Docstoc

Death Of The Internet 21 st Issue Infowars Magazine

Document Sample
Death Of The Internet 21 st Issue Infowars Magazine Powered By Docstoc
					2   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM   3
    FEATURED                                       THE PLAN TO KILL THE INTER-



    11
                                                   NET UNCOVERED
                                                   W R I TTE N BY PAU L JOSEP H
                                                   WATS O N & A L EX JONES




                                                   NSA TO CONTROL THE



    18
                                                   STOCK MARKET
                                                   W R I TTE N BY K I T DA NI EL S




                                                   OBAMA ADMINISTRA-



    44
                                                   TION TURNS INTERNET
                                                   OVER TO GLOBALISTS
                                                   W R I TTE N BY KU RT NI M M O




                                                   CORPORATE DOMINA-



    56
                                                   TION ON THE WEB
                                                   W R I T TE N BY KU RT NI M M O




4    VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
                                                                                                                   CONTENTS
14   CYBER-SECURITY EXPERTS ASK APPLE
     ABOUT NSA BACKDOOR                                  46        REVOLVING DOOR OF DEATH
                                                                   WRITTE N BY I NFOWAR S STAF F
     W R IT T EN BY STE V E WATS ON



17   MONOPOLIZING THE INTERNET                           48        POLICE NOW “ARMED FOR WAR”
                                                                   AGAINST RETURNING VETERANS
     W R IT T EN BY KUR T N IM MO
                                                                   WRITTE N BY PAU L JO SEPH WATSON




                                                                                                                     VOLUME 2 ISSUE 10 JUNE 2014
22   NSA PRETENDS TO BE FACEBOOK
     TO SPY ON THE WORLD                                 51        ROBOTS PROGRAMMED TO KILL
                                                                   YOU “FOR THE GREATER GOOD”
     W R IT T EN BY STE V E WATS ON                                WRITTE N BY PAU L JO SEPH WATSON



26   MASK CAN HIDE YOU FROM
     BIOMETRIC FACE SCANNERS
                                                         52        PUBLIC REJECTS GOVERNMENT
                                                                   TAKEOVER OF INTERNET
     W R IT T EN BY M AC S L AVO                                   WRITTE N BY KI T DANI ELS



31   FCC MOVES CORPORATIZATION OF
                                                         58        TRANSHUMANISTS WISH TO




                                                                                                                     DEATH OF THE INTERNET
     INTERNET FORWARD                                              BECOME “LIKE GOD”
     W R IT T EN BY KUR T N IM MO                                  WRITTE N BY M I CHAEL SNY DER



32   GOOGLE HIRES TOP GENETICIST IN
     SEARCH FOR LIFE EXTENSION                           64        GOOGLE CHROME CAN LISTEN TO
                                                                   YOUR CONVERSATIONS
     W R IT T EN BY DA N IE L TAYLOR                               WRITTE N BY PAU L JO SEPH WATSON



36   NSA FITS HARDWARE WITH SURVEIL-
     LANCE EQUIPMENT                                      66
                                                                   CHINESE-STYLE ID SYSTEM FOR
                                                                   AMERICAN INTERNET USERS
     W R IT T EN BY STE V E WATS ON                                WRITTE N BY PAU L JO SEPH WATSON



40   KILLING THE INTERNET: NEW TAXES
     IN THE WINGS
     W R IT T EN BY KUR T N IM MO




                                                                     A BOUT T H E COV E R
                    In this June edition of The Infowars Magazine the fight for Internet freedom is high-
                    lighted in a multitude of articles that depict the very real threat of a regulated Internet.
                    Whether it be the death of net neutrality, or the corporatization of the world wide
                    web, the attack on online sovereignty is evident. The NSA backdoor spy programs
                    and other invasive operations are also mentioned with other informative articles cov-
                    ering the most recent topics concerning the Infowar and the end of the web.



              VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                              INFOWARS.COM                                                5
                                                                                                                                                   5
       S
    OTE
    QU




6   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
 SUBMIT YOUR QUOTES, MEMES, LETTERS, AND POLITICAL ILLUSTRATIONS TO LETTERS@INFOWARS.COM OR GRAPHICS@INFOWARS.COM




“When you talk to a human
in 2035, you’ll be talking to
someone that’s a combination
of biological and non-biological


                                                          RAYKURZWEIL
intelligence.”




“We know where you are. We
know where you’ve been. We
can more or less know what
you’re thinking about.”

                                                          ERIC SCHMIDT
“I can’t in good conscience
allow the U.S. government to
destroy privacy, Internet freedom
and basic liberties for people
around the world with this mas-
sive surveillance machine they’re
secretly building.”                                       EDWARD SNOWDEN
“If freedom of speech is taken
away, then dumb and silent we
may be led, like sheep to the
slaughter.”


                                                          GEORGE WASHINGTON
               VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                    INFOWARS.COM                    7
                  A S H ORT STO RY A B OUT US                                                                  A BOUT A LEX JONES
Infowars Magazine was founded as a monthly publication in 2012                                The Alex Jones Show is a nationally syndicated
as the answer to the eminent threat of internet censorship. The first                         news/talk show based out of Austin, TX. The
issue debuted in september 2012, bringing the fight for the infowar                           show is syndicated by the Genesis Communi-
to a new front, the changing landscape of print media. Over 100,000                           cation Network on over 160 AM and FM radio
copies are distributed world-wide each month, spreading truth                                 stations across the United States, and has a
journalism with the passion of grassroots publication and the per-                            large internet based audience.
manence of physical print. Our distribution points across the globe
continue to grow and our subscriptions increase as people like you                            SOCIAL SITES:
take the infowar to the streets, providing magazines to stores, restau-                       Facebook.com/AlexanderEmerickJones
rants, businesses, and neighborhoods. Take a stand against tyranny                            Twitter: @RealAlexJones
and join the front lines in the fight for freedom.                                            Youtube.com/TheAlexJonesChannel




INFOWARS.COM                   PRISONPLANET.COM                    PLANETINFOWARS.COM                           WWW.PRISONPLANET.TV
Home of the #1 Internet news   Reporters on the scene, articles,   Instantly connect to what’s most import-     Get access to all the channels: The Alex
show in the world.             and special coverage.               ant to you. Follow your friends, experts,    Jones Show, Nightly News, Exclusive Vid-
                                                                   favorite celebrities, and breaking news.     eo Reports, 60+ Movies and Documenta-
                                                                                                                ries, Books, and more.




  8                   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                                         INFOWARS.COM
                     L I ST E N TO T H E AL E X J ON E S S H OW
   You can listen to the show on-demand over the internet, either
   when the show is on the air (Mon-Fri, 11:00 a.m.—2:00 p.m CST
   and Sunday from 4:00.—6:00 PM CST) or you can stream a feed
   of the latest show at www.infowars.com/show




CONTRIBUTION
 PUBLISHER                  CONTRIBUTING WRITERS                         CHECK OUT
 Alex Jones                 Paul J. Watson
                            Kurt Nimmo                                   INFOWARSSHOP.COM
 MANAGING EDITOR            Kit Daniels                                  Check out Infowars gear, exclusive
 Kelen McBreen              Steve Watson                                 Alex Jones Movies, Infowars Magazine,
                                                                         health and wellness, preparedness
                            Mac Slavo                                    products, and more.
 ART DIRECTOR               Daniel Taylor
 Molly Rogers               Michael Snyder
                                                                          C O N TA C T U S
 GRAPHICS &
 PHOTOGRAPHY                                                             letters@infowars.com
 Molly Rogers               PROJECT MANAGER                              graphics@infowars.com
 Rob Reeger                 Tim Fruge
 Paul Beck
 Steve McGhee               EDITORIAL ASSISTANT
                            Kit Daniels



 SINGLE ISSUES and bulk orders are available online at www.infowarsstore.com or through customer
 service at 1-888-253-3139 • ADVERTISING inquiries can be directed to 512-646-4414 or advertising@
 infowars.com • INFORMATION requests, whether general or editorial, can be found by contacting
 letters@infowars.com • Infowars Magazine is published by Free Speech Systems, LLC. 12 times a year
 with a circulation of 90,000 copies. All content within this magazine is copyright of Free Speech Sys-
 tems, LLC. To receive a free electronic version of the magazine, become an Infowars Insider by signing
 up at www.infowars.com/newletter • PERMISSION to reprint original Infowars articles in whole or in
 part is gladly granted, provided full credit is given. Some articles are copyrighted by our contributing
 writers, so check to see if copyright-free status applies. The articles appearing within this publication
 reflect the opinions and attitudes of their respective authors and not necessarily those of the publisher,
 advertisers, or editorial team.



              VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                  INFOWARS.COM                          9
10   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
              W R I T T E N BY PAU L J O S EP H WATS O N & A L E X J O N E S




THE PLAN TO KILL THE
INTERNET UNCOVERED
10 Ways The Freedom Of The World Wide
Web Is Being Dismantled




T
           he Internet has emerged         see a trickle-down effect of higher        #3 GOVERNMENTS ARE
           as the most empowering          prices as Web sites try to pass along      PAYING TROLLS TO SWAY
           tool of individual freedom      new costs of doing business with
           since the Gutenberg’s press,    Internet service providers,”reports the
                                                                                      PUBLIC OPINION
           affording billions of people    Washington Post.                             In 2010, Canada’s CTV News
worldwide not only the tool of instant       For almost a decade, we have warned      reported on how federal authorities
communication, but access to a wealth      of plans to create an ‘Internet 2′ under   were paying companies to “correct
of liberating information, freedom         which the old Internet would be left       misinformation” on web forums.
from the chains of received consensus,     to crumble and die, eviscerating             The Turkish, Israeli and Chinese
and the opportunity to become their        the world wide web as a tool of free       governments along with a host of
own media platform.                        speech that allows independent voices      others have also implemented similar
  This represents an ever increasing       to be heard amongst the cacophony of       programs, while the U.S. Air Force
threat to the status quo of the elite,     corporate and statist propaganda.          hired data security firm HBGary to
which is why the establishment is                                                     create large numbers of fake social
working feverishly to dismantle the                                                   media profiles that could be used to
freedom granted by the world wide          #2 INTELLIGENCE                            spread propaganda while countering
web in its current form.                                                              anti-U.S. rhetoric online. Raw Story
                                           AGENCIES ARE                               reported that the obvious function
#1 THE DEATH OF NET                        MANIPULATING THE                           of the program was to “manipulate
NEUTRALITY                                 INTERNET WITH                              public opinion on key information,
                                                                                      such as news reports,” thereby creat-
                                           DELIBERATE                                 ing, “the illusion of consensus.”
  The Federal Communications Com-          DISINFORMATION
mission (FCC) recently gave the green                                                 #4 MAINSTREAM NEWS
light for large Internet Service Provid-     Documents recently released by
ers to create a two-tier Internet system   whistleblower Edward Snowden con-          WEBSITES ARE KILLING
which would allow large corporations       firm that western intelligence agencies    COMMENT SECTIONS
to buy up dedicated faster bandwidth,      are deliberately flooding the web with
ending net neutrality and potentially      disinformation in order to, “inject all      Although this remains a relatively
leaving smaller websites in the dust.      sorts of false material onto the inter-    rare phenomenon, increasing num-
  If passed this will allow the “tele-     net in order to destroy the reputation     bers of mainstream news websites are
vization” of the Internet, resulting in    of its targets.”                           killing or severely restricting comment
large companies forming monopolies           These techniques are intended to         sections in order to drown out dissi-
and restricting consumer choice.           “control, infiltrate, manipulate, and      dent voices that challenge the prevail-
  “[S]maller companies that can’t          warp online discourse,” which has the      ing status quo.
afford to pay for faster delivery would    effect of, “compromising the integrity       Studies confirm that article com-
likely face additional obstacles against   of the internet itself,” according to      ment sections – for better or worse
bigger rivals. And consumers could         journalist Glenn Greenwald.                – are heavily swaying public opinion.


                 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                           INFOWARS.COM                      11
Popular Science recently announced         having people in government refute      January 2011, the New York Times
its decision to kill comment sections      conspiracy theories wouldn’t work       reported, “US and Israeli intelligence
on their website in order to silence       because they are inherently untrust-    services collaborated to develop a
global warming skeptics. BoingBoing.       worthy, making it necessary to, “Enlist destructive computer worm to sabo-
net is following a similar track. The      nongovernmental officials in the effort tage Iran’s efforts to make a nuclear
New York Times also recently indi-         to rebut the theories.”                 bomb,” acknowledging the “conspir-
cated that it is scaling back comments       Sunstein suggested that “government   acy theory” to be true.
and removing them from some articles       agents (and their allies) might enter     As the Washington Post reported,
altogether.                                chat rooms, online social networks, or  the United States and Israel were also
  The effort to kill comments is part of   even real-space groups and attempt      responsible for jointly developing the
the establishment media’s desperate        to undermine percolating conspiracy     Flame virus.
effort to dictate reality and maintain     theories by raising doubts about their    Stuxnet’s appearance was dovetailed
a grip on manufacturing consensus in       factual premises, causal logic or impli-by an aggressive PR campaign during
the face of a burgeoning independent       cations for political action.”          which Joe Lieberman and others called
media and the Internet as a vehicle of                                             for the government to be allowed to,
free speech in general.                    #6 FALSE FLAG CYBER-                    “disconnect parts of its Internet in
                                                                                   case of war,” just as China did. What
                                           SECURITY ATTACKS AS A                   Lieberman failed to mention is the
#5 THE OBAMA ADMIN-
                                           PRETEXT TO INCREASE                     fact that China’s Internet censorship
ISTRATION’S “COGNITIVE
                                           WEB REGULATION                          program was and continues to be
INFILTRATION” OF THE                                                               based around crushing dissent against
INTERNET                                     While constantly repeating the the state and has nothing to do with
                                           necessity for restrictive cybersecurity cybersecurity.
  In 2010, a White House program was       regulations to be applied to the Inter-
revealed that centered around infil-       net in the name of preventing cyber #7 FAIRNESS DOCTRINE
trating conspiracy groups in order to      attacks, the United States has itself
undermine them via postings on chat        been behind all the recent major cyber FOR THE INTERNET
rooms and social networks. Harvard         attacks.                                  According to Tim Cavanaugh, under
law professor Cass Sunstein, Obama’s         After Alex Jones pointed the finger a plan entitled “Multi-Market Study
appointee to head the Office of Infor-     at Washington and Tel Aviv for being of Critical Information Needs, “The
mation and Regulatory Affairs, spear-      behind Stuxnet during a September airwaves regulator would subject
headed this “cognitive infiltration” of    27, 2010 broadcast, the likes of CNN, news producers in all media to inva-
the web and has been heralding its         the Economist and others followed up sive questioning about their work and
success ever since.                        by ridiculing the claim as a baseless content,” a move which could lead
  Sunstein pointed out that simply         conspiracy theory. Months later in to policing of political content on the


 12              VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                          INFOWARS.COM
web.                                      in 1934. This law states that if a “state   were advanced in the name of stop-
  Although the study was widely           of public peril or disaster or other        ping online copyright theft, yet were
derided in the media and now appears      national emergency” exists, the presi-      soundly defeated when it emerged
to have been derailed, the fact that      dent may “authorize the use or control      they were actually designed to impose
the FCC is pursuing such programs         of any…station or device.”                  oppressive censorship and surveil-
illustrates the feds’ contempt for free                                               lance on the Internet, will continue
speech on the Internet.                   #9 NEW TAXES AND                            to be advanced by those who seek to
                                                                                      centralize power over the web into
                                          REGULATIONS SET TO                          fewer and fewer hands at the top of
#8 HOMELAND
                                          STIFLE COMMUNICATION                        the pyramid.
SECURITY’S INTERNET
                                          & SALES ON THE WEB                            In addition, the FBI’s attempt to
KILL SWITCH                                                                           amend the 1994 Communications
                                            A blizzard of new taxes and regula-       Assistance for Law Enforcement Act
  While fears of a government kill        tions could herald “Internet freedom’s      in order to build backdoors into all
switch for the Internet have been         expiration date,” according to a recent     Internet Service Providers, email cli-
mooted for years, under Standard          Wall Street Journal piece which points      ents and social media sites, is another
Operating Procedure 303 or SOP 303,       to efforts by lawmakers to weaken the       effort to chill free speech by indoc-
the Department of Homeland Security       Internet Tax Freedom Act in order, “to      trinating people with the notion that
has given itself the power to oversee     punish all American consumers with          everything they do online is being
“the termination of private wireless      new taxes on communication.”                permanently watched and recorded,
network connections, both within            Lobbyists for giant retailers are lean-   making them less likely to express
a localized area, such as a tunnel or     ing on Congress to empower some             their freedoms due to fears of official
bridge, and within an entire metropol-    9,600 state and local governments           oppression.
itan area,” in the event of a declared    with more authority over e-commerce,          Only by aggressively opposing these
emergency.                                including a potential e-mail tax which      onerous threats to the freedom of the
  When privacy rights group the Elec-     could dissuade millions of Americans        Internet can we hope to preserve the
tronic Privacy Information Center         from communicating online.                  world wide web in its current incarna-
attempted to obtain more information                                                  tion and continue to see informed and
on the plan last year, the DHS claimed    #10 SOPA, CISPA & THE                       empowered people the world over
that it could not locate any further                                                  embrace it as the tool of individual
details regarding the program.            FBI’S INTERNET BACK-                        liberation it has truly become.
  The White House also still claims       DOOR
that it retains Internet kill switch
powers under the law that created the      Legislative assaults under the
Federal Communications Commission         banner of SOPA and CISPA, which


                VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                            INFOWARS.COM                      13
                W R I T T E N BY ST EV E WATS O N




CYBER-SECURITY
EXPERTS ASK IF APPLE
“FLAW” WAS REALLY
NSA BACKDOOR
Security Hole Appeared Just One Month
Before NSA Bragged It Had Penetrated
Apple Servers




F
           ollowing an admission by Apple      in iOS 6.0 and was not present in iOS           it.
           that a “bug” in its operating       5.11.                                             4. NSA itself planted it surreptitiously.
           system had left devices open          Immediately, tech experts began to note         5. Apple, complicit with the NSA, added
           to potential hacking, experts       that iOS 6.0 was released in September          it.
           are questioning whether the         2012, just one month before Apple was             “…once the bug was in place, the NSA
security hole was intentional, in order to     added to the NSA’s list of penetrated serv-     wouldn’t even have needed to find the
allow the NSA backdoor access as part of       ers, according to slides leaked by Edward       bug by manually reading the source code.
its mass spying program.                       Snowden.                                        All they would need are automated tests
  On Friday Apple acknowledged that a            Noting that while the evidence is cir-        using spoofed certificates that they run
“goto fail” command in the company’s           cumstantial, blogger John Gruber, a com-        against each new release of every OS.”
SecureTansport protocol had left iPhones,      puter scientist, says that “the shoe fits”      Gruber states.
iPads, and MacBooks vulnerable to data         where the NSA’s Apple breakthrough is             “Apple releases iOS, the NSA’s automated
intercept on networks and wireless con-        concerned.                                      spoofed certificate testing finds the vul-
nections. Anyone who had knowledge               “Sure would be interesting to know who        nerability, and boom, Apple gets “added”
of the security flaw, could have accessed      added that spurious line of code to the         to PRISM. ([It] wasn’t even necessarily a
secure data, Apple noted, declaring that       file,” he notes. “Conspiratorially, one could   fast turnaround — the NSA could have
“a software fix will be released very soon.”   suppose the NSA planted the bug, through        discovered the vulnerability over the
  Johns Hopkins University cryptography        an employee mole, perhaps. Innocuously,         summer, while iOS 6 was in developer
professor Matthew Green told Reuters           the Occam’s Razor explanation would be          program beta testing.)” Gruber concludes.
that the flaw (see below) was “as bad as       that this was an inadvertent error on the         Other tech bloggers concur that it is
you could imagine.”                            part of an Apple engineer. It looks like the    strange how such a major flaw wasn’t
  Several coding experts are now raising       sort of bug that could result from a merge      spotted or fixed sooner. “The timing is
their eyebrows over the matter, noting         gone bad, duplicating the goto fail; line.”     rather odd, and it makes you wonder how
that the timeline of the inception of the        Gruber has laid out five potential sce-       such a serious bug went undiscovered for
security flaw matches up with leaked NSA       narios, personally leaning toward number        over a year.” writes Cody Lee of iDown-
slides that document how the spy agency        three:                                          loadblog.
had managed to gain access to Apple’s            1. Nothing. The NSA was not aware of            Ashkan Soltani, another security expert
severs.                                        this vulnerability.                             has compiled a list of current Apple appli-
  According to coder and App developer           2. The NSA knew about it, but never           cations that he believes are vulnerable to
Jeffrey Grossman, who has studied the          exploited it.                                   security hole that is still open on the cur-
code in question, the flaw only appeared         3. The NSA knew about it, and exploited       rent version of OS X for the Mac. The list


 14                VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                                   INFOWARS.COM
                                                                                             “ASHKAN SOLTANI,
                                                                                             ANOTHER SECURITY EXPERT
                                                                                             HAS COMPILED A LIST OF
                                                                                             CURRENT APPLE APPLICA-
                                                                                             TIONS THAT HE BELIEVES ARE
                                                                                             VULNERABLE TO A SECURITY
                                                                                             HOLE THAT IS STILL OPEN ON
                                                                                             THE CURRENT VERSION OF
                                                                                             OS X FOR THE MAC. THE LIST
                                                                                             INCLUDES BASIC APPS SUCH
                                                                                             AS MAIL, SAFARI, TWITTER,
                                                                                             FACETIME AND CALENDER.
                                                                                             THESE APPS TRANSMIT AND
                                                                                             STORE EXACTLY THE TYPE
                                                                                             OF INFORMATION NSA HAS
                                                                                             TARGETED.”




includes basic apps such as mail, safari,    other personal data.                        deeply about our customers’ privacy and
twitter, facetime and calender. These          Apple has since vehemently denied         security.”
apps transmit and store exactly the type     having knowledge of the NSA’s activi-         What do you think? Did Apple inten-
of information NSA has targeted.             ties. “Apple has never worked with the      tionally allow the NSA backdoor access
  Just one month ago, a new Snowden          NSA to create a backdoor in any of our      to its servers? Is Apple, seemingly like
leak revealed that the NSA had infiltrated   products, including iPhone,” Apple said     Intel, the victim of NSA moles on the
iPhones with a program known as DROP-        in a January statement. “Additionally, we   inside? Or is all of this just a big old coin-
OUT JEEP, which allowed the agency           have been unaware of this alleged NSA       cidence?
access to text messages, voicemails and      program targeting our products. We care


                  VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                                INFOWARS.COM                             15
16   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
              W R I T T E N BY KU RT N I M M O




MONOPOLIZING THE
INTERNET: COMCAST
GOBBLES UP TIME
WARNER
Imperium In Imperio Will Govern Your
Internet Connection




“
            Competition is a sin,” said    government pretends it will protect        history professor at Baruch College in
            the robber baron John D.       them from predatory monopolies and         New York, told the Harvard Business
            Rockefeller. His maxim, a      other highly organized scams and rip-      Review in 2010. The first generation
            rule of conduct for large      offs. It is well-known in the industry     of Americans “did their best to make
            corporations for well over a   that Comcast has a “wealth of con-         sure that those institutions were
hundred years, will soon govern how        nections” in Washington. In short, it      subordinate to elected officials and
you receive your internet signal and       basically owns the FCC.                    representative government. They saw
how much you pay for it.                     The Los Angeles Times posted an          corporations as corrupting influences
  Earlier today, Comcast, the largest      op-ed Wednesday on the merger. “Say        on both the economy at large and
mass media and communications              goodbye to the public interest,” it        on government — that’s why they
transnational corporation in the           headlines. The liberal newspaper pre-      described the East India Company as
world, announced it will absorb Time       dictably leans on the FCC and states       imperium in imperio, a sort of ‘state
Warner, the world’s second largest         the lumbering government regulatory        within a state.’ This wasn’t an outcome
media and entertainment conglom-           commission “has all the authority          they were looking to replicate.”
erate. The “friendly” merger will          it needs to protect net neutrality.”         “With regard to monopolies they
“combine the country’s top two cable       The prospect of handpicked political       are justly classed among the greatest
providers into a colossus that could       apparatchiks deciding the fate of the      nusances in Government,” James
reshape the U.S. pay TV and broad-         internet without bias is on par with       Madison wrote to Thomas Jefferson
band industry if it clears regulatory      a government sanctioned monopoly           in 1788, a little more than a century
hurdles,” reports Reuters. Hurdles, it     doing basically the same thing. All we     before the Supreme Court ruled in a
should be noted, easily swept away         basically need to know is that the cur-    case involving a railroad that corpora-
by the real owners of the FCC and the      rent chairman of the FCC is Thomas         tions have the same rights as flesh and
federal government – leviathan-sized       Wheeler, a former lobbyist for the         blood humans.
international corporations and the         cable and wireless industry.                 “In an already uncompetitive market
global banking cartel.                       Prior to a creeping corporate takeover   with high prices that keep going up
  Despite this fact, we can expect a       beginning in 1819 when the courts          and up, a merger of the two biggest
show. “A deal may face a fierce battle     first tested the waters on the con-        cable companies should be unthink-
in Washington as you are merging           tentious subject of corporate person-      able,” Craig Aaron of Free Press
the two largest cable operators,” an       hood, the founders insisted charters       lamented on Wednesday, prior to the
analyst told Reuters. It will be another   be issued for business incorporation.      merger. “This deal would be a disaster
dog and pony show designed to              “The Founders did not confuse Bos-         for consumers and must be stopped.”
convince the American people they          ton’s Sons of Liberty with the British
actually live in a democracy where the     East India Company,” Brian Murphy, a


                 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                           INFOWARS.COM                      17
              W R I T T E N BY K I T DA N I EL S



NSA TO CONTROL
THE STOCK MARKET
Spy Agency Can Easily Manipulate The
Market Through Latest Surveillance Hub



A
             n upcoming surveillance          traders to rig markets.                   tions and altering the amounts held in
             hub monitoring all invest-         Indeed, three traders have already      bank accounts.
             ment     transactions   in       filed a lawsuit against CME Group           “Governments should not use their
             real-time will allow the         Inc. for selling sensitive data to high   offensive cyber capabilities to change
             National Security Agency         frequency traders.                        the amounts held in financial accounts
unparalleled ability to manipulate the          “The plaintiffs allege CME charged      or otherwise manipulate the financial
stock market.                                 exchange and data fees for real-time      systems,” the report recommended.
  Through the use of the Financial            price data, and purported that the data     Trevor Timm, a former analyst at the
Industry Regulatory Authority (FIN-           was sold to the users in real time. The   Electronic Frontier Foundation, asked
RA)’s latest database, which keeps            suit further states that CME allegedly    if the recommendation implied that
investor data in the same centralized         also charged high-frequency traders       the NSA was already doing just that.
location, the NSA could easily capture        for the ability to see the data before      And a few months earlier, in Septem-
private, financial data on targeted           others, including people who paid         ber, German news outlet Der Spiegel
investors and even influence the stock        and continue to pay CME for seeing        reported that the spy agency was also
market as a whole.                            the same data first,” reports the Wall    tracking the global flow of money.
  And it appears that the dragnet data-       Street Journal.                             Under the “Follow the Money” pro-
base, called the Comprehensive Auto-            Since the 1987 stock market crash,      gram, the NSA collects credit card
mated Risk Data System (CARDS),               the Working Group on Financial Mar-       and other financial transactions into
was designed with such vulnerabilities        kets, otherwise known as the Plunge       its own financial databank, called
in mind.                                      Protection Team, has also been a target   “Tracfin,” which contains nearly 200
  “I can’t think of any other reason          of charges of market manipulation.        million records if not more.
that someone would invest so much               The government itself routinely           “Further NSA documents from 2010
time and so much effort into trying           manipulates markets with the timing       show that the NSA also targets the
to monitor every brokerage account            of announcements and the actual           transactions of customers of large
in the United States in real time,”           execution of quantitative easing and      credit card companies like VISA for
Porter Stansberry, the founder of the         bond buying programs.                     surveillance,” the article continued.
Stansberry & Associates Investment              The Wall Street Journal recently        “NSA analysts at an internal confer-
Research Conference, said on the Alex         reported on the new CARDS database        ence that year described in detail
Jones Show. “That is an enormous              and quoted FINRA’s chairman stating       how they had apparently successfully
technical challenge.”                         that the dragnet “would provide us        searched through the U.S. company’s
  He also added that even knowing             with a treasure trove of information.”    complex transaction network for tap-
something as simple as how many                 Oher revelations in the past reveal     ping possibilities.”
individual investors own certain secu-        that the NSA is more than willing to        And the upcoming CARDS database,
rities could be very, very valuable to        monitor and manipulate financial          which a law professor suggested is as
select interests.                             transactions.                             tempting of a target as the American
  While one of the NSA’s roles is               Last December, the White House          fleet at Pearl Harbor, would grant the
undoubtedly financial espionage, the          report on the activities of the NSA       NSA almost unlimited possibilities to
database will also make it easier for         suggested that the spy agency was         influence the stock market.
corporate entities and high frequency         already hacking into financial institu-



 18              VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                             INFOWARS.COM
“LAST DECEMBER, THE WHITE
HOUSE REPORT ON THE ACTIVITIES
OF THE NSA SUGGESTED THAT THE
SPY AGENCY WAS ALREADY HACK-
ING INTO FINANCIAL INSTITUTIONS
AND ALTERING THE AMOUNTS HELD
IN BANK ACCOUNTS.

“GOVERNMENTS SHOULD NOT USE
THEIR OFFENSIVE CYBER CAPABIL-
ITIES TO CHANGE THE AMOUNTS
HELD IN FINANCIAL ACCOUNTS
OR OTHERWISE MANIPULATE THE
FINANCIAL SYSTEMS,” THE REPORT
RECOMMENDED.”




          VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM   19
20   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM   21
              W R I T T E N BY ST EV E WATS O N




NSA PRETENDS TO BE
FACEBOOK TO SPY ON
THE WORLD
Malware Can Record Audio And Take Photos
Of Web Users Without Their Knowledge




T
            he latest Snowden leaks        nerabilities in these systems, making      administrator’s computer, the agency
            on the NSA reveal that the     them more vulnerable for attacks by        can gain covert access to communica-
            spy agency is masquerad-       third parties,” Hypponen told The          tions that are processed by his com-
            ing as Facebook in order to    Intercept.                                 pany. “Sys admins are a means to an
            infect millions of computers     Hypponen added that because the          end,” the NSA operative writes.
around the world with malware as           system is designed to operate without        The internal post – titled “I hunt sys
part of its mass surveillance program.     a great deal of human oversight, it        admins” – makes clear that terrorists
  Glenn Greenwald reported the latest      could lead to the malware infection        aren’t the only targets of such NSA
information today, noting that the         process spiraling “out of control”.        attacks. Compromising a systems
practice has been in operation for over      “That would definitely not be propor-    administrator, the operative notes,
ten years with the help of British and     tionate,” Hypponen said. “It couldn’t      makes it easier to get to other targets
Japanese intelligence.                     possibly be targeted and named. It         of interest, including any “government
  The NSA, according to the leaks, has     sounds like wholesale infection and        official that happens to be using the
been distributing malware “implants”       wholesale surveillance.”                   network some admin takes care of.”
which can siphon out data from com-          The NSA refused to comment on              The program appears to be part of
puters around the globe. The agency        the latest revelations, suggesting that    NSA’s TAO (Tailored Access Opera-
reportedly used a fake Facebook server     because the practice is used for foreign   tions), and is aimed at “Owning the
as a launching pad to grab information     and counterintelligence purposes, it is    Internet” according to the leaked doc-
from hard drives. The malware has          protected under a recent policy put in     uments. The leaked Black Budget of
also been designed to covertly record      place by President Obama.                  the program reveals it had a price tag
audio from a computer’s microphone           However, the evidence in the leaked      of $67.6 million last year.
and take snapshots with its webcam.        documents indicates that the targets         Last month, a new Snowden leak
  The internal documents describe the      of NSA’s malware were not significant      revealed that British and American
NSA’s own practice as “industrial-scale    threats to national security, raising      governments are spying on people in
exploitation” of computer networks.        serious questions over the legality of     their own homes via web cams, laptop
  Chief research officer at the secu-      mass surveillance tactics.                 microphones and devices such as
rity firm F-Secure, Mikko Hypponen,          In one secret post on an internal        the X-box, a story that Infowars first
described the practice as “disturbing,”    message board, an operative from the       reported on eight years ago.
noting that it could inadvertently         NSA’s Signals Intelligence Director-
affect the security of the entire inter-   ate describes using malware attacks
net.                                       against systems administrators who
  “When they deploy malware on sys-        work at foreign phone and Internet
tems they potentially create new vul-      service providers. By hacking an




 22              VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                            INFOWARS.COM
                            “THE NSA, ACCORDING TO THE LEAKS, HAS
                            BEEN DISTRIBUTING MALWARE “IMPLANTS”
                            WHICH CAN SIPHON OUT DATA FROM COM-
                            PUTERS AROUND THE GLOBE. THE AGENCY
                            REPORTEDLY USED A FAKE FACEBOOK SERVER
                            AS A LAUNCHING PAD TO GRAB INFORMATION
                            FROM HARD DRIVES. THE MALWARE HAS ALSO
                            BEEN DESIGNED TO COVERTLY RECORD AUDIO
                            FROM A COMPUTER’S MICROPHONE AND
                            TAKE SNAPSHOTS WITH ITS WEBCAM.”




VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM      23
24   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM   25
              W R I T T E N BY M AC S L AVO



ANTI-SURVEILLANCE
MASK CAN HIDE YOU
FROM BIOMETRIC FACE
SCANNERS
“An Alternative Identity When In Public”




T
          he U.S. government is           attempt to infringe on the personal    space. Coupled with technologies that
          spending billions of dollars    anonymity comes in the form of what    include email mining, global posi-
          to ensure that they can         has been referred to as Real I.D.,     tioning systems, predictive behavioral
          monitor and track every         essentially a social security number   analysis, drones over America, and
          single activity in which you    for the internet which would be used   even eavesdropping via microphones
engage, be it online of off. The latest   to follow your every move in cyber-    on our cell phones, the ultimate goal is



 26             VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                        INFOWARS.COM
“IN THE REALM OF BIOMETRICS, WHERE
LITERALLY HUNDREDS OF THOUSANDS OF
CAMERAS NOW WATCH OUR EVERY MOVE
AND PLUG IN DIRECTLY TO DATA MINING
FUSION CENTERS WHERE OUR ACTIVITIES
ARE ANALYZED, AGGREGATED AND DIS-
PATCHED ACCORDING TO OUR PERCEIVED
THREAT, SOME MIGHT THINK THE SYSTEM
ITSELF HAS BECOME UNBEATABLE.”


a surveillance state so expansive that     veillance cameras features his visage,      who’s working toward his MFA at
Adolf Hitler and Josef Stalin would be     and if he has his way, plenty of people     Chicago’s Columbia College, says on a
jealous.                                   will be sporting the Personal Surveil-      recently launched Indiegogo page for
  But just as quickly as government        lance Identity Prosthetic in public. It’s   the products. “All URME devices have
introduces the technologies that are       one of three products made by the           been tested for facial recognition and
supposed to keep us safe from terror-      Chicago-based artist’s URME Surveil-        each properly identifies the wearer of
ists and ourselves, enterprising rebels    lance, a venture dedicated to “protect-     me on Facebook, which has some of
across the country are working to          ing the public from surveillance and        the most sophisticated facial recogni-
counter them.                              creating a safe space to explore our        tion software around.”
  In the realm of biometrics, where        digital identities.”                          (Cnet)
literally hundreds of thousands of           “Our world is becoming increasingly         The anti-face recognition tech is
cameras now watch our every move           surveilled. For example, Chicago has        currently only available in Leo Selvag-
and plug in directly to data mining        over 25,000 cameras networked to a          gio’s image, so government systems
Fusion Centers where our activities are    single facial recognition hub,” reads       spotting anyone wearing the mask will
analyzed, aggregated and dispatched        the URME (pronounced U R Me)                flag him as the culprit. But the impli-
according to our perceived threat,         site. “We don’t believe you should          cations are so broad that somewhere
some might think the system itself has     be tracked just because you want to         inside the Department of Homeland
become unbeatable.                         walk outside and you shouldn’t have         Security surveillance personnel are
  Short of plastic surgery, how can we     to hide either. Instead, use one of our     undoubtedly scrambling to thwart it,
modify our faces to disappear from         products to present an alternative          because it presents a serious hiccough
prying government eyes when we step        identity when in public.”                   to the surveillance state.
out of our front doors?                      The 3D-printed resin mask, made             With the ease of 3-D printing any
  If Leo Selvaggio has his way, you’ll     from a 3D scan of Selvaggio’s face and      technophobe with the ability to mimic
be able to assume an alternative iden-     manufactured by ThatsMyFace.com,            someone else’s face via 3D graphing
tity by using an age old low-tech strat-   renders his features and skin tone          software will have the ability to lit-
egy made possible by modern-day 3-D        with surprising realism, though the         erally assume a person’s identity by
printers.                                  eyes peeping out from the eye holes         simply printing their face and wearing
  It’s so simple that it’s brilliant,      do lend a certain creepiness to the         it.
especially considering the fact that       look.                                         In a the world of biometric surveil-
Selvaggio’s innovation is capable of         …                                         lance, that means anybody can disap-
compromising multi-billion dollar            “When you wear these devices the          pear from view and essentially become
face recognition surveillance systems      cameras will track me instead of you        a 21st century Silence Dogood.
with the use of an easily obtainable       and your actions in public space will         Real ID? How about Alternative ID
personal prosthetic mask.                  be attributed as mine because it will       instead?
  His rubber mask aimed at foiling sur-    be me the cameras see,” the artist,


                 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                            INFOWARS.COM                      27
28   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM   29
“THE FEDERAL COMMUNICATIONS
COMMISSION (FCC) HAS APPROVED
A PLAN THAT WOULD ALLOW
LARGE INTERNET SERVICE PROVID-
ERS (ISPS) TO CHARGE SITES LIKE
NETFLIX MORE TO RECEIVE PREF-
ERENTIAL BANDWIDTH TREATMENT
OVER SMALLER COMPANIES AND
WEBSITES WITH LESS RESOURCES.”




30        VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
             W R I T T E N BY KU RT N I M M O



FCC MOVES CORPORATIZATION
OF INTERNET FORWARD
In Addition To The Bandwidth Issue, Commissioners Are Concerned
About Large Isps Blocking Websites


                       X                                                                     X
                       X                                                                     X
                       X                                                                     X




T
            he Federal Communica-          words large players like NBC and           said new rules would prevent content
            tions Commission (FCC)         Disney will effectively monopolize the     blocking.
            has approved a plan that       medium as they now do with cable             In January an appeals court, how-
            would allow large ISPs to      and broadcast television.                  ever, ruled the FCC rules represented
            charge sites like Netflix        “[S]maller companies that can’t          overreach and gave Verizon and other
more to receive preferential bandwidth     afford to pay for faster delivery would    ISPs new latitude in determining
treatment over smaller companies and       likely face additional obstacles against   prices for providing Netflix, Amazon,
websites with less resources.              bigger rivals. And consumers could see     Google and Ebay.
  The change, approved in a three-to-      a trickle-down effect of higher prices       The plan, in addition to raising
two vote along partisan political lines,   as Web sites try to pass along new         prices, will also allow large ISPs to
“could unleash a new economy on the        costs of doing business with Internet      hobble sites deemed politically and
Web,” The Washington Post reports.         service providers.”                        socially unacceptable, from pornogra-
  This new economy will undoubtedly          In addition to the bandwidth issue,      phy to hacker sites and, importantly,
result in less choice for consumers        commissioners are concerned about          alternative media and political sites.
and lead to what may be termed the         large ISPs blocking websites. In Feb-
“televization” of the internet. In other   ruary, FCC chairman Tom Wheeler


                 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                           INFOWARS.COM                     31
             W R I T T E N BY DA N I EL TAY LOR



GOOGLE HIRES TOP
GENETICIST IN SEARCH
FOR LIFE EXTENSION
How Will Synthetic DNA Impact Our Health And
Environment?



G
               oogle is doing all it can     Calico, working with Genentech, will    will compete with “Enhanced Singu-
               these days to prepare for   likely utilize genetic engineering and    lar Individuals” who have augmented
               the coming “Singularity”.   synthetic DNA in its quest to extend      themselves with implantable technol-
                 First, the company        human life. The Supreme Court’s           ogy and genetic enhancements.
               hired     Transhumanist     ruling earlier this year ruled against      Whether or not any of these things
figurehead Ray Kurzweil to work            the patenting of natural human genes.     can be accomplished remains to be
as its director of engineering. Now,       However, there was a vital part of the    seen. In the meantime these devel-
Google has hired top geneticist Cyn-       ruling that allows for the patenting of   opments should not pass by without
thia Kenyon to work at Calico, Goo-        synthetically engineered DNA.             open discussion. How will synthetic
gle’s “moonshot” operation aimed at          The U.K. Ministry of Defense pub-       DNA impact our health and environ-
extending human life.                      lished a 2006 report titled The DCDC      ment? Synthetic biology is already set
  At Calico, in partnership with Arthur    Global Strategic Trends Programme         to enter the food supply this year with
Levinson, former chief executive of        2007-2036. The report outlined pos-       little to no debate at all.
Genentech – the first genetic engi-        sible scenarios surrounding life exten-     The rapidly developing field of epi-
neering company founded in 1976            sion. The report states, “The divide      genetics is showing us that human
– Google will strive to “significantly     between those that could afford to        DNA is far more complex than previ-
expand the human life span.”               ‘buy longevity’ and those that could      ously thought. As Discover magazine
  Cynthia Kenyon, a biochemistry and       not, could aggravate perceived global     reports, “Your ancestors’ lousy child-
biophysics professor, will help Calico     inequality. Dictatorial or despotic       hoods or excellent adventures might
search for radical life extension tech-    rulers could potentially also ‘buy lon-   change your personality, bequeathing
nologies. She will be working under        gevity’, prolonging their regimes and     anxiety or resilience by altering the
Dr. Hal Barron, a former product           international security risks.”            epigenetic expressions of genes in the
development leader at Roche Pharma-          The growing Transhumanist move-         brain.” Will genetic code written in a
ceuticals that Calico hired in Novem-      ment, with Google’s help, is attempt-     computer contain the same “memo-
ber of 2013.                               ing to shift cultural dialogues around    ries” of our ancestors that helped us
  Google chairman Eric Schmidt, who        aging and natural humanity. Google is     to adapt and survive in the world?
expects to be swallowing nanobots in       paving the way in wearable technology
the not too distant future, envisions      that will eventually end up implanted
life in this technological age as a        in the human body. Trends researchers     Daniel Taylor’s post first appeared on
streamlined and convenient existence.      are already wondering how “naturals”      Old-thinker News.




 32              VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                           INFOWARS.COM
VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM   33
34   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM   35
             W R I T T E N BY ST EV E WATS O N



GREENWALD: NSA INTERCEPTS
COMPUTER HARDWARE AND
FITS IT WITH SURVEILLANCE
EQUIPMENT
Us Government Tampers With Routers Before “Factory
Sealing” And Sending Them On




G
              lenn Greenwald, the        cifically, a June 2010 report from the    some, “a system has been built with-
              journalist who broke       head of the NSA’s Access and Target       out our knowledge that has incredible
              the Edward Snowden         Development department states that        dangers embedded within and very
              revelations, has come      US made hardware is “received” by         few controls.”
              good on his promise that   the NSA before it is shipped overseas.      Greenwald notes that the NSA essen-
fresh information on the NSA’s mass        Greenwald writes:                       tially believes it has the right to moni-
spying would be forthcoming. Today         “The agency then implants backdoor      tor all communications on the planet.
he reveals that the US government        surveillance tools, repackages the        He cites an NSA plan to tap into con-
agency routinely intercepts computer     devices with a factory seal, and sends    versations originating from airplanes,
hardware such as routers, switches       them on. The NSA thus gains access        for no particular reason.
and servers, and fits it with cutting    to entire networks and all their users.     “It’s just simply the fact that they do
edge surveillance equipment, before      The document gleefully observes that      not think anybody should be able to
sending it back on its way.              some ‘SIGINT tradecraft … is very         communicate anywhere on the Earth
  In an article for The Guardian, Gre-   hands-on (literally!)’”.                  without they being able to invade it,”
enwald notes that the NSA tampers          “In one recent case, after several      Greenwald said.
with the hardware, then repackages it    months a beacon implanted through           Greenwald added that he believes
with “factory sealing” before sending    supply-chain interdiction called back     the issue today is more pressing than
it off to unsuspecting companies who     to the NSA covert infrastructure. This    previous NSA revelations in 2005
have no idea it has been intercepted.    call back provided us access to further   because it concerns domination of the
  Greenwald notes that the practice      exploit the device and survey the net-    internet and global communications
constitutes “an extreme form of gross    work.” the NSA document reads.            in general.
hypocrisy,” given that it has been         “Chinese routers and servers repre-       With former NSA head Michael
warning companies around the world       sent not only economic competition        Hayden also making statements such
not to buy Chinese hardware because      but also surveillance competition.”       as “We kill people based on metadata”,
it may be set up with surveillance       Greenwald writes.                         this sentiment will only be accepted
technology.                                In a follow up interview with NPR,      more readily, both by critics of the spy
  The revelation again comes from doc-   Greenwald stated that while inter-        agency and everyday Americans alike.
uments leaked to Greenwald by former     cepting equipment known to be on its
NSA employee Edward Snowden. Spe-        way to terrorists may be acceptable to




 36             VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                          INFOWARS.COM
Greenwald notes that the NSA essentially
believes it has the right to monitor all communi-
cations on the planet. He cites an NSA plan to
tap into conversations originating from airplanes,
for no particular reason.

“It’s just simply the fact that they do not think any-
body should be able to communicate anywhere
on the Earth without them being able to invade
it,” Greenwald said.




   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE           INFOWARS.COM   37
38   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM   39
     “IT NOW APPEARS THE INTERNET WILL ULTIMATELY BE
     BURDENED WITH TAXATION, AN IMPOSITION THAT WILL
     UNDOUBTEDLY RESULT, AS DOES ALL TAXATION, IN
     SQUELCHING INNOVATION, DISCOURAGING PROSPERITY
     AND NARROWING CONSUMER CHOICE”.




40       VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
               W R I T T E N BY KU RT N I M M O



KILLING THE INTERNET:
A BLIZZARD OF NEW
TAXES IN THE WINGS
Lobbyists Show Their Power Over
Politicians Once Again



F
          or years revenue-hungry           v. North Dakota back in 1992 it is too
          states and local municipali-      great a burden to force a mail order
          ties have salivated over the      merchant to collect taxes in states
          prospect of taxing the life       where it has no physical presence.
          out of the internet. Now          Retailers interested in undercutting
a move by a small but dedicated             smaller and more agile competitors
minority in Congress may result in the      and their allies in state government
scraping of the Internet Tax Freedom        want to skirt the decision and write
Act and usher in a new era of exor-         new rules for interstate commerce.
bitant taxation, according to The Wall        A brave new world of taxation threat-
Street Journal.                             ened destruction of small online busi-
  In a few months, the newspaper            ness when the Marketplace Fairness
reports, “customers may begin receiv-       Act was proposed. It will force online
ing notices from their Internet pro-        retailers to collect taxes for state and
viders that new taxes are on the way.       local government across the board.
Even though nearly everyone in Con-         Considering the huge number of state,
gress opposes slapping all of America’s     local and tribal governments in the
heavy traditional telephone taxes on        United States, the burden imposed
Internet access, a renewal of this suc-     for the collection of taxes would be,
cessful policy is being held hostage by     to say the least, significant. As of April
lobbyists for giant retailers.”             24, the bill was pending in the House
  So persuasive is this minority, it has    Judiciary Committee.
managed to convince both Democrats            It now appears the internet will
and Republicans that an extension of        ultimately be burdened with taxation,
the Internet Tax Freedom Act – that         an imposition that will undoubt-
has forbidden bit taxes, bandwidth          edly result, as does all taxation, in
taxes, and email taxes since 1998           squelching innovation, discouraging
– should be loosened up to allow            prosperity and narrowing consumer
9,600 governments to shape rules for        choice. As the economy continues its
ecommerce. Specifically, states want        slow motion collapse, federal, state
additional authority to reach beyond        and local governments will desper-
their respective borders to collect sales   ately seek new venues for taxation
taxes on items purchased online or          and wealth confiscation. The internet,
they will pressure Congress to punish       so far unmolested, and thus allowed
all Americans with new prohibitive          the freedom to innovate and grow,
taxes on all internet communication.        appears to be the next juicy target for
  The Supreme Court decided in Quill        the statists.


                 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                             INFOWARS.COM   41
42   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM   43
             W R I T T E N BY KU RT N I M M O



OBAMA ADMINISTRATION
TURNS THE INTERNET
OVER TO THE GLOBALISTS
Plans to impose a censorship and mass surveillance
framework may now commence




O
             n Friday the U.S. Com-     “global internet community” next          management of the internet over the
             merce       Department     year. ICANN, under a Commerce             last few years.
             released its grasp on      Department contract, has issued             “We will not accept a proposal that
             the internet. Oversight    domain names since 2000.                  replaces the NTIA role with a gov-
             of ICANN, the Internet       The United States has played a lead-    ernment-led or an intergovernmental
Corporation for Assigned Names and      ing role in managing internet technol-    solution,” said National Telecommuni-
Numbers, will be passed on to the       ogy but has faced pressure to globalize   cations & Information Administration


 44            VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                         INFOWARS.COM
“THE UN AND EU HAVE SKETCHED OUT HOW
THE FUTURE INTERNET WILL WORK. NOW
THAT ICANN HAS RELINQUISHED CONTROL
OF THE MEDIUM, GLOBALIST INSTITUTIONS
CAN MOVE FORWARD WITH PLANS TO
SCRUB THE INTERNET OF ALL CONTENT
UNACCEPTABLE TO THE GLOBAL ELITE
AND THEIR APPARATCHIKS AT THE UNITED
NATIONS AND, ALSO, TURN IT INTO A REVE-
NUE GENERATING CASH COW.”


boss Larry Strickling. The NITTA is an     resolution of issues pertaining to “use     and other social networks in search of
agency within the Commerce Depart-         of Internet resources for purposes that     “extremist material” and propaganda.
ment.                                      are inconsistent with international         In addition to allowing users to flag
  During the World Summit on Infor-        peace, stability and security.”             “terrorist” content and turn other
mation Society more than a decade            The proposed changes were backed          users in to the police, the proposals
ago, it was proposed that governments      by China, Russia, Brazil, India and         called for eliminating anonymity on
not have too much control over the         other UN members.                           the internet.
internet. “The international manage-         “Internet freedom’s foes around the         In addition to censorship, the ICANN
ment of the Internet should be mul-        globe are working hard to exploit a         transfer will allow for a globalist
tilateral, transparent and democratic,     treaty negotiation that dwarfs the          taxation scheme. “While the Obama
with the full involvement of govern-       importance of the [U.N.’s 2012 World        administration says it is merely remov-
ments, the private sector, civil society   Conference on International Telecom-        ing federal oversight of a non-profit,
and international organizations.”          munications] by orders of magni-            we should assume ICANN would end
  In the intervening years the United      tude,” warned outgoing U.S. Federal         up as part of the United Nations,”
Nations and the European Union             Communications            Commissioner      former Bush administration State
have jostled for control the internet.     Robert McDowell in testimony before         Department senior advisor Christian
During a meeting in Dubai last year        Congress in a joint U.S. House sub-         Whiton told The Daily Caller. “If the
the International Telecommunication        committee hearing on international          U.N. gains control what amounts to
Union (ITU), the telecom branch of         Internet governance last February.          the directory and traffic signals of the
the United Nations, demanded rules           The European Union has proposed           Internet, it can impose whatever taxes
governing the internet be rewritten.       censoring the internet to protect chil-     it likes. It likely would start with a tax
Specifically, the international organi-    dren and fight terrorism. The Clean IT      on registering domains and expand
zation proposed deep-packet inspec-        project proposed the creation of a cen-     from there.”
tion authority that would allow it to      sorship and mass surveillance frame-          The UN and EU have sketched out
monitor and censor content on the          work for EU countries funded by the         how the future internet will work. Now
internet. The United States walked         European Commission. “The Clean IT          that ICANN has relinquished control of
out of the conference in protest.          project aimed to start a constructive       the medium, globalist institutions can
  Hamadoun Toure, Secretary-General        dialogue between governments, busi-         move forward with plans to scrub the
of the ITU, released the fourth and        nesses and civil society to explore how     internet of all content unacceptable to
final ITU/WTPF-13 report in May,           to reduce the terrorist use of the inter-   the global elite and their apparatchiks
2013, outlining groundwork for inter-      net. This dialogue resulted in a set of     at the United Nations and, as well,
net governance and regulatory topics.      general principles and an overview of       turn it into a revenue generating cash
The report calls for the creation of       possible best practices,” the Clean IT      cow.
“Global Principles for the governance      Project web page explains. The plan
and use of the Internet” and proposes      called for police to patrol Facebook


                 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                            INFOWARS.COM                         45
46   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
              W R I TT E N BY I N FOWA RS STA F F



THE REVOLVING DOOR
OF DEATH
The Brazen Plot To Silence You



I
      n true beltway insider fashion,     resigning their posts by offering them      masters have hatched a plan to strat-
      the top posts at the Federal        obscenely lucrative, often symbolic         ify the internet into virtual ‘lanes.’ The
      Communications       Commission     positions in the private sector. This       idea is that information (data) that
      are stocked to the brim with        has the effect of opening a high level      has payed the toll will be allowed pri-
      corporate stooges, lobbyists and    vacancy at the federal agency that          ority and zip through the congestion
the globalists yes-men. These public      can then be filled with appointments        with a virtual ‘police escort.’ Data that
offices, who’s purpose it is to protect   made by politicians that have sold          doesn’t pay for special access is stuck
the consumer and regulate data trans-     their souls to the industry in question.    in the data traffic jam, or intentionally
mission have been completely infil-         The ongoing battle for control of the     throttled by the providers.
trated by the communication indus-        internet is locked in a long, hard, siege     The turncoats at the FCC are doing
tries’ moles, warping public policy and   against the cabal of the communica-         their best to secretly slide these
regulations to bend to the will of the    tion cartels hell bent on seizing control   changes into law and rip freedom of
corporate overlords.                      of the free flow of information. Their      speech out of the hands of citizens
  Now, it is clear that the FCC is in     goal is to destroy the foundational         worldwide. It will stifle innovation,
the grip of an obvious case of what is    principles of the free, open internet       gouge users for money, and effectively
known as “regulatory capture.” The        and impose their “tiered” system            kill any dissent to the powers that be.
classic technique is that corporations,   whereby they can crush dissent and            Let’s take a look at who these nefari-
and special interest groups lure high     manufacture opinion.                        ous players are…
ranking government officials into           The embedded lobbyists and their


Tom Wheeler, Chairman - Is a true lobbyist-insider with close connections to major Internet Service Providers. Last March,
a group of the most important companies threw a party in honor of Wheeler and other FCC commissioners who come
scurrying when they call.

Daniel Alvarez, Legal Advisor - Is an attorney who represented Comcast, and is vocally outspoken in his support to kill Net
Neutrality. He has authored several opinions and lobbied ceaselessly for the death of the internet as we know it.


Philip Verveer, Senior Counselor – Was an ambassador who was employed by Comcast a scant few months ago. He has
also brazenly represented two powerful industry coalitions intent on destroying freedom on the internet.


Brendan Carr, Legal Advisor - Was none other than the associate general counsel at Verizon and put in his time as an
attorney for the U.S. Telecom Association, which has been in virulent opposition of net neutrality for over nine years.


Matthew DelNero, Deputy Chief - Joined the FCC to work exclusively on the subject of destroying Net Neutrality. His
former employer, TDS Telecom, lobbied furiously against Net Neutrality during his extended tenure there.




                VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                            INFOWARS.COM                         47
              W R I T T E N BY PAU L J O S EP H WATS O N




POLICE NOW “ARMED
FOR WAR” AGAINST
RETURNING VETERANS
Cops In Armored Vehicle Asked By Residents “Are
You Coming To Take Our Guns Away?”



I
     n an interview with Fox 59, a         to know why we needed this…what             terized returning veterans from Iraq
     Morgan County, Indiana Police         were we going to use it for? ‘Are you       and Afghanistan as a major domestic
     Sergeant admits that the increas-     coming to take our guns away?’” said        terrorist threat.
     ing militarization of domestic        Downing. “To come and take away               It seems to have been completely
     police departments is partly to       their firearms…that absolutely is not       forgotten by police departments, the
deal with returning veterans who           the reason why we go this vehicle. We       media and Americans in general that
are now seen as a homegrown terror         got this vehicle because of the need        having military-style tanks patrol the
threat.                                    and because of increased violence that      streets is symbolic of a collapsing
  In a chilling story entitled Armed       we have been facing over the last few       banana republic or an authoritarian
for War: Pentagon surplus gives local      years….I’ll be the last person to come      Communist state.
police an edge, we learn how a Mine        and take anybody’s guns.”                     Perhaps the main reason why police
Resistant Vehicle (MRAP) which was           Indiana seems to be a major trial         officers are being trained that veterans
once used during the occupation of         balloon for the militarization of law       are a major threat is because return-
Afghanistan will now be “patrolling        enforcement given that the Indiana          ing vets are in a perfect position to
the streets of central Indiana,” accord-   National Guard has also just purchased      recognize that America is beginning
ing to the report.                         two military UH-72 Lakota helicopters       to resemble an occupied country like
  Sgt. Dan Downing of the Morgan           which will also be used by local police     Afghanistan.
County Sheriff’s Department states,        and the DHS for “homeland secu-               Such warnings have come from
“When I first started we really didn’t     rity missions”. Downing’s claim that        people like former Marine Corps
have the violence that we see today,”      armored tanks are necessary to deal         Colonel Peter Martino, who was sta-
adding, “The weaponry is totally dif-      with violent crime doesn’t jive with        tioned in Fallujah and trained Iraqi
ferent now that it was in the begin-       actual statistics which suggest that        soldiers. Martino went before a New
ning of my career, plus, you have a        violent crime is in fact on the decrease.   Hampshire city council meeting last
lot of people who are coming out of          Downing’s admission that the              year to assert that the Department of
the military that have the ability and     armored vehicles are partly about           Homeland Security is working with
knowledge to build IEDs and to defeat      combating the threat posed by return-       law enforcement to build a “domestic
law enforcement techniques.”               ing veterans correlates with similar        army,” because the federal govern-
  Downing goes on to relate how cit-       rhetoric at the federal level.              ment is afraid of its own citizens.
izens approach the vehicle when it           An April 2009 DHS intelligence              Indeed, the city’s Police Chief justi-
stops at gas stations to express their     assessment listed returning vets as         fied the necessity for the acquisition of
concerns that the militarization of        likely domestic terrorists. Just a month    an armored ‘Bearcat’ vehicle by citing
police is about arming cops with the       later, the New York Times reported on       the “threat” posed by libertarians, sov-
tools required for mass gun confisca-      how Boy Scout Explorers were being          ereign citizen adherents, and Occupy
tion programs.                             trained by the DHS to kill “disgruntled     activists in the region.
  “We were actually approached when        Iraq war veterans” in terrorist drills.
we’d stop to get fuel by people wanting      The FBI has also repeatedly charac-


 48              VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                             INFOWARS.COM
VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM   49
                       “LAST YEAR, AWARD-WINNING MILITARY
                       WRITER AND FORMER INTELLIGENCE
                       OFFICER LT. COL. DOUGLAS PRYER
                       PENNED AN ESSAY WARNING OF THE
                       THREAT POSED BY REMORSELESS
                       “KILLER ROBOTS” THAT WILL BE USED
                       TO STALK AND SLAUGHTER HUMAN
                       TARGETS IN THE NEAR FUTURE.”

50   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
                W R I T T E N BY PAU L J O S EP H WATS O N




SCIENTISTS: ROBOTS
COULD BE PROGRAMMED
TO KILL YOU ‘FOR THE
GREATER GOOD’
Autonomous Vehicles Present ‘Morally Dangerous Path’




A
                s the United Nations           professor and director of the Ethics       essay warning of the threat posed by
                debates legislation that       + Emerging Sciences Group at Cali-         remorseless “killer robots” that will
                could     outlaw     ‘killer   fornia Polytechnic State University, in    be used to stalk and slaughter human
                robots’, scientists predict    which Lin delves into the “legally and     targets in the near future.
                that artificially intelli-     morally dangerous paths” presented           Pryer’s comments echo those of Noel
gent systems could one day decide to           by the emergence of robotic vehicles.      Sharkey, professor of artificial intelli-
kill humans “for the greater good.”              Aside from Google cars and other         gence and robotics at the University of
  In an article for Popular Science,           autonomous forms of transportation,        Sheffield, who has repeatedly warned
Erik Sofge outlines a scenario whereby         the question of giving robot soldiers      that the robots currently being devel-
robot cars would decide to sacrifice           a license to kill has raged for years      oped under the auspices of DARPA
their human owner in order to prevent          and is currently the subject of a highly   will eventually be used to kill.
a collision that could kill more people.       anticipated debate in New York being         In a 50-page report published in
  A front tire blows, and your auton-          overseen by the U.N.’s Convention on       2012, Human Rights Watch also
omous SUV swerves. But rather than             Certain Conventional Weapons.              warned that artificially intelligent
veering left, into the opposing lane             The UN body’s role in banning            robots let loose on the battlefield
of traffic, the robotic vehicle steers         blinding laser weapons for battlefield     would inevitably commit war crimes.
right. Brakes engage, the system tries         use in the 1990′s has led to specula-        Michael Cahill, a law professor and
to correct itself, but there’s too much        tion that legislation banning the use of   vice dean at Brooklyn Law School,
momentum. Like a cornball stunt in             drone soldiers could be in the works.      welcomed the idea of autonomous
a bad action movie, you are over the             “All too often international law only    robots with the power to make life or
cliff, in free fall.                           responds to atrocities and suffering       death decisions on behalf of humans,
  Your robot, the one you paid good            once it has happened,” said Michael        but acknowledged that such a society
money for, has chosen to kill you.             Moeller, acting head of the U.N.’s         could resemble a science fiction night-
Better that, its collision-response algo-      European headquarters in Geneva.           mare.
rithms decided, than a high-speed,             “You have the opportunity to take            “The beauty of robots is that they
head-on collision with a smaller,              preemptive action and ensure that the      don’t have relationships to anybody,”
non-robotic compact. There were two            ultimate decision to end life remains      stated Cahill, adding, “They can make
people in that car, to your one. The           firmly under human control.”               decisions that are better for everyone.
math couldn’t be simpler.                        Last year, award-winning military        But if you lived in that world, where
  Sofge cites an opinion piece by              writer and former intelligence officer     robots made all the decisions, you
Patrick Lin, an associate philosophy           Lt. Col. Douglas Pryer penned an           might think it’s a dystopia.”




                  VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                              INFOWARS.COM                        51
               W R I T T E N BY K I T DA N I EL S



PUBLIC REJECTS GOVERNMENT
TAKEOVER OF INTERNET
Attacks Against Online Free Speech And Privacy Opposed By People
Who Think For Themselves



C
             ountries around the world,         - Giving ISPs who play ball with        and other tech firms are eyeing finger-
             including      the     United    officials preferable treatment when       prints to replace passwords for online
             States, are proposing new        awarding government contracts             shopping, e-mail and even social
             guidelines for the Internet        The list goes on and on.                media.
             which will curb free speech        “In essence, Clean IT wants to            This could easily erode online ano-
and reduce online privacy, prompting          punish you for using the Internet as      nymity if web sites begin demanding
many concerns from the public.                it was intended,” Zach Walton with        users’ biometrics in order to login to
  The European Commission, for                WebProNews wrote on the subject.          post comments or otherwise con-
example, has proposed the Clean IT            “It would require you to use your real    tribute to the site, and no doubt it
project that would allow European             name in all online communications.”       will be sold to the public as offering
officials to “patrol” the Internet, partic-     “It would punish you for linking        more security than current methods of
ularly social media sites, in search for      to ‘terrorist content’ (whatever that     authentication.
so-called “extreme” speech under the          means) and it makes no distinction          But biometrics aren’t as secure as
guise of “protecting the children” and        between linking for educational or        they seem.
“fighting terrorism.”                         malicious purposes.”                        “The creation of a biometric payment
  Knowing how government likes to               But unfortunately, such Orwellian       system would mean surrendering
regulate above and beyond its stated          proposals are not unique to Europe.       fingerprint data to companies with a
purpose, “extreme” speech would                 In the United States, the Obama         history of security breaches,” Corinne
likely include any online speech that         administration is spearheading a Chi-     Iozzio wrote in the Feb. 2014 issue of
questions government policy.                  nese-style ID system for Internet users   Popular Science. “If prints were irre-
  The Clean IT project would also             in a program called the “National         producible, that might not be such a
coerce Internet Service Providers into        Strategy for Trusted Identities in        concern, but it’s not particularly hard
implementing “real name” rules to             Cyberspace.”                              to hack a fingerprint.”
prevent completely anonymous use                The program would replace the cur-        “A laser printout of a digital finger-
of the Internet, according to a leaked        rent system of usernames and pass-        print has just enough relief for a coun-
document on the project not meant to          words with biometrics, fingerprints       terfeiter to cast a glue-based copy.”
be seen by the public.                        for example, used for web access to
  The document also lists other stated        government services such as license         She also pointed out that a German
goals of Clean IT, such as:                   applications.                             hacker group successfully used a simi-
  - Allowing police to remove online            While the program is initially slated   lar technique to trick Touch ID, Apple’s
content “without following the more           for government web sites, there’s no      fingerprint recognition technology.
labour-intensive and formal proce-            reason why it or a similar program          Unlike passwords or compromised
dures for ‘notice and action’,”               won’t be used for private sites in the    credit cards, you can’t change or
  - Appealing any existing laws that          future as well, considering that the      cancel your fingerprints; they are
prevent companies from monitoring             private sector is already taking steps    yours for life.
their employees’ Internet use,                to replace passwords with biometrics.       “A fingerprint’s greatest strength —
  - Strict penalties for “knowingly” pro-       Both Samsung and Apple have             its uniqueness — is also its greatest
viding links to undefined “extremist”         already added fingerprint authentica-     weakness,” Iozzio added. “And once
content, and                                  tion technology to their smartphones      it’s compromised, you’ll never get it


  52              VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                             INFOWARS.COM
VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM   53
                                                    DID
                                                    YOU
                                                    KNOW?
back.”                                     is a basic liberty which all people        it happen.”
  But how does the public feel about       have,” he said. “We have to be able          A business graduate pointed out
both the use of biometrics on the Inter-   to express anything while of course        that even with the government’s past
net as well as government’s increasing     respecting everybody.”                     encroachments on Internet freedoms,
surveillance online?                         So he doesn’t believe that it’s wise     people are already saying less online
  Recently, the University of Texas at     for government to restrict free speech.    than before.
Austin held its spring graduation out-       “We have to be aware of govern-            “The government is already play-
side on campus, attracting thousands       ment,” Xavier added. “Government           ing a role,” she said. “I think family
from around the world, so we took the      has to have power but it cannot have       members play the immediate role, [as
opportunity to ask a wide variety of       more power than the people.”               in] What is my family going to think
attendants for their take on the sub-        Similarly, one of the parents at the     of me? What are my friends going to
ject.                                      graduation, Bob, said that free speech     think of me?” and then “What is the
  Xavier, who hails from Bolivia, said     on the Internet should “never, ever be     government even looking at [about]
that allowing police to monitor social     restricted.”                               me?”
media for so-called “extremist” talk         “I don’t know if I have any fears, but     “I think every day you have to be
would be a very big mistake.               I have concerns,” he said when asked       careful of what you say because it’s
  “They shouldn’t do that because          for his opinion on Internet ID. “I don’t   the society that we live in right now
unlimited expression, free expression,     agree with it; never, ever, ever should    [where] anything you say could be


 54              VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                           INFOWARS.COM
     NET NEUTRALITY IS THE PRINCIPAL OF HAVING
     AN OPEN INTERNET. THE THOUGHT THAT INTERNET
     SERVICE PROVIDERS AND GOVERNMENTS SHOULD
     ALLOW NO BIT OF INFORMATION TO BE PRIORITIZED
     OVER ANOTHER. THIS PRINCIPLE IMPLIES THAT AN
     INFORMATION NETWORK SUCH AS THE INTERNET IS
     MOST EFFICIENT AND USEFUL TO THE PUBLIC WHEN
     IT IS LESS FOCUSED ON A PARTICULAR AUDIENCE AND
     INSTEAD ATTENTIVE TO MULTIPLE USERS. THE TERM
     WAS COINED BY COLUMBIA MEDIA LAW PROFESSOR
     TIM WU IN 2003.



criticized, like the LA Clippers owner,     tication, Harlan believes that most         are propagated through mainstream
a perfect example of a private conver-      Americans would find it “really             media outlets; rather they came up
sation turning into a global outrage.”      creepy.”                                    with their own conclusions about
  The graduate also disagreed with the        “I know I do,” he stated. “I can’t        these new developments.
latest push for biometric-based Inter-      speak for everyone else but I think it        A lot of that can be contributed to
net ID, stating that it gives too much      would be a horrible, horrible use of        both Edward Snowden’s revelations
control to the government.                  technology.”                                on government surveillance and the
  Harlan, who owns a business near            “I think people would probably turn       rise of the alternative media which
campus, called the Clean IT program         away from those sorts of technologies       doesn’t shy away from covering real
“devastating to people who want to          and join ones that didn’t incorporate       issues such as the government’s push
share information.”                         those sorts of things, but I could be       for biometrics.
  “Who deems what information is            wrong.”                                       This is exactly why governments
clean and what information is dirty?”         It is definitely refreshing to see such   across the world are moving against
He asked. “It seems like that kind of       strong opposition to the erosion of         the Internet: they simply want to
regulation is just fraught with all types   both free speech and privacy.               replace the flow of truth that reaches
of peril that will only endanger free         For one thing, the individuals we         millions every day with their own false
speech in the future.”                      interviewed didn’t just parrot big          narratives which cement their control
  On the subject of biometric authen-       government talking points which             over the population.


                VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                             INFOWARS.COM                      55
              W R I T T E N BY KU RT N I M M O



A NEW ECONOMY OF
CORPORATE DOMINATION
ON THE WEB
FCC Approves Plan To Allow Large ISPs To Charge Websites
More To Receive Preferential Bandwidth Treatment



A
               Democrat       dominated     likely face additional obstacles against   and asks for further comments on the
               Federal Communications       bigger rivals. And consumers could         approach.”
               Commission (FCC) has         see a trickle-down effect of higher          The remarks by the FCC boss arrived
               approved a plan that         prices as Web sites try to pass along      following a federal appeals court
               will allow large Internet    new costs of doing business with           ruling in February. According to U.S.
service providers (ISPs) to charge          Internet service providers,” the Post      District Court of Appeals for the Dis-
bandwidth hungry sites like Netflix         reported following the FCC party-line      trict of Columbia, the agency over-
and Youtube more to receive preferen-       vote ahead of final changes to be          stepped its authority on net neutrality
tial bandwidth treatment. The tiered        implemented later this year.               rules when it moved to prevent large
arrangement in favor of large corpo-          In addition to the bandwidth issue,      internet service providers like Time
rate sites will ultimately force smaller    commissioners are concerned large          Warner Cable and Verizon from block-
sites with less capital and resources       ISPs will block content in competition     ing traffic by Netflix, Amazon, Google,
into a ghetto with internet speed           with them or deemed inappropriate. In      Ebay and other bandwidth-intensive
bumps comparable to the old days of         February, FCC chairman Tom Wheeler,        services. The court ruling opened the
dial-up access.                             a former telecom lobbyist appointed        door for the latest foray by large ISPs
  This fundamental change will signifi-     by Obama, said he will make sure new       to carve out high speed internet toll
cantly modify the web in favor of large     rules prevent content blocking.            roads and charge accordingly.
telecom and entertainment corpora-            “There has been a great deal of mis-       “I intend to accept that invitation
tions. It was approved in May follow-       information that has recently surfaced     by proposing rules that will meet the
ing a three-to-two vote along partisan      regarding the draft Open Internet          court’s test for preventing improper
political lines. If adopted the plan will   Notice of Proposed Rulemaking that         blocking of and discrimination among
“unleash a new economy on the Web,”         we will today circulate to the Com-        Internet traffic, ensuring genuine
according to The Washington Post. It        mission,” Wheeler posted on the FCC        transparency in how Internet Ser-
will undoubtedly result in less choice      blog in April. “The Notice proposes the    vice Providers manage traffic, and
for consumers. Large players like NBC       reinstatement of the Open Internet         enhancing competition,” Wheeler
and Disney with lavish budgets will         concepts adopted by the Commission         said in a statement after the court
effectively monopolize the medium as        in 2010 and subsequently remanded          ruling. “Preserving the Internet as
they now do with cable and broadcast        by the D.C. Circuit. The Notice does       an open platform for innovation and
television. Consumers will pay more         not change the underlying goals of         expression while providing certainty
to receive sanitized and highly com-        transparency, no blocking of lawful        and predictability in the marketplace
mercialized corporate content. They         content, and no unreasonable dis-          is an important responsibility of this
will face frustrating load times when       crimination among users established        agency.”
they decide to visit smaller websites       by the 2010 Rule. The Notice does            The new decision by the FCC does
containing multimedia content.              follow the roadmap established by the      not violate the federal agency’s pre-
  “[S]maller companies that can’t           Court as to how to enforce rules of the    vious commitment to discourage
afford to pay for faster delivery would     road that protect an Open Internet         “behavior harmful to consumers or


  56              VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                            INFOWARS.COM
                                                                                       “CONSUMERS WILL PAY
                                                                                       MORE TO RECEIVE
                                                                                       SANITIZED AND HIGHLY
                                                                                       COMMERCIALIZED
                                                                                       CORPORATE CONTENT.
                                                                                       THEY WILL FACE
                                                                                        FRUSTRATING LOAD
                                                                                       TIMES WHEN THEY
                                                                                       DECIDE TO VISIT
                                                                                       SMALLER WEBSITES
                                                                                       CONTAINING
                                                                                       MULTIMEDIA CONTENT.”




competition by limiting the openness       ident of the advocacy group Public            “Profits and corporate disfavor of
of the Internet.” It will, however, put    Knowledge, told John Nichols of The         controversial viewpoints or competing
a premium price on what consumers          Cap Times he is “concerned that the         services could change both what you
presently expect when they pay $50 or      FCC is considering some kind of paid        can see on the Internet and the qual-
$60 per month for high speed inter-        prioritization.”                            ity of your connection,” the American
net. Moreover, consumers may experi-         According to Nichols “paid prioriti-      Civil Liberties Union warns. “And the
ence many sites previously accessible      zation” would “recreate the Internet as     need to monitor what you do online
on the internet’s level playing field as   a place where there would be super-         in order to play favorites means even
unbearably slow or, as prices rise on      highway service for big-ticket custom-      more consumer privacy invasions
premium bandwidth, go away alto-           ers and dirt roads for small businesses,    piled on top of the NSA’s prying eyes.”
gether.                                    creative artists and citizen groups. In a     It is important that you express your
  It remains to be seen if the FCC will    political context, it has the potential     opinion about the FCC’s effort to
implement the new rules. “There is         to narrow access to ideas and reduce        establish a two tiered system that will
one Internet,” Wheeler mused prior         the range of debate.”                       either seriously hobble or eliminate
to the vote. “Not a fast Internet, not       For the political establishment this is   outright many websites, especially
a slow Internet. One Internet... Noth-     good news. For nearly two decades the       small political websites operating on
ing in this proposal authorizes paid       Internet has provided an open forum         shoestring budgets.
prioritization. The potential for there    for diverse political groups challeng-
to be some kind of fast lane has many      ing the establishment and the status         You can add a comment via the
people concerned... I will work to see     quo dominated by corporate interests.       FCC’s Electronic Comment Filing
that does not happen.”                     A growing and vibrant alternative           System. The URL for the comment
  Some, however, believe Wheeler is        media has flourished on the Internet        system is:
fuzzing the margins as the four month      and this will undoubtedly change if
window for comment and deliber-            the FCC allows large corporations like       http://apps.fcc.gov/ecfs/upload/
ation on the FCC proposals counts          Comcast and Time Warner Cable to            display?z=6inmu
down. Michael Weinberg, vice pres-         dominate the fast lane.



                 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                            INFOWARS.COM                      57
 “TRANSHUMANISTS ENVISION A DAY WHEN TECHNOLOGY
 WILL ALLOW HUMANITY TO BECOME SO ADVANCED
 THAT SICKNESS, DISEASE, POVERTY AND WAR WILL
 ESSENTIALLY BE ERADICATED. THEY BELIEVE THAT
 MERGING WITH MACHINES WILL PERMIT US TO BECOME
 TRILLIONS OF TIMES MORE INTELLIGENT THAN WE ARE
 TODAY, AND THEY ALSO BELIEVE THAT RADICAL LIFE
 EXTENSION TECHNOLOGIES WILL MAKE IT POSSIBLE FOR
 HUMANITY TO ACTUALLY ACHIEVE IMMORTALITY.”




58        VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
               W R I T T E N BY M I C H A EL S N Y D E R


TRANSHUMANISTS:
SUPERHUMAN POWERS
& LIFE EXTENSION TECH
WILL ALLOW US TO
BECOME LIKE GOD
Merging Man With Machine Is What Elite Have Planned



I
      f you could merge your current            The key moment that most trans-           the human mind on a computer. If
      mind and body with technology           humanists are looking forward to is         your entire consciousness could be
      that would give you superhuman          known as “the Singularity”. That is         “uploaded” into a computer, it could
      powers and would allow you to           the moment when artificial intelli-         conceivably later be downloaded into
      live forever, would you do it? This     gence will actually surpass human           a futuristic avatar of some sort once
is essentially what the transhumanism         intelligence and a massive technolog-       that technology has been developed.
movement is seeking to accomplish.            ical chain reaction will be triggered.        But that is not the only life extension
  Transhumanists envision a day when          At that time, most transhumanists           technology that transhumanists are
technology will allow humanity to             believe that biological intelligence        working on. Some other examples
become so advanced that sickness,             will merge with non-biological intel-       include embedding nanobots in our
disease, poverty and war will essen-          ligence and humanity will become            bodies and brains and eliminating dis-
tially be eradicated. They believe that       vastly more intelligent than it is today.   eases through the process of “genetic
merging with machines will permit             During this transition, society will be     reprogramming”…
us to become trillions of times more          fundamentally transformed…                    Other futurists and transhumanists
intelligent than we are today, and they         After the Singularity occurs, it is       are working toward improving lon-
also believe that radical life extension      predicted that vast changes will sweep      gevity through more biological means,
technologies will make it possible            through society; changes so drastic         such as growing new organs from
for humanity to actually achieve              that they are nearly inconceivable          stems cells, replacing worn out parts
immortality. Many transhumanists are          at the present time. Experts in the         of the body with high-tech updated
convinced that such a world can be            movement say that after the Singu-          models, and curing diseases through
achieved within their lifetimes. They         larity, indefinite human life extension     genetic reprogramming. A third
point to Moore’s Law and to the fact          will rapidly become the norm. Many          method of achieving a transhuman
that technology already appears to be         scientists working in this field are par-   state of being may come through merg-
growing at an exponential rate. As the        ticularly interested in the concept of      ing the biological and non biological
technology curve continues to steepen,        achieving immortality.                      in equal measure, such as embedding
transhumanists believe that our world           To most people, the idea of achieving     nano robots into the bloodstream and
will rapidly become transformed into          immortality in our decaying physical        brain; and replacing atoms with nano
a place that would be unrecognizable          bodies would sound absolutely ridic-        computers to solve the degeneration
to us today. Just a few decades from          ulous.                                      that comes with aging.
now, transhumanists believe that                But transhumanists are very serious         According to transhumanists, not
superhuman powers and extremely               about this.                                 only will we be able to live much
advanced life extension technologies            One way they are seeking to               longer, but our quality of life will also
will allow them to essentially become         accomplish this is by searching for a       be so much better in the future. The
like gods.                                    method that will enable them to store       following is how one transhumanist


                 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                               INFOWARS.COM                        59
envisions what life will be like in the   useful in the workforce?                     But transhumanists are not really
2050s…                                      In a recent article by Andrew Smart,     concerned with such matters. They
  Robots have become an important         he suggests that these “enhance-           insist that we will become so intelli-
family acquisition. Ability to repli-     ments” could just turn us into “better     gent that we will easily figure out the
cate self-assembling robot parts in       slaves”…                                   solutions to such social issues.
nanofactories, make these machines          Could it be that we’ve been tricked        Yes, most transhumanists concede
easily available and affordable. By       into pouring our innovative energy         that there will be bumps on the road
2050, technologies advancing at           into making ourselves better slaves? If    to utopia, but they argue that it would
“Moore’s Law” speeds have produced        the digital elite achieves its dream of    be foolish not to “take control of our
an android-like creature nearly indis-    a perfect union with machines, what        own evolution”. They believe that
cernible from a human.                    becomes of the rest of us who either       we can use science and technology
  Programmed with Internet-down-          can’t afford cyborgification or who        to guide the evolution of society and
loaded software, 2050s household          actually enjoy life as a regular human     that this will create a far better world
robots cater to our every whim. They      being? Would one Singularitized            than we have today. The following is
also manage the nanorobots that whiz      human be expected to handle the            what one participant stated at a recent
through our veins keeping us healthy      workload of 100 unenhanced work-           conference about transhumanism and
24/7, and monitor our safety when         ers? Robots will have of course taken      religion…
we connect to simulation events that      the rest of the jobs.                        Transhumanism is a thrust toward
whisk us away in a Star Trek Holo-          In fact, robots are already taking our   transcendence. It is not classical mys-
deck-like adventure.                      jobs at a staggering pace. This is even    ticism but seeks a temporal transcen-
  That sounds wonderful doesn’t it?       happening in low wage countries such       dence The driving force behind this is
  But how will we earn the money to       as China…                                  evolution…
pay for all of those things?                Chinese company Hon Hai, the               What is reality? Reality is evolution.
  If robots are so advanced at that       world’s largest contract electronics       It has a direction from the simple to
point, why would companies even           manufacturer, has announced it             the complex; the most complex [out-
need human workers?                       intends to build a robot-making fac-       come] is intelligence. Thus evolution
  Or will we have to “enhance” our-       tory and replace 500,000 workers           is aimed at intelligence.
selves with technology just to be         with robots over the next three years.       We should thus have a will to evolve.



 60             VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                            INFOWARS.COM
We have a moral responsibility to           are systematically moving us in the          We know all this. Because we know
increase evolution and do so by con-        direction of becoming more like God…         it, we seek something more—a tran-
tinually striving to expand our abilities     “Evolution moves toward greater            scendence of transience, translation
throughout life by acting in harmony        complexity, greater elegance, greater        to incorruptible form. An escape if
with the evolutionary process…              knowledge,       greater     intelligence,   you will, a stop to the wheel. We seek,
  Science and technology move us            greater beauty, greater creativity, and      therefore, to bless ourselves with per-
toward Utopia. One of the most excit-       greater levels of subtle attributes such     fect knowledge and perfect will; To
ing things about transhumanism is           as love. In every monotheistic tradi-        become as gods, take the universe in
that all will be fixed.                     tion God is likewise described as all        hand, and transform it in our image—
  That all sounds so alluring.              of these qualities, only without any         for our own delight. As it is on Earth,
  After all, who wouldn’t want to live      limitation: infinite knowledge, infinite     so it shall be in the heavens. The inev-
in a “utopia” where everything that is      intelligence, infinite beauty, infinite      itable result of incredible improbabil-
currently wrong with our planet has         creativity, infinite love, and so on. Of     ity, the arrow of evolution is lipping us
been “fixed”?                               course, even the accelerating growth         into the transhuman – an apotheosis
  But transhumanists don’t just stop        of evolution never achieves an infinite      to reason, salvation – attained by good
there. They believe that eventually         level, but as it explodes exponentially      works.”
we will possess such superhuman             it certainly moves rapidly in that             And what transhumanist Dr. Richard
powers and will enjoy such radical life     direction. So evolution moves inexo-         Seed has to say about all of this is
extension technologies that we will         rably toward this conception of God,         quite frightening. He warns of “war-
essentially be like God.                    although never quite reaching this           fare” if anyone tries to prevent him
  The most famous transhumanist             ideal. We can regard, therefore, the         from becoming a god…
on the globe, Ray Kurzweil, takes           freeing of our thinking from the severe        If you want to get an idea of where
150 vitamin supplements a day in an         limitations of its biological form to be     transhumanists want to take us, just
attempt to extend his life until more       an essentially spiritual undertaking.”       check out the YouTube video posted
advanced life extension technologies          Transhumanist Mark Pesce is even           below. It was produced by “the 2045
can be developed. In chapter 7 of “The      more extreme. He openly states that          Initiative”, and as you can see, they
Singularity Is Near: When Humans            he believes that transhumanism will          believe that the world will be infinitely
Transcend Biology”, he expresses his        allow us “to become as gods”…                superior in the year 2045 than it is
belief that evolution and technology          “Men die, planets die, even stars die.     today…


                 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                              INFOWARS.COM                        61
62   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM   63
                                         “THE PROGRAMMER EXPLAINS
                                         HOW GOOGLE CHROME’S SPEECH
                                         RECOGNITION FUNCTION REMAINS
                                         OPERATIONAL EVEN AFTER THE USER
                                         HAS LEFT THE WEBSITE ON WHICH
                                         THEY GAVE PERMISSION FOR THE
                                         BROWSER TO RECORD THEIR VOICE.”

                                         “WHEN YOU CLICK THE BUTTON
                                         TO START OR STOP THE SPEECH
                                         RECOGNITION ON THE SITE, WHAT
                                         YOU WON’T NOTICE IS THAT THE SITE
                                         MAY HAVE ALSO OPENED ANOTHER
                                         HIDDEN POP UNDER WINDOW. THIS
                                         WINDOW CAN WAIT UNTIL THE MAIN
                                         SITE IS CLOSED, AND THEN START
                                         LISTENING IN WITHOUT ASKING FOR
                                         PERMISSION. THIS CAN BE DONE
                                         IN A WINDOW THAT YOU NEVER
                                         SAW, NEVER INTERACTED WITH,
                                         AND PROBABLY DIDN’T EVEN KNOW
                                         WAS THERE,” WRITES THE WHIS-
                                         TLEBLOWER.”


64   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM
              W R I T T EN BY PAUL J OS EP H WATS O N



WHISTLEBLOWER: GOOGLE
CHROME CAN LISTEN TO
YOUR CONVERSATIONS
Programmer goes public four months after company



A
failed to fix exploit
              whistleblower who pri-      The window can be disguised as an         that computers would use in-built
              vately informed Google      advertising banner so the user has no     microphones to spy on users. We also
              four months ago that        indication that Chrome is listening to    revealed how digital cable boxes had
              their Chrome browser        their voice, whether that be on the       embedded microphones that had the
              had the ability to record   phone, talking to someone on Skype,       capability of recording conversations
conversations without the user’s          or merely having a conversation with      since the late 1990′s.
knowledge has gone public after the       someone near the computer.                  As we have previously highlighted,
tech giant failed to fix the issue.         The exploit is a “serious security      terms of agreement for both Android
  In the video above, the program-        breach” that has compromised the          and iPhone apps now require users to
mer explains how Google Chrome’s          privacy of millions of Google Chrome      agree to allow their microphone to be
speech recognition function remains       users, according to the programmer,       activated at any time without confir-
operational even after the user has       who warns, “as long as Chrome is still    mation before they can download the
left the website on which they gave       running, nothing said next to your        app.
permission for the browser to record      computer is private.”                       Facebook’s term’s of agreement
their voice.                                The exploit turns Google Chrome         also allow the social network giant
  “When you click the button to start     into an “espionage tool,” adds the pro-   to record your phone calls, read your
or stop the speech recognition on the     grammer, noting that the recording        phone’s call log and “read data about
site, what you won’t notice is that the   function can be activated by the use of   contacts stored on your phone, includ-
site may have also opened another         sensitive keywords and be passed on       ing the frequency with which you’ve
hidden pop under window. This             “to your friends at the NSA.”             called, emailed or communicated in
window can wait until the main site         The programmer reported the             other ways with specific individuals.”
is closed, and then start listening in    exploit to Google on September 19           We are now fully ensconced in a
without asking for permission. This       last year and was met with assur-         world that even George Orwell would
can be done in a window that you          ances that it would be quickly fixed.     have laughed off as inconceivable.
never saw, never interacted with, and     However, despite apparently fixing        Embedded microphones in everything
probably didn’t even know was there,”     the bug within two weeks, the update      from Xbox Kinect consoles to high-tech
writes the whistleblower.                 was never released to Chrome users,       street lights that can record private
  The video shows a pop-under             with Google telling the programmer,       conversations in real time represent
browser window recording and typing       “Nothing is decided yet.”                 the final nail in the coffin of privacy.
the programmer’s words as she speaks.       As far back as 2006, we warned




        LISTENING...
                VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                           INFOWARS.COM                      65
               W R I T T EN BY PAUL J OS EP H WATS O N


WHITE HOUSE WANTS
CHINESE-STYLE ID
SYSTEM FOR INTERNET
USERS
Government Moves To Create “Identity Ecosystem”



T
            esting is set to begin next     col that works for any website, from       too draconian, but the Obama admin-
            month on a pilot program        your Facebook account to your health       istration is pushing ahead with its
            that could lead to the intro-   insurance company,” writes Meghan          own Internet ID system in pursuit of
            duction of a Chinese-style      Neal, warning that the proposal is “a      a wider cybersecurity agenda that
            ID system for Internet          scary can of worms to open”.               Senator Joe Lieberman publicly stated
users, an “identity ecosystem” that           The scope of the program could even-     back in 2010 is aimed at mimicking
critics fear would create a backdoor        tually be expanded into an ID card to      Chinese-style censorship of the world
to government regulation of the world       access the Internet itself, greasing the   wide web.
wide web.                                   skids for every citizen to require gov-      Back when the NSTIC plan was first
  The White House’s “National Strategy      ernment permission to use the world        introduced, CNet’s Declan McCul-
for Trusted Identities in Cyberspace”       wide web, a privilege that could be        lagh noted that it represented “the
would replace the current system of         denied to criminals, accused terrorists    virtual equivalent of a national ID
using passwords to access sensitive         and other undesirables, which accord-      card” because it would eventually be
online accounts with something akin         ing to federal government literature       mandatory for filing IRS tax returns,
to a biometric ID card that would link      includes people who hold certain           applying for benefits or renewing
one individual to all their government      anti-establishment political beliefs.      licenses.
services, such as food stamps, welfare        The program bears more than a pass-        The notion of the US government
as well as a myriad of other things like    ing resemblance to a 2007 proposal         being able to provide a secure “identity
mortgage applications and applica-          by China that threatened to force          ecosystem” immune from hacking and
tions for licenses.                         bloggers to register their real identi-    data theft is also naive given previous
  “The original proposal was quick          ties and personal details via a single     instances of information being stolen.
to point out that this isn’t a federally    centralized ID system as a means for       The train wreck that was the launch of
mandated national ID. But if suc-           the Communist government to control        the Obamacare website is also a very
cessful, it could pave the way for an       information and punish dissenters.         strong argument for the government
interoperable authentication proto-           That idea was scrapped for being         to stay out of such programs.



                                                                 “BACK WHEN THE NSTIC PLAN WAS FIRST
                                                                 INTRODUCED, CNET’S DECLAN MCCUL-
                                                                 LAGH NOTED THAT IT REPRESENTED “THE
                                                                 VIRTUAL EQUIVALENT OF A NATIONAL ID
                                                                 CARD” BECAUSE IT WOULD EVENTUALLY BE
                                                                 MANDATORY FOR FILING IRS TAX RETURNS,
                                                                 APPLYING FOR BENEFITS OR RENEWING
                                                                 LICENSES.”



 66              VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE                             INFOWARS.COM
VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM   67
68   VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE   INFOWARS.COM

				
DOCUMENT INFO
Description: The Internet has emerged as the most empowering tool of individual freedom since the Gutenberg’s press, affording billions of people worldwide not only the tool of instant communication, but access to a wealth of liberating information, freedom from the chains of received consensus, and the opportunity to become their own media platform. This represents an ever increasing threat to the status quo of the elite, which is why the establishment is working feverishly to dismantle the freedom granted by the world wide web in its current form.