Author Topic: Google/CIA Perfecting Precrime Analytics System to create guilt from innocence  (Read 11724 times)

0 Members and 1 Guest are viewing this topic.

Offline endof

  • Member
  • *****
  • Posts: 1,709
The investment arms of the CIA and Google are both backing a company that monitors the web in real time — and says it uses that information to predict the future. The company is called Recorded Future, and it scours tens of thousands of websites, blogs and Twitter accounts to find the relationships between people, organizations, actions and incidents — both present and still-to-come. In a white paper, the company says its temporal analytics engine “goes beyond search” by “looking at the ‘invisible links’ between documents that talk about the same, or related, entities and events.”

The idea is to figure out for each incident who was involved, where it happened and when it might go down. Recorded Future then plots that chatter, showing online “momentum” for any given event. “The cool thing is, you can actually predict the curve, in many cases,” says company CEO Christopher Ahlberg, a former Swedish Army Ranger with a PhD in computer science. Which naturally makes the 16-person Cambridge, Massachusetts, firm attractive to Google Ventures, the search giant’s investment division, and to In-Q-Tel, which handles similar duties for the CIA and the wider intelligence community.

It’s not the very first time Google has done business with America’s spy agencies. Long before it reportedly enlisted the help of the National Security Agency to secure its networks, Google sold equipment to the secret signals-intelligence group. In-Q-Tel backed the mapping firm Keyhole, which was bought by Google in 2004 — and then became the backbone for Google Earth. This appears to be the first time, however, that the intelligence community and Google have funded the same startup, at the same time. No one is accusing Google of directly collaborating with the CIA. But the investments are bound to be fodder for critics of Google, who already see the search giant as overly cozy with the U.S. government, and worry that the company is starting to forget its “don’t be evil” mantra.

Offline UKStewart82

  • Member
  • *****
  • Posts: 1,234
  • Stewie; The Audio Peeeimp.
    • PrisonPlanetPatriot on
Re: Google, CIA Invest in ‘Future’ of Web Monitoring
« Reply #1 on: July 30, 2010, 03:50:07 am »
Little by little, TPTB are showing why they are so arrogant.  The technology they possess would blow everyone's mind away.  Einstein sent data through light "Fiberoptics" and sent music into the future in the 30's.  80 years ago...that's a looong time.
Make Sure To Bookmark The Back-Up Forum!
Invisible Empire & Police State 4 @

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
IBM Controls the Nordic Viking Genome

In 1998, Iceland created the world's first national DNA database of its citizens. Almost all of its 275,000 citizens trace their lineages to the original Nordic Vikings of a prior millennium. In a unique arrangement, Iceland's national genetic code was sold to the genetic research and pharmacogenetic industries through an entity called deCODE Genetics. Less than 8 percent of Iceland's population opted out of the voluntary program, hence deCODE possesses virtually a complete national genetic and hereditary portrait of Iceland. Scientists at deCODE are currently utilizing the information in their study of a range of debilitating condition, including respiratory and muscular disease. Safeguards have been built into the program to conceal individuals' names. But at least one Icelander has sued the government to have her father's genetic history removed. As of March 2003, the case is still winding its way through Icelandic courts. Iceland's national genomic information will be made available to a wide variety of scientific, commercial and governmental entities in an Internet-based system that employs massive data storage drives codenamed "Shark." 31

One main company manages and controls Iceland's genetic data. That company is already positioned to become the worldwide manager and disseminator of all genomic information globally. In anticipation of that day, the company currently operates genomic offices in California, New York, Zurich, Haifa, New Delhi and Tokyo. The name of the company is IBM. Its Iceland project operates under a division known as "Life Services - Nordic." 32

War Against the Weak: Eugenics and America's Campaign to Create a Master Race. By Edwin Black. Pg. 439

Related Archive:
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
"Be as cautious as you can, of course, for you know that as soon as you have anything like a kingdom, enchanters and conjurers will always drop in from all over Creation to take it away from you, naturally enough."
-Brion Gysin

MUST-READ: Hardcore Mind Control article from 1990 Playboy Magazine

MUST-READ: Hardcore Police State Article from 1974 - And How Vietnam Enabled It
That would be relevant if it was not used to justify more draconian control methods.

They want us to curcumvent their BS so they can then say "see the terrorists have found a way around our system so we need to plug it up". What needs to be exposed is the multiple levels of insanity inherent in this mind control grid. The situation we are currently in is that those who cannot be mind controlled are considered ENEMIES OF THE STATE.

Make anti-social behaviour 'abnormal'



Creating a smart grid: GE Plan for total enslavement


IBM: Transforming the military through Sense & Respond

One Mainframe To Rule Them All - IBM & Verichip - The Human Microchipping Agenda

Almost every single issue can now be traced to the cybernetics agenda!

Brzezinski is scared to death that you now know Cybernetics is the real agenda

Extremely Important--Also see:  Global Warming/Climate Change Agenda Is Geo-Cybernetics In Disguise

"(1) In an industrial society the mode of production shifts from agriculture to industry, with the use of human and animal muscle supplanted by machine operation. In the technetronic society industrial employment yields to services, with automation and cybernetics replacing the operation of machines by individuals."
"The national community is the obvious one to turn to, and a definition of what a national community is may well become more restrictive as broader transnational cooperation develops. For many peoples the nationstate was a compromise dictated by economics, by security, and by other factors. An optimum balance was eventually struck, often after centuries of conflict. Today the balance is becoming unsettled, because newer and larger frameworks of cooperation are emerging, and the effective integration of much smaller, more cohesive units into much larger wholes is becoming increasingly possible because of computers, cybernetics, communications, and so on."
"Solid work has been done by Soviet scholars, primarily in the area of technologicaleconomic forecasting. For example, in 1964 the Soviet philosophical journal, Voprosy Filosofii, began publishing a series of articles on the theme of "The ScientificTechnical Revolution and Its Social Consequences." On the whole, these articles have been serious and frequently very informative treatments of such subjects as the methodology of forecasting, the organizational problems of science in the context of the scientific explosion, the role of cybernetics, comparative analyses of scientific development and projections for the United States and the Soviet Union, to say nothing of more specifically Sovietoriented economic and technological prognoses." 23
"Technological adaptation would involve the transformation of the bureaucraticdogmatic party into a party of technocrats. Primary emphasis would be on scientific expertise, efficiency, and discipline. As has already happened in Ulbricht's East Germany, the party would be composed of scientific experts, trained in the latest techniques, capable of relying on cybernetics and computers for social control, and looking to scientific innovation for the preservation of Soviet security and industrial growth.  Nationalism would replace ideological dogmas as the basic integrative principle linking society and the state. The younger, more technologically oriented leaders of the military establishment would, in all probability, favour this pattern. Political leadership, as in the first variant, could remain collective, though it would probably involve a wider coalition of partystate militaryeconomic leaders."
"The example of Ulbricht's East Germany may become particularly relevant. Though in Rumania explorations of the scientific revolution's significance have led some communists to suggest that this revolution requires a new theoretical framework based on the principle of universality, 34 Ulbricht has attempted to combine scientific innovation with strict adherence to the LeninistStalinist ideological tradition. Political leadership has remained highly centralized, and ideological dissent has been firmly suppressed. At the same time, Ulbricht, perhaps more than any other communist leader, has emphasized that "the development of the socialist system, above all the implementation of the economic system as a whole, is to a growing extent a matter of scientific leadership. . . . We orient ourselves on the conscious scientific control of complex processes and systems by the people and for the people. We make use of cybernetics in this sense." 35

During the second half of the 1960s, East German leadership made an intense effort to rationalize economic management in order to combine lowerlevel initiative with an effective system of controls and coordination. The Seventh Party Congress (April 1967) set itself the task of developing a general conception of the relations between the various partsystems with the economic system as a whole;more than any other communist country, East Germany utilized cybernetics, operational research, and electronic data processing.  Two years later, at the April 1969 Central Committee Plenum, Politburo member Kurt Hager proudly reported—and he repeatedly used this formula—that East Germany was not only ideologically sound but "correctly programmed."

In line with this "correct programming," the party has emphasized the importance of expertise among its members, 36 and the educational system has been reformed in order to link science closely with industry. † By the late 1960s, East Germany had transformed itself from one of the most warravaged societies into the most economically and ideologically advanced scienceoriented communist state. After a fiftyyear lapse, the combination of Prussian discipline, German scientific efficiency, and LeninistStalinist ideology has thus again made German communism a model for its eastern neighbors.

In the Soviet Union, however, other considerations will in all likelihood impede the pace of a similar "technologization" of the Soviet political system. For one thing, the Soviet Union is a much bigger country, is more difficult to integrate, and has many more areas of socioeconomic backwardness to overcome. In addition, over the last fifty years the ruling party has developed its own traditions and ideological style, and though it favors the acquisition of technical skills by its officials, it is likely to continue to resist the development of an essentially technical orientation among its members, since that would dilute the importance attached to ideology. 37 Moreover, perhaps intensified in the years to come by the SinoSoviet dispute, the role of the security factor in policymaking and of the military in the political process might tend to increase."

Monday, Oct. 12, 1970

"Contemporary America is often described—especially by the young—as a reactionary country. But in the opinion of Zbigniew Brzezinski, professor of government at Columbia University, the only revolution worth talking about these days is an American one—and it has not been run by the New Left. Brzezinski calls it the technetronic revolution. In Between Two Ages he discusses the repercussions of rapid change from an industrial era—with its emphasis on sheer productivity—to a period that stresses services, automation and cybernetics. Being that rarity among futurists, a cautious man, Brzezinski is not sure if utopia or bedlam will result. Meanwhile, between two ages is a time of uncertainty and some guarded hope.

Whatever military and political reverses it may have suffered, the U.S. is plunging ahead in the realm of technology and dragging the rest of the world with it. Such progress—if that is what it is—largely results from the fact that the U.S. spends more on scientific education and research than any other nation; it has indeed drained the world of the brains needed for its technical endeavors. "What makes America unique in our time," Brzezinski writes, "is that confrontation with the new is part of the daily American experience. For better or for worse, the rest of the world learns what is in store for it by observing what happens in the United States: whether it be the latest scientific discoveries in space and medicine or the electric toothbrush in the bathroom; pop art or LSD; air conditioning or air pollution; old-age problems or juvenile delinquency."

Polish-born Brzezinski has something of the pride of an adopted son in such achievements, though he recognizes that in some ways the U.S. is its own worst enemy. For the technetronic revolution it exports causes profound disturbances in the less developed nations. Suddenly aware of material progress, they conspicuously and maddeningly lack the means to achieve it. Their acute frustration causes not a revolution in rising expectations, says Brzezinski, but a "specter of insatiable aspirations."

Just as the technetronic revolution has further divided rich from poor nations, so is it beginning to fracture the nation-state. But the result of the breakup is not likely to lead to One World. Brzezinski amends Marshall Mc-Luhan's thesis that the world is shrinking into a "global village." A village implies shared tradition and intimacy. Today's technetronic world resembles rather a "global city—a nervous, agitated, tense, and fragmented web of interdependent relations." To recover some sense of identity, people are desperately turning back to their origins in race or region.

Flood of Technocrats. The New American Revolution, according to Brzezinski, is also fragmenting the mind of man. More than ever before, society is rigidly divided between those who think and those who feel. On the one side are the quiet, methodical technocrats who run the new machines pretty much without questioning their aims.On the other are the emotionalists, who have rebelled against the dehumanization of computer society.

Brzezinski harbors a good deal of contempt for what he calls the "new class" of alienated students and those intellectuals of the "Violent Left" who feel superfluous to society and for that reason want to bring the whole thing down. Paradoxically, he fears fellow technocrats even more than the New Left. Goaded mercilessly from the left, often deficient in traditional humanitarian values, a New Right of technocrats might eventually seize power. Unlike the left, they would know how to use it. To forestall such a disaster, Brzezinski strives for a formula that will fuse together the divided halves of the American soul. Lacking confidence in liberalism—partly because it lacks confidence in itself—Brzezinski proposes a kind of participatory democracy in which government, private business and the academic world join hands to solve the nation's social problems.

This limited solution, not so very different from a number of New Left panaceas, scarcely bears the weight of Brzezinski's earlier complaint. Like so many analysts, he is better at stating the problem thin supplying an answer. But, as he sees it, the problem may just turn out to be the answer. For if the miracles of technology have fragmented the world, they have made man more humble in the face of his own awesome creations. As Brzezinski suggests, man can no longer subscribe to one all-encompassing ideology; he must tolerate the existence of several world views. Between Two Ages is rich in respect for variety. Proposing neither to predict nor control the future, Brzezinski brilliantly explores some of its options and suggests that they can perhaps be lived with. These days that is a comforting view.

Edwin Warner

“The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. [...] The capacity to assert social and political control over the individual will vastly increase. It will soon be possible to assert almost continuous surveillance over every citizen and to maintain up-to-date, complete files, containing even most personal information about the health or personal behavior of the citizen in addition to more customary data. These files will be subject to instantaneous retrieval by the authorities.”
-Zbigniew Brzezinski

Napolitano Bombshell:

"We track every single thing you do on the Internet"

Internet Monitoring Needed to Fight Fake Homegrown Terrorism
Published June 18, 2010 | Associated Press

WASHINGTON -- Fighting homegrown terrorism by monitoring Internet communications is a civil liberties trade-off the U.S. government must make to beef up national security, the nation's homeland security chief said Friday.

As terrorists increasingly recruit U.S. citizens [This is a lie, the CIA recruits American citizens. Terrorists do not recruit shit, anyone not an American who even sneazes "allah akbar" is tracked 24/7 (also illegally). And if they interact with any American citizen it is because the CIA wants that interaction to occur], the government needs to constantly balance Americans' civil rights and privacy with the need to keep people safe, said Homeland Security Secretary Janet Napolitano. [THIS IS EXACTLY THE HITLER, BUSH, MAO, STALIN DOCTRINE!]

But finding that balance has become more complex as homegrown terrorists have used the Internet to reach out to extremists abroad for inspiration and training [This is a lie of the highest degree. The top 100 sites used for so called recruiting are run out of Langley, 10 Downing Street, or Tel Aviv. Everybody knows this, is she trying to completely discredit herself?]. Those contacts have spurred a recent rash of U.S.-based terror plots and incidents. [Another lie, just because they initiated Project Northwoods which is so obvious with the Chistmas Underwear Intelligence Op and the Times Square Drill does not mean they can use their own false flag black ops to force us into burning the constitution]

"The First Amendment protects radical opinions, but we need the legal tools to do things like monitor the recruitment of terrorists via the Internet," Napolitano told a gathering of the American Constitution Society for Law and Policy. [Has she completely lost her f**king mind? What? What the hell do they have to do with each other? And why has terrorism grown while we have spent over $5 Trillion on exterminating over 1 million so called terrorists while raping another million, maiming many millions, and causing massive exoduses. And all this time causing PTSD and radiation in over a million soldiers, causing over 20,000 dead soldiers through the battlefield or by damaging their minds so much that they end up committing suicide. After all the world gave to this massive undertaking we are supposed to believe that so calld terrorism by random nuts increased? How is this even possible? Do you think maybe there is some other hidden agenda going on?]

Napolitano's comments suggest an effort by the Obama administration to reach out to its more liberal, Democratic constituencies to assuage fears that terrorist worries will lead to the erosion of civil rights.

The administration has faced a number of civil liberties and privacy challenges in recent months as it has tried to increase airport security by adding full-body scanners, or track suspected terrorists traveling into the United States from other countries.

"Her speech is sign of the maturing of the administration on this issue," said Stewart Baker, former undersecretary for policy with the Department of Homeland Security. "They now appreciate the risks and the trade-offs much more clearly than when they first arrived, and to their credit, they've adjusted their preconceptions."

Underscoring her comments are a number of recent terror attacks over the past year where legal U.S. residents such as Times Square bombing suspect Faisal Shahzad and accused Fort Hood, Texas, shooter Maj. Nidal Hasan, are believed to have been inspired by the Internet postings of violent Islamic extremists. [So the slave Napolitano was not enough for the banksters, Rothschild ordered AP to add that cherry of a comment. Hey Rothschild, we know that both Fort Hood and Times Square were protected patsies by the Terrorist Industrial Complex and that it is funded by Bilderberg and acts on behalf of Bilderberg. Bilderberg had the largest motive for the Fort Hood massacre and then ran the 24/7 psyops about so called Homegrown Terrorism and the evil Internet. Thanks for confirming this "kill the Internet" motive.]

And the fact that these are U.S. citizens or legal residents raises many legal and constitutional questions.

Napolitano said it is wrong to believe that if security is embraced, liberty is sacrificed.

She added, "We can significantly advance security without having a deleterious impact on individual rights in most instances. At the same time, there are situations where trade-offs are inevitable."

As an example, she noted the struggle to use full-body scanners at airports caused worries that they would invade people's privacy.

The scanners are useful in identifying explosives or other nonmetal weapons that ordinary metal-detectors might miss -- such as the explosives that authorities said were successfully brought on board the Detroit-bound airliner on Christmas Day by Nigerian Umar Farouk Abdulmutallab.

He is accused of trying to detonate a bomb hidden in his underwear, but the explosives failed, and only burned Abdulmutallab.

U.S. officials, said Napolitano, have worked to institute a number of restrictions on the scanners' use in order to minimize that. The scans cannot be saved or stored on the machines by the operator, and Transportation Security Agency workers can't have phones or cameras that could capture the scan when near the machine. [These scanners are controlled by NRO, she has no power whatsoever on what they do. What a joke]

NSA Must Examine
All Internet Traffic
to Prevent Cyber Nine-Eleven, Top Spy Says
By Ryan Singel   January 15, 2008  |  9:55 am

Read More

The nation’s top spy, Michael McConnell, thinks the threat of cyberarmageddon! is so great that the U.S. government should have unfettered and warrantless access to U.S. citizens’ Google search histories, private e-mails and file transfers, in order to spot the cyberterrorists in our midst.

That’s according to a sprawling 18-page story on the Director of
National Intelligence by Lawrence Wright in the January 21 edition of the New Yorker. (The story is not online).

In the piece, McConnell returns, in flamboyant style, to his exaggerating ways, hyping threats and statistics to further his bureaucratic aims. For example, McConnell regurgitates the hoary myth that computer crime costs America $100 billion a year. THREAT LEVEL traced down the source of that fake-factoid in September to a former privacy officer for the state of Colorado.

Presumably using unsupported stats like that, in May 2007 McConnell convinced President Bush that a massive cyber-attack on a single U.S. bank would be worse for the economy than than the deadly terrorist attacks of September 11, the article reports. In response, the NSA developed a mind-boggling, but still incomplete, plan to eavesdrop on the internet in order to protect it.

In order for cyberspace to be policed, Internet activity will have to be closely monitored. Ed Giorgio, who is working with McConnell on the plan, said that would mean giving the government the authority to examine the content of any e-mail, file transfer, or Web search. "Google has records that could help in a cyber-investigation," he said. Giorgio warned me, "We have a saying in this business: ‘Privacy and security are a zero-sum game.’"

It says something ominous about McConnell’s priorities if he believes a DDOS attack on Bank of America, or even a computer intrusion that wiped out its database (and magically purged its backup tapes), would be worse than an attack that killed 3,000 Americans.

Still, it’s hardly a surprising plan — given that McConnell was one of the main backers of the Clipper Chip, the government’s failed, early 1990’s proposal to put a backdoor in every encryption product.

McConnell also makes an astounding assertion that the secretive Foreign Intelligence Surveillance Court recently crippled the NSA’s overseas signals intelligence collection with a string of soft-on-terror rulings.

McConnell said that federal judges had recently decided, in a series of secret rulings, that any telephone transmission or e-mail that incidentally flowed into U.S. computer systems was potentially subject to judicial oversight. According to McConnell the capacity of the NSA to monitor foreign-based communications had consequently been reduced by seventy per cent.

In other words, McConnell claims the NSA couldn’t intercept a terrorist’s e-mail by tapping a fiber optic cable in Pakistan, if there was a chance the message would pass through a U.S. router or end up in a Hotmail account.

I’m no rich man, but I’ll bet any reader $1,000 that, when and if those rulings are ever released, we’ll see they say no such thing. Send me an e-mail to take me up this bet. U.S. government officials are welcome to participate.

The FISA law that created the Foreign Intelligence Surveillance Court only applies to intercepts that physically happen within the borders of the United States. The NSA has always been free to intercept foreign communications overseas — the mission for which they were created and funded — even if the call passes through a U.S. switch.

So in the case of the now debunked Iraqi kidnappers anecdote that leads off the New Yorker story, the NSA would only have needed to get a court order if its Iraqi targets initiated communications that flowed through U.S. servers or switches and the NSA decided to tap them physically at a United States internet or telecom facility, by burglarizing it, digging up its cables or getting the company to cooperate. (As for why that happens and how common it is, check my story: NSA’s Lucky Break: How the U.S. Became the Switchboard to the World.)

Simply put, the FISA law is intended to prevent the NSA from operating inside the United States.

In any event, that restriction collapsed this summer with the fear-induced, strong-armed passage of the so-called Protect America Act. That law radically re-architected the nation’s surveillance apparatus.
Now the NSA can turn Gmail’s servers and AT&T’s switches into de facto arms of the surveillance industrial complex without any court oversight.

And though the law ostensibly sunsets in February, any orders in effect at that time will have power for another 12 months. Moreover, Senate Majority Leader Harry Reid (D-Nevada) is reportedly planning to discard legislative attempts to rein in these new powers and will instead simply push to extend the current scheme another 12 months.

In short, McConnell’s politically convenient exaggerations have already worked well for him in winning domestic spying powers, despite their flimsiness under any real scrutiny.

That track record bodes ill for anyone concerned about his new plans to push for sweeping and unnecessary powers to put the NSA in the wires of the internet in order to prevent a computer attacks.

The Wall Street Journal’s intelligence guru Siobhan Gorman’s take is here. Gorman wrote a groundbreaking story on the cyberspace initiative last September while at The Baltimore Sun.

UPDATE: Ex-spook Michael Tanji guest-posting over at Danger Room writes:

It’s bad enough that the Director of National Intelligence is trotting out a bogus threat so the government can snoop on all Internet traffic.  What’s worse is that this kind of mass surveillance is a pretty lame way to catch the honest-to-God bad guys.

Of more interest to observers of intelligence activities is the issue of quality vs. quantity and the slow creep towards doom that these efforts foretell. The fact that we are essentially attempting to gill-net bad guys is a fairly strong indicator that the intelligence community has yet to come up with an effective strategy against information-age threats.

[...] Its not a question of listening in to you whispering sweet nothings into the ear to your significant other, it is simply a case of – as the late Sam Kinison joked – going where the food is. That our intelligence agencies can intercept adversary communications is largely a given, they just want to do it from the convenience of the homeland, not some remote switch in the darkest hinterlands.

(Photo: AP/ Cook)

Read More
Cyberwar Doomsayer Lands $34 Million in Government Cyberwar Contracts
By Ryan Singel   April 13, 2010  |  6:04 pm

Read More

Last month, the former Director of National Intelligence Michael McConnell boldly took to the Senate floor and the Washington Post’s editorial page to declare “The United States is fighting a cyber-war today, and we are losing.”

Thankfully for the American people, his company — the giant defense contractor Booz Allen Hamilton — has now landed the contract to build the Pentagon’s cyberwar control center. For a measly $14.4 million in taxpayer money, the outfit will help build a new cyberwar bunker for the U.S. Cyber Command.

Read More

Additionally, Booz Allen Hamilton won another contract for $20 million to “foster collaboration among telecommunications researchers, University of Maryland faculty members and other academic institutions to improve secure networking and telecommunications and boost information assurance,” Washington Technology reports. While that might sound like a lot of money to set up a mailing list and a wiki, please don’t be cynical. Undoubtedly, McConnell’s crack team of consultants are providing the researchers with around-the-clock bodyguards and state-of-the-art bullet-proof monitors.

Meanwhile, we urge U.S. netizens to refrain from un-patriotic musings that McConnell intentionally uses fear and exaggerated rhetoric to land these kinds of contracts for his company and instead, be vigilant and keep their eyes out for signs of Chinese hackers (one telltale sign is a “Made in China” label on the bottom of your laptop).

Otherwise you might soon find yourself facing a Red Screen of Death (RSOD), making you just one more casualty in this tragic cyberwar we Americans are all bravely enduring as one nation united.

Photo: USAF

Read More

Quotes from the movie....

Spook: ...I know you don't smoke. I saw your DARPA file, and that's my way of telling you - you've got a DARPA file.

MG: You gonna tell me what that is?

Spook: Defense Advanced Research Projects Agency. Their slogan is "scientia est potentia", and I know you know latin.

DARPA's slogan is "Knowledge is POWER".

Scientia Est Potentia (Knowledge Is Power)

    I'm sorry... but aren't you WORRIED yet...???!!! You should be:

    If the Homeland Security Act is not amended before passage, here is what will happen to you:
    Every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend -- all these transactions and communications will go into what the Defense Department describes as "a virtual, centralized grand database."

    To this computerized dossier on your private life from commercial sources, add every piece of information that government has about you -- passport application, driver's license and bridge toll records, judicial and divorce records, complaints from nosy neighbors to the F.B.I., your lifetime paper trail plus the latest hidden camera surveillance -- and you have the supersnoop's dream: a "Total Information Awareness" about every U.S. citizen.

    This is not some far-out Orwellian scenario. It is what will happen to your personal freedom in the next few weeks if John Poindexter gets the unprecedented power he seeks.

    This is not fiction, and it is no longer something you can afford to disregard - the freedoms that we've cherished for so long in this country are being ripped out from under your feet.

    Don't think it doesn't matter to you, that it won't affect you - because by the time it does, it will be too late to do a thing about it.

Thread about DARPA's recent news:

All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Apple/DoD use iPhones to biotrack Bilderberg slaves for Behavioral Modification/Mind Control projects

this is very not cool - read on  >:(

A patent application filed by the California-based computer manufacturer has revealed that the firm is developing heartbeat sensors to put into portable electronic devices such as the iPhone. While the technology in an iPhone might be used simply to monitor the heart rate of people such as cardiac patients, the patent states that it could also have wider uses such as allowing the owner to unlock the phone or authenticating financial transactions.  It could also be used to measure the pulse of a user's finger as he operates a touch screen.  Subtle differences caused by heart size, heart rate and muscle strength can produce unique electrical patterns that distinguish individuals.

The patent claims that these unique electrical signals could be used to authenticate the users identity by matching it to a pre-recorded heart beat trace held in the phone's memory. This could be used to provide access to certain applications and data contained on a phone such as personal information or access to email. It could also be used to authenticate financial transactions.
Apple has previously published several patents that indicate its intention to turn the iPhone into a kind of electronic wallet that could be used like a contactless credit card that can be swiped over electronic readers to make transactions or withdraw money from an ATM.

The latest patent claims that the heart monitor could then be used in combination with this technology as a way of providing added security. The patent said: "The heart sensor and processor can detect and process the user's cardiac activity at any suitable time. The processor can receive and process heart activity when a user slides a finger across the display to unlock the device. "In some embodiments the duration of particular portions of a user's heart rhythm or the relative size of peaks of a user's electrocardiogram can be processed and compared to a stored profile to authenticate a user of the device." The patent, which has just been published by the US Patent and Trademark Office, also states that the device could use the owner's heartbeat to provide music that matches their mood or physical activity.

While the technology in an iPhone might be used simply to monitor the heart rate of people such as cardiac patients, the patent states that it could also have wider uses such as allowing the owner to unlock the phone or authenticating financial transactions.

Or it could be used for deployment of assassination weapons by the state.

All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Carlos Santillan

  • Member
  • ***
  • Posts: 224
    • "They are not from outer space"
What is the Google Prediction API?
« Reply #5 on: August 01, 2010, 12:32:31 am »
I remembered that Alex Jones talked about this the other day:


    * Language identification
    * Customer sentiment analysis
    * Product recommendations & upsell opportunities
    * Message routing decisions
    * Diagnostics
    * Document and email classification
    * Suspicious activity identification
    * Churn analysis
    * And many more...

What intrigues me is their: "And many more..." (to predict future crimes like in Minority Report?...)
twitter: @Carlos_S01

fighting the NWO so that my people does not have to become illegal immigrants

Offline Brocke

  • Eleutherophiliac & Drapetomaniac
  • Global Moderator
  • Member
  • *****
  • Posts: 9,790
  • I am not a number, I am a free man!
    • Vimeo page
Re: What is the Google Prediction API?
« Reply #6 on: August 01, 2010, 12:43:35 am »

Google Teams Up With CIA to Fund "Recorded Future" Startup Monitoring Public

Investors at the CIA and Google are backing a company called "Recorded Future" that monitors tens of thousands of websites, blogs and Twitter accounts in real time in order to find patterns, events, and relationships that may predict the future. The news comes on amidst Google's so-called "Wi-Spy" scandal, that refers to revelations that Google's Street View cars operating in some 30 countries snooped on private WiFi networks over the last three years.

Google and CIA working together to spy on you!! The New World Order is watching you!! PT. 1

Welcome To Recorded Future

Welcome to Recorded Future. This is a brief introduction that highlights our new interface and latest features. To learn more about Recorded Future's media analysis, temporal analytics and predictive tools check out

That men do not learn very much from the lessons of history is the most important of all the lessons of history.
~Aldous Huxley

He who has a why to live can bear almost any how. - ~Friedrich Nietzsche