Tag Archives: government

The Blueprint for WWIII

The Blueprint for WWIII

by Dave Hodges – thecommonsenseshow.com
– Conspiracy, Featured, Main
Tagged: – no comments

denialMy next set of articles are not for the faint of heart. If you desire to keep on burying your head in the sand, then go watch the NFL Draft. Of course, if we do not collectively wake up the majority of sheep which inhabit this country and motivate them to action against the globalists, the acronym “NFL” will soon come to mean Not For Long. And “Not For Long” will soon represent how long the sheeple of this country can keep their heads buried in the sand as the country disintegrates into total chaos. No amount of cognitive dissonance, normalcy bias and general apathy can protect even the most unaware of Americans as to what lies in their immediate future. The solvency of the Federal Reserve is being threatened and to understand the roots of the coming world war and the roll out of tyrannical martial law, over this issue, I need to take a brief look at the historical underpinnings.
The Birth of the Petrodollar

A novel system for monetary and exchange rates were established in 1944. The Bretton Woods Agreement was developed at the United Nations Monetary and Financial Conference held in Bretton Woods, New Hampshire, from July 1-22, 1944. This conference established the US dollar as the reserve currency of the world.

The Banksters (e.g. Rockefellers’) reveled in their new found fortune. As a result of the Bretton Woods Conference, all nations desiring to purchase Middle East oil had to first purchase dollars and use these dollars to complete the purchase of oil.

Nearly everyone inside of our country benefited from this system. Americans basically enjoyed a stable currency minus the inflation rates of about 5% per year which served as an informal tax that went into the Federal Reserve banksters’ pockets. Thus, the Petrodollar was born. If the Petrodollar were to ever be successfully undermined, our currency would sink faster than a submarine with screen doors because there is nothing backing up our money.

The old guard at the Federal Reserve worked from 1910 to 1971 to rid the economy of the Gold Standard so that they could enforce debt slavery upon the American people and government through encouraging a prolonged out of control spending spree accompanied by the awarding of lucrative unbid contracts to the elite’s corporations which would dramatically drive up the deficit and line the pockets of the Federal Reserve owners.

The coming war with Syria is merely the opening act. The main act, following Syrian subjugation, will consist of the United States and Israel and perhaps England attacking Iran. Iran is the prize needed for the old guard of the Federal Reserve to maintain its strangle hold on the global economy. On the surface, attacking Iran seems like a good idea if it will preserve our economy. However, the risks associated with this course of action are astronomical.
Why Every American Should Fixate On This Issue

starvationThe Petrodollar is in real trouble and so is your bank account, your job, your ability to get gas, medicine, food and water. America is literally a push button away from the total calamity that we see in the NBC show, Revolution. In many eyes, the Petrodollar must be maintained at all costs.
On the Precipice of WWIII

Syria is the first real domino in the coming conflict that threatens all life on this planet. The take down of Egypt and Libya was mere foreplay. The real action will commence in a few months with the invasion of Syria and the excuse will be to save humanity from Syria’s weapons of mass destruction, namely, chemical weapons. Hmmm, isn’t there a DHS chemical weapons attack drill planned for either Denver or Portsmouth next month? But I digress, this issue will be fully exposed in a subsequent complementary article in this series.

Make no mistake about it, America is headed towards war with Syria and don’t think for a second that this war will imitate, in any way, the wars in Iraq and in Afghanistan. The previous wars compared to Syria, and later with Iran, is child’s play compared to anything we have been involved with in the history of this nation. The “saving the Petrodollar” strategy being pursued by the Federal Reserve is a high stakes gamble with you, your children and the future of humanity being used as their collateral.

Proof that the coming war is imminent is evidenced by the accusations being currently made by the US government that Syria is using chemical weapons against the rebels. In this fabrication of the Syrian version of the Boston Marathon bombing false flag event, it is likely that if there are chemical weapons in play, the CIA is the responsible party. Why? Because all roads to Tehran run through Damascus. Iran is the actual target of the Federal Reserve’s war intentions, because Iran is doing the unthinkable as it is waging war on the old guard of the New World Order, by selling its oil to Russia, China and India for gold and this is a dire threat to the solvency of the dollar.
First Syria, Then Iran

map of syria and iranBefore one can invade Iran, with the threat of Russian intervention looming, Syria must first be occupied and fortified by US/NATO forces. Occupying Syria allows America and her allies to invade Iran from several directions. Through Syria, we will see airstrikes which will fly unimpeded over Northern Iraq. Also, and most importantly, the occupation of Syria will be a threat to the mobilization of forces inside of Russia who would then come under the American long and short range missile batteries, which will be installed in Syria. These missiles will surely be armed with battlefield nuclear warheads. This deterrent could provide the Americans with enough time to occupy most of Iran before Russia or China could act with its conventional forces. This strategy, however, dares the Chinese and Russians to not invoke the use of large scale nuclear weapons in the biggest game of chicken ever played on this planet.
The Unexpected Twists and Turns of the Coming World War

I do not expect China to attack the US in the Middle East, at least not at first. I expect the Chinese to move on Taiwan and let the North Koreans launch its nuclear missiles against Japan. It is possible that Russia might further invade the US through Alaska.

fear aheadI never thought that elements of the Red Dawn scenario would ever come to fruition, but how many times have we seen the media tell us what is going to transpire in advance of an event? And while we are at it, I would anticipate that China would approach the Southwestern underbelly of the United States via Central America, given that the Chinese control the Panama Canal and are rumored to have troops throughout Central America, including Mexico. And if things really go crazy, all sides may launch its ICBM missiles and their submarine based nuclear missiles at each others homeland and then all bets are off. Perhaps, you now know why I constantly refer these criminal banksters who have hijacked our government as psychopathic.
Iran Is Public Enemy Number One

Because of Iran’s threat to the Petrodollar, Iran occupies a similar, but much more dangerous position than did Iraq in 2001. As we now all know, 9/11 provided the motivation to invade Iraq. No, Iraq was not responsible for the 9/11 attacks and President Bush did admit as much. But that did not prevent Bush from capitalizing on the emotion from 9/11 so that America would confuse the issues and tacitly accept the invasion of Iraq in which the Iraqi’s were lumped together with all Middle Eastern nations who “want to kill us because of our freedoms.”

petrodollarSpecifically, why did Iraq have to be invaded? Simple, Saddam Hussein was attempting to sell his oil in currency other than Federal Reserve Notes (i.e. the Euro). He was threatening the Federal Reserve and at that time, he was also a threat to the central bankers in their headquarters, otherwise known as the Bank of International Settlements, which controls all central banking. During that time frame, these banksters would have done anything at that time to prevent a threat to the world’s reserve currency, namely the dollar, which they controlled.

Following the completion of the second Iraq war, Exxon and BP controlled 80% of Iraqi oil fields and nobody would be selling Iraqi oil in either the Euro or for gold. However, the game has changed, Iran has replaced Iraq as the major threat to the stability of the Federal Reserve Notes.

Iran is economically destroying the US. Unfortunately for every man, woman and child in America, that day of economic reckoning is quickly approaching. China has commenced buying Iranian oil in gold. India has followed suit, as have the Russians. The days of the Petrodollar are numbered and therefore, so is the only source of backing of our dollar. Have you and your family prepared for the collapse of the dollar and ultimately the collapse of society? It is coming and it coming fast.
The Russians and the Chinese Have Warned the US
President Hu

President Hu

Creating the pretext for fighting a war, and then successfully selling the American public on the need to fight the war, is one thing. However, winning the war, is quite another. How serious are the Chinese and Russians at standing up to the imperialistic United States? Considering that both Chinese President Hu and Major General Zhang Zhaozhong have threatened the United States with nuclear war if they invade Iran, the prudent opinion says that this is the newest version of the “Axis of Evil’s” line in the sand, has been clearly drawn.
The Dawn of the American Empire

America is in a very difficult dilemma. If we acquiesce to the Russian and Chinese threat of war for invading Iran, our dollar will collapse. If we attack Iran after taking over Syria, the nuclear powers with formidable armies have promised retaliation. America could see its first invasion on American soil since the War of 1812.

It is possible that the Americans will only invade Syria in a game of brinksmanship with the Russians and the Chinese, in order to test their resolve (e.g. a game of military chicken). However, I don’t think that is likely. The Federal Reserve will not back down. They have already killed Gaddafi and Hussein in order to preserve the Petrodollar. They are not going to back down to the Iranians, Chinese and Russians because it will not be their children doing the fighting and dying, it will be our children. Now, does it make sense on why the elite are driving down the price of Gold so they can buy up as much as they can for as cheaply as they can? They intend to be the last men standing at the end of the next great war to end all wars.

And just how will the elite sell us on war? You can bet there will be more false flag events, with each one being more horrific than the previous one. And guess who will get the blame? It does not take a rocket scientist to accurately speculate that the last of the false flag events will be nuclear and then all hell will break loose.
Conclusion

It is clear, it is hands off Iran or it means WWIII. Does anyone really think that the Federal Reserve is going to take this lying down? Could the path to WWIII be the reason that so many bankers have left the United States because they know what is coming?

police brutality 6

How do the false flag events tie into this? One hint I will offer is that once you understand the globalist objectives, the Boston Marathon bombing and the aftermath of martial law will make a lot of sense. What will the accompanying martial law look like in this country? The last question is the easiest to answer, because the government has left a trail of documents which details how martial law will enforced and it is frightening. In the next several installments in this series, I will answer all of these questions and perhaps a little bit more.

Will the Real Zombies Please Stand Up?

Will the Real Zombies Please Stand Up?

by Dave Hodges – thecommonsenseshow.com

Zombies are currently all the rage. Between movies, books, games, television shows, and other media the concept of a zombie apocalypse is very popular. And before you accuse yours truly of totally losing his mind, you should note the accompanying picture is brought to you courtesy of the CDC.

Also, when I read that Russia was testing a beam weapon, which was introduced by Russian defense minister Anatoly Serdyukov that could fight back against a zombie attack, I wondered if I had missed something in my undergraduate Zoology class.

The Australia’s Herald Sun reports that this Russian weapon could transform humans into Zombies. I began to wonder if there really is something to the rumors coming out of both the mainstream media (MSM) about the plausibility of something transforming humans into zombies, which would, in-turn, terrorize humanity.

In October of 2012, Navy special-operations forces, along with the Marines, took part in a DHS drill on an island off the coast of San Diego. The entire drill was based upon a zombie invasion. This drill was not a parody as the exercise was also attended by former CIA director Michael Hayden.

Let me be clear on this point, DHS director, Janet Napolitano is not secretly concerned that the undead will soon overrun the human population. Instead, the agency said it wanted to make a serious counter-terrorism training exercise more fun. ABC news reported the event as an example of wasteful spending. In fact, Senator Tom Coburn (R-Okla.) told ABC News that DHS also spent “$30,000 on an underwater robot for Columbus, Ohio, $240,000 for a armored personnel carrier to protect New Hampshire’s annual pumpkin festival and $69,000 for a hovercraft in Indianapolis.” Wasteful spending, more fun? What a great way to hide what DHS is truly up to.

And just when it could not get an weirder, it is now reported that FEMA will hold a Zombie Apocalypse/Alien Invasion drill in Moscow, Idaho on April 27th, from 9 am to 5 pm with 100 participating actors. DHS scrubbed the notice of the drill from its website. However, the drill is still a go as evidenced by the fact that the County Coordinator, Sandi Rollins, for the Moscow, ID. area is listed as being the local person in charge of the drill. Here is Ms. Rollins’ contact information

County Coordinator
Latah County
PO Box 8068
Moscow, ID 83843 [email protected] 209-883-2265

The National Geographic Channel Popularizes the “Zombie Threat”

The National Geographic Channel produced a docudrama entitled The Truth Behind Zombies. The threat from Zombies begins as an outbreak in which humans exhibit an extreme level of violence, entranced states as they plunge into absolute madness. Within days, the epidemic spreads and humanity is griped with fear. The show speculates that there is something behind the zombie myth. The show then proceeds to speculate on whether a mutated virus could create a vast army of Zombies and the producers go so far as to teach viewers how to survive such a threat.

Before running for the hills, it might be useful to recall that National Geographic has always been a CIA enterprise. And it is interesting that this show surfaced in proximity to the Zombie drills sponsored by DHS.

Against all common sense, I began to wonder if there could really be something to the legends of Zombies and if DHS actually knew something that we did not about this potential threat. Being a researcher, I began to systematically examine each and every instance of the reports of threatening Zombies using the principle known as Occam’s Razor which states that the simplest answer is most often correct answer.

The Russian Zombie Death Ray Gun

Upon closer examination, the alleged Russian inspired Zombie creating death ray is no more than a crowd control device capable of inflicting massive pain and mind-control. The hordes of newly created Russian Zombies were no more than dissidents who needed to brought under control. And the Russian weapon is similar to the “microwave heater” used by the US government for the same purpose. Although the Zombie producing ray gun is a myth, the fact that the device is a crowd control device is highly significant. Perhaps the Russian version of the DHS is also accumulating billions of rounds of ammunition in order to use it against the Russian people.
DHS Zombie Defense Drills

When we strip away the Zombie hype in the media, the Zombie preparation drill in October of last year, according to the videotape evidence, is no more than a glorified target practice session designed to practice shootinh humans.

Below is a two minute clip of the Zombie preparedness drills sponsored by DHS.

It is very difficult for anyone, who is not dumber than a box of rocks, to find the real threat posed by Zombies in this video. It was difficult to hold back the laughter as I watched this video. However, the important thing to remember about this exercise is that the targets were human and they were unarmed and this is no laughing matter.
DHS Training Exercises and Manuals

When one considers the leaked US Army Military Police training manual, which details how military assets are to be used to stop acts of civil disobedience, to confiscate firearms and to even murder Americans on American soil and these documents are further characterizing Americans as enemies of the state who are “suspicious of centralized federal authority.” Christians who believe the Bible is the literal word of God.are also the enemy of DHS.

dhsWhat the hell is DHS up to? Who are the real Zombies? This is a very reasonable question to ask especially with DHS purchasing billions of rounds of ammunition, placing orders for 2700 armored personnel carriers and placing solicitations for 7,000 fully automatic rifles, one should become very suspicious as to the true motives of DHS.
Who Could Ever Forget?

sDo you remember when the DHS got caught using the images of these people as target practice? I have concluded that the pregnant woman is a Zombie as is the little boy and the elderly lady. And just like the Zombies in San Diego and soon to be in Moscow, Idaho, DHS has simply replaced the term domestic terrorist with the term Zombie. Why?

America, YOU Are the Zombies

A mythical Zombie invasion is a politically correct way to practice shooting American citizens in a civilian uprising. Can you imagine the outcry if it were discovered that our military, DHS forces and foreign assets were practicing for civilian uprisings by murdering unarmed civilians in the street? This would serve to awaken a lot of the sheep that mistakenly believes that DHS was actually put in play to protect you from al Qaeda. Also, when you train your troops to be shooting at zombies, it dehumanizes the target and desensitizes the act, thus, making it easier to pull the trigger for American soldiers when they are called upon to fire upon American citizens.

Conclusion

The battle lines have been drawn. Yet, most Americans are still unaware that they are about to the most hunted prey on the planet. Field Marshall Napolitano, on behalf of the globalists, has declared most Americans to be enemies of the illegitimate state.

When you go to bed tonight, instead of counting sheep, instead, maybe you should think about waking up a few of the sheep before you are living through a perpetual globalist nightmare.
SOURCE

Egypt Issues Arrest Warrant For Jon Stewart – Extradition to be sought

Egypt Issues Arrest Warrant For Jon Stewart

The Egyptian government has issued an arrest warrant for American comedian Jon Stewart, accusing him of blasphemy and fomenting “anti-Egyptian” sentiment.

The charges come just two days after Stewart used The Daily Show to blast Egyptian president Mohammed Morsi over his harassment of Bassem Youssef, an Egyptian satirist critical of his government.

Youssef is the host of the wildly popular El Bernameg, a satirical news program inspired by Stewart’s Daily Show. He has been questioned by police in recent days, and the government has threatened to revoke the licence of the television station at which he works.

According to a statement issued by Minister of Justice Ahmed Mekki, Stewart will also be charged with “contributing to the delinquency of an Egyptian”, for his role in inspiring Youssef to challenge the Islamist regime.

Mekki claims that since clips form The Daily Show are rebroadcast in Egypt on CNN’s international channel, Stewart is open to prosecution under Egyptian law.
Pyramid Scheme

“Mr. Stewart has 30 days to surrender to Egyptian authorities in Cairo,” the statement reads, “If he does not comply he will be tried in abstenia and we will seek his extradition from the American government.

“This conspiracy to defame the Egyptian government violates our laws and will be prosecuted fully. Mr. Stewart may think he’s funny. But in reality he is destroying the moral fiber of Egypt with his numerous references to penises and openly flamboyant homosexuals like Larry Craig, Marcus Bachmann, and Lindsey Graham.”

Some have reacted with surprise that Egypt is investing precious time and energy into pursuing a legal case against a foreign comedian. Faced with a collapsing economy, a constitutional crisis, and an epidemic of sexual assaults – the government’s resources could perhaps be better used.

However, in an exclusive interview, Mekki says there is nothing more important than defending Egypt’s honor against America’s most prominent political comedian.

“We’re making this our top priority,” he beams, “We’re taking prosecutors off of sexual harassment and domestic violence cases and reassigning them to Stewart. These jokes simply cannot go unpunished.

“We’re also planning to get The Moment of Zen segment removed from the Egyptian broadcast immediately. We can’t have Buddhist fifth infiltrating our Islamic republic.”

According to legal experts, Egypt’s action against Stewart will have little effect as the American government is unlikely to extradite him.

“Egypt is a sovereign country,” explains one prominent international lawyer, “They can do whatever they want. But their warrants have no validity in the United States.

“All this would do is stop Stewart form visiting Egypt. So I guess no pyramids for him.”

Watch: The video that started it all.

SOURCE

Depopulation Through Planned Governmental Starvation of U.S. Citizens

Depopulation Through Planned Governmental Starvation of U.S. Citizens

Dave Hodges

“If people let government decide what foods they eat and what medicines they take, their bodies will soon be in as sorry a state as are the souls of those who live under tyranny.”

Thomas Jefferson

The lessons of history clearly demonstrate that dictatorial regimes, whether they be Socialists, Communists, and Marxists will not hesitate to use food as a weapon against their own people in order to solidify power and impose absolute autocratic control. Food can be withheld from the masses by preventing it from being grown and harvested, by contaminating it and rendering it unfit for human consumption or by simply preventing food from being distributed to a targeted population.

The two most notable examples of dictators using food a weapon in order to destroy the free will of their people comes from the regimes of Stalin and Hitler.

Josef Stalin engaged in his own Soviet style Holocaust when, in 1932 and 1933, and estimated six to 20 million people in the Ukraine died from starvation when Stalin implemented his prescription of “hope and change” policies in order to eliminate the Ukrainian’s desire for becoming their own nation-state.

Upon assuming power, the Stalinist Communist regime rapidly nationalized the food industry and forced all of the region’s farms into collectives. Thus, Stalin’s version of the Holocaust came to fruition in what history has dubbed, the “Holdomor,” in which millions perished in only a two year period when the Soviet government began to exterminate the Ukrainian population by taking control of food and food production.

Hitler proclaimed that food could be used as a tool “…to discipline the masses” and he did not hesitate to use the control of food as a type of carrot and stick in which he would reward accomplishment and punish failure as well as to ferment preferential class distinctions in which his armed forces received the largest food ration cards. Skilled workers who were engaged in industries critical to the building of the German war machine, received food ration cards which were slightly less in value. And, finally, the prisoners and the Jews received the lowest valued Nazi food ration cards. Food ration cards were also utilized as incentives to increase industrial production and were also increased in value when productive Nazi workers would be promoted. Food ration cards were diminished in value for the failure to meet Nazi production goals. Hitler’s use of what psychologists refer to as classical conditioning techniques reduced the will of the German population to a pack of Pavlovian dogs who were conditioned to be totally dependent upon the government for their survival.

Most recently, Somalia thug, Farah Aideed, systematically starved his people into submission as a brutal civil war raged in both Darfur and Rwanda where the Islamic regimes sought the annihilation of ‘infidels’ and the use of food was one of the primary weapons designed to force compliance. And of course, Pol Pot, Castro and Mao all used food deprivation to quarantine their political opposition and exact absolute allegiance to their respective dictatorial regimes.

I venture to say that most individuals who get their “news” from FOX and CNN would hold fast to the belief that the benevolent U.S. government would never use food as a weapon against the American people. Someone should remind these “sheeple” that this is the same U.S. government which has been caught shipping drugs into Mexico under Operation Fast and Furious which has resulted in the deaths of a half dozen U.S. law enforcement officials. Yes, this is the same government which has turned a blind eye to HSBC bank setting up fictitious bank accounts in order to launder money derived from the profits of drug trafficking and running guns and then turning around and sending this money to fund various terrorist organizations. Yes, this is the same government which permits the Federal Reserve to send trillions of American dollars in order to bail out their own personal banking interests in Europe. Yes, this is the same U.S. government , through the TSA, which commits second degree sexual assault on airline travelers under the guise of protecting Americans from the very terrorists that they are complicit in funding through organizations such as the HSBC bank. Therefore, it is prudent to ask the question, would the United States use food a tool of governmental policy in order to control its population? Unfortunately, this question has already been answered in the affirmative.

The use of food by the U.S. government has been a matter of official U.S. governmental covert policy since 1974-1975.

In December, 1974, National Security Council directed by Henry Kissinger completed a classified study entitled, “National Security Study Memorandum 200: Implications of Worldwide Population Growth for U.S. Security and Overseas Interests.” The study was based upon the unproven claims that population growth in Lesser Developed Countries (LDC) constituted a serious risk to America’s national security.

In November 1975 President Ford, based upon the tenets of NSSM 200 outlined a classified plan to forcibly reduce population growth in LDC countries through birth control, war and famine. Ford’s new national security adviser, Brent Scowcroft, in conjunction with CIA Director, George H. W. Bush, were tasked with implementing the plan and the secretaries of state, treasury, defense, and agriculture assisted in the implementation of these insane genocidal plans.

NSSM 200 formally raised the question, “Would food be considered an instrument of national power? … Is the U.S. prepared to accept food rationing to help people who can’t/won’t control their population growth?” Kissinger has answered these questions when he stated that he was predicting a series of contrived famines, created by mandatory programs and this would make exclusive reliance on birth control programs unnecessary in this modern day application of eugenics in a scheme that would allow Henry to have his cake and eat it too in that the world would finally be rid of the “useless eaters!”

Third world population control, using food as one of the primary weapons, has long been a matter of official covert national policy and a portion of President Obama’s Executive Order (EO), National Defense Resources Preparedness is a continuation of that policy. Only now, the intended target are not the LDC’s but, instead, the American people.

With the stroke of his pen, Obama has total and absolute control over all food where his EO states:

e) “Food resources” means all commodities and products, (simple, mixed, or compound), or complements to such commodities or products, that are capable of being ingested by either human beings or animals, irrespective of other uses to which such commodities or products may be put, at all stages of processing from the raw commodity to the products thereof in vendible form for human or animal consumption. “Food resources” also means potable water packaged in commercially marketable containers, all starches, sugars, vegetable and animal or marine fats and oils, seed, cotton, hemp, and flax fiber, but does not mean any such material after it loses its identity as an agricultural commodity or agricultural product.

(f) “Food resource facilities” means plants, machinery, vehicles (including on farm), and other facilities required for the production, processing, distribution, and storage (including cold storage) of food resources, and for the domestic distribution of farm equipment and fertilizer…”

This unconstitutional EO is particularly disturbing in that it clearly states that the government has control over anything that is “capable of being ingested by either human beings or animals…” If you thought that you and Fido were going to get through coming food crisis by storing and consuming dog food, think again.

How will farmers maintain the nation’s food supply when all fertilizer, their farm equipment and all of their vehicles are under the control of this sociopathic President or the next power-hungry President?

The term “all food storage facilities” includes your refrigerator, your pantry and even the very food in your cabinets as well as what is on your kitchen table. In short, anywhere you keep food is now under the control of the government and can be redistributed.

Have you recently been scratching your head in bewilderment as you watch on the news as the Amish have had their farms raided, raw milk producers have been jailed and the kids running lemonade stands have been shut down and ticketed? Now you know why these abuses are being perpetrated by the government in that it represents a mere conditioning process designed to get all U.S. citizens used to the idea that the government owns all food and food production.

The most clever aspect of this EO is that no Hegelian Dialectic (i.e., false flag event) is needed as a pretense to seize food and imperil survivability. Section 201(b) of the Obama EO clearly states that this EO is enforceable under both emergency and non-emergency conditions.”

Even Ray Charles could see that Obama is setting the table to take his place among Stalin, Hitler, Pol Pot, Castro and Mao as another despot in the long line of tyrannical leaders who would grant themselves the authority to subjugate the masses by using food as a weapon. Americans desperately need to look at history in order to understand what happens every time the people of a government allows the government to control its food supplies and farms. It was with great forethought that the second part of the title of this article reads “…systematic population reduction.”

In hindsight, I have often wondered how prophetic was Obama’s campaign speech when he promised to fundamentally transform America? This was actually one campaign promise that Obama is trying to keep. NSSM 200 has come full circle, but in this case, it is specifically aimed at the American people. History show us that Socialists, Communists, Islamists and Marxists, use food and the production of food as a weapon against their own people in order to solidify power and control. Hitler himself said that using food as a weapon was “a beautiful instrument . . . for maneuvering and disciplining the masses.”

Through the National Defense Preparedness Act, Obama is following in the footsteps of Hitler and Stalin and we should all be worried, very worried.

SOURCE

Life in Prison for possession of a Half-Ounce of Medical Marijuana

Facing life in prison for a half Ounce of medical marijuana

Alex Webb

Well now, all other crimes will have to wait, there’s a pothead out there trying to score. Why waste the time chasing rapists, murders and meth manufacturers when it’s so much easier to nab a stoner. How is it that governments and law enforcement is so against marijuana, but supports viewing the killing of a world leader on TV? We have Disney and Nickelodeon trying desperately to sell sex to our children, and with the rise of child sex offenders their efforts are paying off, but if someone smokes a plant they’re attacked as if they were Hitler. I guess none of these Middle aged mothers taking their clothes off for Justin Bieber ever sparked a joint and watched the Big Lebowski. Which one of those statements sounds more illegal? But lets digress…

20-Year-old Chris Diaz is an asthma sufferer from Texas. After learning medical marijuana was a successful treatment for asthma, he headed to California seeking medical treatment. Diaz was approved for medical marijuana in California for his serious condition, so he stocked up on what he could afford and headed back to his home town in Texas.

He was pulled over on a Texas highway for having an expired license tag, a routine traffic stop. But when Diaz wasn’t able to produce a drivers’ license or proof of insurance this alerted the police officer. Already in custody for a criminal offense, the officer began to search Diaz’s car. They found 14 grams of medical marijuana and hashish, medical marijuana is not legal in Texas nor do they recognize medical cannabis cards from other states.

Under Texas law, Marijuana possession of less then 2 ounces is a Class B misdemeanor that is punishable with fines and up to six months in jail. But the hash is a totally different story, possession of hashish is a Class 2 felony punishable by up to 20 years including fines if less then 4 grams. Diaz can only wish he was so lucky.

He is charged with possession of a controlled substance with intent to deliver, a half ounce must be “Big Time” in Texas. Diaz was indicted by a Brown County grand jury, and now he faces up to life in prison, and without his much needed medication. He is now in jail on a $40,000 bond awaiting trial.

Why is Texas so worried about a small amount of pot, so much to the extent to take someone’s entire life away? Diaz’s real crime was driving in an unregistered plates and without a license and insurance. Some stiff fines and community service will nip that in the bud, but to focus on some small amount of marijuana and treating him like a murder is just plain BS. No one is saying Diaz is innocent, but at the ripe age of 20 he deserves the opportunity to become a valuable citizen. Moral of the story is, stay away from Texas!

SOURCE

Obscure Obamacare rule gives government access to everybody’s health records

Obamacare HHS rule would give government everybody’s health records

By: Rep. Tim Huelskamp

Secretary of Health and Human Services Kathleen Sebelius has proposed that medical records of all Americans be turned over to the federal government by private health insurers.

It’s been said a thousand times: Congress had to pass President Obama’s health care law in order to find out what’s in it. But, despite the repetitiveness, the level of shock from each new discovery never seems to recede.

This time, America is learning about the federal government’s plan to collect and aggregate confidential patient records for every one of us.

In a proposed rule from Secretary Kathleen Sebelius and the Department of Health and Human Services (HHS), the federal government is demanding insurance companies submit detailed health care information about their patients.

(See Proposed Rule: Patient Protection and Affordable Care Act; Standards Related to Reinsurance, Risk Corridors and Risk Adjustment, Volume 76, page 41930. Proposed rule docket ID is HHS-OS-2011-0022 http://www.gpo.gov/fdsys/pkg/FR-2011-07-15/pdf/2011-17609.pdf)

The HHS has proposed the federal government pursue one of three paths to obtain this sensitive information: A “centralized approach” wherein insurers’ data go directly to Washington; an “intermediate state-level approach” in which insurers give the information to the 50 states; or a “distributed approach” in which health insurance companies crunch the numbers according to federal bureaucrat edict.

It’s par for the course with the federal government, but abstract terms are used to distract from the real objectives of this idea: no matter which “option” is chosen, government bureaucrats would have access to the health records of every American – including you.

There are major problems with any one of these three “options.” First is the obvious breach of patient confidentiality. The federal government does not exactly have a stellar track record when it comes to managing private information about its citizens.

Why should we trust that the federal government would somehow keep all patient records confidential? In one case, a government employee’s laptop containing information about 26.5 million veterans and their spouses was stolen from the employee’s home.

There’s also the HHS contractor who lost a laptop containing medical information about nearly 50,000 Medicare beneficiaries. And, we cannot forget when the USDA’s computer system was compromised and information and photos of 26,000 employees, contractors, and retirees potentially accessed.

The second concern is the government compulsion to seize details about private business practices. Certainly many health insurance companies defended and advocated for the president’s health care law, but they likely did not know this was part of the bargain.

They are being asked to provide proprietary information to governments for purposes that will undermine their competitiveness. Obama and Sebelius made such a big deal about Americans being able to keep the coverage they have under ObamaCare; with these provisions, such private insurance may cease to exist if insurers are required to divulge their business models.

Certainly businesses have lost confidential data like the federal government has, but the power of the market can punish the private sector. A victim can fire a health insurance company; he cannot fire a bureaucrat.

What happens to the federal government if it loses a laptop full of patient data or business information? What recourse do individual citizens have against an inept bureaucrat who leaves the computer unlocked? Imagine a Wikileaks-sized disclosure of every Americans’ health histories. The results could be devastating – embarrassing – even Orwellian.

With its extensive rule-making decrees, ObamaCare has been an exercise in creating authority out of thin air at the expense of individuals’ rights, freedoms, and liberties.

The ability of the federal government to spy on, review, and approve individuals’ private patient-doctor interactions is an excessive power-grab.

Like other discoveries that have occurred since the law’s passage, this one leaves us scratching our heads as to the necessity not just of this provision, but the entire law.

The HHS attempts to justify its proposal on the grounds that it has to be able to compare performance. No matter what the explanation is, however, this type of data collection is an egregious violation of patient-doctor confidentiality and business privacy. It is like J. Edgar Hoover in a lab coat.

And, no matter what assurances Obama, Sebelius and their unelected and unaccountable HHS bureaucrats make about protections and safeguards of data, too many people already know what can result when their confidential information gets into the wrong hands, either intentionally or unintentionally.

Republican Tim Huelskamp represents the first congressional district of Kansas.

Read more at the Washington Examiner: SOURCE

FEMA, FCC Announce Nationwide Test Of The Emergency Alert System

FEMA and a Special Announcement

The Intel Hub
Shepard Ambellas


Note: The Intel Hub is making an announcement within this release based on information we have received from our sources. This announcement is not to be taken lightly, but at the same time should not dictate a panic either. Unfortunately at this time we are undergoing an investigation and are only able to provide a vague alert regarding the following statement released by FEMA dated June 9, 2011;

FEMA, FCC Announce Nationwide Test Of The Emergency Alert System

Similar to local Emergency Alert System Tests, this Test is Scheduled to Take Place on November 9, 2011

Release Date: June 9, 2011
Release Number: HQ-11-099

WASHINGTON, D.C. — The U.S. Department of Homeland Security’s Federal Emergency Management Agency (FEMA) and the Federal Communications Commission (FCC) will conduct the first nationwide test of the Emergency Alert System (EAS). The nationwide test will occur on Wednesday, November 9 at 2 p.m. eastern standard time and may last up to three and a half minutes.

The EAS is a national alert and warning system established to enable the President of the United States to address the American public during emergencies. NOAA’s National Weather Service, governors and state and local emergency authorities also use parts of the system to issue more localized emergency alerts.

Similar to local EAS tests that are already conducted frequently, the nationwide test will involve broadcast radio and television stations, cable television, satellite radio and television services and wireline video service providers across all states and the territories of Puerto Rico, the U.S. Virgin Islands and American Samoa.

PART 2

On November 9, the public will hear a message indicating that “This is a test.” The audio message will be the same for both radio and television. Under the FCC’s rules, radio and television broadcasters, cable operators, satellite digital audio radio service providers, direct broadcast satellite service providers and wireline video service providers are required to receive and transmit presidential EAS messages to the public. A national test will help the federal partners and EAS participants determine the reliability of the system and its effectiveness in notifying the public of emergencies and potential dangers nationally and regionally.

“A national test of our Emergency Alert System, with the vital communications support and involvement of participants, is a step towards ensuring that the alert and warning community is prepared to deliver critical information that can help save lives and protect property,” said Damon Penn, FEMA’s Assistant Administrator of National Continuity Programs. “Because there has never been an activation of the Emergency Alert System on a national level, FEMA views this test as an excellent opportunity to assess the readiness and effectiveness of the current system. It is important to remember that this is not a pass or fail test, but a chance to establish a baseline for making incremental improvements to the Emergency Alert System with ongoing and future testing. It is also important to remember that the Emergency Alert System is one of many tools in our communications toolbox, and we will continue to work on additional channels that can be a lifeline of information for people during an emergency.”

“The upcoming national test is critical to ensuring that the EAS works as designed,” said Jamie Barnett, Chief of the FCC’s Public Safety and Homeland Security Bureau. “As recent disasters here at home and in Japan have reminded us, a reliable and effective emergency alert and warning system is key to ensuring the public’s safety during times of emergency. We look forward to working with FEMA in preparation for this important test.”

Over the past two years and as part of ongoing national preparedness planning efforts, FEMA, the FCC and other federal partners, state, local, tribal and territorial governments, Emergency Alert System participants and other stakeholders have been working toward making this test a reality.

As the federal, state, tribal, territorial and local governments prepare for and test their capabilities, this event serves as a reminder that everyone should establish an emergency preparedness kit and emergency plan for themselves, their families, communities, and businesses. Anyone can visit www.Ready.gov for more information about how to prepare for and stay informed about what to do in the event of an actual emergency.

FEMA’s mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards.

SOURCE

Red Light……Green Light….Red Light! Gotcha!

Challenges to red light cameras span US
Studies touting safety benefits sometimes contradictory, incomplete

By Alex Johnson Reporter
msnbc.com

In more than 500 cities and towns in 25 states, silent sentries keep watch over intersections, snapping photos and shooting video of drivers who run red lights. The cameras are on the job in metropolises like Houston and Chicago and in small towns like Selmer, Tenn., population 4,700, where a single camera setup monitors traffic at the intersection of U.S. Highway 64 and Mulberry Avenue.

One of the places is Los Angeles, where, if the Police Commission gets its way, the red light cameras will have to come down in a few weeks. That puts the nation’s second-largest city at the leading edge of an anti-camera movement that appears to have been gaining traction across the country in recent weeks.

A City Council committee is considering whether to continue the city’s camera contract over the objections of the commission, which voted unanimously to remove the camera system, which shoots video of cars running red lights at 32 of the city’s thousands of intersections. The private Arizona company that installed the cameras and runs the program mails off $446 tickets to their registered owners.

The company’s contract will expire at the end of July if the council can’t reach a final agreement to renew it.

Opponents of the cameras often argue that they are really just revenue engines for struggling cities and towns, silently dinging motorists for mostly minor infractions. And while guidelines issued by the National Highway Traffic Safety Administration say revenue is an invalid justification for the use of the eyes in the sky (see box at right), camera-generated citations do spin off a lot of money in many cities — the nearly 400 cameras in Chicago, for example, generated more than $64 million in 2009, the last year for which complete figures were available.

Los Angeles hasn’t been so lucky.

The city gets only a third of the revenue generated by camera citations, many of which go unpaid anyway because judges refuse to enforce them, the city controller’s office reported last year. It found in an audit that if you add it all up, operating the cameras has cost $1 million to $1.5 million a year more than they’ve generated in fines, even as “the program has not been able to document conclusively an increase in public safety.”

Federal camera guidelines

The Federal Highway Traffic Safety Administration says red light cameras and other automated traffic controls should:

• Reduce the frequency of violations.

• Maximize safety improvements with the most efficient use of resources.

• Maximize public awareness and approval.

• Maximize perceived likelihood that violators will be caught.

• Enhance the capabilities of traffic law enforcement and supplement, rather than replace, traffic stops by officers.

• Emphasize deterrence rather than punishment.

• Emphasize safety rather than revenue generation.

• Maintain program transparency by educating the public about program operations and be prepared to explain and justify decisions that affect program operations.

Source: Speed Enforcement Camera Systems Operational Guidelines, Federal Highway Traffic Safety Administration


Another common refrain from critics is that the devices replace a human officer’s judgment and discretion with the cold, unforgiving algorithms of a machine.

“You’ve got to treat people fairly,”
said Jay Beeber, executive director of Safer Streets LA, who has led the campaign to kill the city’s red light cameras. “You have to give people a fighting chance that you’re not going to penalize them for a minor lapse of judgment.”

Paul Kubosh, a lawyer who has led a similar anti-camera fight in Houston, called the camera systems “a scam on the public,” because they “are writing tickets that police officers don’t write.”

There’s a fierce court battle going on in Houston, the nation’s fourth-largest city, after a U.S. district judge this week ruled that a measure voters approved to shut down the city’s more than 70 cameras was invalid on procedural grounds.

Could hundreds of lives be saved?

More than a dozen large studies over the past decade have concluded that the cameras reduce accidents and injuries. The most recent, published in February by the Insurance Institute for Highway Safety, crunched 10 years of federal traffic data for the 99 largest U.S. cities — 14 of which now deploy cameras — and calculated that had all 99 installed the devices, 815 lives would have been saved from 2004 through 2008.

We still have thousands of people who die,” said Adrian Lund, the Insurance Institute’s president. “We look at where and how that’s happening, and one of the most dangerous (locations) is intersections.”

Citing reports like that, the U.S. Conference of Mayors, which coincidentally is headed by Los Angeles Mayor Antonio Villaraigosa, this week approved a resolution endorsing nationwide adoption of red light cameras.

And yet, in addition to the votes in Los Angeles and Houston:

The Albuquerque, N.M., City Council voted this month to let residents vote on the future of the city’s 20 red light cameras in October. (City lawyers are still weighing whether the vote would have any official effect.)
In May, a Missouri circuit judge issued a preliminary ruling saying the measure that authorized St. Louis’ 51 cameras was illegally enacted.
Tennessee Gov. Bill Haslam said he would sign a bill the Legislature passed last month to limit — though not ban outright — localities’ use of cameras at intersections.
The North Carolina Senate voted in April to ban cameras; the measure awaits House action.
The Florida House passed a bill last month to ban red light cameras; the measure failed in the Senate.
A Superior Court judge last week struck down the law that enacted use of cameras in Spokane, Wash., agreeing that citations generated by the cameras were invalid because they were not personally signed by a police officer.

Often, the cameras lead to fines — and depending on the jurisdiction, costly points on drivers’ records — for borderline infractions like failing to come to a complete stop before making a right turn. (That infraction makes up two-thirds of the citations issued at camera-monitored intersections in Los Angeles, even though it rarely leads to an accident, the controller’s audit reported.)

Other common complaints are that the automated citations violate due process and equal protection rights — often, there’s no officer to confront in court — and invade motorists’ privacy.
Challenges to red light cameras

Besides questions about the reliability of safety research and the use of cameras as revenue generators, challenges to the devices have raised these issues:

Due process and equal protection. Defendants have argued that enforcement is selective because not all violators receive tickets, that assuming the driver is also the owner shifts the burden of proof from prosecutors to defendants, that different punishments for tickets issued by a machine and by an officer violate the 14th Amendment, that delays in processing and sending out tickets violate due process protections and that warning signs are frequently unclear or incorrectly placed.

Search and seizure. At least two lawsuits have argued that issuing a citation based on a photograph amounts to an unconstitutional seizure of the vehicle.

Privacy. While some anti-camera advocates argue that the cameras are an invasion of privacy, no such challenges have been raised in court, according to research by Carlos Sun, a lawyer and engineering professor at the University of Missouri, who writes: “Driving is a regulated activity on public roads. By obtaining a license, a motorist agrees to abide by certain rules including, for example, to obey traffic signals.”

Sources: msnbc.com research; “Is Robocop a Cash Cow?” (Carlos Sun, University of Missouri, November 2010)

Leslie Blakey, executive director of the nonprofit Campaign to Stop Red Light Running, which advocates for red light cameras, said opponents have fought the devices since they started taking root about a decade ago. She broke the opposition down into two camps: “civil libertarians who resist the imposition of automated enforcement” and “people who got tickets and just don’t like it.”

Beeber, of Safer Streets LA, agreed that “as more people get tickets, they start getting mad about it,” saying: “You start doing that year after year after year and you start generating enough anger in the populace and it gets to the tipping point.”

What’s changed in the last couple of years, Blakey said, is the “ability of people to organize online and form communities and organize actions that are well-orchestrated” on sites like Facebook and Twitter.

These things are becoming more and more useful to a small minority of people who want to mount an action against anything,” she said.

In response, Blakey’s group points to the Insurance Institute study and others like it that conclude the “red light cameras lead to significant decreases in intersection violations and crashes.”

Large studies produce wide range of results
This is where things get muddy, because hard research on the effect of red light cameras in the United States is incomplete and often contradictory.

That includes the widely reported Insurance Institute study from February. Like nearly all other studies over the past decade, that report found a significant decline in deaths from red light accidents in cities that use cameras. But deaths from U.S. roadway accidents of all kinds have dropped significantly — by 13.1 percent — during the study period of 2004 through 2008, data from the Federal Highway Traffic Safety Administration show.

SOURCE

New FBI Documents Provide Details on Government’s Surveillance Spyware

April 29th, 2011

New FBI Documents Provide Details on Government’s Surveillance Spyware

Commentary by Jennifer Lynch

EFF recently received documents from the FBI that reveal details about the depth of the agency’s electronic surveillance capabilities and call into question the FBI’s controversial effort to push Congress to expand the Communications Assistance to Law Enforcement Act (CALEA) for greater access to communications data. The documents we received were sent to us in response to a Freedom of Information Act (FOIA) request we filed back in 2007 after Wired reported on evidence that the FBI was able to use “secret spyware” to track the source of e-mailed bomb threats against a Washington state high school. The documents discuss a tool called a “web bug” or a “Computer and Internet Protocol Address Verifier” (CIPAV),1 which seems to have been in use since at least 2001.2

What is CIPAV and How Does It Work?

The documents discuss technology that, when installed on a target’s computer, allows the FBI to collect the following information:

IP Address
Media Access Control (MAC) address
“Browser environment variables”
Open communication ports
List of the programs running
Operating system type, version, and serial number
Browser type and version
Language encoding
The URL that the target computer was previously connected to
Registered computer name
Registered company name
Currently logged in user name
Other information that would assist with “identifying computer users, computer software installed, [and] computer hardware installed”3

It’s not clear from the documents how the FBI deploys the spyware, though Wired has reported that, in the Washington state case, the FBI may have sent a URL via MySpace’s internal messaging, pointing to code that would install the spyware by exploiting a vulnerability in the user’s browser. Although the documents discuss some problems with installing the tool in some cases, other documents note that the agency’s Crypto Unit only needs 24-48 hours to prepare deployment.4 And once the tool is deployed, “it stay[s] persistent on the compromised computer and . . . every time the computer connects to the Internet, [FBI] will capture the information associated with the PRTT [Pen Register/Trap & Trace Order].5

Where Has CIPAV Been Used and What Legal Process Does the FBI Rely On to Use It?

It is clear from the documents we received that the FBI—and likely other federal agencies—have used this tool a lot. According the documents, the FBI has used CIPAV in cases across the country—from Denver, El Paso, and Honolulu in 2005; to Philadelphia, California, and Houston in 2006; to Cincinnati and Miami in 2007. In fact, one stack of documents we received consists entirely of requests from FBI offices around the country to the agency’s Cryptologic and Electronic Analysis Unit (“CEAU”) for help installing the device.6

The FBI has been using the tool in domestic criminal investigations as well as in FISA cases,7 and the FISA Court appears to have questioned the propriety of the tool.8 Other agencies, and even other countries have shown interest in the tool, indicating its effectiveness. Emails from 2006 discuss interest from the Air Force,9 the Naval Criminal Investigative Service10 and the Joint Task Force-Global Network Operations,11 while another email from 2007 discusses interest from the German government.12


The FBI’s Crypto Unit appears to have viewed the CIPAV as a proprietary tool. In one email, an agent grumbled, “we are seeing indications that [CIPAV] is being used needlessly by some agencies, unnecessarily raising difficult legal questions (and a risk of suppression without any countervailing benefit).”13 In another email, an agent stated, “[I] am weary [sic] to just hand over our tools to another Gov’t agency without any oversight or protection for our tool/technique.”14 And a third email noted, “[w]e never discuss how we collect the [data CIPAV can collect] in the warrants/affidavits or with case agents. AUSAs, squad supervisors, outside agencies, etc.”15

It appears from the documents that the FBI wasn’t sure what legal process to seek to authorize use of the spyware device. Some emails discuss trying to use a “trespasser exception” to get around a warrant,16 while others discuss telling the AUSA (government attorney) to cite to the “All Writs Act, 28 U.S.C. § 1651(a).”17 And one email suggests some agents thought the tool required no legal process at all. In that email, the FBI employee notes he considers the tool to be “consensual monitoring without need for process; in my mind, no different than sitting in a chat room and tracking participants’ on/off times; or for that matter sitting on P2P networks and finding out who is offering KP.”18

Eventually, the FBI seems to have sought a legal opinion on the proper use of the tool, both from the Office of General Counsel and from the National Security Law Branch,19 and ultimately, the agency seems to have settled on a “two-step request” process for CIPAV deployments — a search warrant to authorize intrusion into the computer, and then a subsequent Pen/Trap order to authorize the surveillance done by the spyware.

What Does This Mean for the FBI’s Push for New Back Doors into Our Internet Communications?

Over the past few months, we’ve heard a lot from the FBI about its need to expand the Communications Assistance to Law Enforcement Act (CALEA), a law that that requires all telecommunications and broadband providers to be technically capable of complying with an intercept order. Federal law enforcement officials have argued that under current regulations they can’t get the information they need and want to expand CALEA to apply to communications systems like Gmail, Skype, and Facebook. However, these documents show the FBI already has numerous tools available to surveil suspects directly, rather than through each of their communications service providers. One heavily redacted email notes that the FBI has other tools that “provide the functionality of the CIPAV [text redacted] as well as provide other useful info that could help further the case.”21 Another email notes that CIPAVs are used in conjunction with email intercepts, perhaps using similar spyware-type tools.22 If the FBI already has endpoint surveillance-based tools for internet wiretapping, it casts serious doubt on law enforcement’s claims of “going dark.”

A device that remains “persistent” on a “compromised computer” is certainly concerning. However, if the FBI obtains a probable cause-based court order before installing tools like CIPAV, complies with the minimization requirements in federal wiretapping law by limiting the time and scope of surveillance, and removes the device once surveillance concludes, the use of these types of targeted tools for Internet surveillance would be a much more narrowly tailored solution to the FBI’s purported problems than the proposal to undermine every Internet user’s privacy and security by expanding CALEA. We will continue to report on both the FBI’s use of endpoint surveillance tools and on the agency’s push to expand CALEA as more documents come in.

Click here to access full pdf versions of the documents we received or see below for the pages referenced in this post.

SOURCE

Everything you do is monitored……We saw that.

When President Obama talked about a transparent administration during the run up to the 2008 election most Americans assumed he was talking about openness in government dealings. Obviously, this is not the case, as evidenced by the administration’s handling of the universal health care legislation which was passed without a single American having had a chance to read it for 72 hours before a vote as the President promised would be the case with all legislation, refusal to release photographic evidence of the Osama Bin Laden raid, the President’s own birth certificate which has taken two years to be made public, and the many secret meetings held with Congressional members behind closed doors.

It should be clear by now that Big Government’s domestic surveillance policies under Presidents Bill Clinton and George Bush are being furthered expanded by Mr. Obama. Transparency, it seems, had nothing to do with making government more visible. It did, however, have everything to do with making your life more transparent.

Before we itemize the many ways in which you’re being watch, surveyed, monitored and aggregated, this latest report by Alex Thomas of The Intel Hub reiterates, yet again, that digital surveillance capabilities are not just isolated to intelligence agencies:

A lawsuit filed on Tuesday alleges that Aaron’s, a huge furniture rent to buy company, used software and a special device on their computers that enabled them to spy on PC renters.

According to the lawsuit, the company is able to track keystrokes and snap webcam pictures in the home of their customers.

Brian and Crystal Byrd, the couple who filed the lawsuit, claim that they were never told about these intrusive spying measures.

While computer privacy experts agree that Aaron’s has the right to install devices that enable them to shut down the computers remotely, customers must be told that they are being monitored.

The couple only found out about the spying after an Aaron’s employee showed them a picture of Brian Byrd that was taken remotely while the Byrds were in their home.

“After they showed us the picture, I, of course, felt violated,” Crystal Byrd said in an interview Monday. “There are many times I sat in front of that computer with barely nothing on. So I didn’t know if they had taken lots of pictures of us or what,” reported the Wyoming Tribune.

Brian Byrd also reported that he thinks the picture was shown to him in order to intimidate him into an easy repossession.

Source: The Intel Hub

While we often hear protests from privacy advocates about government intrusion into the lives of Americans, what many fail to understand is that it’s not just the government. Private businesses like Aaron’s, as well as large corporate conglomerates, are themselves engaging in the surveillance of Americans with the development of products and services specifically for this purpose – and often without the consent of their customers, or, through terms of services agreements that include dozens of pages of unintelligible fine print.

As modern technology continues to advance at breakneck speeds, just as the merger of the corporations and the state are occurring within political circles, so to are they becoming more prevalent in the intelligence sphere.

Fellow Americans, everything you do is being monitored.

With respect to the government, it’s not by choice. However, when dealing with private businesses, we have readily accepted our own fate by accepting into our lives the very technologies that make it all possible.

What You Do Online Is No Secret: As you sit in the perceived privacy of your own home reading this article, a log of your surfing habits and preferred reading or video viewing subjects is being created. Your IP address, that unique identifier the points specifically to the broadband line connected to your home modem, is time stamped with every web site you visit. Everything you watch at video web sites, everything you download online, and even your search queries are logged. You don’t even have to have an account with a major online service provider – your IP is sufficient – but that user account you create is used to further improve your personal profile and characteristics.
We can see you. We can hear you. Not only are your actions logged, but if you were deemed a person of interest for whatever reason, that little camera staring back at you on top of your monitor or that microphone built directly into your PC can be flipped on for remote surveillance at any time. While Aaron’s furniture or the local school district may need to install special software to remotely view what you’re doing in your bedroom, public sector intelligence groups operating on equipment that is technologically advanced compared to the consumer products of today is perfectly capable of entering your ‘secure’ home network and turning on those video and audio features – and you’d have absolutely no clue it’s going on.
Your cell phone is a mobile monitoring device. Much like your computer, all modern day cell phones come with cameras. And they all have a microphone. It is no secret that law enforcement agencies have the ability to easily tap these devices and listen and watch anything that’s going on. This capability is essentially hard-wired right into the phone. In fact, it has been reported that even if your cell phone is turned completely off, the microphone can still be remotely activated. The only known solution is to remove the battery if you want to ensure complete privacy. Sounds pretty far-fetched doesn’t it? Up until two weeks ago, so did the notion that Apple and Android phones could track and log everywhere you go. We now know that this is exactly what’s happening, and literally, every movement you make is tracked within inches of your location. A log of everywhere you have been has been logged if your cell phone was in your pocket.
Phone Conversation and Email Analysis. If you haven’t guessed yet, phones can be dangerous to your personal privacy. In the 1990?s, the few alternative media web sites on the internet often discussed a little know operation in Europe called Echelon. It was hard core tin foil conspiracy type stuff. You know, the kind where intelligence agencies were plugged into the entire phone, fax and email grids and had computers analyzing conversations in multiple languages looking for keywords and keyword strings. If you said a specific word, your conversation was immediately red-flagged and distributed to appropriate intel desks. As sci-fi as this may sound, it turns out that the ‘conspiracy theorists’ were 100% correct about Echelon. Its existence has been confirmed by the US government. Of course, no such system could possibly exist here domestically.
Your pictures are not private. When you snap those photos of the kids in the front yard and subsequently post those pictures on your favorite social network, guess what? That’s right, an inquiring viewer on your social networking account can track exactly where that picture was taken. Remember that location logging thing with your cell phone? It turns out that every single picture you take with most newer model cell phones will be tagged with specific GPS coordinates. When you upload that picture anywhere online, that location information becomes publicly available. So anyone who wants to know can now track down exactly where it is your kids were when the picture was taken, or, where exactly you were if you happened to engage in an activity that may be deemed illegal.
The social network. For many, it’s fun to spend every waking hour updating the rest of the world on what we’re doing. We publish our thoughts. We upload our pictures. We even click a like button at the end of articles like this one to let people know what we’re into and what they should be reading. As social networking becomes bigger, connecting hundreds of millions of people across the world, so to does the profiling of members of these networks. Have you agreed with what a certain person has said in a recent post? If they’re a person-of-interest for whatever reason, then guess what? You’ve just become one too. Did your friend recently take a picture of you at a party getting rowdy? Once that hits the social network, facial recognition technology will identify you and publish your name for all the world to see, including current or future employers. It’s a social network, and its purpose is to learn everything about you. Perhaps this is why key U.S. intelligence agencies made no effort to hide their $5 billion investment in the largest network in the world recently. Social networking is a critical tool in the struggle to categorize every person on earth.
Toll tags and license plates. Even if you’ve given up the cell phone and prefer to go without for privacy reasons, when you drive around town you may have noticed those little intersection cameras – at least four of them – on every major (or more regularly now, minor) intersection. While most of them may not be tied to the computer processing systems yet, some, and especially those in sensitive areas and toll booths can automatically read your license plate. Like your cell phone, your position can be logged on a regular basis with either your toll tag or simply, your license plate. Impossible? Not really. Especially when you consider that the information required to track your personal movements are nothing but a few data bytes. All anyone really needs to keep extensive records is a bigger hard drive.
We know your underwear size. Admittedly, we sometimes have a hard time remembering what size pants or shirts we need to purchase. But while our memory may be failing, private data aggregators have plenty of it, and the processing power to boot. Everything you have ever bought with a credit card or membership club card is sent off for processing and aggregation to centralized data centers. While you may use a Visa card at one store, a Mastercard at another, and pay cash with a grocery membership card somewhere else, it’s as easy as finding your name and cross referencing that on your cards – and your entire shopping profile can be created. The purpose, we’re told, is to better improve our shopping experience and provide market data to companies so that they can improve their advertising. We can only guess at who else has access to this information, which happens to be very easily accessible and widely available for a small fee.
Radio Frequency Identification. Say you’ve decided to scrap cell phones, internet surfing and electronic payment or membership cards. And, you choose to walk everywhere you go. Not a problem for enterprising surveillance technologists. Large retail distributors have already begun implementing RFID technologies into every major product on store shelves. For now, most of the RFID tracking is limited to transportation and inventory control and is designed to track products on the pallet level. Tracking capabilities are improving, however, and are quickly being implemented on the individual product level. That means when you buy a soda at your local grocery store, an RFID monitoring station will be capable of tracking that soda across the entire city, with the goal eventually being whether or not you put that aluminum can in a trashcan or a recycle bin once you were finished drinking it. One day, you may be issued a ticket by a law enforcement computer autmatically for failing to dispose of your trash properly. Again, it’s simply an issue of hard drive space and processing power – and technology will soon get over that hurdle. All electronics, clothing, food packaging, and just about everything else will soon contain a passive RFID chip.
Ripping Data Off Your Private, Secure, chip-enhanced personal identification cards. Passports, driver’s licenses, credit cards, cell phones – they all store data. Personal data like banking information, birth date, social security numbers, pictures, phone books – basically everything you’ve ever wanted to keep private. As storage technology further integrates into our daily lives, and everything from our passports to our health insurance cards contains a digital chip that stores our private information, it will become much easier to rip that data from your purse or wallet without ever touching you. A recent report indicated that local law enforcement officials now have devices that, when you’re pulled over, can remotely pull all of the data on your cell phone. This demonstrates how simple it is for anyone, be it law enforcement or criminals, to gain access to everything about you – including you personal travel habits.
Eye in the sky. We’ve previously reported about domestic drone programs in Houston and Miami. Local and state law enforcement agencies are increasingly adding Federal and military technologies to their surveillance arsenals. Drones have the capability of flying quietly and at high altitude, while monitoring multiple targets simultaneously. It’s been reported that domestic drones can not only monitor in the visible light spectrum, but night vision and infrared. That means they can ‘see’ what you’re doing in your home behind closed doors. Incidentally, there have been reports of roaming ground patrols with similar infrared technology, capable of seeing right through your walls. This is not science fiction – this is reality right now. Combine this with real-time spy agency satellites and interested parties have the ability to see and hear you, even when you’re locked indoors with computers and cell phones disabled.
Security cameras. We’ve already discussed traffic cams. But cameras are not limited to just the government. Residences, retailers and even day cares are now interconnecting camera security systems with online web browsing. And, as we pointed out earlier, these are easily subject to unauthorized access. Certain cities in the US are now allowing residents to register their personal or business camera systems with the city to allow for local police monitoring. The government doesn’t need to push the technology on us. The people willingly accept the technology en masse in exchange for a sense of being more secure.
I See Something! When all else fails, the last bastion of surveillance is human intel. It’s been used by oppressive regimes for millennia. The Nazis used it. The Communists used it (and do to this day). It was very effective. And now, we’re using it. Remember, if you See Something, Say Something. Even if what someone sees is not accurately represented because of mis-perception, you can be assured that when they say something rapid response units will be on the scene to diffuse the situation.

Fusing It All Together

What is the purpose ? It depends who you ask.

Local law enforcement will tell you it’s to protect the safety of the public. Federal law enforcement and intelligence agencies say it’s to prevent terrorism. Apple and Android tells us it’s so that they can produce better mobile products and services. Retailers want more customer data so they can improve advertising and marketing.

Whatever the case, it’s clear that almost everything we do, whether it’s in the privacy of our own homes or on public streets, can be tracked, monitored, and logged.

As technology improves and the internet interconnects even more nodes, the information collected by the public, private and personal sectors will be further aggregrated, cross referenced and analyzed. Your personal profile will become more detailed, including your shopping habits, hobbies, likes, dislikes, political affiliation, reading preferences, friends, and potentially your psychological and emotional status.

All of this information will eventually be fused into one large database. In fact, the government has already setup well over fifty fusion centers around the nation. What goes on in these centers is kept strictly confidential, and there doesn’t seem to be any agency in charge of them, but we know they exist, and we know that their purpose is to acquire, aggregate and act on whatever information they have available to them. These are fairly new, appearing just over the last several years. But be assured that as processing power and software technology improves, so too will the surveillance capabilities of fusion like facilities, whether they belong to government, private industry or criminal industry.

History has shown what tends to happen in surveillance societies. Often times, that surveillance is forced upon the people by tyranical government. We won’t argue that this is not the case today, as governments the world over are not hiding the fact that they want to know what everyone is doing. The odd thing is, we the people don’t seem to care a whole lot. What we’re seeing is that the surveillance state is expanding in concert with the definitions for what is criminal or terrorist-like activity – and that’s scary. Every year, more people are finding themselves on no-fly lists, no-work lists, or other terrorist watch lists. We’ve facetiously noted in a previous commentary that at this rate, the terrorist watch list will exceed the U.S. population by 2019. While we were, for the most part, trying to put a humorous spin on an otherwise very important issue, the fact is, that as surveillance expands, more and more people will become enemies of the state or persons-of-interest. That’s just how these things tend to work with these types of things.

In today’s world, the private sector is ready and willing to help government achieve these goals of total control and involvement in our personal lives. In fact, it is at times becoming difficult to distinguish between government and private industry.

But if we are to lay blame on anyone here, it must be ourselves. We need only take a look into the mirror and we’ll see who makes these technologies possible. It’s the American consumer who willingly adopts the technologies into his or her daily life, often standing in lines a quarter mile long to acquire the latest in digital monitoring.

While our votes at the ballot box account for something, how we vote with our pocket books will ultimately determine the direction of our country. We have empowered the corporation to lobby Congress and further erode our own freedoms, whether it’s with the surveillance technologies we choose to integrate into our lives, the food we buy, the cheap Chinese goods we’ll stampede children over, or the gas we pump into our vehicles.

The problem is not government. It’s us. We’ve let it go this far. It can only change when the individual does.

Author: Mac Slavo
Date: May 5th, 2011
Visit the Author’s Website: http://www.SHTFplan.com/

http://www.shtfplan.com/headline-news/americans-everything-you-do-is-monitored_05052011

Texans look at expanding gambling, drug testing for unemployment benefits, to cover budget shortfalls

Texans Could Vote on Expanding Gambling


The Texas Gaming Association says expanding gambling could bring in $1.2 billion a year in gaming taxes alone.

By CHRIS TOMLINSON

Texans could get to vote on a constitutional amendment to expand gambling.

The House Licensing and Administrative Procedures Committee will hear testimony on a number of measures to allow casinos and slot machines. The Texas Gaming Association is backing a measure that would license eight casinos and slot machines at eight racetracks. Other measures would allow gambling on Indian reservations or slot machines at bingo halls.

The Texas Gaming Association says its proposal could bring in $1.2 billion a year in gaming taxes alone. The organization also released a poll it said found that 86 percent of Texans believe there should be a vote on gambling.

The state faces a $23 billion budget shortfall over the next two years. Opponents warn that gambling could bring more trouble than it’s worth.

http://www.nbcdfw.com/news/local/Texans-Could-Vote-on-Expanding-Gambling-118837164.html?dr

State Lawmaker Wants Drug Tests For Welfare Recipients

March 29, 2011 8:44 AM
Print Share 149

SPRINGFIELD, Ill. (WBBM) – A state lawmaker wants welfare recipients to submit to drug tests in order to receive aid, but he admits the proposal isn’t ready for a full debate – and probably won’t make it into law this year.

This isn’t the first time State Rep. Jim Sacia (R-Pecatonica) has introduced such a measure. He first introduced it three years ago when a constituent asked him why welfare applicants don’t submit to drug tests, but many job applicants do.

This year’s bill would create a pilot program to administer the drug tests in three counties for three years.

Sacia cautions his bill will not fix all welfare problems. But he says lawmakers must create a way to foster a change in recipients’ attitudes, and this is a good start.

“We have to come up with a way, and this is a Panacea I recognize that, where we’re creating a motivational factor for people to want to get off the welfare rolls, to get back to legitimate employment,” explains Sacia.

Sacia says House Bill 11 is imperfect, but is getting better. He says one of the bills’ amendments will eventually address how to pay for the drug tests, but the specifics have yet to be hammered out.

The proposal has received significant push back in its first three years, namely from the House Human Services Committee.

“I will not move the bill until I get a bill that I can get those who are adamantly opposed to it, maybe not to necessarily say they’re in support of the bill, but to go neutral on [it],” says Sacia.

http://chicago.cbslocal.com/2011/03/29/state-lawmaker-wants-drug-tests-for-welfare-recipients/

And you thought Internet dating was hard before! Revealed: US spy operation that manipulates social media


Revealed: US spy operation that manipulates social media Military’s ‘sock puppet’ software creates fake online identities to spread pro-American propaganda

General David Petraeus has previously said US online psychological operations are aimed at ‘countering extremist ideology and propaganda’.

The US military is developing software that will let it secretly manipulate social media sites such as Facebook and Twitter by using fake online personas to influence internet conversations and spread pro-American propaganda.

Sooooo fake...................like duh!

A Californian corporation has been awarded a contract with United States Central Command (Centcom), which oversees US armed operations in the Middle East and Central Asia, to develop what is described as an “online persona management service” that will allow one US serviceman or woman to control up to 10 separate identities based all over the world.

The project has been likened by web experts to China’s attempts to control and restrict free speech on the internet. Critics are likely to complain that it will allow the US military to create a false consensus in online conversations, crowd out unwelcome opinions and smother commentaries or reports that do not correspond with its own objectives.

The discovery that the US military is developing false online personalities – known to users of social media as “sock puppets” – could also encourage other governments, private companies and non-government organisations to do the same.

The Centcom contract stipulates that each fake online persona must have a convincing background, history and supporting details, and that up to 50 US-based controllers should be able to operate false identities from their workstations “without fear of being discovered by sophisticated adversaries”.

Centcom spokesman Commander Bill Speaks said: “The technology supports classified blogging activities on foreign-language websites to enable Centcom to counter violent extremist and enemy propaganda outside the US.”

He said none of the interventions would be in English, as it would be unlawful to “address US audiences” with such technology, and any English-language use of social media by Centcom was always clearly attributed. The languages in which the interventions are conducted include Arabic, Farsi, Urdu and Pashto.

Once developed, the software could allow US service personnel, working around the clock in one location, to respond to emerging online conversations with any number of co-ordinated Facebook messages, blogposts, tweets, retweets, chatroom posts and other interventions. Details of the contract suggest this location would be MacDill air force base near Tampa, Florida, home of US Special Operations Command.

Centcom’s contract requires for each controller the provision of one “virtual private server” located in the United States and others appearing to be outside the US to give the impression the fake personas are real people located in different parts of the world.

It also calls for “traffic mixing”, blending the persona controllers’ internet usage with the usage of people outside Centcom in a manner that must offer “excellent cover and powerful deniability”.

The multiple persona contract is thought to have been awarded as part of a programme called Operation Earnest Voice (OEV), which was first developed in Iraq as a psychological warfare weapon against the online presence of al-Qaida supporters and others ranged against coalition forces. Since then, OEV is reported to have expanded into a $200m programme and is thought to have been used against jihadists across Pakistan, Afghanistan and the Middle East.

Hmmmm this ONE could be real....do they have wifi in Tora Bora?

OEV is seen by senior US commanders as a vital counter-terrorism and counter-radicalisation programme. In evidence to the US Senate’s armed services committee last year, General David Petraeus, then commander of Centcom, described the operation as an effort to “counter extremist ideology and propaganda and to ensure that credible voices in the region are heard”. He said the US military’s objective was to be “first with the truth”.

This month Petraeus’s successor, General James Mattis, told the same committee that OEV “supports all activities associated with degrading the enemy narrative, including web engagement and web-based product distribution capabilities”.

Centcom confirmed that the $2.76m contract was awarded to Ntrepid, a newly formed corporation registered in Los Angeles. It would not disclose whether the multiple persona project is already in operation or discuss any related contracts.

Nobody was available for comment at Ntrepid.

In his evidence to the Senate committee, Gen Mattis said: “OEV seeks to disrupt recruitment and training of suicide bombers; deny safe havens for our adversaries; and counter extremist ideology and propaganda.” He added that Centcom was working with “our coalition partners” to develop new techniques and tactics the US could use “to counter the adversary in the cyber domain”.

According to a report by the inspector general of the US defence department in Iraq, OEV was managed by the multinational forces rather than Centcom.

Asked whether any UK military personnel had been involved in OEV, Britain’s Ministry of Defence said it could find “no evidence”. The MoD refused to say whether it had been involved in the development of persona management programmes, saying: “We don’t comment on cyber capability.”

OEV was discussed last year at a gathering of electronic warfare specialists in Washington DC, where a senior Centcom officer told delegates that its purpose was to “communicate critical messages and to counter the propaganda of our adversaries”.

Persona management by the US military would face legal challenges if it were turned against citizens of the US, where a number of people engaged in sock puppetry have faced prosecution.

Kaspersky Lab E-Store

Last year a New York lawyer who impersonated a scholar was sentenced to jail after being convicted of “criminal impersonation” and identity theft.

It is unclear whether a persona management programme would contravene UK law. Legal experts say it could fall foul of the Forgery and Counterfeiting Act 1981, which states that “a person is guilty of forgery if he makes a false instrument, with the intention that he or another shall use it to induce somebody to accept it as genuine, and by reason of so accepting it to do or not to do some act to his own or any other person’s prejudice”. However, this would apply only if a website or social network could be shown to have suffered “prejudice” as a result.

http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks

How to Detect a Fake Facebook Profile

Posted by dotJenna on May 3rd, 2010 in Facebook Tips

BEWARE!!! Do not automatically assume that all your Facebook friends are real people, or are who they say they are. There are crooks, liars, thiefs and predators who create false profiles using other people’s identities and stolen pictures. The anonymity of the web gives the perfect cover for bad people. I’ve heard some heart-breaking stories ranging from fake relationships to rape and murder. Please pass this article. Check your friend list and eliminate anyone you suspect may be a fake. It could be a matter of life and death for you, or someone in your network.

Stay alert when allowing friends into your network. We share a lot of information on these sites; data that in the wrong hands can be disastrous. The fakes are pretty easy to spot once you know their sneaky tricks. I found a few fake Facebook profiles that are sprinkled throughout this article. Click on the images below to see a larger view of what fake profilers do.

How Fake Profilers Work

Someone operating with a false made-up identity is a con. Do not be naive. Con-artists prey on vulnerabilities of unsuspecting people, seeking to defraud them out of value (ie: money, attention, sex or worse). Most of us don’t think like criminals, so it’s hard to fathom deliberate deception. Frauds, liars and crooks however, prey on this weakness, knowing we don’t suspect foul play. We must be vigilant. It’s unpleasant to ponder, but we must realize that bad people who mean harm are lurking in our friendly networks. Stay alert, especially when it comes to letting people see your very personal and private information. Tell every teen you know as they are more susceptible to flattery and in need of attention, and can suffer serious consequences.

Be leery of anyone who is too friendly, too “into” your everything you post or complimenting you daily. This is not normal behavior and could be an imposter trying to flatter you. It’s hard to resist when someone feeds your ego, saying everything you want to hear, but don’t be a mark. Fake creeps are not sincere.


Dirty Tricks

Most fakers have several fake profiles on the web, so do not be fooled if you are friends with two people who interact and vouch for one another. This happened to me, and turned out to be one person. Imposters will also try to make you more comfortable by interacting with your other friends and family members. They create fake relationships, fake Twitter profiles, fake websites and anything else that will get you to take your guard down and trust them. I’ve seen companies created, false addresses given and fake voice mailboxes set-up. (No, I’m not kidding, wish I were.)

Fakers Go Unexposed

It is humiliating to be duped by an imposter, so many instances of harm by these crooks go unreported in your network. Shame and embarrassment stop the “viral” process. Chances that you have a harmful person posing with a fake profile on your Facebook profile are very high. If a faker wants something from you, he or she will tell you everything you want to hear while pumping you for private information. He or she will then try to blackmail you to keep you quiet. Facebook imposters are not stupid. They know how to keep their identity concealed, even after their victims know the truth.

Every Man for Himself

Unfortunately there is no law yet for operating a fake Facebook Profile. There is a huge gap in legislature regarding the web. Technology is moving so fast while our government seems to be getting slower. The web is like the Wild West where you must take care of yourself by arming yourself with knowledge. No one will take care of the validity of your network for you. You must do so for yourself and your family members. There are laws under consideration due to serious crimes that have occurred, but these laws apply to children and teens, not adults. We need to get the word out to save heartache and lives.

Carefully Consider Your Friends

Don’t get in a hurry when allowing friends into your network. Check the profile carefully to make sure you’re dealing with a legitimate person. Before accepting a friend request from someone you’ve never met in person, check them out thoroughly.

Questions to Ask Before Accepting a Friend

If more than 2-3 of the following points are true, you’re very likely dealing with a fake person. I recommend deleting them or blocking their profile. Not every fake profiler intends you harm at all, but then again, why are they hiding? Create your own set of boundaries to determine what profiles you allow into your network. Don’t just let anyone in, even if you’re a marketer.

Does the pic look perfect?

A perfect pic is cause for alert. People are not perfect, so check any profile carefully that has a model photo or a stock photo as the profile picture. This also applies for pics of beautiful women and handsome men. Don’t let your libido drive you to trusting someone because they fulfill a fantasy. Make sure the person is not really a troll in real life.

Do you see pics of the person’s family?

A real person will have pics of family on their Facebook Profile. If a person does not, it doesn’t mean it’s fake, just let that be a red-flag.

Is the person tagged by anyone on the web?

A real person will have friends on Facebook with whom they are engaging. A real person has a life and will have tagged photos of him or herself in the Photo Gallery.


Are there more photos of objects than the person?

Fakers often try to make the photo area full by adding pics of odd items like flowers, trees, and other graphics. Real people don’t usually add a zillion object-oriented photos to their Facebook Account. If they do, then they will also have personal pics too.

Does the person talk?

A faker may have so many fake accounts, he or she can’t comment regularly. I have seen fake profilers comment often, so this is not always the case, but sometimes you can tell from the posts made if the person is legitimate. Some fake profiles are easier to distinguish than others.


Does the person fulfill your every fantasy?

If a really cute girl is acting like a total slut, saying all the right things, chances are it’s really a guy living out his fantasies. (Sorry, but welcome to Facebook.) Same goes for a hot guy telling you that you’re the most beautiful thing he’s ever seen–if it seems too good to be true, it probably is.

Does the person have several photos?

Beware because entire photo albums can easily be stolen. Real Facebook photos are added in layers. A cute girl who seems socially active will have SEVERAL photo albums, not just 1-2. A cute girl (or guy) will also have SEVERAL profile pics. If you see a profile with 1-2 photos of a person and then several pics of objects, you know it’s a fake. Photos can be easily swiped from other profiles anywhere in the world. A profile with only 1 picture is a fake unless the person is brand new.

Does the person interact with his or her FB friends outside of FB?
You can tell this by the people who post on the page. Fakes operate only on the web, they won’t have posts, comments or photos of real-life activities. The posts will all be related to Facebook activities. If there is interaction, a faker will have it only with “Facebook” friends. Look for signs of real life–especially photos. Photos of outside activities need to have the person’s pics throughout.

Are there several “doo dad” widgets on the Profile page?

Fakes will use a lot of widgets to try to “beef up” the page and make it look more used. Too many widgets is a sign that a page is a fake.


Is the info area filled out completely?

A sparse info page can be a sign of a fake, however, I’ve seen fake profiles with very elaborate made-up personal info on the info page–so don’t let this be the only thing you check. Go to the website. Don’t trust the Twitter account because fakers can easily create a fake Twitter account to fool you.

Can the person be found in a Google Search?

Practically everyone has info on themselves on Google. Check the person in Google. Find websites from prior years listing the person. Do not accept as proof recent social media profiles or recent websites. Many fakers are very astute in web design and can whip up websites in a jiffy. Find proof of a life prior to this year. Find pics of earlier times, even it it’s just 2 years ago.


Does the person give his or her full name?

A full name should be given on the profile, not a fake name. This is not the only indicator, but one of the things you want to check.

Do Not Be Fooled

Do not be fooled by the following:

* The person seems normal.
* The person is friends with many of your friends already.
* The person engages with you regularly.

Allowing Fakes to Get Close to You

The real danger is in allowing someone who is not real into your social circle, where you interact and engage directly with them. This is dangerous because bonds are built between people, and you may be building a relationship with a non-existent person. That’s a terrible experience for anyone to endure. Several people have had this happen that I know. It’s a real problem.

The most vulnerable are young people who are seeking approval and may be susceptible to the cunning words of a liar.

I want to protect you from predators out there who steal other people’s pictures and identities, add a fake name and pretend like they are someone else on Facebook. Beware of Fake Facebook Profiles. The anonymity of the web gives crooks, liars and cheaters the perfect front to their game. Test every person. Don’t be afraid to look their name up on the internet. Spread the word.
SOURCE