By Susan Duclos
All News PipeLine
What started out as research into the all-out final push for a completely “cashless society” to the point where they are now going after our nations children with the announcement of the new “cashless Monopoly” game, brought me so far down the rabbit hole that I started calling myself a “conspiracy theorist,” but the information is out there and I suggest readers click all the links and follow the information.
So, how do we get from the cashless society push to ‘Skynet’? Come on “Alice” jump in and lets explore.
Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.
In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.
The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.
By Ron Paul
Campaign for Liberty
Passage of Senator Mitch McConnell’s authorization for war against ISIS will not only lead to perpetual US wars across the globe, it will also endanger our civil and economic liberties. The measure allows the president to place troops anywhere he determines ISIS is operating. Therefore, it could be used to justify using military force against United States citizens on US territory. It may even be used to justify imposing martial law in America.
The President does not have to deploy the US military to turn America into a militarized police state, however. He can use his unlimited authority to expand programs that turn local police forces into adjuncts of the US military, and send them increasing amounts of military equipment. Using the threat of ISIS to justify increased police militarization will be enthusiastically supported by police unions, local officials, and, of course, politically-powerful defense contractors. The only opposition will come from citizens whose rights have been violated by a militarized police force that views the people as the enemy.
By Justin Jouvenal
While officers raced to a recent 911 call about a man threatening his ex-girlfriend, a police operator in headquarters consulted software that scored the suspect’s potential for violence the way a bank might run a credit report.
The program scoured billions of data points, including arrest reports, property records, commercial databases, deep Web searches and the man’s social- media postings. It calculated his threat level as the highest of three color-coded scores: a bright red warning.
The man had a firearm conviction and gang associations, so out of caution police called a negotiator. The suspect surrendered, and police said the intelligence helped them make the right call — it turned out he had a gun.
As a national debate has played out over mass surveillance by the National Security Agency, a new generation of technology such as the Beware software being used in Fresno has given local law enforcement officers unprecedented power to peer into the lives of citizens.
By Susan Duclos
All News PipeLine
The Obama administration has created yet another new task force, this one to counter “anti-militant communications,” according to Reuters, but which could and has been applied to free speech that doesn’t fit the government’s official narrative.
Under the guise of cracking down on the “unprecedented use of the Internet by jihadists,” the new group referred to as “Countering Violent Extremism Task Force,” will “integrate and harmonize” government efforts to prevent violent extremism in the United States, White House national security spokesman Ned Price said.
Officials from the Obama administration, including White House Chief of Staff Denis McDonough, Homeland Security Secretary Jeh Johnson, Attorney General Loretta Lynch and FBI Director James Comey and others, held talks with top tech leaders on Friday in what is being called a “technological brainstorming meeting” in what White House spokesman Josh Earnest called “ways to work together to make it even harder for terrorists or criminals to find refuge in cyberspace.”
This is a very slippery slope as Gary Franchi from Next News Network calls “The greatest threat to free speech that America has ever seen,” as he points out the ambiguity of the language and wonders if Alternative News sites, specifically those questioning the government’s policies, will be silenced.
By Site Staff
KINGSVILLE, TX — A panel of judges unanimously held that the presence of bumper stickers, air fresheners, and religious symbols in a vehicle can be considered “reasonable suspicion of criminal activity” during a traffic stop.
The case stems from a March 9, 2011, traffic stop that took place along U.S. Highway 77 in Kingsville, Texas. Officer Mike Tamez of the Kingsville Police Department observed a Chevy Tahoe with a woman behind the wheel, going 2 MPH above the posted speed limit. The family vehicle had a man in the passenger seat and a young girl in the back. The vehicle’s bumper was decorated with a Drug Abuse Resistance Education (D.A.R.E.) sticker and other “pro-police” decals. There were also a few rosaries hanging from the rear view mirror, and some air fresheners visible.
From these visual clues alone, Officer Tamez “concluded that they were probably drug runners.” He pulled them over for speeding, with the premeditated intention of searching the vehicle for drugs.
By Daisy Luther
As posted at The Organic Prepper
There isn’t much that feels more self-reliant than going out to your backyard hen house to get fresh eggs for breakfast. There’s no need for USDA approval, you know what your hens have been eating, and you don’t have to pay a premium price and hope that the farm who raised the chickens that laid those grocery store eggs actually treated the hens humanely. Bonus points if the bacon you fry up comes from a local farm, and bonus BONUS points if you raised that little piggie yourself. Raising backyard chickens is incredibly rewarding.
It’s pure freedom, this control over your own food.
Of course, until you have to register your chickens. Then, as food freedom activist Joel Salatin says, “Everything I want to do is illegal.”
By Michael Krieger
Criminal sentencing has long been based on the present crime and, sometimes, the defendant’s past criminal record. In Pennsylvania, judges could soon consider a new dimension: the future.
Pennsylvania is on the verge of becoming one of the first states in the country to base criminal sentences not only on what crimes people have been convicted of, but also on whether they are deemed likely to commit additional crimes. As early as next year, judges there could receive statistically derived tools known as risk assessments to help them decide how much prison time — if any — to assign.
– From the Five Thirty Eight article: Should Prison Sentences Be Based On Crimes That Haven’t Been Committed Yet?
As technology generally continues to advance, one thing you can be sure of is the criminal justice system’s use of innovative new “tools” will grow exponentially. This can be a good thing, but it can also be a very dangerous thing. Pennsylvania’s new law that permits the use of data showing whether people are “deemed likely to commit additional crimes” in criminal sentencing, is a perfect example of how an over reliance on technology can be a threat to liberty and due process.
By Heather Linebaugh
December 29, 2013
Whenever I read comments by politicians defending the Unmanned Aerial Vehicle Predator and Reaper program – aka drones – I wish I could ask them a few questions. I’d start with: “How many women and children have you seen incinerated by a Hellfire missile?” And: “How many men have you seen crawl across a field, trying to make it to the nearest compound for help while bleeding out from severed legs?” Or even more pointedly: “How many soldiers have you seen die on the side of a road in Afghanistan because our ever-so-accurate UAVs [unmanned aerial vehicles] were unable to detect an IED [improvised explosive device] that awaited their convoy?”
By John W. Whitehead
October 21, 2013
The Rutherford Institute
“Democracy means that if the doorbell rings in the early hours, it is likely to be the milkman.”—Winston Churchill
It’s 3 a.m. You’ve been asleep for hours when suddenly you hear a loud “Crash! Bang! Boom!” Based on the yelling, shouting and mayhem, it sounds as if someone—or several someones—are breaking through your front door. With your heart racing and your stomach churning, all you can think about is keeping your family safe from the intruders who have invaded your home. You have mere seconds before the intruders make their way to your bedroom. Desperate to protect your loved ones, you scramble to lay hold of something—anything—that you might use in self-defense. It might be a flashlight, your son’s baseball bat, or that still unloaded gun you thought you’d never need. In a matter of seconds, the intruders are at your bedroom door. You brace for the confrontation, a shaky grip on your weapon. In the moments before you go down for the count, shot multiple times by the strangers who have invaded your home, you get a good look at your accosters. It’s the police.