’s electronic spying agency has been using a spoof version of LinkedIn professional social network’s website to target global roaming data exchange companies as well as senior management in the OPEC oil cartel, according to a Der Spiegel report.

Continue Reading >>