“The “logical” way for the internet to be organised, in Irvine’s view, doesn’t require massive servers in data centres owned by big companies; they’re an unnecessary middleman. In fact, you don’t really need servers. “If you add up all the computers on our desks, it’s much more powerful, with larger storage, and larger CPU than any large corporation,” he said. The SAFE network would be distributed across the hard drives and CPUs of devices linked up to the system—”
“Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums.”
“One of the latest ideas to spring forth is a bold initiative called the Outernet. The Media Development Investment Fund is planning to launch hundreds of miniature satellites around the earth to create a wireless internet that anyone can access for free. The miniature satellite, or cubesat, will receive data from ground antennas around the globe and broadcast the content in the same manner as a television broadcast.
Not only could the Outernet revolutionize the cost of internet service, but MDIF is hoping to bypass internet censorship laws. The Outernet’s website states, “Access to knowledge and information is a human right, and Outernet will guarantee this right by taking a practical approach to information delivery. Lack of an Internet connection should not prevent anyone from learning about current events, trending topics and innovative ideas.”
Another brilliant idea is the Namecoin plug-in. Namecoin works similar to the crypto currency Bitcoin in the sense that it allows users to register names and information into a public blockchain. Currently, the Domain Name System (DNS) that most websites are registered with
allows for removal of a site by a central authority. With Namecoin however, users can register domain names without depending on hierarchical government institutions.
This plug-in allows users to view dot-bit (.bit) sites. Viral Electron Chaos Laboratories has launched tutorials with the plug-in to show webmasters how to set up Dot Bit versions of their Dot-Com sites. The Dot-bit sites are then registered into the public Namecoin blockchain. This decentralized network allows users to type Benswann.bit or Benswann.com and arrive at the same destination. The difference is that the Dot-com sites can be easily censored by governments and corporations.”
Throughout last night, panicked people told their stories of state-sponsored paramilitaries on motorcycles roaming middle class neighborhoods, shooting at people and storming into apartment buildings, shooting at anyone who seemed like he might be protesting. People continue to be arrested merely for protesting, and a long established local Human Rights NGO makes an urgent plea for an investigation into widespread reports of torture of detainees. There are now dozens of serious human right abuses: National Guardsmen shooting tear gas canisters directly into residential buildings. We have videos of soldiers shooting civilians on the street. And that’s just what came out in real time, over Twitter and YouTube, before any real investigation is carried out. Online media is next, a city of 645,000 inhabitants has been taken off the internet amid mounting repression, and this blog itself has been the object of a Facebook “block” campaign.
“”When a smartphone user opens Angry Birds, the popular game application, and starts slinging birds at chortling green pigs, spy agencies have plotted how to lurk in the background to snatch data revealing the player’s location, age, sex and other personal information …” The New York Times reported, based on the latest of Edward Snowden’s leaks.”
“ Russell Tice, one of the first NSA whistleblowers, comments on President Obama’s January 17 speech about the National Security Agency. Tice cautions that the modest changes Obama proposes do not even acknowledge the abuses that have occurred, and that the narrow focus on cosmetic changes to the mass collection of phone records distracts from the big picture of unconstitutional actions by NSA and other intel agencies. We note that not a single person was fired, and that Obama has ignored the clear perjury of DNI’s Clapper and NSA’s Alexander. Other than restricting the circle of surveillance to 2 hops, Obama did not embrace the findings of his hand-picked Review Panel or the thoughtful 21-point reform agenda presented by NSA whistleblowers. Tice also shares his views on Ed Snowden’s disclosures and Glenn Greenwald’s reporting.”
All physical matter is constantly moving, organized according to vibration, to frequency, which is the frequencies with which vibrations interact. Elements can be “programmed” to work with frequencies, be they in a quart-crystal radio, a musical instrument, or a microchip. This interview considers the direct application of vibration-based holographic (like on the back of your CREDIT CARDS) technology to problems of carbon emissions and homeopathy. Human beings glow in the dark, though the emissions are too slight for us to see working with only our thin sliver of the visible light spectrum. When we are diseased, the light changes in a predictable way (IF you know how to work with sound vibration, light, and conductive materials).
You have a phone that you call home with. The NSA can listen in to your phone using PICASSO. It knows your phone book, your recent calls, where you’ve been, your PIN numbers that you’ve used, and can block your calls. Like if you’re being chased by black SUV’s and you want to call 911 – tough luck, they’ve shut down your phone.
But the REAL interesting part of the PICASSO- it can collect LIVE AUDIO from the phone. Are you carrying on a great conversation about how much you think Obamacare is a scam? Your political dissent can now be recorded in real time and documented.”
“Either [the NSA] have a huge collection of exploits that work against Apple products, meaning they are hoarding information about critical systems that American companies produce, and sabotaging them, or Apple sabotaged it themselves,” Appelbaum said at the Chaos Communication Conference in Hamburg, Germany.”
“Users are made to accept an agreement that allows Facebook to “record audio with the microphone….at any time without your confirmation.”
The TOS also authorizes Facebook to take videos and pictures using the phone’s camera at any time without permission, as well as directly calling numbers, again without permission, that could incur charges.
But wait, there’s more! Facebook can also “read your phone’s call log” and “read data about contacts stored on your phone, including the frequency with which you’ve called, emailed or communicated in other ways with specific individuals.”
…most apps on Android and Apple devices include similar terms to those pictured above”