Survivalist News Network

This Friday The Grid Gets Hacked. You Could See The BIG Cyber Attack in the US History. “90% Of Americans Could Die As A Result Of A Power Outage”

By Mac Slavo

The Ransomware that began spreading across the globe on Friday is still going with more computers reportedly being affected today by new variants of the virus.

What we’ve learned is that the attack hasn’t just taken down personal computers, but core government and business networks affecting everything from health care systems and transportation in Europe, to ATM withdrawals in China.

It’s massive, to be sure. But in the grand scheme of things, up to this point, it has been a fairly minor inconvenience.

Continue Reading >>

Massive Global Cyber Attack Using NSA Hacking Tools Takes Down 45,000 Computers Across 74 Countries: “A Scale Never Seen Before”

By Mac Slavo

They’re calling it one of the biggest global cyber attack in history. Unprecedented in scale, Kaspersky Labs reports that some 45,000 devices have been compromised across 74 countries.

According to reports, America’s own National Security Agency (NSA) developed the very tools that have been used to break into computers around the world. The exploit, named “EternalBlue,” was released by a hacking group earlier this year and put up for sale.

It appears that someone took them up on the offer and is now using it to deliver Ransom Ware to target computers:

A hacking tool known as “eternal blue”, developed by US spies has been weaponised by the hackers to super-charge an existing form of ransomware known as WannaCry, three senior cyber security analysts said. Their reading of events was confirmed by western security officials who are still scrambling to contain the spread of the attack. The NSA’s eternal blue exploit allows the malware to spread through file-sharing protocols set up across organisations, many of which span the globe.

Continue Reading >>

Total Chaos: Cyber Attack Fears As MULTIPLE CITIES HIT With Simultaneous Power Grid Failures: Shockwave Of Delays In San Francisco, Los Angeles, New York

By Mac Slavo

The U.S. power grid appears to have been hit with multiple power outages affecting San Francisco, New York and Los Angeles.

Officials report that business, traffic and day-to-day life has come to a standstill in San Francisco, reportedly the worst hit of the three major cities currently experiencing outages.

Power companies in all three regions have yet to elaborate on the cause, though a fire at a substation was the original reason given by San Francisco officials.
A series of subsequent power outages in Los Angeles, San Francisco, and New York City left commuters stranded and traffic backed up on Friday morning. Although the outages occurred around the same time, there is as of yet no evidence that they were connected by anything more than coincidence.

The first outage occurred at around 7:20 a.m. in New York, when the power went down at the 7th Avenue and 53rd Street subway station, which sent a shockwave of significant delays out from the hub and into the rest of the subway system. By 11:30 a.m. the city’s MTA confirmed that generators were running again in the station, although the New York subways were set to run delayed into the afternoon.

Later in the morning, power outages were reported in Los Angeles International Airport, as well as in several other areas around the city.

Via : Inverse

The San Francisco Fire Department was responding to more than 100 calls for service in the Financial District and beyond, including 20 elevators with people stuck inside, but reported no immediate injuries. Everywhere, sirens blared as engines maneuvered along streets jammed with traffic.

Traffic lights were out at scores of intersections, and cars were backing up on downtown streets as drivers grew frustrated and honked at each other.

Via: SF Gate

The cause of the outage has not yet been made clear, though given the current geo-political climate it is not out of the question to suggest a cyber attack could be to blame. It has also been suggested that the current outages could be the result of a secretive nuclear/EMP drill by the federal government.

As we have previously reported, the entire power grid failures has been mapped by adversaries of the United States and it is believed that sleep trojans or malware may exist within the computer systems that maintain the grid.

In a 2016 report it was noted that our entire way of life has been left vulnerable to saboteurs who could cause cascading blackouts across the United States for days or weeks at a time:

It isn’t just EMPs and natural disaster that poses a threat to the grid, but there is also the potential for attacks on individual power substations in the vast network of decentralized and largely unguarded power grid chain. A U.S. government study established that there would be “major, extended blackouts if more than three key substations were destroyed.”

Whether by criminals, looters, terrorists, gangs or pranksters, it would take very little to bring down the present system, and there is currently very little the system can do to protect against this wide open threat.

Whether the current outages are the result of a targeted infrastructure cyber attack or simply a coincidence, most Americans think the impossible can’t happen, as The Prepper’s Blueprint author Tess Pennington highlights, a grid-down scenario won’t just be a minor inconvenience if it goes on for more than a day or two:

Consider, for a moment, how drastically your life would change without the continuous flow of energy the grid delivers. While manageable during a short-term disaster, losing access to the following critical elements of our just-in-time society would wreak havoc on the system.

  • Challenges or shut downs of business commerce
  • Breakdown of our basic infrastructure: communications, mass transportation, supply chains
  • Inability to access money via atm machines
  • Payroll service interruptions
  • Interruptions in public facilities – schools, workplaces may close, and public gatherings.
  • Inability to have access to clean drinking water

Full report: When the Grid Goes Down, You Better Be Ready!

It is for this reason that we have long encouraged Americans to prepare for this potentially devastating scenario by considering emergency food reserves, clean water reserves and even home defense strategies in the event of a widespread outage.

The majority of Americans have about 3 days worth of food in their pantry.

Imagine for a moment what Day 4 might look like in any major city that goes dark.

This exclusive clip from American Blackout shows what an extended outage might look like:

Prepare for the worst, because this is one scenario you do not want to face.

.

.


Forget The ‘Mother Of All Bombs,’ Russia Tests World’s Most Powerful Bomb

The US boasts that its GBU-43/B Massive Ordnance Air Blast Bomb (MOAB), known as the ‘Mother of all bombs’, is the largest ever non-nuclear bomb used in combat but, don’t be fooled, Russia possesses something far superior. Kids, meet Daddy.

The Aviation Thermobaric Bomb of Increased Power, known as the ‘Father of all bombs’ (FOAB), the most powerful bomb,  was developed by Russia in 2007 and eclipses its US rival in both power and efficiency.

Continue Reading >>

Alert: Your Cell Phone is Spying on You! 4 Ways to Block Your Cell Phone and Prevent Being Monitored

By Jeremiah Johnson

“We are all just prisoners here…of our own device…” – “Hotel California,” by The Eagles

ReadyNutrition Guys and Gals, this piece is on the heels of an article released by RT News on 3/8/17, entitled “85% of World’s Smart Phones ‘Weaponized’ by CIA.”  The article is a very disturbing report; however, it isn’t something that just “surfaced” out of the zone of unpredictability.  The basis for the report stems from the recent WikiLeaks release of the CIA-documents and information that just occurred.  Here is an excerpt from that article:

 “Google’s Android operating system, used in 85 percent of the world’s smart phones, including Samsung and Sony, was found to have 24 ‘zero days’ – the code name used by the CIA to identify and exploit vulnerabilities for the purpose of secretly collecting data on individuals.  The techniques allow the CIA to access data from social messaging platforms, including WhatsApp, Weibo and Clockman before encryption, according to WikiLeaks.  Both audio and message data were vulnerable to the exploit through the CIA’s exploitation of gaps in the OS.”

Now mind you, Readers, this piece is not a “news article,” although this event was just reported on 3/8/17.  The purpose of this article is to serve as a “wake-up” call, in case you haven’t taken the measures already outlined in previous articles to protect yourself from your own devices tracking, recording, and (essentially) “spying” upon you.  You may research past articles on electronic security that you can do, and this piece is a “refresher” that will enable you to secure yourself…. from your own equipment.

4 Ways to Block Cell Phone and Prevent Being Monitored

As mentioned in times past, Mylar can be your best ally.  Mylar is simple to use, affordable, and it works at blocking the signals going to and from your happy cell-phone tracking and recording device.  Here are some inexpensive sources for the Mylar:

  1. Chip/Snack bags: An infinite variety of sizes are available, and you will have to gauge what size you use after taking the size of your phone/device into account.
  2. Mylar in the form of “ponchos” or “space blankets”: these are a little more expensive than the chips, but only slightly so. You will end up with more Mylar to use, and the pieces you cut will not need to be cleaned off of salt and other detritus as with the chip bags.
  3. Freezer bags: Also in a variety of sizes, such as ones that hold up to 30 lbs. of food/ice (for a laptop-sized device) or just a small 1’ x 1’ bag, such as a lunchbag-cooler size.
  4. Another thing to do is to place your device inside of an ammo can (military issue). In doing so, make sure the rubber gasket around the mouth seals efficiently for a tight seal.  There are other containers that can be used; however, you may have to reinforce the seams with something such as Aluminum HVAC duct tape (available for about $15 per roll from your local Home Depot), and cover them over.  With the ammo cans, the container is contiguous with only the lid needing that rubber gasket that works.

How to Test for Protection

There is a way to test it out with your phone to see if you have the protection.  Take your chip bag or bags.  If they’re small, be advised that you will need about three complete layers around the cell phone.  Also, place your phone in a plastic Ziploc bag before putting them into the chip bags.  This will keep them clean just in case you missed wiping all of the stuff out of them.  Wiping out the bags can best be accomplished with a dry paper towel: the oils, salts, and other filth will be caught up by the towel.  Just remember to cover/swipe the entire inside surface of the bag.

Then turn your phone on, and turn up the volume of its ring all the way.  Next, roll/wrap up your phone and fold it over in at least three complete layers of Mylar.  Then use your house phone/landline/etc. to dial your wrapped-up cell phone’s number, and hold the wrapped-up phone close to your ear.

If you did the job correctly, you will not hear a thing.  Also, make sure you only ring it 3 times.  Any more than that and it may go to a voice-mail/other function, that will send it stored to your cell phone after you unwrap it as a missed call.  This way it will not ring it, and the call will have been cancelled.

Remember what General David Petraeus mentioned about the “Internet of things?”  Well, those days are upon us.  So, what else?  You’ll have to figure out the best method for making your layers work and last a long time.  You can take the chip bags, cut them open with scissors, and make three premeasured layers.  Form a pouch, and cover them inside and out with duct tape.  Then you just slip in your phone, and secure the top (fold it over) with whatever type of clamp or clip works for you.

The continuous signal your cell phone sends out (every 4 seconds) will be interrupted.  Inconvenient?  No.  Coordinate with your family members when you will call and talk to them beforehand.  Emergency?  Pull the phone out of the pouch and use it.


Bottom line: It is a discipline that will have to be followed to enable your privacy…from your own device.


99% of all people carry that thing around with them everywhere.  They’re hooked to it more closely than a fetus to the umbilicus: they can’t function without it.  But the point I’m making is this: Do you own the phone, or does it own you?

You can accomplish the same thing with your laptops and other “smart” toys…your palm-pilots, blackberries, cameras, and all of the other damnable devices that have made you an unwitting prisoner to the powers and systems that set them in place…not for your “technological convenience,” but for the very purposes of control, dominion, and surveillance over you.

Ammo cans work.  The Mylar (when cleaned and fashioned properly) will work.  Now you just received confirmation that it is happening, and I’ve given you methods to use to stop it from happening to you.  The methods work.  I have tested and used them myself.  So, without further ado, figure out how much material you need and make one of these pouches for yourself.  Your privacy is guaranteed under the 4th Amendment from illegal searches and seizures by the government.  That right, however, needs to be exercised by action.  So, finish those Doritos, clean out that bag, and wrap that phone up!  We’d love to hear of any tips or improvements you have come to trust.  Keep fighting that good fight, and send us your comments!  JJ out!


Jeremiah Johnson is the Nom de plume of a retired Green Beret of the United States Army Special Forces (Airborne). Mr. Johnson was a Special Forces Medic, EMT and ACLS-certified, with comprehensive training in wilderness survival, rescue, and patient-extraction. Mr. Johnson is an ardent advocate for preparedness, self-sufficiency, and long-term disaster sustainability for families. He and his wife survived Hurricane Katrina and its aftermath. Cross-trained as a Special Forces Engineer, he is an expert in supply, logistics, transport, and long-term storage of perishable materials, having incorporated many of these techniques plus some unique innovations in his own homestead.


.

.


 

Three Massive “Towers” Found On Mars Laid Out In Same Pattern As Egyptian Pyramids

source: TheDailySheeple

Here’s yet another curious find on the surface of the red planet. It looks like three towers spaced equidistant from one another in the same pattern as the pyramids at Giza or the belt in the constellation Orion.

Here’s the original YouTube video from user Mundodesconocido discussing the find:

Investigating on some Mars images, we have recently found three massive towers on Mars. A row of huge towers located in the Martian area of Terra Meridiani. Due to their peculiar features, we believe that they have an artificial origin. In the following video, we will show you all the amazing information, evidences as well as animated 3D models that will allow you to evaluate correctly the information we propose.

Continue Reading >>

‘Russian Hackers’ Penetrate US Power Grid with ‘outdated Ukrainian malware’

By Jim W. Dean

[ Editor’s Note:  This Russian hacking story is turning into a Three Stoogies movie rerun. Experienced Intel people, even those who are not intimate code people know that setting up blinds, dead ends and pasties as diversions for hacks is a operational staple.

When VT was running down our own hack attack, tracing the packets back, the trail was running through major university and some defense contractor servers where endless fingers could be in the pie. But with more digging the trail ended at a US military base where “training” was done for doing this very thing.

Continue Reading >>

2000-yo Lead Tablet Could Change What We Know About Jesus: “Earliest Document in Existence”

By Mac Slavo

An article of faith?

Controversial and startling new evidence is casting light on a part of Jesus’ life that was not previously known, and appears to provide documentary evidence of his work. 2000-yo lead tablet artifact contains noteworthy references and at least some of the details of his life, and is now the oldest discovered record of early Christianity.

Continue Reading >>

How To Use Alternative Energy Sources for Your Home

By Laura Johnson

Yes, most of us depend on the local electric company for our energy needs. Not all of us even have the power to choose from differing rates like they do in cities like Dallas. Most of the time, especially in smaller areas, there is just the one power company and you either go with them or you don’t have power.

The thing is, traditional power companies aren’t the only way to get energy to our homes. What’s more, you don’t need to go off the grid to have these types of alternative energy sources in your home. Some of these types of energies include things like:

Why don’t we take a look at a few of these more closely?

Continue Reading >>

WW3 Has Begun, And It Is Digital: Cyberattacks Took Down Major Sites

By Mac Slavo

Get ready – it seems that this will be an October Surprise to remember.

The Internet is under attack through the United States and UK… and there is every reason to think that more is coming.

Reports confirmed that a distributed denial of service attack (DDoS) was carried out against the company Dyn, and disrupted much of the East Coast, and later the West Coast and other parts of the U.S. as well, taking down hundreds of major websites – including Paypal, Twitter, Spotify, Netflix, Amazon, Tumblr and Reddit and more.

It took hours for many of them to come back online.

According to USA Today:

At least two successive waves of online attacks blocked multiple major websites Friday, at times making it impossible for many users on the East Coast to access Twitter, Spotify, Netflix, Amazon, Tumblr and Reddit.

[…]

The cause was a large-scale distributed denial of service attack (DDoS) against Internet performance company Dyn that blocked user access to many popular sites standstill.

Dyn … confirmed the attack, noting that “this attack is mainly impacting US East and is impacting Managed DNS customers in this region. Our Engineers are continuing to work on mitigating this issue.”

Here’s a log of updates for the attacks on Dyn Managed DNS infrastructure:

Speculation is that this could be a test run for larger attacks – and public demonstration of just how vulnerable Internet connected systems are. Things are coming to a head very quickly, and there is no telling what will happen as the U.S. election approaches. As the San Jose Mercury News reported:

“Say, not to panic anybody, but what if the (attacks) today were practice for 11/8 ?” high-profile pundit Keith Olbermann tweeted.

A hacking collective calling itself “New World Hackers” are taking credit – and they are based out of Russia and China, so there is little doubt that it will fuel the narrative for more war, tighter security and an age of online instability as the new world (where the dollar is no longer king) is sorted out. According to the Associated Press:

Members of a shadowy hacker collective that calls itself New World Hackers claimed responsibility for the attack via Twitter. They said they organized networks of connected “zombie” computers that threw a staggering 1.2 terabits per second of data at the Dyn-managed servers.

“We didn’t do this to attract federal agents, only test power,” two collective members who identified themselves as “Prophet” and “Zain” told an AP reporter via Twitter direct message exchange. They said more than 10 member participated in the attack. It was not immediately possible to verify the claim.

[…]

The collective has also claimed responsibility for cyber attacks against Islamic State. The two said about 30 people have access to the @NewWorkdHacking Twitter account. They said 20 are in Russia and 10 in China. “Prophet” said he is in India. “Zain” said he is in China. The two claimed to be taking “good actions.”

Perhaps, this major blackout of Internet services may even be a self-inflicted wound to make the establishment look like the victim, rather than the aggressor that Hillary’s legacy represents. Wikileaks has to be hurting her campaign, and it is difficult to say exactly how far things are going to reestablish credibility and take control of the situation.

Right now, Julian Assange is reportedly surrounded by police forces outside the Ecaudorian embassy in London – and his personal future, and that of Wikileaks remains up in the air. Only days ago, his Internet access was cut, with Ecuador under diplomatic pressure by the U.S.

Further Internet attacks are now pending, and it seems everything is potentially exposed. There is no way to be certain how massive future attacks could be – but the largest potential event would likely be an EMP, sending out an electromagnetic pulse powerful enough to take down the electric grid and fry virtually all unprotected electronics.

Individuals can and should prepare on two fronts – stored food and supplies necessary to sustain your family/group for a minimal of several weeks without power and essential services. People can also protect electronic equipment – primary or backup – in a Faraday cage (which will guard against EMP).

Additionally, emergency cash and alternative currency (such as gold and silver) reserves should kept on hands; identity protection measures should be put in place and all accounts, documents, paperwork and other sensitive items should be written down, photocopies and/or stored offline (on a USB, for example). A more detailed check list can be found here. Extra caution should be used with electronic banking and online payment systems.

The shadow government and its military forces have been preparing for extremes in all areas. Things are happening now that we have warned about for years – the cyber dimension of war means that everyone is on the battlefield:

The attack is “consistent with record-setting sized cyberattacks seen in the last few weeks,” [said Carl Herberger, vice president of security at security company Radware]

[…]

Others worried the attack could be from a nation-state rather than simply an individual seeking to wreak havoc.

“This not just an instant job, this is something that was probably worked on for weeks if not for months by really competent people,” he said. (source)

The power to shut down commerce, communication and news feeds could either start – or stop – the kind of 21st Century war that is only now taking shape.

In what is perhaps a bit of planned irony, or a tip off to the perpetrators of this attack, video surfaced of Hillary Clinton in 2010 (as Secretary of State) blathering on about the importance of cyber security and intelligence protection.

Empty words indeed.

In hindsight, no one could have done more to expose the United States’ secrets than the Madam Secretary herself – emails and more make this clear.

Will any of this stop her, or will she take power in spite of it all?


 

OTHER USEFUL RESOURCES:

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com


 

Facebook Accused Of Listening To Everything You Say — Here’s How To Stop It

By Jay Syrmopoulos

Recently, an expert has come out to claim that Facebook may be listening in on your conversations. Kelli Burns, a mass communication professor at the University of South Florida, believes the app might be using people’s microphones to gather data on the content of people’s conversations.

Facebook admits that the app is capable of listening to what’s happening around it — but claims the feature simply identifies what people are listening to or watching as means of conveniently posting about it.

Currently, the feature is only available in the U.S. and has been available for a couple of years according to Facebook, although recent warnings from Burns have drawn renewed interest.

According to a report in The Independent:

Professor Burns has said that the tool appears to be using the audio it gathers not simply to help out users, but might be doing so to listen in to discussions and serve them with relevant advertising. She says that to test the feature, she discussed certain topics around the phone and then found that the site appeared to show relevant ads.Though Professor Burns said she was not convinced that Facebook is listening in on conversations – it may have been that she was searching for the same things that she chose to discuss around the phone – but she said that it wouldn’t be a surprising move from the site.

The claim chimes with anecdotal reports online that the site appears to show ads for things that people have mentioned in passing.

Facebook accused of listening to everything you say and collects audio information from users – but that the two aren’t combined, and that no audio data is stored or correlated with advertising.

“Facebook does not use microphone audio to inform advertising or News Feed stories in any way. Businesses are able to serve relevant ads based on people’s interests and other demographic information, but not through audio collection,” said Facebook in a recent blog post. “We only access your microphone if you have given our app permission and if you are actively using a specific feature that requires audio. This might include recording a video or using an optional feature we introduced two years ago to include music or other audio in your status updates.”

Although Facebook claims they do not listen in on conversations, the catch here is that Facebook does have access to your phone’s microphone — as giving permission to access your microphone is a requirement to be able to download the site’s mobile app – thus giving the company the ability to access your phone’s mic at any time.

According to a report in Forbes:

This is not the first time Facebook was accused of listening to conversations using smartphone microphones. Reddit user NewHoustonian started a discussion last year about whether the Facebook app was listening to conversations for advertising purposes. NewHoustonian started off the discussion with a post — which has since been removed — about how he suspects the Facebook app was listening to him because he started seeing pest control ads after talking to his girlfriend about killing a cockroach. That Reddit thread now has over 1,700 comments in regards to Facebook listening to conversations and several of those comments refer to similar experiences.

Additionally, police in Belgium have warned citizens to not use Facebook’s recently added Reactions feature if they are concerned about safeguarding their personal privacy.

Whether or not Facebook is actually listening is debatable, but the ability to listen certainly exists given the fact that each person with the mobile app has already given the company permission to access their phone’s microphone. Thankfully, there is an easy solution for those that don’t trust the social media giant with access to their microphone.

One simple way is to uninstall the app altogether and simply access Facebook from the mobile site itself, thus never having to give any permissions to access your data or microphone.

Another fix is to turn off the microphone in a phone’s settings, which is relatively easy to do. Since this is done at the operating system level, doing so will mean that Facebook loses the ability to access your microphone completely.

On an iPhone this can be done by entering the app’s settings, going to privacy and then switching the slider for the microphone to the off position; on an Android phone, go to settings and then privacy, App permissions, Microphone, and from there you can change the permissions that the Facebook app is given.

 

While Facebook claims that they may not be actively listening to your conversations, the idea that you have given permission for the company to access your microphone and text message data simply by downloading and installing the app is certainly disconcerting for those completely unaware that they have given such privacy-shattering permissions to Facebook.

 

OTHER USEFUL RESOURCES:

 

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without

 


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com 


 

 

Military Secretive About GPS Blackout Over California: “Testing Something That Disrupts GPS Over a Huge Area”

The U.S. military is planning a series of tests near the West Coast that will result in GPS outages all across the area.

The FAA put out a notice warning about disruptions that may affect aircraft in general, and particularly those reliant upon GPS that testing based at the Navy’s China Lake Naval Weapons Center, some 150 miles north of Los Angeles during  June 9, 21,23, 28 and 30.

As AVWeb noted:

A Notam (PDF) is warning operators of “all aircraft relying on GPS” of widespread GPS blackout over California. Outages starting Tuesday
throughout the Southwest and especially southern California.
Although the FAA doesn’t go into detail, it seems the military is testing something that can disrupt GPS over a huge area, centered on China Lake, California, home of the Navy’s China Lake Naval Weapons Center. On Tuesday, June 7, the FAA is warning that GPS signals down to 50 feet AGL could be “unreliable or unavailable” between 9:30 a.m. and 3:30 p.m. local time over a radius of 253 nautical miles, which includes the L.A. Basin, Bay area and Las Vegas.  There will be further outages of similar potential duration June 9, 21,23, 28 and 30.

The circles expand with altitude and at 40,000 feet the interference will affect a circular area of the Southwest 950 nautical miles across, reaching central Oregon, Colorado and New Mexico. The tests will potentially knock out all GPS-reliant services including WAAS, GBAS and, notably, ADS-B.

What kind of electromagnetic interference is the military messing with that will result in GPS outages all across the Western portion of the U.S.?

The Navy and its other military counterparts aren’t specifying and have so far refused to release further information about the scope of the tests or the type of technology being used.

According to Tech Times:

The mysterious part of the news, however, is that there is no indication on what kind of device will the military be testing that would lead to such GPS outages in the southwestern United States.

The tests, which were announced by the FAA and not by the military, are centered near the largest installation of the United States Navy in the Mojave Desert, specifically on the 1.1-million-acre Naval Air Weapons Center in China Lake, California.

[…]

With the FAA and the Navy both keeping their mouths shut on the experiments that will be carried out… the military will be testing more potent systems that are able to disrupt the GPS of unmanned and manned aircraft.

Whatever it is, there is a spooky sense about the secrecy and the vulnerability of so many gadgets that are reliant on technology which militaries can so easily disrupt over such a widespread area.

GPS location services in car systems, cell phones and other electronic devices all operate on the same basis, and are essentially hackable.

It is interesting that the the outages could particularly affect certain private business jets:

ADDITIONALLY, DUE TO GPS INTERFERENCE IMPACTS POTENTIALLY AFFECTING EMBRAER PHENOM
300 AIRCRAFT FLIGHT STABILITY CONTROLS, FAA RECOMMENDS EMB PHENOM PILOTS AVOID THE ABOVE TESTING AREA AND CLOSELY MONITOR FLIGHT CONTROL SYSTEMS DUE TO POTENTIAL LOSS OF GPS SIGNAL.

Radar jamming and other disruptions using radio frequency have been in use for decades now, but are becoming more sophisticated and targeted. These signals have also been weaponized for use in disrupting crowd behavior and could also affect the weather or shut down electronics activities for entire geographic areas.

There have been plenty of strange events in recent times that have raised questions about how far the U.S. and Russia have gone back down the road of Cold War.

Are these weapons and devices being used covertly against adversaries and conflict zones?

Could they account for disruptions and other events here in the states?

Don’t let any electronic device put your life in jeopardy if it stops working or can’t get a signal. Know what you’re doing and where you are going, and be prepared to continuity in the event that none of those things operate.

 

By Mac Slavo

 

OTHER USEFUL RESOURCES:

 

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without

 


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com


 

 

 

Tubular Glass House Around A Tree

A Kazakh architect has plans to begin building this beautiful tubular glass house around a tree to support forest growth rather than destruction.

First designed in 2013, this tubular glass house provides a stunning response to the question, “What if we stopped cutting down trees and built houses around them?”

Of course, most people would assume that it would mean building houses between the trees and leaving nature undisturbed, but Aibek Almassov, a Kazakh architect, took it a step further.

When asked about why he decided to design the home, Almassov told Bored Panda,

“About two years ago I created the design of the house which was harmless and as close to the nature. I respect nature, it feeds us but we destroy it. I’ve been looking for a solution that would help in the future to avoid the destruction of forests, we want to live with it in harmony. So I created the tubular glass house around a tree.”

The house was originally designed years ago and was set to be built until an investor pulled out, leaving dreams of the glass house becoming a reality shattered.

However, a solar panel manufacturer recently showed interest in the project and the plans are back on. There is no exact date for when the house will be completed, but at least we have these stunning renderings to hold us over while we wait.

View the images below of this amazing house-to-be.

 

 

 

 

 

What do you think living in a house surrounding a tree would be like?

 

By Brianna Acuesta

 

OTHER USEFUL RESOURCES:

THE LOST WAYS (Pioneer Skills You May Need! Bonus: Learn The best 3 Pioneer Survival Lesson)

DARKEST WOMAN (Handpicked Tactics, Techniques And Even Quick-Fixes Tips)

US WATER REVOLUTION (Generate Your Clean Water Anywhere)

ALIVE AFTER THE FALL (Key Survival Situation Procedures and Knowledge for You and Me)

DROUGHT USA (Secure unlimited fresh clean water)

SURVIVE THE END DAYS (Exposes the biggest cover up of our president)

SURVIVAL MD (Learn how to survive any crisis situation)

BLACKOUT USA (EMP survival and preparedness guide)

CONQUERING THE COMING COLLAPSE (Financial advice and preparedness )

LIBERTY GENERATOR (Easy DIY to build your own off-grid free energy device)

BACKYARD LIBERTY (Easy and cheap DIY Aquaponic system to grow your organic and living food bank)

BULLET PROOF HOME (A Prepper’s Guide in Safeguarding a Home)

37 VITAL FOOD ITEMS You Can’t Get In The Coming Disaster And May Not Survive Without

 


This content may be freely reproduced in full or in part in digital form. Feel free to share any information from this site, leaving all links intact, giving credit to the author and including a link to www.survivalistnewsnetwork.com


 

 

 

US and Russia preparing for Planet X / Nibiru arrival and aftermath

Russia is just finishing 5,000 shelters in Moscow. They’re much more open (in this regard anyway) on this topic than other governments.

I personally estimate the US probably has over 150 Deep Underground Military Bases. A huge military underground city exists underneath the Denver Airport. Russia has some that can accommodate over 100,000 people (at the base of mountains). These are entire underground cities that have been under construction since the 1980s.

Continue Reading >>

Don’t Discuss Personal Information In Front Of Samsung Smart TVs

Samsung has confirmed that its “smart TV” sets are listening to customers’ every word. The company warn customers not to discuss about personal information in front of TVs.

“Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party.”

Continue Reading >>

GMO Human Embryo Raises Ethical Concerns

It all started with a rumour. Then just six weeks ago, a warning rang out in the scientific journal Nature, expressing “grave concerns regarding the ethical and safety implications” of creating the world’s first genetically-modified human embryo.

Then last week, a Chinese group from Sun Yat-sen University, reported that they had, in fact, done it: they had created the first GMO human embryo.

They reported that, in a world first, they had taken “human tripronuclear embryos”, and altered mutant DNA that causes the human disease β-thalassemia, which is life-threatening and affects 100,000 people worldwide.

Continue Reading >>

Stephen Hawking Warns: Leave Earth Before the Ruling Class Destroys It

Stephen Hawking Warns: Humanity’s future is in peril thanks to so-called advancements in science and technology, claims Professor Hawking, who cited “nuclear war, global warming, and genetically-modified viruses” as deadly threats to our existence.

Hawking described various “things that could go wrong” to an audience of hundreds attending the first in a series of BBC Reith Lectures, which pertain to research about black holes.

Continue Reading >>

“They’re Looking For The Voice of God” – Tom Horn Explains The Dangers Of CERN Particle Experiments

 

There are some unprecedented scientific experiments taking place at the European Organization for Nuclear Research, more commonly known as the CERN hadron collider. Some say it is merely research into quantum physics and the inner workings of our universe, while others have argued that the experiments are dangerous and could well threaten humanity’s existence.

Continue Reading >>

Watch: The Drone Defender: “The First Portable, Accurate, Rapid-To-Use Counter-Weapon To Stop Hostile Drones In Flight”

By Mac Slavo

Earlier this year a remote controlled drone quadracopter was flown onto the White House lawn in a security breach that left the Secret Service embarrassed and looking like amateurs. The national security apparatus immediately went into overdrive looking for ways to mitigate future threats posed by the new robotic technologies and it’s not hard to see why.

Continue Reading >>

Report: Could North Korea Launch An EMP Attack Against the United States In October?

 

Most are aware of the tense situation that exists between North Korea, South Korea, and the United States.  You all probably know that Kim Jung-Un, the son of and successive dictator of deceased Kim Jung-Il is just as much of a power driven megalomaniac as his departed father. 

Continue Reading >>

Watch Putin Hammer Obama: “Not Grounded In The Real World… Absolutely Unprofessional Politics”


As airstrikes in Syria heat up, so too has the rhetoric from both sides.

The Obama administration claims that Putin’s military, which now include the globally feared Spetnatz special operations teams, are attacking rebel forces opposed to Syria’s President Assad.

Russia, on the other hand, says that the so-called rebels are actually ISIS terrorists that have been funded and armed by America.

Continue Reading >>

Epic Self Sustained: Vertical Farms Are Changing the Way We Grow Food


No soil? No problem. From Japan to Jackson, Wyoming, plucking fresh lettuce is as easy as looking up. Vertical farms have been sprouting around the world, growing crops in places where traditional agriculture would have been impossible.

Vertical farms are multiple stories, often have a hydroponic system and some contain artificial lights to mimic the sun.

Continue Reading >>

How to Survive When You Can’t Pay Your Bills: “If You’ve Never Been This Level of Broke, I’m Very Glad”

Let’s talk about poverty.

I don’t mean the kind you’re talking about when your friends invite you to go shopping or for a night out and you say, “No, I can’t. I’m poor right now.”

I don’t mean the situation when you’d like to get a nicer car but decide you should just stick to the one you have because you don’t have a few thousand for a down payment.

Continue Reading >>

Here’s How You’ll Die When the SHTF and How to Prevent Your Untimely Demise

When it hits the fan…I mean REALLY hits the fan in a permanent kind of way, the most likely outcome is death.

That’s not pretty, and I’m well aware of it. I always try to be positive and optimistic, because for me, preparedness is the ultimate act of optimism, but sometimes we have to look at the numbers and face some things that are pretty terrifying. The first reality check is that some research says that only 3 million Americans are preppers. 

Continue Reading >>

Building a tiled roof hut


Built a hut in the bush using naturally occurring materials and primitive tools.

The hut is 2m wide and 2m long, the side walls are 1m high and the ridge line (highest point) is 2m high giving a roof angle of 45 degrees.

Continue Reading >>

Windows 10 is spying on almost everything you do

Here’s how to opt out …

Windows 10 is amazing. Windows 10 is fantastic. Windows 10 is glorious. Windows 10 is faster, smoother and more user-friendly than any Windows operating system that has come before it. Windows 10 is everything Windows 8 should have been, addressing nearly all of the major problems users had with Microsoft’s previous-generation platform in one fell swoop.

Continue Reading >>

The Creator of This Amazing Internet Privacy Device Has Been Silenced: “Effective Immediately We Are Halting Further Development”

Data collection and invasive monitoring of American citizens has been at the forefront of government activities for decades. After revelations by Edward Snowden in recent years, the fringe conspiracy theorists who warned of Big Brother surveillance and had been laughed at by the general population were finally proven right.

But despite the literal hundreds of thousands of pages of information about government snooping and the Congressional

Continue Reading >>

The Sad Truth About The Modern World In 15 Powerful Illustrations

 

 

Steve Cutts is a London based illustrator who has worked with big names like Coca-Cola, Virgin and Nokia. He cut his ties recently and went freelance, producing more personal and opinionated illustrations that really sum the world up.

Continue Reading >>

Homeland Security seeking to develop massive license plate database

The US Department of Homeland Security is hoping to find a private company that is technologically capable of providing a system that will track license plates across the nation, according to a new report.

Continue Reading >>

Arizona first US state to attempt legal resistance to NSA surveillance

Arizona’s state senate panel approved a bill withdrawing state support for intelligence agencies’ collection of metadata and banning the use of warrantless data in courts. The panel becomes the first legislative body in US to try and thwart NSA spying.

Continue Reading >>

First American arrested with help from drone is sentenced

A North Dakota farmer who was the first US citizen to be arrested in a situation where law enforcement had help from a drone has also become the first to be convicted and sentenced,  thanks in part to an unmanned aerial vehicle.

Continue Reading >>

US intelligence chief: Snowden and ‘accomplices’ should return stolen info

The most powerful intelligence official in the United States told a Senate committee Wednesday that National Security Agency leaker Edward Snowden is a hypocrite and that he and his supposed accomplices should return any classified documents he still has.

Continue Reading >>

Republicans vote to end NSA bulk phone metadata surveillance program

The Republican National Committee has passed a resolution pushing conservative lawmakers to put an end to the National Security Agency’s blanket surveillance of American citizens’ phone records.

Continue Reading >>

Lawmakers accuse Snowden of being Russian spy

Two of the top lawmakers within the United States intelligence community say that Congress is now considering whether any officials in the Russian government have influenced the actions of US National Security Agency leaker Edward Snowden.

Continue Reading >>

NSA able to target offline computers using radio-waves for surveillance, cyber-attacks

The National Security Agency has implanted software in about 100,000 computers around the world, allowing the United States to surveil those machines while creating a trail that can be used to launch cyber-attacks.

Continue Reading >>

Snowden obtained nearly 2 million classified files in NSA leak – Pentagon report

Edward Snowden downloaded 1.7 million intelligence files from US agencies, the most secrets ever to be stolen from the US government in a single instance in the nation’s history, according to lawmakers who have viewed a classified Pentagon report.

Continue Reading >>

Obama expected to curb spying on foreign leaders, limit NSA access to phone records

The White House is in the midst of hosting a flurry of meetings with intelligence officials, civil libertarians and technology experts as the administration prepares to announce changes to some of the surveillance programs exposed by Edward Snowden.

Continue Reading >>

Ford VP: ‘We have GPS in your car, so we know what you’re doing’

Modern automobiles are logging tremendous amounts of information every single second they’re being put to use, and a senior executive at the Ford Motor Company says car manufacturers have access to every last piece of it.

Continue Reading >>

US govt appeals ruling denouncing NSA’s mass phone surveillance as unconstitutional

The US Justice Department appealed Friday a federal judge’s December ruling that advanced a legal challenge to the National Security Agency’s bulk collection of Americans’ telephone records.

The Justice Department filed the appeal with the US Circuit Court  of Appeals in Washington. US government lawyers are asking for a  dismissal of US District Judge Richard Leon’s ruling  that called the NSA’s domestic phone metadata   collection likely unconstitutional.

Continue Reading >>

Facebook sued for alleged monitoring of users’ private messages

Social media giant Facebook is being sued for the alleged monitoring of its users’ private messages in order to gather more consumer data that it in turn shares with marketers.

A federal lawsuit filed Thursday in San Jose, California alleges  that Facebook traces the contents of users’ private messages,  including links to other websites, “to improve its marketing  algorithms and increase its ability to profit from data about  Facebook users,” The Los Angeles Times reported.

Continue Reading >>

Apple execs deny company helps NSA monitor iPhone users

Apple executives have denied granting the US National Security Agency a so-called “backdoor” that allowed the intelligence monolith to surveil the company’s popular mobile devices.The denial was prompted by a report this week in the German  newspaper Der Spiegel which revealed that the NSA uses software  known as DROPOUT JEEP to monitor an iPhone user’s files, text  messages, contact lists, and location data. The technology was  also capable of using the iPhone’s camera and even its  microphone.

Continue Reading >>

Not Socially Acceptable: NSA boss video ‘most hated’ on YouTube in 2013?

A YouTube video in which NSA boss Keith Alexander tries “to set the record straight” on the agency’s spying antics has nosedived. The half-hour interview triggered a wave of criticism from users, branding it the “most hated” video on YouTube.

Continue Reading >>

‘I already won’: Snowden is helping the NSA though it brands him a traitor

Edward Snowden has said he feels satisfied and a winner despite the espionage charges confronting him. Denying claims he is a traitor, Snowden said he is working to improve the NSA, something that US spy chiefs do not realize.

Continue Reading >>

Clapper reveals Bush-era docs showing NSA spying dragnet started 2001

Obama’s Director for National Intelligence, James Clapper, has declassified new documents that reveal how the NSA was first given the green light to start collecting bulk communication data in the hunt for Al-Qaeda terrorists after 9/11.

Continue Reading >>

Eyes everywhere: NSA’s second tier spying partners identified

Denmark, Belgium, the Netherlands and several other EU countries were named among “third party partners” in the NSA-led global signal intelligence program, a new leak submitted by journalist Glenn Greenwald to Danish TV reveals.

Continue Reading >>

NSA confidence shaken since Snowden leaks began – report

Morale at the US National Security Agency has plummeted since the Edward Snowden leak made international headlines and inspired an ongoing wave of criticism against the intelligence agency – news that coincides with the publication of more NSA documents.

Continue Reading >>