Survivalist News Network

Trump Will Send “Presidential Alert” To Every Cell Phone In America On Thursday

By Tyler Durden

The Federal Emergency Management Agency  (FEMA), in coordination with the Federal Communications Commission (FCC), will conduct a nationwide test of the Emergency Alert System (EAS) and Wireless Emergency Alerts (WEA) on September 20th.

The emergency communications drill will begin at 2:18 p.m. EDT through 2:20 p.m. EDT. Every cell phone in the US will receive a text message from President Trump.

All US wireless firms and more than 100 mobile carriers are participating in the exercise that allows for presidential alerts, FEMA wrote in a Thursday press release.

“The EAS [Emergency Alert System] is a national public warning system that provides the president with the communications capability to address the nation during a national emergency,” FEMA said in a statement.

Cell phones will receive a text message that states “Presidential Alert” and “THIS IS A TEST of the National Wireless Emergency Alert System. No action is needed.”

 

Separate from the FEMA statement, a FEMA National Test Fact Sheet detailed how the EAS is used with radio and television broadcasters, cable systems, satellite radio and television providers, and wireline video providers. The upcoming FEMA EAS message will read:

“THIS IS A TEST of the National Emergency Alert System. This system was developed by broadcast and cable operators in voluntary cooperation with the Federal Emergency Management Agency, the Federal Communications Commission, and local authorities to keep you informed in the event of an emergency. If this had been an actual emergency, an official message would have followed the tone alert you heard at the start of this message. A similar Wireless Emergency Alert test message has been sent to all cell phones nationwide. Some cell phones will receive the message; others will not. No action is required.”

The WEA system is currently in use to warn the public about dangerous weather, missing children, and other vital information. The FEMA WEA message will read:

“THIS IS A TEST of the National Wireless Emergency Alert System. No action is needed.”

The goal of the test will evaluate the readiness to distribute an emergency message nationwide and determine whether improvements are needed, FEMA said in a statement. The upcoming alerts will be sent using FEMA’s Integrated Public Alert and Warning System (IPAWS), which allows government officials to send emergency messages to multiple communications networks, including the EAS and WEA as part of the nation’s modern alert and warning infrastructure.

FCC Chairman Ajit Pai explains how the Wireless Emergency Alert system works

Despite Trump’s obsession with Twitter as a direct means of communicating, experts told NBC News last week that President Trump will not abuse the “Presidential Alert” system.

“If you separate this from the politics and personality of any individual president then this is a great idea and an amazing use of technology to reach everybody if they’re in harms way,” said Karen North, director of the Annenberg Digital Social Media program at the University of Southern California.

 

RELATED:

 

UCLA communications professor Tim Groeling agreed, told NBC via email, “broadcast-based emergency alert systems … have remained professional and impartial over decades.”

How did Twitter respond to Trump’s new communication channels?

So when the tens of millions of Americans get the “Presidential Alert” on September 20, do not freak out — it is just President Trump debuting the new emergency communication systems that broadcast personalized emergency messages on a much larger plane than Twitter.

As for the many folks who have blocked him on social media, well, it is almost certain that there will be an uproar when liberals look at their phones and see a text message from Trump later this week.

 


OTHER USEFUL RESOURCES:

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com 


 

Do You Need Proof Of Weather Geoengineering?

By Catherine J. Frompovich

What’s with the weather where you are?  Everyone talks about the weather, but no one can control the weather!  Not so fast….there are numerous weather control or weather engineering patents.  Here is a wallpaper scroll listing most of them.

Recently, I heard a talking head on the local news radio station proclaim that humans have only 30 years left to be able to live on Planet Earth, as conditions for life are getting to be unsustainable.  The person making that remark was from a university.  Can we believe it or was that, like most science today, “consensus science”?

In the Saturday, August 11th, issue of Dane Wigington’s weekly report, he wrote this introduction: Our world is changing to a degree and at a rate that few yet understand. Wheels have been set in motion that can no longer be stopped. How will the masses react to what is unfolding? How long do we have until major links in the chain of our current reality begin to break?

As a concerned individual in many fields (research, journalism, health, the environment and human rights), I’d like to add my “two cents worth” to Dane’s in the hope it can bring some sensibility to those who still question weather geoengineering.

Recently, I had the opportunity to interact with a young man in his early twenties and we talked about those ‘contrails’ in the sky.  I took the opportunity to explain to him the difference between real contrails and weather engineering spraying some call “chemtrails.”

When I pointed out real contrails evaporate shortly behind jet engines, whereas those weather geoengineering lines can be seen as being sprayed and then periodically turned off for a period of time and restarted, as depicted in the two videos below.

 

When I explained to that young man if those ‘trails’ truly were vapor condensation, when the trails stopped the plane ought to fall out of the sky, since that means the jet engines were NOT working.  Duh!

Another thing I’d like to point out is the “soap suds” effect on streets and roadways during rains, something I never saw in my entire lifetime, except recently.  Is that a visible indication of the surfactants [1] being sprayed in weather geoengineering chemicals exercises?

I can remember the first time I saw the “soap suds.”  I thought the cars came from a car wash, but then remembered it was raining, so no car washes were open!  When one thinks rationally about what one sees, one has to doubt the propaganda and spin being disseminated by the mainstream, lamestream media about weather geoengineering!

(Source)

Other very real and visible aspects to illustrate the horrors of weather geoengineering are “tree stress” and “tree decline.”  Here’s what’s happening in California where weather geoengineering has caused a six-year-long weather anomaly, i.e., drought, and now firestorms.  Trees are Planet Earth’s lungs!

Tropical rainforests are often called the “lungs of the planet” because they generally draw in carbon dioxide and breathe out oxygen. But the amount of carbon dioxide they absorb, or produce, varies hugely with year-to-year variations in the climate.

 

Another weather anomaly attributed to weather geoengineering is ice-snow balls appearing on lakes.  I never remember any news agency in past years reporting such an unusual weather phenomenon.

However, it’s a global event as reported by NPR in their story “Giant Snowballs Wash Up On Siberian Beach.”

If you have lived at least 40 to 50 years, you ought to realize the things I’ve pointed out in this article were non-existent when you were younger, or you probably would remember hearing about them as weather news issues, since they really are unusual.  Don’t you think?  Now, look up to the sky and see something else you never saw before the last 20 years or so: weather management, weather geoengineering, Solar Radiation Management, etc.

 


This Friday The Grid Gets Hacked. You Could See The BIG Cyber Attack in the US History. “90% Of Americans Could Die As A Result Of A Power Outage”

By Mac Slavo

The Ransomware that began spreading across the globe on Friday is still going with more computers reportedly being affected today by new variants of the virus.

What we’ve learned is that the attack hasn’t just taken down personal computers, but core government and business networks affecting everything from health care systems and transportation in Europe, to ATM withdrawals in China.

It’s massive, to be sure. But in the grand scheme of things, up to this point, it has been a fairly minor inconvenience.

Continue Reading >>

Massive Global Cyber Attack Using NSA Hacking Tools Takes Down 45,000 Computers Across 74 Countries: “A Scale Never Seen Before”

By Mac Slavo

They’re calling it one of the biggest global cyber attack in history. Unprecedented in scale, Kaspersky Labs reports that some 45,000 devices have been compromised across 74 countries.

According to reports, America’s own National Security Agency (NSA) developed the very tools that have been used to break into computers around the world. The exploit, named “EternalBlue,” was released by a hacking group earlier this year and put up for sale.

It appears that someone took them up on the offer and is now using it to deliver Ransom Ware to target computers:

A hacking tool known as “eternal blue”, developed by US spies has been weaponised by the hackers to super-charge an existing form of ransomware known as WannaCry, three senior cyber security analysts said. Their reading of events was confirmed by western security officials who are still scrambling to contain the spread of the attack. The NSA’s eternal blue exploit allows the malware to spread through file-sharing protocols set up across organisations, many of which span the globe.

Continue Reading >>

Total Chaos: Cyber Attack Fears As MULTIPLE CITIES HIT With Simultaneous Power Grid Failures: Shockwave Of Delays In San Francisco, Los Angeles, New York

By Mac Slavo

The U.S. power grid appears to have been hit with multiple power outages affecting San Francisco, New York and Los Angeles.

Officials report that business, traffic and day-to-day life has come to a standstill in San Francisco, reportedly the worst hit of the three major cities currently experiencing outages.

Power companies in all three regions have yet to elaborate on the cause, though a fire at a substation was the original reason given by San Francisco officials.
A series of subsequent power outages in Los Angeles, San Francisco, and New York City left commuters stranded and traffic backed up on Friday morning. Although the outages occurred around the same time, there is as of yet no evidence that they were connected by anything more than coincidence.

The first outage occurred at around 7:20 a.m. in New York, when the power went down at the 7th Avenue and 53rd Street subway station, which sent a shockwave of significant delays out from the hub and into the rest of the subway system. By 11:30 a.m. the city’s MTA confirmed that generators were running again in the station, although the New York subways were set to run delayed into the afternoon.

Later in the morning, power outages were reported in Los Angeles International Airport, as well as in several other areas around the city.

Via : Inverse

The San Francisco Fire Department was responding to more than 100 calls for service in the Financial District and beyond, including 20 elevators with people stuck inside, but reported no immediate injuries. Everywhere, sirens blared as engines maneuvered along streets jammed with traffic.

Traffic lights were out at scores of intersections, and cars were backing up on downtown streets as drivers grew frustrated and honked at each other.

Via: SF Gate

The cause of the outage has not yet been made clear, though given the current geo-political climate it is not out of the question to suggest a cyber attack could be to blame. It has also been suggested that the current outages could be the result of a secretive nuclear/EMP drill by the federal government.

As we have previously reported, the entire power grid failures has been mapped by adversaries of the United States and it is believed that sleep trojans or malware may exist within the computer systems that maintain the grid.

In a 2016 report it was noted that our entire way of life has been left vulnerable to saboteurs who could cause cascading blackouts across the United States for days or weeks at a time:

It isn’t just EMPs and natural disaster that poses a threat to the grid, but there is also the potential for attacks on individual power substations in the vast network of decentralized and largely unguarded power grid chain. A U.S. government study established that there would be “major, extended blackouts if more than three key substations were destroyed.”

Whether by criminals, looters, terrorists, gangs or pranksters, it would take very little to bring down the present system, and there is currently very little the system can do to protect against this wide open threat.

Whether the current outages are the result of a targeted infrastructure cyber attack or simply a coincidence, most Americans think the impossible can’t happen, as The Prepper’s Blueprint author Tess Pennington highlights, a grid-down scenario won’t just be a minor inconvenience if it goes on for more than a day or two:

Consider, for a moment, how drastically your life would change without the continuous flow of energy the grid delivers. While manageable during a short-term disaster, losing access to the following critical elements of our just-in-time society would wreak havoc on the system.

  • Challenges or shut downs of business commerce
  • Breakdown of our basic infrastructure: communications, mass transportation, supply chains
  • Inability to access money via atm machines
  • Payroll service interruptions
  • Interruptions in public facilities – schools, workplaces may close, and public gatherings.
  • Inability to have access to clean drinking water

Full report: When the Grid Goes Down, You Better Be Ready!

It is for this reason that we have long encouraged Americans to prepare for this potentially devastating scenario by considering emergency food reserves, clean water reserves and even home defense strategies in the event of a widespread outage.

The majority of Americans have about 3 days worth of food in their pantry.

Imagine for a moment what Day 4 might look like in any major city that goes dark.

This exclusive clip from American Blackout shows what an extended outage might look like:

Prepare for the worst, because this is one scenario you do not want to face.

.

.


Alert: Your Cell Phone is Spying on You! 4 Ways to Block Your Cell Phone and Prevent Being Monitored

By Jeremiah Johnson

“We are all just prisoners here…of our own device…” – “Hotel California,” by The Eagles

ReadyNutrition Guys and Gals, this piece is on the heels of an article released by RT News on 3/8/17, entitled “85% of World’s Smart Phones ‘Weaponized’ by CIA.”  The article is a very disturbing report; however, it isn’t something that just “surfaced” out of the zone of unpredictability.  The basis for the report stems from the recent WikiLeaks release of the CIA-documents and information that just occurred.  Here is an excerpt from that article:

 “Google’s Android operating system, used in 85 percent of the world’s smart phones, including Samsung and Sony, was found to have 24 ‘zero days’ – the code name used by the CIA to identify and exploit vulnerabilities for the purpose of secretly collecting data on individuals.  The techniques allow the CIA to access data from social messaging platforms, including WhatsApp, Weibo and Clockman before encryption, according to WikiLeaks.  Both audio and message data were vulnerable to the exploit through the CIA’s exploitation of gaps in the OS.”

Now mind you, Readers, this piece is not a “news article,” although this event was just reported on 3/8/17.  The purpose of this article is to serve as a “wake-up” call, in case you haven’t taken the measures already outlined in previous articles to protect yourself from your own devices tracking, recording, and (essentially) “spying” upon you.  You may research past articles on electronic security that you can do, and this piece is a “refresher” that will enable you to secure yourself…. from your own equipment.

4 Ways to Block Cell Phone and Prevent Being Monitored

As mentioned in times past, Mylar can be your best ally.  Mylar is simple to use, affordable, and it works at blocking the signals going to and from your happy cell-phone tracking and recording device.  Here are some inexpensive sources for the Mylar:

  1. Chip/Snack bags: An infinite variety of sizes are available, and you will have to gauge what size you use after taking the size of your phone/device into account.
  2. Mylar in the form of “ponchos” or “space blankets”: these are a little more expensive than the chips, but only slightly so. You will end up with more Mylar to use, and the pieces you cut will not need to be cleaned off of salt and other detritus as with the chip bags.
  3. Freezer bags: Also in a variety of sizes, such as ones that hold up to 30 lbs. of food/ice (for a laptop-sized device) or just a small 1’ x 1’ bag, such as a lunchbag-cooler size.
  4. Another thing to do is to place your device inside of an ammo can (military issue). In doing so, make sure the rubber gasket around the mouth seals efficiently for a tight seal.  There are other containers that can be used; however, you may have to reinforce the seams with something such as Aluminum HVAC duct tape (available for about $15 per roll from your local Home Depot), and cover them over.  With the ammo cans, the container is contiguous with only the lid needing that rubber gasket that works.

How to Test for Protection

There is a way to test it out with your phone to see if you have the protection.  Take your chip bag or bags.  If they’re small, be advised that you will need about three complete layers around the cell phone.  Also, place your phone in a plastic Ziploc bag before putting them into the chip bags.  This will keep them clean just in case you missed wiping all of the stuff out of them.  Wiping out the bags can best be accomplished with a dry paper towel: the oils, salts, and other filth will be caught up by the towel.  Just remember to cover/swipe the entire inside surface of the bag.

Then turn your phone on, and turn up the volume of its ring all the way.  Next, roll/wrap up your phone and fold it over in at least three complete layers of Mylar.  Then use your house phone/landline/etc. to dial your wrapped-up cell phone’s number, and hold the wrapped-up phone close to your ear.

If you did the job correctly, you will not hear a thing.  Also, make sure you only ring it 3 times.  Any more than that and it may go to a voice-mail/other function, that will send it stored to your cell phone after you unwrap it as a missed call.  This way it will not ring it, and the call will have been cancelled.

Remember what General David Petraeus mentioned about the “Internet of things?”  Well, those days are upon us.  So, what else?  You’ll have to figure out the best method for making your layers work and last a long time.  You can take the chip bags, cut them open with scissors, and make three premeasured layers.  Form a pouch, and cover them inside and out with duct tape.  Then you just slip in your phone, and secure the top (fold it over) with whatever type of clamp or clip works for you.

The continuous signal your cell phone sends out (every 4 seconds) will be interrupted.  Inconvenient?  No.  Coordinate with your family members when you will call and talk to them beforehand.  Emergency?  Pull the phone out of the pouch and use it.


Bottom line: It is a discipline that will have to be followed to enable your privacy…from your own device.


99% of all people carry that thing around with them everywhere.  They’re hooked to it more closely than a fetus to the umbilicus: they can’t function without it.  But the point I’m making is this: Do you own the phone, or does it own you?

You can accomplish the same thing with your laptops and other “smart” toys…your palm-pilots, blackberries, cameras, and all of the other damnable devices that have made you an unwitting prisoner to the powers and systems that set them in place…not for your “technological convenience,” but for the very purposes of control, dominion, and surveillance over you.

Ammo cans work.  The Mylar (when cleaned and fashioned properly) will work.  Now you just received confirmation that it is happening, and I’ve given you methods to use to stop it from happening to you.  The methods work.  I have tested and used them myself.  So, without further ado, figure out how much material you need and make one of these pouches for yourself.  Your privacy is guaranteed under the 4th Amendment from illegal searches and seizures by the government.  That right, however, needs to be exercised by action.  So, finish those Doritos, clean out that bag, and wrap that phone up!  We’d love to hear of any tips or improvements you have come to trust.  Keep fighting that good fight, and send us your comments!  JJ out!


Jeremiah Johnson is the Nom de plume of a retired Green Beret of the United States Army Special Forces (Airborne). Mr. Johnson was a Special Forces Medic, EMT and ACLS-certified, with comprehensive training in wilderness survival, rescue, and patient-extraction. Mr. Johnson is an ardent advocate for preparedness, self-sufficiency, and long-term disaster sustainability for families. He and his wife survived Hurricane Katrina and its aftermath. Cross-trained as a Special Forces Engineer, he is an expert in supply, logistics, transport, and long-term storage of perishable materials, having incorporated many of these techniques plus some unique innovations in his own homestead.


.

.


 

Dr. Doom Marc Faber: “Global Liquidity Will Move Into Precious Metals In The Next 3 – 6 Months”

By Mac Slavo

Economist Marc Faber, who is known in many circles as Doctor Doom for his oft gloomy forecasts, says that stock markets are overvalued, but stops short of saying that a crash is imminent. Though valuations are high and sentiment is dangerously optimistic, Faber argues in a recent interview with Fox Business that there are huge money flows still making their way into U.S. equities.

And over the next three to six months Faber says much of that liquidity from foreign and domestic investors may start moving into precious metals and precious metals stocks:

Continue Reading >>

What Really Happened to Hitler and the Third Reich Nazi High Command?

By Preston James

Did Hitler Escape Germany and is the New FOURTH REICH Alive and Well?

Over the years, I have come into contact with numerous very interesting individuals in my research on the endemic high level government corruption.

One such individual is Gregg Hallett, a well-known previously very successful architect from New Zealand, a man who exposed corruption in New Zealand and had to flee to Europe and the UK because of serious harassment by Law Enforcement and Intel.

Greg is the modal example of how a well educated, well respected professional can became a Truth-seeker, and then became transformed into an international anti-corruption Truth-warrior, all because of high level corruption that impacted his life.

Continue Reading >>

‘Russian Hackers’ Penetrate US Power Grid with ‘outdated Ukrainian malware’

By Jim W. Dean

[ Editor’s Note:  This Russian hacking story is turning into a Three Stoogies movie rerun. Experienced Intel people, even those who are not intimate code people know that setting up blinds, dead ends and pasties as diversions for hacks is a operational staple.

When VT was running down our own hack attack, tracing the packets back, the trail was running through major university and some defense contractor servers where endless fingers could be in the pie. But with more digging the trail ended at a US military base where “training” was done for doing this very thing.

Continue Reading >>

Evidence Scrubbed, Pizzagate Is a Worldwide Citizen Investigation Now

source: shtfplan.com

Editor’s Comment: The evidence is now overwhelming – whatever the full truth of the matter, something is very, very suspicious about the “pizza code” that has been discovered in the leaked Podesta emails that many believe is connected to a ring of pedophilia activity. Independent researchers have been scouring the web for supporting information, and have pieced together a disturbing pile of circumstantial evidence connecting many of DC’s most powerful to lewd comments, references to illegal sex acts and child trafficking, dark art and more. It is very likely that this could go to the very top, where powerful people are protected by people with ranking positions inside the power structure.

Continue Reading >>

Beware These 20 Fake News Sites

By Chris Campbell

As you may’ve heard, there’s a digital witchhunt being waged against “fake” news on the Interwebs. Since everyone else is doing it, we thought we’d release our hounds and let you know who the most heinous offenders are.

We’ll show you the full list of the top – 20 fake news sites in just one moment. This list might not be what you expect. (Or, heck, it might be exactly what you’re expecting.)

And, no, it isn’t the list published recently by Melissa Zimdars, an assistant professor of communication at Merrimack College in Massachusetts. Zimdars released the list below to her class on a Google Doc entitled, “False, misleading, clickbait-y and satirical ‘news’ sources.”

Continue Reading >>

WW3 Has Begun, And It Is Digital: Cyberattacks Took Down Major Sites

By Mac Slavo

Get ready – it seems that this will be an October Surprise to remember.

The Internet is under attack through the United States and UK… and there is every reason to think that more is coming.

Reports confirmed that a distributed denial of service attack (DDoS) was carried out against the company Dyn, and disrupted much of the East Coast, and later the West Coast and other parts of the U.S. as well, taking down hundreds of major websites – including Paypal, Twitter, Spotify, Netflix, Amazon, Tumblr and Reddit and more.

It took hours for many of them to come back online.

According to USA Today:

At least two successive waves of online attacks blocked multiple major websites Friday, at times making it impossible for many users on the East Coast to access Twitter, Spotify, Netflix, Amazon, Tumblr and Reddit.

[…]

The cause was a large-scale distributed denial of service attack (DDoS) against Internet performance company Dyn that blocked user access to many popular sites standstill.

Dyn … confirmed the attack, noting that “this attack is mainly impacting US East and is impacting Managed DNS customers in this region. Our Engineers are continuing to work on mitigating this issue.”

Here’s a log of updates for the attacks on Dyn Managed DNS infrastructure:

Speculation is that this could be a test run for larger attacks – and public demonstration of just how vulnerable Internet connected systems are. Things are coming to a head very quickly, and there is no telling what will happen as the U.S. election approaches. As the San Jose Mercury News reported:

“Say, not to panic anybody, but what if the (attacks) today were practice for 11/8 ?” high-profile pundit Keith Olbermann tweeted.

A hacking collective calling itself “New World Hackers” are taking credit – and they are based out of Russia and China, so there is little doubt that it will fuel the narrative for more war, tighter security and an age of online instability as the new world (where the dollar is no longer king) is sorted out. According to the Associated Press:

Members of a shadowy hacker collective that calls itself New World Hackers claimed responsibility for the attack via Twitter. They said they organized networks of connected “zombie” computers that threw a staggering 1.2 terabits per second of data at the Dyn-managed servers.

“We didn’t do this to attract federal agents, only test power,” two collective members who identified themselves as “Prophet” and “Zain” told an AP reporter via Twitter direct message exchange. They said more than 10 member participated in the attack. It was not immediately possible to verify the claim.

[…]

The collective has also claimed responsibility for cyber attacks against Islamic State. The two said about 30 people have access to the @NewWorkdHacking Twitter account. They said 20 are in Russia and 10 in China. “Prophet” said he is in India. “Zain” said he is in China. The two claimed to be taking “good actions.”

Perhaps, this major blackout of Internet services may even be a self-inflicted wound to make the establishment look like the victim, rather than the aggressor that Hillary’s legacy represents. Wikileaks has to be hurting her campaign, and it is difficult to say exactly how far things are going to reestablish credibility and take control of the situation.

Right now, Julian Assange is reportedly surrounded by police forces outside the Ecaudorian embassy in London – and his personal future, and that of Wikileaks remains up in the air. Only days ago, his Internet access was cut, with Ecuador under diplomatic pressure by the U.S.

Further Internet attacks are now pending, and it seems everything is potentially exposed. There is no way to be certain how massive future attacks could be – but the largest potential event would likely be an EMP, sending out an electromagnetic pulse powerful enough to take down the electric grid and fry virtually all unprotected electronics.

Individuals can and should prepare on two fronts – stored food and supplies necessary to sustain your family/group for a minimal of several weeks without power and essential services. People can also protect electronic equipment – primary or backup – in a Faraday cage (which will guard against EMP).

Additionally, emergency cash and alternative currency (such as gold and silver) reserves should kept on hands; identity protection measures should be put in place and all accounts, documents, paperwork and other sensitive items should be written down, photocopies and/or stored offline (on a USB, for example). A more detailed check list can be found here. Extra caution should be used with electronic banking and online payment systems.

The shadow government and its military forces have been preparing for extremes in all areas. Things are happening now that we have warned about for years – the cyber dimension of war means that everyone is on the battlefield:

The attack is “consistent with record-setting sized cyberattacks seen in the last few weeks,” [said Carl Herberger, vice president of security at security company Radware]

[…]

Others worried the attack could be from a nation-state rather than simply an individual seeking to wreak havoc.

“This not just an instant job, this is something that was probably worked on for weeks if not for months by really competent people,” he said. (source)

The power to shut down commerce, communication and news feeds could either start – or stop – the kind of 21st Century war that is only now taking shape.

In what is perhaps a bit of planned irony, or a tip off to the perpetrators of this attack, video surfaced of Hillary Clinton in 2010 (as Secretary of State) blathering on about the importance of cyber security and intelligence protection.

Empty words indeed.

In hindsight, no one could have done more to expose the United States’ secrets than the Madam Secretary herself – emails and more make this clear.

Will any of this stop her, or will she take power in spite of it all?


 

OTHER USEFUL RESOURCES:

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com


 

Facebook Accused Of Listening To Everything You Say — Here’s How To Stop It

By Jay Syrmopoulos

Recently, an expert has come out to claim that Facebook may be listening in on your conversations. Kelli Burns, a mass communication professor at the University of South Florida, believes the app might be using people’s microphones to gather data on the content of people’s conversations.

Facebook admits that the app is capable of listening to what’s happening around it — but claims the feature simply identifies what people are listening to or watching as means of conveniently posting about it.

Currently, the feature is only available in the U.S. and has been available for a couple of years according to Facebook, although recent warnings from Burns have drawn renewed interest.

According to a report in The Independent:

Professor Burns has said that the tool appears to be using the audio it gathers not simply to help out users, but might be doing so to listen in to discussions and serve them with relevant advertising. She says that to test the feature, she discussed certain topics around the phone and then found that the site appeared to show relevant ads.Though Professor Burns said she was not convinced that Facebook is listening in on conversations – it may have been that she was searching for the same things that she chose to discuss around the phone – but she said that it wouldn’t be a surprising move from the site.

The claim chimes with anecdotal reports online that the site appears to show ads for things that people have mentioned in passing.

Facebook accused of listening to everything you say and collects audio information from users – but that the two aren’t combined, and that no audio data is stored or correlated with advertising.

“Facebook does not use microphone audio to inform advertising or News Feed stories in any way. Businesses are able to serve relevant ads based on people’s interests and other demographic information, but not through audio collection,” said Facebook in a recent blog post. “We only access your microphone if you have given our app permission and if you are actively using a specific feature that requires audio. This might include recording a video or using an optional feature we introduced two years ago to include music or other audio in your status updates.”

Although Facebook claims they do not listen in on conversations, the catch here is that Facebook does have access to your phone’s microphone — as giving permission to access your microphone is a requirement to be able to download the site’s mobile app – thus giving the company the ability to access your phone’s mic at any time.

According to a report in Forbes:

This is not the first time Facebook was accused of listening to conversations using smartphone microphones. Reddit user NewHoustonian started a discussion last year about whether the Facebook app was listening to conversations for advertising purposes. NewHoustonian started off the discussion with a post — which has since been removed — about how he suspects the Facebook app was listening to him because he started seeing pest control ads after talking to his girlfriend about killing a cockroach. That Reddit thread now has over 1,700 comments in regards to Facebook listening to conversations and several of those comments refer to similar experiences.

Additionally, police in Belgium have warned citizens to not use Facebook’s recently added Reactions feature if they are concerned about safeguarding their personal privacy.

Whether or not Facebook is actually listening is debatable, but the ability to listen certainly exists given the fact that each person with the mobile app has already given the company permission to access their phone’s microphone. Thankfully, there is an easy solution for those that don’t trust the social media giant with access to their microphone.

One simple way is to uninstall the app altogether and simply access Facebook from the mobile site itself, thus never having to give any permissions to access your data or microphone.

Another fix is to turn off the microphone in a phone’s settings, which is relatively easy to do. Since this is done at the operating system level, doing so will mean that Facebook loses the ability to access your microphone completely.

On an iPhone this can be done by entering the app’s settings, going to privacy and then switching the slider for the microphone to the off position; on an Android phone, go to settings and then privacy, App permissions, Microphone, and from there you can change the permissions that the Facebook app is given.

 

While Facebook claims that they may not be actively listening to your conversations, the idea that you have given permission for the company to access your microphone and text message data simply by downloading and installing the app is certainly disconcerting for those completely unaware that they have given such privacy-shattering permissions to Facebook.

 

OTHER USEFUL RESOURCES:

 

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without

 


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com 


 

 

Military Secretive About GPS Blackout Over California: “Testing Something That Disrupts GPS Over a Huge Area”

The U.S. military is planning a series of tests near the West Coast that will result in GPS outages all across the area.

The FAA put out a notice warning about disruptions that may affect aircraft in general, and particularly those reliant upon GPS that testing based at the Navy’s China Lake Naval Weapons Center, some 150 miles north of Los Angeles during  June 9, 21,23, 28 and 30.

As AVWeb noted:

A Notam (PDF) is warning operators of “all aircraft relying on GPS” of widespread GPS blackout over California. Outages starting Tuesday
throughout the Southwest and especially southern California.
Although the FAA doesn’t go into detail, it seems the military is testing something that can disrupt GPS over a huge area, centered on China Lake, California, home of the Navy’s China Lake Naval Weapons Center. On Tuesday, June 7, the FAA is warning that GPS signals down to 50 feet AGL could be “unreliable or unavailable” between 9:30 a.m. and 3:30 p.m. local time over a radius of 253 nautical miles, which includes the L.A. Basin, Bay area and Las Vegas.  There will be further outages of similar potential duration June 9, 21,23, 28 and 30.

The circles expand with altitude and at 40,000 feet the interference will affect a circular area of the Southwest 950 nautical miles across, reaching central Oregon, Colorado and New Mexico. The tests will potentially knock out all GPS-reliant services including WAAS, GBAS and, notably, ADS-B.

What kind of electromagnetic interference is the military messing with that will result in GPS outages all across the Western portion of the U.S.?

The Navy and its other military counterparts aren’t specifying and have so far refused to release further information about the scope of the tests or the type of technology being used.

According to Tech Times:

The mysterious part of the news, however, is that there is no indication on what kind of device will the military be testing that would lead to such GPS outages in the southwestern United States.

The tests, which were announced by the FAA and not by the military, are centered near the largest installation of the United States Navy in the Mojave Desert, specifically on the 1.1-million-acre Naval Air Weapons Center in China Lake, California.

[…]

With the FAA and the Navy both keeping their mouths shut on the experiments that will be carried out… the military will be testing more potent systems that are able to disrupt the GPS of unmanned and manned aircraft.

Whatever it is, there is a spooky sense about the secrecy and the vulnerability of so many gadgets that are reliant on technology which militaries can so easily disrupt over such a widespread area.

GPS location services in car systems, cell phones and other electronic devices all operate on the same basis, and are essentially hackable.

It is interesting that the the outages could particularly affect certain private business jets:

ADDITIONALLY, DUE TO GPS INTERFERENCE IMPACTS POTENTIALLY AFFECTING EMBRAER PHENOM
300 AIRCRAFT FLIGHT STABILITY CONTROLS, FAA RECOMMENDS EMB PHENOM PILOTS AVOID THE ABOVE TESTING AREA AND CLOSELY MONITOR FLIGHT CONTROL SYSTEMS DUE TO POTENTIAL LOSS OF GPS SIGNAL.

Radar jamming and other disruptions using radio frequency have been in use for decades now, but are becoming more sophisticated and targeted. These signals have also been weaponized for use in disrupting crowd behavior and could also affect the weather or shut down electronics activities for entire geographic areas.

There have been plenty of strange events in recent times that have raised questions about how far the U.S. and Russia have gone back down the road of Cold War.

Are these weapons and devices being used covertly against adversaries and conflict zones?

Could they account for disruptions and other events here in the states?

Don’t let any electronic device put your life in jeopardy if it stops working or can’t get a signal. Know what you’re doing and where you are going, and be prepared to continuity in the event that none of those things operate.

 

By Mac Slavo

 

OTHER USEFUL RESOURCES:

 

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without

 


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com


 

 

 

Tubular Glass House Around A Tree

A Kazakh architect has plans to begin building this beautiful tubular glass house around a tree to support forest growth rather than destruction.

First designed in 2013, this tubular glass house provides a stunning response to the question, “What if we stopped cutting down trees and built houses around them?”

Of course, most people would assume that it would mean building houses between the trees and leaving nature undisturbed, but Aibek Almassov, a Kazakh architect, took it a step further.

When asked about why he decided to design the home, Almassov told Bored Panda,

“About two years ago I created the design of the house which was harmless and as close to the nature. I respect nature, it feeds us but we destroy it. I’ve been looking for a solution that would help in the future to avoid the destruction of forests, we want to live with it in harmony. So I created the tubular glass house around a tree.”

The house was originally designed years ago and was set to be built until an investor pulled out, leaving dreams of the glass house becoming a reality shattered.

However, a solar panel manufacturer recently showed interest in the project and the plans are back on. There is no exact date for when the house will be completed, but at least we have these stunning renderings to hold us over while we wait.

View the images below of this amazing house-to-be.

 

 

 

 

 

What do you think living in a house surrounding a tree would be like?

 

By Brianna Acuesta

 

OTHER USEFUL RESOURCES:

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without

 


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com


 

 

 

Don’t Discuss Personal Information In Front Of Samsung Smart TVs

Samsung has confirmed that its “smart TV” sets are listening to customers’ every word. The company warn customers not to discuss about personal information in front of TVs.

“Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party.”

Continue Reading >>

Stephen Hawking Warns: Leave Earth Before the Ruling Class Destroys It

Stephen Hawking Warns: Humanity’s future is in peril thanks to so-called advancements in science and technology, claims Professor Hawking, who cited “nuclear war, global warming, and genetically-modified viruses” as deadly threats to our existence.

Hawking described various “things that could go wrong” to an audience of hundreds attending the first in a series of BBC Reith Lectures, which pertain to research about black holes.

Continue Reading >>

Has He Become “Mentally Unstable”? Obama Provoking China With Warships

Editor’s Comment: With the United States already at fever pitch with Russia over the Syrian and Ukrainian crises, why not start some stuff with China too? It is clear that foreign policy – directed by our misleaders – is more and more intent on sowing chaos. Why do it? In a truly bad economy, as the U.S. had in the decade prior to WWII, it is last ditch Hail Mary! effort to turn a profit through the industry of suffering and death.

Continue Reading >>

“They’re Looking For The Voice of God” – Tom Horn Explains The Dangers Of CERN Particle Experiments

 

There are some unprecedented scientific experiments taking place at the European Organization for Nuclear Research, more commonly known as the CERN hadron collider. Some say it is merely research into quantum physics and the inner workings of our universe, while others have argued that the experiments are dangerous and could well threaten humanity’s existence.

Continue Reading >>

Watch: The Drone Defender: “The First Portable, Accurate, Rapid-To-Use Counter-Weapon To Stop Hostile Drones In Flight”

By Mac Slavo

Earlier this year a remote controlled drone quadracopter was flown onto the White House lawn in a security breach that left the Secret Service embarrassed and looking like amateurs. The national security apparatus immediately went into overdrive looking for ways to mitigate future threats posed by the new robotic technologies and it’s not hard to see why.

Continue Reading >>

Watch Putin Hammer Obama: “Not Grounded In The Real World… Absolutely Unprofessional Politics”


As airstrikes in Syria heat up, so too has the rhetoric from both sides.

The Obama administration claims that Putin’s military, which now include the globally feared Spetnatz special operations teams, are attacking rebel forces opposed to Syria’s President Assad.

Russia, on the other hand, says that the so-called rebels are actually ISIS terrorists that have been funded and armed by America.

Continue Reading >>

7 Key Events That Are Going To Happen By The End Of September

7 Key Events That Are Going To Happen By The End Of September

This article was originally published by Michael Snyder
at End of the American Dream on June 11th, 2015

Is something really big about to happen?  For months, people have been pointing to the second half of this year for various reasons.  For some, the major concern is Jade Helm and the unprecedented movement of military vehicles and equipment that we have been witnessing all over the nation. 

Continue Reading >>

14 Things You Must Do TODAY to Survive the Coming Economic Collapse

Yesterday, The Common Sense Show issued a breaking news alert as to the possible use of multiple IED type of devices based upon the reports of a highly credible source(s). The Common Sense Show is pleased to announce that arrests have been made in conjunction with this event and eventually I will be able to provide more details.

Continue Reading >>

Windows 10 is spying on almost everything you do

Here’s how to opt out …

Windows 10 is amazing. Windows 10 is fantastic. Windows 10 is glorious. Windows 10 is faster, smoother and more user-friendly than any Windows operating system that has come before it. Windows 10 is everything Windows 8 should have been, addressing nearly all of the major problems users had with Microsoft’s previous-generation platform in one fell swoop.

Continue Reading >>

The Post 9/11 Era: “The Fourteen Year War OF Terror”

 

After 9/11, the “war on terror” is a 14-year-old lie foisted on the world by forces hostile to the US Constitution. This has been and remains a “war OF terror” waged against all people.

Low intensity police state at home and high intensity war abroad are the new norms. The fact that such a program has not been more widely acknowledged and refuted is a profound statement on the state of civil society in the early 21st century.

Continue Reading >>

Truthers and Terrorists: Questioning 9/11 Is Becoming An Increasingly Dangerous Use of Free Speech

Editor’s Note: Regardless of your views on 9/11, the following alarming report from The Intel Hub is clear evidence that our rights to free and independent thought are being sacrificed on the alter of security. Yesterday, your eccentric musings rendered you mentally incompetent and unable to safely possess firearms. Today, your questioning of the official 9/11 report may identify you as a potential sleeper agent and member of a domestic terror organization. What will tomorrow bring?

Continue Reading >>

The Creator of This Amazing Internet Privacy Device Has Been Silenced: “Effective Immediately We Are Halting Further Development”

Data collection and invasive monitoring of American citizens has been at the forefront of government activities for decades. After revelations by Edward Snowden in recent years, the fringe conspiracy theorists who warned of Big Brother surveillance and had been laughed at by the general population were finally proven right.

But despite the literal hundreds of thousands of pages of information about government snooping and the Congressional

Continue Reading >>

Homeland Security seeking to develop massive license plate database

The US Department of Homeland Security is hoping to find a private company that is technologically capable of providing a system that will track license plates across the nation, according to a new report.

Continue Reading >>

First American arrested with help from drone is sentenced

A North Dakota farmer who was the first US citizen to be arrested in a situation where law enforcement had help from a drone has also become the first to be convicted and sentenced,  thanks in part to an unmanned aerial vehicle.

Continue Reading >>

US intelligence chief: Snowden and ‘accomplices’ should return stolen info

The most powerful intelligence official in the United States told a Senate committee Wednesday that National Security Agency leaker Edward Snowden is a hypocrite and that he and his supposed accomplices should return any classified documents he still has.

Continue Reading >>

Bloggers, public have First Amendment protection – US court

A federal appeals court has ruled that bloggers and the general public have the same protection of the First Amendment as journalists when sued for defamation. Should the issue be of public concern, the claimant has to prove negligence to win the case.

Continue Reading >>

Key provision of net-neutrality law struck down by court

Should internet service providers be allowed to restrict access to websites and block certain content from customers depending on how much they pay to be connected? On Tuesday, a federal appeals court said yes.

Continue Reading >>

Snowden obtained nearly 2 million classified files in NSA leak – Pentagon report

Edward Snowden downloaded 1.7 million intelligence files from US agencies, the most secrets ever to be stolen from the US government in a single instance in the nation’s history, according to lawmakers who have viewed a classified Pentagon report.

Continue Reading >>

Obama expected to curb spying on foreign leaders, limit NSA access to phone records

The White House is in the midst of hosting a flurry of meetings with intelligence officials, civil libertarians and technology experts as the administration prepares to announce changes to some of the surveillance programs exposed by Edward Snowden.

Continue Reading >>

Ford VP: ‘We have GPS in your car, so we know what you’re doing’

Modern automobiles are logging tremendous amounts of information every single second they’re being put to use, and a senior executive at the Ford Motor Company says car manufacturers have access to every last piece of it.

Continue Reading >>

Apple execs deny company helps NSA monitor iPhone users

Apple executives have denied granting the US National Security Agency a so-called “backdoor” that allowed the intelligence monolith to surveil the company’s popular mobile devices.The denial was prompted by a report this week in the German  newspaper Der Spiegel which revealed that the NSA uses software  known as DROPOUT JEEP to monitor an iPhone user’s files, text  messages, contact lists, and location data. The technology was  also capable of using the iPhone’s camera and even its  microphone.

Continue Reading >>

Not Socially Acceptable: NSA boss video ‘most hated’ on YouTube in 2013?

A YouTube video in which NSA boss Keith Alexander tries “to set the record straight” on the agency’s spying antics has nosedived. The half-hour interview triggered a wave of criticism from users, branding it the “most hated” video on YouTube.

Continue Reading >>

‘I already won’: Snowden is helping the NSA though it brands him a traitor

Edward Snowden has said he feels satisfied and a winner despite the espionage charges confronting him. Denying claims he is a traitor, Snowden said he is working to improve the NSA, something that US spy chiefs do not realize.

Continue Reading >>

NSA confidence shaken since Snowden leaks began – report

Morale at the US National Security Agency has plummeted since the Edward Snowden leak made international headlines and inspired an ongoing wave of criticism against the intelligence agency – news that coincides with the publication of more NSA documents.

Continue Reading >>

IRS has left US taxpayers at risk of fraud

irs-us-taxpayers-fraud-risk_siThe US Internal Revenue Service has left American taxpayers at increased risk of identity fraud as the federal agency has consistently neglected to seek out and eliminate known flaws in its security system, according to an internal audit.

Continue Reading >>

GCHQ spoofed LinkedIn site to target global mobile traffic exchange and OPEC – report

gchq-spying-linkedin-belgium_siThe UK’s electronic spying agency has been using a spoof version of LinkedIn professional social network’s website to target global roaming data exchange companies as well as senior management in the OPEC oil cartel, according to a Der Spiegel report.

Continue Reading >>

Epic fail: just 1 percent of Obamacare requests successfully processed

obamacare_siMillions of Americans visited newly launched websites last week to learn more about the benefits offered through the president’s health insurance mandate, but Obamacare is apparently not ready for everyone.

Continue Reading >>

NSA’s vast new Utah data hub suffering from ‘meltdowns’ – report

national-security-agency_s-utah-data-center_siThough the NSA’s vast data storage facility in Utah is now hardly a secret, new information has surfaced indicating widespread technical failures delaying its opening, including 10 “meltdowns” within the past 13 months.

Continue Reading >>

Tor anonymizer network among NSA’s targets, Snowden leaks reveal

nsa-target-tor-network_siTop-secret national security documents disclosed to the Guardian by Edward Snowden show United States and British intelligence have long attempted to crack the Tor anonymizer network used by human rights workers, journalists, cybercriminals and others.

Continue Reading >>

Snowden’s email service Lavabit consistently denied US govt access despite intimidation

2013-10-03_04_40_08_siThe Federal Bureau of Investigation secretly obtained a court order compelling Lavabit, the email service used by National Security Agency whistleblower Edward Snowden, to hand over its private SSL key, thereby allowing the FBI to monitor Lavabit’s users.

Continue Reading >>