VIEWS: 159 PAGES: 68 CATEGORY: Polls & Surveys POSTED ON: 6/13/2014
The Internet has emerged as the most empowering tool of individual freedom since the Gutenberg’s press, affording billions of people worldwide not only the tool of instant communication, but access to a wealth of liberating information, freedom from the chains of received consensus, and the opportunity to become their own media platform. This represents an ever increasing threat to the status quo of the elite, which is why the establishment is working feverishly to dismantle the freedom granted by the world wide web in its current form.
2 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 3 FEATURED THE PLAN TO KILL THE INTER- 11 NET UNCOVERED W R I TTE N BY PAU L JOSEP H WATS O N & A L EX JONES NSA TO CONTROL THE 18 STOCK MARKET W R I TTE N BY K I T DA NI EL S OBAMA ADMINISTRA- 44 TION TURNS INTERNET OVER TO GLOBALISTS W R I TTE N BY KU RT NI M M O CORPORATE DOMINA- 56 TION ON THE WEB W R I T TE N BY KU RT NI M M O 4 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM CONTENTS 14 CYBER-SECURITY EXPERTS ASK APPLE ABOUT NSA BACKDOOR 46 REVOLVING DOOR OF DEATH WRITTE N BY I NFOWAR S STAF F W R IT T EN BY STE V E WATS ON 17 MONOPOLIZING THE INTERNET 48 POLICE NOW “ARMED FOR WAR” AGAINST RETURNING VETERANS W R IT T EN BY KUR T N IM MO WRITTE N BY PAU L JO SEPH WATSON VOLUME 2 ISSUE 10 JUNE 2014 22 NSA PRETENDS TO BE FACEBOOK TO SPY ON THE WORLD 51 ROBOTS PROGRAMMED TO KILL YOU “FOR THE GREATER GOOD” W R IT T EN BY STE V E WATS ON WRITTE N BY PAU L JO SEPH WATSON 26 MASK CAN HIDE YOU FROM BIOMETRIC FACE SCANNERS 52 PUBLIC REJECTS GOVERNMENT TAKEOVER OF INTERNET W R IT T EN BY M AC S L AVO WRITTE N BY KI T DANI ELS 31 FCC MOVES CORPORATIZATION OF 58 TRANSHUMANISTS WISH TO DEATH OF THE INTERNET INTERNET FORWARD BECOME “LIKE GOD” W R IT T EN BY KUR T N IM MO WRITTE N BY M I CHAEL SNY DER 32 GOOGLE HIRES TOP GENETICIST IN SEARCH FOR LIFE EXTENSION 64 GOOGLE CHROME CAN LISTEN TO YOUR CONVERSATIONS W R IT T EN BY DA N IE L TAYLOR WRITTE N BY PAU L JO SEPH WATSON 36 NSA FITS HARDWARE WITH SURVEIL- LANCE EQUIPMENT 66 CHINESE-STYLE ID SYSTEM FOR AMERICAN INTERNET USERS W R IT T EN BY STE V E WATS ON WRITTE N BY PAU L JO SEPH WATSON 40 KILLING THE INTERNET: NEW TAXES IN THE WINGS W R IT T EN BY KUR T N IM MO A BOUT T H E COV E R In this June edition of The Infowars Magazine the fight for Internet freedom is high- lighted in a multitude of articles that depict the very real threat of a regulated Internet. Whether it be the death of net neutrality, or the corporatization of the world wide web, the attack on online sovereignty is evident. The NSA backdoor spy programs and other invasive operations are also mentioned with other informative articles cov- ering the most recent topics concerning the Infowar and the end of the web. VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 5 5 S OTE QU 6 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM SUBMIT YOUR QUOTES, MEMES, LETTERS, AND POLITICAL ILLUSTRATIONS TO LETTERS@INFOWARS.COM OR GRAPHICS@INFOWARS.COM “When you talk to a human in 2035, you’ll be talking to someone that’s a combination of biological and non-biological RAYKURZWEIL intelligence.” “We know where you are. We know where you’ve been. We can more or less know what you’re thinking about.” ERIC SCHMIDT “I can’t in good conscience allow the U.S. government to destroy privacy, Internet freedom and basic liberties for people around the world with this mas- sive surveillance machine they’re secretly building.” EDWARD SNOWDEN “If freedom of speech is taken away, then dumb and silent we may be led, like sheep to the slaughter.” GEORGE WASHINGTON VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 7 A S H ORT STO RY A B OUT US A BOUT A LEX JONES Infowars Magazine was founded as a monthly publication in 2012 The Alex Jones Show is a nationally syndicated as the answer to the eminent threat of internet censorship. The first news/talk show based out of Austin, TX. The issue debuted in september 2012, bringing the fight for the infowar show is syndicated by the Genesis Communi- to a new front, the changing landscape of print media. Over 100,000 cation Network on over 160 AM and FM radio copies are distributed world-wide each month, spreading truth stations across the United States, and has a journalism with the passion of grassroots publication and the per- large internet based audience. manence of physical print. Our distribution points across the globe continue to grow and our subscriptions increase as people like you SOCIAL SITES: take the infowar to the streets, providing magazines to stores, restau- Facebook.com/AlexanderEmerickJones rants, businesses, and neighborhoods. Take a stand against tyranny Twitter: @RealAlexJones and join the front lines in the fight for freedom. Youtube.com/TheAlexJonesChannel INFOWARS.COM PRISONPLANET.COM PLANETINFOWARS.COM WWW.PRISONPLANET.TV Home of the #1 Internet news Reporters on the scene, articles, Instantly connect to what’s most import- Get access to all the channels: The Alex show in the world. and special coverage. ant to you. Follow your friends, experts, Jones Show, Nightly News, Exclusive Vid- favorite celebrities, and breaking news. eo Reports, 60+ Movies and Documenta- ries, Books, and more. 8 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM L I ST E N TO T H E AL E X J ON E S S H OW You can listen to the show on-demand over the internet, either when the show is on the air (Mon-Fri, 11:00 a.m.—2:00 p.m CST and Sunday from 4:00.—6:00 PM CST) or you can stream a feed of the latest show at www.infowars.com/show CONTRIBUTION PUBLISHER CONTRIBUTING WRITERS CHECK OUT Alex Jones Paul J. Watson Kurt Nimmo INFOWARSSHOP.COM MANAGING EDITOR Kit Daniels Check out Infowars gear, exclusive Kelen McBreen Steve Watson Alex Jones Movies, Infowars Magazine, health and wellness, preparedness Mac Slavo products, and more. ART DIRECTOR Daniel Taylor Molly Rogers Michael Snyder C O N TA C T U S GRAPHICS & PHOTOGRAPHY firstname.lastname@example.org Molly Rogers PROJECT MANAGER email@example.com Rob Reeger Tim Fruge Paul Beck Steve McGhee EDITORIAL ASSISTANT Kit Daniels SINGLE ISSUES and bulk orders are available online at www.infowarsstore.com or through customer service at 1-888-253-3139 • ADVERTISING inquiries can be directed to 512-646-4414 or advertising@ infowars.com • INFORMATION requests, whether general or editorial, can be found by contacting firstname.lastname@example.org • Infowars Magazine is published by Free Speech Systems, LLC. 12 times a year with a circulation of 90,000 copies. All content within this magazine is copyright of Free Speech Sys- tems, LLC. To receive a free electronic version of the magazine, become an Infowars Insider by signing up at www.infowars.com/newletter • PERMISSION to reprint original Infowars articles in whole or in part is gladly granted, provided full credit is given. Some articles are copyrighted by our contributing writers, so check to see if copyright-free status applies. The articles appearing within this publication reflect the opinions and attitudes of their respective authors and not necessarily those of the publisher, advertisers, or editorial team. VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 9 10 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM W R I T T E N BY PAU L J O S EP H WATS O N & A L E X J O N E S THE PLAN TO KILL THE INTERNET UNCOVERED 10 Ways The Freedom Of The World Wide Web Is Being Dismantled T he Internet has emerged see a trickle-down effect of higher #3 GOVERNMENTS ARE as the most empowering prices as Web sites try to pass along PAYING TROLLS TO SWAY tool of individual freedom new costs of doing business with since the Gutenberg’s press, Internet service providers,”reports the PUBLIC OPINION affording billions of people Washington Post. In 2010, Canada’s CTV News worldwide not only the tool of instant For almost a decade, we have warned reported on how federal authorities communication, but access to a wealth of plans to create an ‘Internet 2′ under were paying companies to “correct of liberating information, freedom which the old Internet would be left misinformation” on web forums. from the chains of received consensus, to crumble and die, eviscerating The Turkish, Israeli and Chinese and the opportunity to become their the world wide web as a tool of free governments along with a host of own media platform. speech that allows independent voices others have also implemented similar This represents an ever increasing to be heard amongst the cacophony of programs, while the U.S. Air Force threat to the status quo of the elite, corporate and statist propaganda. hired data security firm HBGary to which is why the establishment is create large numbers of fake social working feverishly to dismantle the media profiles that could be used to freedom granted by the world wide #2 INTELLIGENCE spread propaganda while countering web in its current form. anti-U.S. rhetoric online. Raw Story AGENCIES ARE reported that the obvious function #1 THE DEATH OF NET MANIPULATING THE of the program was to “manipulate NEUTRALITY INTERNET WITH public opinion on key information, such as news reports,” thereby creat- DELIBERATE ing, “the illusion of consensus.” The Federal Communications Com- DISINFORMATION mission (FCC) recently gave the green #4 MAINSTREAM NEWS light for large Internet Service Provid- Documents recently released by ers to create a two-tier Internet system whistleblower Edward Snowden con- WEBSITES ARE KILLING which would allow large corporations firm that western intelligence agencies COMMENT SECTIONS to buy up dedicated faster bandwidth, are deliberately flooding the web with ending net neutrality and potentially disinformation in order to, “inject all Although this remains a relatively leaving smaller websites in the dust. sorts of false material onto the inter- rare phenomenon, increasing num- If passed this will allow the “tele- net in order to destroy the reputation bers of mainstream news websites are vization” of the Internet, resulting in of its targets.” killing or severely restricting comment large companies forming monopolies These techniques are intended to sections in order to drown out dissi- and restricting consumer choice. “control, infiltrate, manipulate, and dent voices that challenge the prevail- “[S]maller companies that can’t warp online discourse,” which has the ing status quo. afford to pay for faster delivery would effect of, “compromising the integrity Studies confirm that article com- likely face additional obstacles against of the internet itself,” according to ment sections – for better or worse bigger rivals. And consumers could journalist Glenn Greenwald. – are heavily swaying public opinion. VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 11 Popular Science recently announced having people in government refute January 2011, the New York Times its decision to kill comment sections conspiracy theories wouldn’t work reported, “US and Israeli intelligence on their website in order to silence because they are inherently untrust- services collaborated to develop a global warming skeptics. BoingBoing. worthy, making it necessary to, “Enlist destructive computer worm to sabo- net is following a similar track. The nongovernmental officials in the effort tage Iran’s efforts to make a nuclear New York Times also recently indi- to rebut the theories.” bomb,” acknowledging the “conspir- cated that it is scaling back comments Sunstein suggested that “government acy theory” to be true. and removing them from some articles agents (and their allies) might enter As the Washington Post reported, altogether. chat rooms, online social networks, or the United States and Israel were also The effort to kill comments is part of even real-space groups and attempt responsible for jointly developing the the establishment media’s desperate to undermine percolating conspiracy Flame virus. effort to dictate reality and maintain theories by raising doubts about their Stuxnet’s appearance was dovetailed a grip on manufacturing consensus in factual premises, causal logic or impli-by an aggressive PR campaign during the face of a burgeoning independent cations for political action.” which Joe Lieberman and others called media and the Internet as a vehicle of for the government to be allowed to, free speech in general. #6 FALSE FLAG CYBER- “disconnect parts of its Internet in case of war,” just as China did. What SECURITY ATTACKS AS A Lieberman failed to mention is the #5 THE OBAMA ADMIN- PRETEXT TO INCREASE fact that China’s Internet censorship ISTRATION’S “COGNITIVE WEB REGULATION program was and continues to be INFILTRATION” OF THE based around crushing dissent against INTERNET While constantly repeating the the state and has nothing to do with necessity for restrictive cybersecurity cybersecurity. In 2010, a White House program was regulations to be applied to the Inter- revealed that centered around infil- net in the name of preventing cyber #7 FAIRNESS DOCTRINE trating conspiracy groups in order to attacks, the United States has itself undermine them via postings on chat been behind all the recent major cyber FOR THE INTERNET rooms and social networks. Harvard attacks. According to Tim Cavanaugh, under law professor Cass Sunstein, Obama’s After Alex Jones pointed the finger a plan entitled “Multi-Market Study appointee to head the Office of Infor- at Washington and Tel Aviv for being of Critical Information Needs, “The mation and Regulatory Affairs, spear- behind Stuxnet during a September airwaves regulator would subject headed this “cognitive infiltration” of 27, 2010 broadcast, the likes of CNN, news producers in all media to inva- the web and has been heralding its the Economist and others followed up sive questioning about their work and success ever since. by ridiculing the claim as a baseless content,” a move which could lead Sunstein pointed out that simply conspiracy theory. Months later in to policing of political content on the 12 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM web. in 1934. This law states that if a “state were advanced in the name of stop- Although the study was widely of public peril or disaster or other ping online copyright theft, yet were derided in the media and now appears national emergency” exists, the presi- soundly defeated when it emerged to have been derailed, the fact that dent may “authorize the use or control they were actually designed to impose the FCC is pursuing such programs of any…station or device.” oppressive censorship and surveil- illustrates the feds’ contempt for free lance on the Internet, will continue speech on the Internet. #9 NEW TAXES AND to be advanced by those who seek to centralize power over the web into REGULATIONS SET TO fewer and fewer hands at the top of #8 HOMELAND STIFLE COMMUNICATION the pyramid. SECURITY’S INTERNET & SALES ON THE WEB In addition, the FBI’s attempt to KILL SWITCH amend the 1994 Communications A blizzard of new taxes and regula- Assistance for Law Enforcement Act While fears of a government kill tions could herald “Internet freedom’s in order to build backdoors into all switch for the Internet have been expiration date,” according to a recent Internet Service Providers, email cli- mooted for years, under Standard Wall Street Journal piece which points ents and social media sites, is another Operating Procedure 303 or SOP 303, to efforts by lawmakers to weaken the effort to chill free speech by indoc- the Department of Homeland Security Internet Tax Freedom Act in order, “to trinating people with the notion that has given itself the power to oversee punish all American consumers with everything they do online is being “the termination of private wireless new taxes on communication.” permanently watched and recorded, network connections, both within Lobbyists for giant retailers are lean- making them less likely to express a localized area, such as a tunnel or ing on Congress to empower some their freedoms due to fears of official bridge, and within an entire metropol- 9,600 state and local governments oppression. itan area,” in the event of a declared with more authority over e-commerce, Only by aggressively opposing these emergency. including a potential e-mail tax which onerous threats to the freedom of the When privacy rights group the Elec- could dissuade millions of Americans Internet can we hope to preserve the tronic Privacy Information Center from communicating online. world wide web in its current incarna- attempted to obtain more information tion and continue to see informed and on the plan last year, the DHS claimed #10 SOPA, CISPA & THE empowered people the world over that it could not locate any further embrace it as the tool of individual details regarding the program. FBI’S INTERNET BACK- liberation it has truly become. The White House also still claims DOOR that it retains Internet kill switch powers under the law that created the Legislative assaults under the Federal Communications Commission banner of SOPA and CISPA, which VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 13 W R I T T E N BY ST EV E WATS O N CYBER-SECURITY EXPERTS ASK IF APPLE “FLAW” WAS REALLY NSA BACKDOOR Security Hole Appeared Just One Month Before NSA Bragged It Had Penetrated Apple Servers F ollowing an admission by Apple in iOS 6.0 and was not present in iOS it. that a “bug” in its operating 5.11. 4. NSA itself planted it surreptitiously. system had left devices open Immediately, tech experts began to note 5. Apple, complicit with the NSA, added to potential hacking, experts that iOS 6.0 was released in September it. are questioning whether the 2012, just one month before Apple was “…once the bug was in place, the NSA security hole was intentional, in order to added to the NSA’s list of penetrated serv- wouldn’t even have needed to find the allow the NSA backdoor access as part of ers, according to slides leaked by Edward bug by manually reading the source code. its mass spying program. Snowden. All they would need are automated tests On Friday Apple acknowledged that a Noting that while the evidence is cir- using spoofed certificates that they run “goto fail” command in the company’s cumstantial, blogger John Gruber, a com- against each new release of every OS.” SecureTansport protocol had left iPhones, puter scientist, says that “the shoe fits” Gruber states. iPads, and MacBooks vulnerable to data where the NSA’s Apple breakthrough is “Apple releases iOS, the NSA’s automated intercept on networks and wireless con- concerned. spoofed certificate testing finds the vul- nections. Anyone who had knowledge “Sure would be interesting to know who nerability, and boom, Apple gets “added” of the security flaw, could have accessed added that spurious line of code to the to PRISM. ([It] wasn’t even necessarily a secure data, Apple noted, declaring that file,” he notes. “Conspiratorially, one could fast turnaround — the NSA could have “a software fix will be released very soon.” suppose the NSA planted the bug, through discovered the vulnerability over the Johns Hopkins University cryptography an employee mole, perhaps. Innocuously, summer, while iOS 6 was in developer professor Matthew Green told Reuters the Occam’s Razor explanation would be program beta testing.)” Gruber concludes. that the flaw (see below) was “as bad as that this was an inadvertent error on the Other tech bloggers concur that it is you could imagine.” part of an Apple engineer. It looks like the strange how such a major flaw wasn’t Several coding experts are now raising sort of bug that could result from a merge spotted or fixed sooner. “The timing is their eyebrows over the matter, noting gone bad, duplicating the goto fail; line.” rather odd, and it makes you wonder how that the timeline of the inception of the Gruber has laid out five potential sce- such a serious bug went undiscovered for security flaw matches up with leaked NSA narios, personally leaning toward number over a year.” writes Cody Lee of iDown- slides that document how the spy agency three: loadblog. had managed to gain access to Apple’s 1. Nothing. The NSA was not aware of Ashkan Soltani, another security expert severs. this vulnerability. has compiled a list of current Apple appli- According to coder and App developer 2. The NSA knew about it, but never cations that he believes are vulnerable to Jeffrey Grossman, who has studied the exploited it. security hole that is still open on the cur- code in question, the flaw only appeared 3. The NSA knew about it, and exploited rent version of OS X for the Mac. The list 14 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM “ASHKAN SOLTANI, ANOTHER SECURITY EXPERT HAS COMPILED A LIST OF CURRENT APPLE APPLICA- TIONS THAT HE BELIEVES ARE VULNERABLE TO A SECURITY HOLE THAT IS STILL OPEN ON THE CURRENT VERSION OF OS X FOR THE MAC. THE LIST INCLUDES BASIC APPS SUCH AS MAIL, SAFARI, TWITTER, FACETIME AND CALENDER. THESE APPS TRANSMIT AND STORE EXACTLY THE TYPE OF INFORMATION NSA HAS TARGETED.” includes basic apps such as mail, safari, other personal data. deeply about our customers’ privacy and twitter, facetime and calender. These Apple has since vehemently denied security.” apps transmit and store exactly the type having knowledge of the NSA’s activi- What do you think? Did Apple inten- of information NSA has targeted. ties. “Apple has never worked with the tionally allow the NSA backdoor access Just one month ago, a new Snowden NSA to create a backdoor in any of our to its servers? Is Apple, seemingly like leak revealed that the NSA had infiltrated products, including iPhone,” Apple said Intel, the victim of NSA moles on the iPhones with a program known as DROP- in a January statement. “Additionally, we inside? Or is all of this just a big old coin- OUT JEEP, which allowed the agency have been unaware of this alleged NSA cidence? access to text messages, voicemails and program targeting our products. We care VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 15 16 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM W R I T T E N BY KU RT N I M M O MONOPOLIZING THE INTERNET: COMCAST GOBBLES UP TIME WARNER Imperium In Imperio Will Govern Your Internet Connection “ Competition is a sin,” said government pretends it will protect history professor at Baruch College in the robber baron John D. them from predatory monopolies and New York, told the Harvard Business Rockefeller. His maxim, a other highly organized scams and rip- Review in 2010. The first generation rule of conduct for large offs. It is well-known in the industry of Americans “did their best to make corporations for well over a that Comcast has a “wealth of con- sure that those institutions were hundred years, will soon govern how nections” in Washington. In short, it subordinate to elected officials and you receive your internet signal and basically owns the FCC. representative government. They saw how much you pay for it. The Los Angeles Times posted an corporations as corrupting influences Earlier today, Comcast, the largest op-ed Wednesday on the merger. “Say on both the economy at large and mass media and communications goodbye to the public interest,” it on government — that’s why they transnational corporation in the headlines. The liberal newspaper pre- described the East India Company as world, announced it will absorb Time dictably leans on the FCC and states imperium in imperio, a sort of ‘state Warner, the world’s second largest the lumbering government regulatory within a state.’ This wasn’t an outcome media and entertainment conglom- commission “has all the authority they were looking to replicate.” erate. The “friendly” merger will it needs to protect net neutrality.” “With regard to monopolies they “combine the country’s top two cable The prospect of handpicked political are justly classed among the greatest providers into a colossus that could apparatchiks deciding the fate of the nusances in Government,” James reshape the U.S. pay TV and broad- internet without bias is on par with Madison wrote to Thomas Jefferson band industry if it clears regulatory a government sanctioned monopoly in 1788, a little more than a century hurdles,” reports Reuters. Hurdles, it doing basically the same thing. All we before the Supreme Court ruled in a should be noted, easily swept away basically need to know is that the cur- case involving a railroad that corpora- by the real owners of the FCC and the rent chairman of the FCC is Thomas tions have the same rights as flesh and federal government – leviathan-sized Wheeler, a former lobbyist for the blood humans. international corporations and the cable and wireless industry. “In an already uncompetitive market global banking cartel. Prior to a creeping corporate takeover with high prices that keep going up Despite this fact, we can expect a beginning in 1819 when the courts and up, a merger of the two biggest show. “A deal may face a fierce battle first tested the waters on the con- cable companies should be unthink- in Washington as you are merging tentious subject of corporate person- able,” Craig Aaron of Free Press the two largest cable operators,” an hood, the founders insisted charters lamented on Wednesday, prior to the analyst told Reuters. It will be another be issued for business incorporation. merger. “This deal would be a disaster dog and pony show designed to “The Founders did not confuse Bos- for consumers and must be stopped.” convince the American people they ton’s Sons of Liberty with the British actually live in a democracy where the East India Company,” Brian Murphy, a VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 17 W R I T T E N BY K I T DA N I EL S NSA TO CONTROL THE STOCK MARKET Spy Agency Can Easily Manipulate The Market Through Latest Surveillance Hub A n upcoming surveillance traders to rig markets. tions and altering the amounts held in hub monitoring all invest- Indeed, three traders have already bank accounts. ment transactions in filed a lawsuit against CME Group “Governments should not use their real-time will allow the Inc. for selling sensitive data to high offensive cyber capabilities to change National Security Agency frequency traders. the amounts held in financial accounts unparalleled ability to manipulate the “The plaintiffs allege CME charged or otherwise manipulate the financial stock market. exchange and data fees for real-time systems,” the report recommended. Through the use of the Financial price data, and purported that the data Trevor Timm, a former analyst at the Industry Regulatory Authority (FIN- was sold to the users in real time. The Electronic Frontier Foundation, asked RA)’s latest database, which keeps suit further states that CME allegedly if the recommendation implied that investor data in the same centralized also charged high-frequency traders the NSA was already doing just that. location, the NSA could easily capture for the ability to see the data before And a few months earlier, in Septem- private, financial data on targeted others, including people who paid ber, German news outlet Der Spiegel investors and even influence the stock and continue to pay CME for seeing reported that the spy agency was also market as a whole. the same data first,” reports the Wall tracking the global flow of money. And it appears that the dragnet data- Street Journal. Under the “Follow the Money” pro- base, called the Comprehensive Auto- Since the 1987 stock market crash, gram, the NSA collects credit card mated Risk Data System (CARDS), the Working Group on Financial Mar- and other financial transactions into was designed with such vulnerabilities kets, otherwise known as the Plunge its own financial databank, called in mind. Protection Team, has also been a target “Tracfin,” which contains nearly 200 “I can’t think of any other reason of charges of market manipulation. million records if not more. that someone would invest so much The government itself routinely “Further NSA documents from 2010 time and so much effort into trying manipulates markets with the timing show that the NSA also targets the to monitor every brokerage account of announcements and the actual transactions of customers of large in the United States in real time,” execution of quantitative easing and credit card companies like VISA for Porter Stansberry, the founder of the bond buying programs. surveillance,” the article continued. Stansberry & Associates Investment The Wall Street Journal recently “NSA analysts at an internal confer- Research Conference, said on the Alex reported on the new CARDS database ence that year described in detail Jones Show. “That is an enormous and quoted FINRA’s chairman stating how they had apparently successfully technical challenge.” that the dragnet “would provide us searched through the U.S. company’s He also added that even knowing with a treasure trove of information.” complex transaction network for tap- something as simple as how many Oher revelations in the past reveal ping possibilities.” individual investors own certain secu- that the NSA is more than willing to And the upcoming CARDS database, rities could be very, very valuable to monitor and manipulate financial which a law professor suggested is as select interests. transactions. tempting of a target as the American While one of the NSA’s roles is Last December, the White House fleet at Pearl Harbor, would grant the undoubtedly financial espionage, the report on the activities of the NSA NSA almost unlimited possibilities to database will also make it easier for suggested that the spy agency was influence the stock market. corporate entities and high frequency already hacking into financial institu- 18 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM “LAST DECEMBER, THE WHITE HOUSE REPORT ON THE ACTIVITIES OF THE NSA SUGGESTED THAT THE SPY AGENCY WAS ALREADY HACK- ING INTO FINANCIAL INSTITUTIONS AND ALTERING THE AMOUNTS HELD IN BANK ACCOUNTS. “GOVERNMENTS SHOULD NOT USE THEIR OFFENSIVE CYBER CAPABIL- ITIES TO CHANGE THE AMOUNTS HELD IN FINANCIAL ACCOUNTS OR OTHERWISE MANIPULATE THE FINANCIAL SYSTEMS,” THE REPORT RECOMMENDED.” VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 19 20 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 21 W R I T T E N BY ST EV E WATS O N NSA PRETENDS TO BE FACEBOOK TO SPY ON THE WORLD Malware Can Record Audio And Take Photos Of Web Users Without Their Knowledge T he latest Snowden leaks nerabilities in these systems, making administrator’s computer, the agency on the NSA reveal that the them more vulnerable for attacks by can gain covert access to communica- spy agency is masquerad- third parties,” Hypponen told The tions that are processed by his com- ing as Facebook in order to Intercept. pany. “Sys admins are a means to an infect millions of computers Hypponen added that because the end,” the NSA operative writes. around the world with malware as system is designed to operate without The internal post – titled “I hunt sys part of its mass surveillance program. a great deal of human oversight, it admins” – makes clear that terrorists Glenn Greenwald reported the latest could lead to the malware infection aren’t the only targets of such NSA information today, noting that the process spiraling “out of control”. attacks. Compromising a systems practice has been in operation for over “That would definitely not be propor- administrator, the operative notes, ten years with the help of British and tionate,” Hypponen said. “It couldn’t makes it easier to get to other targets Japanese intelligence. possibly be targeted and named. It of interest, including any “government The NSA, according to the leaks, has sounds like wholesale infection and official that happens to be using the been distributing malware “implants” wholesale surveillance.” network some admin takes care of.” which can siphon out data from com- The NSA refused to comment on The program appears to be part of puters around the globe. The agency the latest revelations, suggesting that NSA’s TAO (Tailored Access Opera- reportedly used a fake Facebook server because the practice is used for foreign tions), and is aimed at “Owning the as a launching pad to grab information and counterintelligence purposes, it is Internet” according to the leaked doc- from hard drives. The malware has protected under a recent policy put in uments. The leaked Black Budget of also been designed to covertly record place by President Obama. the program reveals it had a price tag audio from a computer’s microphone However, the evidence in the leaked of $67.6 million last year. and take snapshots with its webcam. documents indicates that the targets Last month, a new Snowden leak The internal documents describe the of NSA’s malware were not significant revealed that British and American NSA’s own practice as “industrial-scale threats to national security, raising governments are spying on people in exploitation” of computer networks. serious questions over the legality of their own homes via web cams, laptop Chief research officer at the secu- mass surveillance tactics. microphones and devices such as rity firm F-Secure, Mikko Hypponen, In one secret post on an internal the X-box, a story that Infowars first described the practice as “disturbing,” message board, an operative from the reported on eight years ago. noting that it could inadvertently NSA’s Signals Intelligence Director- affect the security of the entire inter- ate describes using malware attacks net. against systems administrators who “When they deploy malware on sys- work at foreign phone and Internet tems they potentially create new vul- service providers. By hacking an 22 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM “THE NSA, ACCORDING TO THE LEAKS, HAS BEEN DISTRIBUTING MALWARE “IMPLANTS” WHICH CAN SIPHON OUT DATA FROM COM- PUTERS AROUND THE GLOBE. THE AGENCY REPORTEDLY USED A FAKE FACEBOOK SERVER AS A LAUNCHING PAD TO GRAB INFORMATION FROM HARD DRIVES. THE MALWARE HAS ALSO BEEN DESIGNED TO COVERTLY RECORD AUDIO FROM A COMPUTER’S MICROPHONE AND TAKE SNAPSHOTS WITH ITS WEBCAM.” VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 23 24 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 25 W R I T T E N BY M AC S L AVO ANTI-SURVEILLANCE MASK CAN HIDE YOU FROM BIOMETRIC FACE SCANNERS “An Alternative Identity When In Public” T he U.S. government is attempt to infringe on the personal space. Coupled with technologies that spending billions of dollars anonymity comes in the form of what include email mining, global posi- to ensure that they can has been referred to as Real I.D., tioning systems, predictive behavioral monitor and track every essentially a social security number analysis, drones over America, and single activity in which you for the internet which would be used even eavesdropping via microphones engage, be it online of off. The latest to follow your every move in cyber- on our cell phones, the ultimate goal is 26 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM “IN THE REALM OF BIOMETRICS, WHERE LITERALLY HUNDREDS OF THOUSANDS OF CAMERAS NOW WATCH OUR EVERY MOVE AND PLUG IN DIRECTLY TO DATA MINING FUSION CENTERS WHERE OUR ACTIVITIES ARE ANALYZED, AGGREGATED AND DIS- PATCHED ACCORDING TO OUR PERCEIVED THREAT, SOME MIGHT THINK THE SYSTEM ITSELF HAS BECOME UNBEATABLE.” a surveillance state so expansive that veillance cameras features his visage, who’s working toward his MFA at Adolf Hitler and Josef Stalin would be and if he has his way, plenty of people Chicago’s Columbia College, says on a jealous. will be sporting the Personal Surveil- recently launched Indiegogo page for But just as quickly as government lance Identity Prosthetic in public. It’s the products. “All URME devices have introduces the technologies that are one of three products made by the been tested for facial recognition and supposed to keep us safe from terror- Chicago-based artist’s URME Surveil- each properly identifies the wearer of ists and ourselves, enterprising rebels lance, a venture dedicated to “protect- me on Facebook, which has some of across the country are working to ing the public from surveillance and the most sophisticated facial recogni- counter them. creating a safe space to explore our tion software around.” In the realm of biometrics, where digital identities.” (Cnet) literally hundreds of thousands of “Our world is becoming increasingly The anti-face recognition tech is cameras now watch our every move surveilled. For example, Chicago has currently only available in Leo Selvag- and plug in directly to data mining over 25,000 cameras networked to a gio’s image, so government systems Fusion Centers where our activities are single facial recognition hub,” reads spotting anyone wearing the mask will analyzed, aggregated and dispatched the URME (pronounced U R Me) flag him as the culprit. But the impli- according to our perceived threat, site. “We don’t believe you should cations are so broad that somewhere some might think the system itself has be tracked just because you want to inside the Department of Homeland become unbeatable. walk outside and you shouldn’t have Security surveillance personnel are Short of plastic surgery, how can we to hide either. Instead, use one of our undoubtedly scrambling to thwart it, modify our faces to disappear from products to present an alternative because it presents a serious hiccough prying government eyes when we step identity when in public.” to the surveillance state. out of our front doors? The 3D-printed resin mask, made With the ease of 3-D printing any If Leo Selvaggio has his way, you’ll from a 3D scan of Selvaggio’s face and technophobe with the ability to mimic be able to assume an alternative iden- manufactured by ThatsMyFace.com, someone else’s face via 3D graphing tity by using an age old low-tech strat- renders his features and skin tone software will have the ability to lit- egy made possible by modern-day 3-D with surprising realism, though the erally assume a person’s identity by printers. eyes peeping out from the eye holes simply printing their face and wearing It’s so simple that it’s brilliant, do lend a certain creepiness to the it. especially considering the fact that look. In a the world of biometric surveil- Selvaggio’s innovation is capable of … lance, that means anybody can disap- compromising multi-billion dollar “When you wear these devices the pear from view and essentially become face recognition surveillance systems cameras will track me instead of you a 21st century Silence Dogood. with the use of an easily obtainable and your actions in public space will Real ID? How about Alternative ID personal prosthetic mask. be attributed as mine because it will instead? His rubber mask aimed at foiling sur- be me the cameras see,” the artist, VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 27 28 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 29 “THE FEDERAL COMMUNICATIONS COMMISSION (FCC) HAS APPROVED A PLAN THAT WOULD ALLOW LARGE INTERNET SERVICE PROVID- ERS (ISPS) TO CHARGE SITES LIKE NETFLIX MORE TO RECEIVE PREF- ERENTIAL BANDWIDTH TREATMENT OVER SMALLER COMPANIES AND WEBSITES WITH LESS RESOURCES.” 30 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM W R I T T E N BY KU RT N I M M O FCC MOVES CORPORATIZATION OF INTERNET FORWARD In Addition To The Bandwidth Issue, Commissioners Are Concerned About Large Isps Blocking Websites X X X X X X T he Federal Communica- words large players like NBC and said new rules would prevent content tions Commission (FCC) Disney will effectively monopolize the blocking. has approved a plan that medium as they now do with cable In January an appeals court, how- would allow large ISPs to and broadcast television. ever, ruled the FCC rules represented charge sites like Netflix “[S]maller companies that can’t overreach and gave Verizon and other more to receive preferential bandwidth afford to pay for faster delivery would ISPs new latitude in determining treatment over smaller companies and likely face additional obstacles against prices for providing Netflix, Amazon, websites with less resources. bigger rivals. And consumers could see Google and Ebay. The change, approved in a three-to- a trickle-down effect of higher prices The plan, in addition to raising two vote along partisan political lines, as Web sites try to pass along new prices, will also allow large ISPs to “could unleash a new economy on the costs of doing business with Internet hobble sites deemed politically and Web,” The Washington Post reports. service providers.” socially unacceptable, from pornogra- This new economy will undoubtedly In addition to the bandwidth issue, phy to hacker sites and, importantly, result in less choice for consumers commissioners are concerned about alternative media and political sites. and lead to what may be termed the large ISPs blocking websites. In Feb- “televization” of the internet. In other ruary, FCC chairman Tom Wheeler VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 31 W R I T T E N BY DA N I EL TAY LOR GOOGLE HIRES TOP GENETICIST IN SEARCH FOR LIFE EXTENSION How Will Synthetic DNA Impact Our Health And Environment? G oogle is doing all it can Calico, working with Genentech, will will compete with “Enhanced Singu- these days to prepare for likely utilize genetic engineering and lar Individuals” who have augmented the coming “Singularity”. synthetic DNA in its quest to extend themselves with implantable technol- First, the company human life. The Supreme Court’s ogy and genetic enhancements. hired Transhumanist ruling earlier this year ruled against Whether or not any of these things figurehead Ray Kurzweil to work the patenting of natural human genes. can be accomplished remains to be as its director of engineering. Now, However, there was a vital part of the seen. In the meantime these devel- Google has hired top geneticist Cyn- ruling that allows for the patenting of opments should not pass by without thia Kenyon to work at Calico, Goo- synthetically engineered DNA. open discussion. How will synthetic gle’s “moonshot” operation aimed at The U.K. Ministry of Defense pub- DNA impact our health and environ- extending human life. lished a 2006 report titled The DCDC ment? Synthetic biology is already set At Calico, in partnership with Arthur Global Strategic Trends Programme to enter the food supply this year with Levinson, former chief executive of 2007-2036. The report outlined pos- little to no debate at all. Genentech – the first genetic engi- sible scenarios surrounding life exten- The rapidly developing field of epi- neering company founded in 1976 sion. The report states, “The divide genetics is showing us that human – Google will strive to “significantly between those that could afford to DNA is far more complex than previ- expand the human life span.” ‘buy longevity’ and those that could ously thought. As Discover magazine Cynthia Kenyon, a biochemistry and not, could aggravate perceived global reports, “Your ancestors’ lousy child- biophysics professor, will help Calico inequality. Dictatorial or despotic hoods or excellent adventures might search for radical life extension tech- rulers could potentially also ‘buy lon- change your personality, bequeathing nologies. She will be working under gevity’, prolonging their regimes and anxiety or resilience by altering the Dr. Hal Barron, a former product international security risks.” epigenetic expressions of genes in the development leader at Roche Pharma- The growing Transhumanist move- brain.” Will genetic code written in a ceuticals that Calico hired in Novem- ment, with Google’s help, is attempt- computer contain the same “memo- ber of 2013. ing to shift cultural dialogues around ries” of our ancestors that helped us Google chairman Eric Schmidt, who aging and natural humanity. Google is to adapt and survive in the world? expects to be swallowing nanobots in paving the way in wearable technology the not too distant future, envisions that will eventually end up implanted life in this technological age as a in the human body. Trends researchers Daniel Taylor’s post first appeared on streamlined and convenient existence. are already wondering how “naturals” Old-thinker News. 32 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 33 34 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 35 W R I T T E N BY ST EV E WATS O N GREENWALD: NSA INTERCEPTS COMPUTER HARDWARE AND FITS IT WITH SURVEILLANCE EQUIPMENT Us Government Tampers With Routers Before “Factory Sealing” And Sending Them On G lenn Greenwald, the cifically, a June 2010 report from the some, “a system has been built with- journalist who broke head of the NSA’s Access and Target out our knowledge that has incredible the Edward Snowden Development department states that dangers embedded within and very revelations, has come US made hardware is “received” by few controls.” good on his promise that the NSA before it is shipped overseas. Greenwald notes that the NSA essen- fresh information on the NSA’s mass Greenwald writes: tially believes it has the right to moni- spying would be forthcoming. Today “The agency then implants backdoor tor all communications on the planet. he reveals that the US government surveillance tools, repackages the He cites an NSA plan to tap into con- agency routinely intercepts computer devices with a factory seal, and sends versations originating from airplanes, hardware such as routers, switches them on. The NSA thus gains access for no particular reason. and servers, and fits it with cutting to entire networks and all their users. “It’s just simply the fact that they do edge surveillance equipment, before The document gleefully observes that not think anybody should be able to sending it back on its way. some ‘SIGINT tradecraft … is very communicate anywhere on the Earth In an article for The Guardian, Gre- hands-on (literally!)’”. without they being able to invade it,” enwald notes that the NSA tampers “In one recent case, after several Greenwald said. with the hardware, then repackages it months a beacon implanted through Greenwald added that he believes with “factory sealing” before sending supply-chain interdiction called back the issue today is more pressing than it off to unsuspecting companies who to the NSA covert infrastructure. This previous NSA revelations in 2005 have no idea it has been intercepted. call back provided us access to further because it concerns domination of the Greenwald notes that the practice exploit the device and survey the net- internet and global communications constitutes “an extreme form of gross work.” the NSA document reads. in general. hypocrisy,” given that it has been “Chinese routers and servers repre- With former NSA head Michael warning companies around the world sent not only economic competition Hayden also making statements such not to buy Chinese hardware because but also surveillance competition.” as “We kill people based on metadata”, it may be set up with surveillance Greenwald writes. this sentiment will only be accepted technology. In a follow up interview with NPR, more readily, both by critics of the spy The revelation again comes from doc- Greenwald stated that while inter- agency and everyday Americans alike. uments leaked to Greenwald by former cepting equipment known to be on its NSA employee Edward Snowden. Spe- way to terrorists may be acceptable to 36 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM Greenwald notes that the NSA essentially believes it has the right to monitor all communi- cations on the planet. He cites an NSA plan to tap into conversations originating from airplanes, for no particular reason. “It’s just simply the fact that they do not think any- body should be able to communicate anywhere on the Earth without them being able to invade it,” Greenwald said. VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 37 38 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 39 “IT NOW APPEARS THE INTERNET WILL ULTIMATELY BE BURDENED WITH TAXATION, AN IMPOSITION THAT WILL UNDOUBTEDLY RESULT, AS DOES ALL TAXATION, IN SQUELCHING INNOVATION, DISCOURAGING PROSPERITY AND NARROWING CONSUMER CHOICE”. 40 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM W R I T T E N BY KU RT N I M M O KILLING THE INTERNET: A BLIZZARD OF NEW TAXES IN THE WINGS Lobbyists Show Their Power Over Politicians Once Again F or years revenue-hungry v. North Dakota back in 1992 it is too states and local municipali- great a burden to force a mail order ties have salivated over the merchant to collect taxes in states prospect of taxing the life where it has no physical presence. out of the internet. Now Retailers interested in undercutting a move by a small but dedicated smaller and more agile competitors minority in Congress may result in the and their allies in state government scraping of the Internet Tax Freedom want to skirt the decision and write Act and usher in a new era of exor- new rules for interstate commerce. bitant taxation, according to The Wall A brave new world of taxation threat- Street Journal. ened destruction of small online busi- In a few months, the newspaper ness when the Marketplace Fairness reports, “customers may begin receiv- Act was proposed. It will force online ing notices from their Internet pro- retailers to collect taxes for state and viders that new taxes are on the way. local government across the board. Even though nearly everyone in Con- Considering the huge number of state, gress opposes slapping all of America’s local and tribal governments in the heavy traditional telephone taxes on United States, the burden imposed Internet access, a renewal of this suc- for the collection of taxes would be, cessful policy is being held hostage by to say the least, significant. As of April lobbyists for giant retailers.” 24, the bill was pending in the House So persuasive is this minority, it has Judiciary Committee. managed to convince both Democrats It now appears the internet will and Republicans that an extension of ultimately be burdened with taxation, the Internet Tax Freedom Act – that an imposition that will undoubt- has forbidden bit taxes, bandwidth edly result, as does all taxation, in taxes, and email taxes since 1998 squelching innovation, discouraging – should be loosened up to allow prosperity and narrowing consumer 9,600 governments to shape rules for choice. As the economy continues its ecommerce. Specifically, states want slow motion collapse, federal, state additional authority to reach beyond and local governments will desper- their respective borders to collect sales ately seek new venues for taxation taxes on items purchased online or and wealth confiscation. The internet, they will pressure Congress to punish so far unmolested, and thus allowed all Americans with new prohibitive the freedom to innovate and grow, taxes on all internet communication. appears to be the next juicy target for The Supreme Court decided in Quill the statists. VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 41 42 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 43 W R I T T E N BY KU RT N I M M O OBAMA ADMINISTRATION TURNS THE INTERNET OVER TO THE GLOBALISTS Plans to impose a censorship and mass surveillance framework may now commence O n Friday the U.S. Com- “global internet community” next management of the internet over the merce Department year. ICANN, under a Commerce last few years. released its grasp on Department contract, has issued “We will not accept a proposal that the internet. Oversight domain names since 2000. replaces the NTIA role with a gov- of ICANN, the Internet The United States has played a lead- ernment-led or an intergovernmental Corporation for Assigned Names and ing role in managing internet technol- solution,” said National Telecommuni- Numbers, will be passed on to the ogy but has faced pressure to globalize cations & Information Administration 44 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM “THE UN AND EU HAVE SKETCHED OUT HOW THE FUTURE INTERNET WILL WORK. NOW THAT ICANN HAS RELINQUISHED CONTROL OF THE MEDIUM, GLOBALIST INSTITUTIONS CAN MOVE FORWARD WITH PLANS TO SCRUB THE INTERNET OF ALL CONTENT UNACCEPTABLE TO THE GLOBAL ELITE AND THEIR APPARATCHIKS AT THE UNITED NATIONS AND, ALSO, TURN IT INTO A REVE- NUE GENERATING CASH COW.” boss Larry Strickling. The NITTA is an resolution of issues pertaining to “use and other social networks in search of agency within the Commerce Depart- of Internet resources for purposes that “extremist material” and propaganda. ment. are inconsistent with international In addition to allowing users to flag During the World Summit on Infor- peace, stability and security.” “terrorist” content and turn other mation Society more than a decade The proposed changes were backed users in to the police, the proposals ago, it was proposed that governments by China, Russia, Brazil, India and called for eliminating anonymity on not have too much control over the other UN members. the internet. internet. “The international manage- “Internet freedom’s foes around the In addition to censorship, the ICANN ment of the Internet should be mul- globe are working hard to exploit a transfer will allow for a globalist tilateral, transparent and democratic, treaty negotiation that dwarfs the taxation scheme. “While the Obama with the full involvement of govern- importance of the [U.N.’s 2012 World administration says it is merely remov- ments, the private sector, civil society Conference on International Telecom- ing federal oversight of a non-profit, and international organizations.” munications] by orders of magni- we should assume ICANN would end In the intervening years the United tude,” warned outgoing U.S. Federal up as part of the United Nations,” Nations and the European Union Communications Commissioner former Bush administration State have jostled for control the internet. Robert McDowell in testimony before Department senior advisor Christian During a meeting in Dubai last year Congress in a joint U.S. House sub- Whiton told The Daily Caller. “If the the International Telecommunication committee hearing on international U.N. gains control what amounts to Union (ITU), the telecom branch of Internet governance last February. the directory and traffic signals of the the United Nations, demanded rules The European Union has proposed Internet, it can impose whatever taxes governing the internet be rewritten. censoring the internet to protect chil- it likes. It likely would start with a tax Specifically, the international organi- dren and fight terrorism. The Clean IT on registering domains and expand zation proposed deep-packet inspec- project proposed the creation of a cen- from there.” tion authority that would allow it to sorship and mass surveillance frame- The UN and EU have sketched out monitor and censor content on the work for EU countries funded by the how the future internet will work. Now internet. The United States walked European Commission. “The Clean IT that ICANN has relinquished control of out of the conference in protest. project aimed to start a constructive the medium, globalist institutions can Hamadoun Toure, Secretary-General dialogue between governments, busi- move forward with plans to scrub the of the ITU, released the fourth and nesses and civil society to explore how internet of all content unacceptable to final ITU/WTPF-13 report in May, to reduce the terrorist use of the inter- the global elite and their apparatchiks 2013, outlining groundwork for inter- net. This dialogue resulted in a set of at the United Nations and, as well, net governance and regulatory topics. general principles and an overview of turn it into a revenue generating cash The report calls for the creation of possible best practices,” the Clean IT cow. “Global Principles for the governance Project web page explains. The plan and use of the Internet” and proposes called for police to patrol Facebook VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 45 46 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM W R I TT E N BY I N FOWA RS STA F F THE REVOLVING DOOR OF DEATH The Brazen Plot To Silence You I n true beltway insider fashion, resigning their posts by offering them masters have hatched a plan to strat- the top posts at the Federal obscenely lucrative, often symbolic ify the internet into virtual ‘lanes.’ The Communications Commission positions in the private sector. This idea is that information (data) that are stocked to the brim with has the effect of opening a high level has payed the toll will be allowed pri- corporate stooges, lobbyists and vacancy at the federal agency that ority and zip through the congestion the globalists yes-men. These public can then be filled with appointments with a virtual ‘police escort.’ Data that offices, who’s purpose it is to protect made by politicians that have sold doesn’t pay for special access is stuck the consumer and regulate data trans- their souls to the industry in question. in the data traffic jam, or intentionally mission have been completely infil- The ongoing battle for control of the throttled by the providers. trated by the communication indus- internet is locked in a long, hard, siege The turncoats at the FCC are doing tries’ moles, warping public policy and against the cabal of the communica- their best to secretly slide these regulations to bend to the will of the tion cartels hell bent on seizing control changes into law and rip freedom of corporate overlords. of the free flow of information. Their speech out of the hands of citizens Now, it is clear that the FCC is in goal is to destroy the foundational worldwide. It will stifle innovation, the grip of an obvious case of what is principles of the free, open internet gouge users for money, and effectively known as “regulatory capture.” The and impose their “tiered” system kill any dissent to the powers that be. classic technique is that corporations, whereby they can crush dissent and Let’s take a look at who these nefari- and special interest groups lure high manufacture opinion. ous players are… ranking government officials into The embedded lobbyists and their Tom Wheeler, Chairman - Is a true lobbyist-insider with close connections to major Internet Service Providers. Last March, a group of the most important companies threw a party in honor of Wheeler and other FCC commissioners who come scurrying when they call. Daniel Alvarez, Legal Advisor - Is an attorney who represented Comcast, and is vocally outspoken in his support to kill Net Neutrality. He has authored several opinions and lobbied ceaselessly for the death of the internet as we know it. Philip Verveer, Senior Counselor – Was an ambassador who was employed by Comcast a scant few months ago. He has also brazenly represented two powerful industry coalitions intent on destroying freedom on the internet. Brendan Carr, Legal Advisor - Was none other than the associate general counsel at Verizon and put in his time as an attorney for the U.S. Telecom Association, which has been in virulent opposition of net neutrality for over nine years. Matthew DelNero, Deputy Chief - Joined the FCC to work exclusively on the subject of destroying Net Neutrality. His former employer, TDS Telecom, lobbied furiously against Net Neutrality during his extended tenure there. VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 47 W R I T T E N BY PAU L J O S EP H WATS O N POLICE NOW “ARMED FOR WAR” AGAINST RETURNING VETERANS Cops In Armored Vehicle Asked By Residents “Are You Coming To Take Our Guns Away?” I n an interview with Fox 59, a to know why we needed this…what terized returning veterans from Iraq Morgan County, Indiana Police were we going to use it for? ‘Are you and Afghanistan as a major domestic Sergeant admits that the increas- coming to take our guns away?’” said terrorist threat. ing militarization of domestic Downing. “To come and take away It seems to have been completely police departments is partly to their firearms…that absolutely is not forgotten by police departments, the deal with returning veterans who the reason why we go this vehicle. We media and Americans in general that are now seen as a homegrown terror got this vehicle because of the need having military-style tanks patrol the threat. and because of increased violence that streets is symbolic of a collapsing In a chilling story entitled Armed we have been facing over the last few banana republic or an authoritarian for War: Pentagon surplus gives local years….I’ll be the last person to come Communist state. police an edge, we learn how a Mine and take anybody’s guns.” Perhaps the main reason why police Resistant Vehicle (MRAP) which was Indiana seems to be a major trial officers are being trained that veterans once used during the occupation of balloon for the militarization of law are a major threat is because return- Afghanistan will now be “patrolling enforcement given that the Indiana ing vets are in a perfect position to the streets of central Indiana,” accord- National Guard has also just purchased recognize that America is beginning ing to the report. two military UH-72 Lakota helicopters to resemble an occupied country like Sgt. Dan Downing of the Morgan which will also be used by local police Afghanistan. County Sheriff’s Department states, and the DHS for “homeland secu- Such warnings have come from “When I first started we really didn’t rity missions”. Downing’s claim that people like former Marine Corps have the violence that we see today,” armored tanks are necessary to deal Colonel Peter Martino, who was sta- adding, “The weaponry is totally dif- with violent crime doesn’t jive with tioned in Fallujah and trained Iraqi ferent now that it was in the begin- actual statistics which suggest that soldiers. Martino went before a New ning of my career, plus, you have a violent crime is in fact on the decrease. Hampshire city council meeting last lot of people who are coming out of Downing’s admission that the year to assert that the Department of the military that have the ability and armored vehicles are partly about Homeland Security is working with knowledge to build IEDs and to defeat combating the threat posed by return- law enforcement to build a “domestic law enforcement techniques.” ing veterans correlates with similar army,” because the federal govern- Downing goes on to relate how cit- rhetoric at the federal level. ment is afraid of its own citizens. izens approach the vehicle when it An April 2009 DHS intelligence Indeed, the city’s Police Chief justi- stops at gas stations to express their assessment listed returning vets as fied the necessity for the acquisition of concerns that the militarization of likely domestic terrorists. Just a month an armored ‘Bearcat’ vehicle by citing police is about arming cops with the later, the New York Times reported on the “threat” posed by libertarians, sov- tools required for mass gun confisca- how Boy Scout Explorers were being ereign citizen adherents, and Occupy tion programs. trained by the DHS to kill “disgruntled activists in the region. “We were actually approached when Iraq war veterans” in terrorist drills. we’d stop to get fuel by people wanting The FBI has also repeatedly charac- 48 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 49 “LAST YEAR, AWARD-WINNING MILITARY WRITER AND FORMER INTELLIGENCE OFFICER LT. COL. DOUGLAS PRYER PENNED AN ESSAY WARNING OF THE THREAT POSED BY REMORSELESS “KILLER ROBOTS” THAT WILL BE USED TO STALK AND SLAUGHTER HUMAN TARGETS IN THE NEAR FUTURE.” 50 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM W R I T T E N BY PAU L J O S EP H WATS O N SCIENTISTS: ROBOTS COULD BE PROGRAMMED TO KILL YOU ‘FOR THE GREATER GOOD’ Autonomous Vehicles Present ‘Morally Dangerous Path’ A s the United Nations professor and director of the Ethics essay warning of the threat posed by debates legislation that + Emerging Sciences Group at Cali- remorseless “killer robots” that will could outlaw ‘killer fornia Polytechnic State University, in be used to stalk and slaughter human robots’, scientists predict which Lin delves into the “legally and targets in the near future. that artificially intelli- morally dangerous paths” presented Pryer’s comments echo those of Noel gent systems could one day decide to by the emergence of robotic vehicles. Sharkey, professor of artificial intelli- kill humans “for the greater good.” Aside from Google cars and other gence and robotics at the University of In an article for Popular Science, autonomous forms of transportation, Sheffield, who has repeatedly warned Erik Sofge outlines a scenario whereby the question of giving robot soldiers that the robots currently being devel- robot cars would decide to sacrifice a license to kill has raged for years oped under the auspices of DARPA their human owner in order to prevent and is currently the subject of a highly will eventually be used to kill. a collision that could kill more people. anticipated debate in New York being In a 50-page report published in A front tire blows, and your auton- overseen by the U.N.’s Convention on 2012, Human Rights Watch also omous SUV swerves. But rather than Certain Conventional Weapons. warned that artificially intelligent veering left, into the opposing lane The UN body’s role in banning robots let loose on the battlefield of traffic, the robotic vehicle steers blinding laser weapons for battlefield would inevitably commit war crimes. right. Brakes engage, the system tries use in the 1990′s has led to specula- Michael Cahill, a law professor and to correct itself, but there’s too much tion that legislation banning the use of vice dean at Brooklyn Law School, momentum. Like a cornball stunt in drone soldiers could be in the works. welcomed the idea of autonomous a bad action movie, you are over the “All too often international law only robots with the power to make life or cliff, in free fall. responds to atrocities and suffering death decisions on behalf of humans, Your robot, the one you paid good once it has happened,” said Michael but acknowledged that such a society money for, has chosen to kill you. Moeller, acting head of the U.N.’s could resemble a science fiction night- Better that, its collision-response algo- European headquarters in Geneva. mare. rithms decided, than a high-speed, “You have the opportunity to take “The beauty of robots is that they head-on collision with a smaller, preemptive action and ensure that the don’t have relationships to anybody,” non-robotic compact. There were two ultimate decision to end life remains stated Cahill, adding, “They can make people in that car, to your one. The firmly under human control.” decisions that are better for everyone. math couldn’t be simpler. Last year, award-winning military But if you lived in that world, where Sofge cites an opinion piece by writer and former intelligence officer robots made all the decisions, you Patrick Lin, an associate philosophy Lt. Col. Douglas Pryer penned an might think it’s a dystopia.” VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 51 W R I T T E N BY K I T DA N I EL S PUBLIC REJECTS GOVERNMENT TAKEOVER OF INTERNET Attacks Against Online Free Speech And Privacy Opposed By People Who Think For Themselves C ountries around the world, - Giving ISPs who play ball with and other tech firms are eyeing finger- including the United officials preferable treatment when prints to replace passwords for online States, are proposing new awarding government contracts shopping, e-mail and even social guidelines for the Internet The list goes on and on. media. which will curb free speech “In essence, Clean IT wants to This could easily erode online ano- and reduce online privacy, prompting punish you for using the Internet as nymity if web sites begin demanding many concerns from the public. it was intended,” Zach Walton with users’ biometrics in order to login to The European Commission, for WebProNews wrote on the subject. post comments or otherwise con- example, has proposed the Clean IT “It would require you to use your real tribute to the site, and no doubt it project that would allow European name in all online communications.” will be sold to the public as offering officials to “patrol” the Internet, partic- “It would punish you for linking more security than current methods of ularly social media sites, in search for to ‘terrorist content’ (whatever that authentication. so-called “extreme” speech under the means) and it makes no distinction But biometrics aren’t as secure as guise of “protecting the children” and between linking for educational or they seem. “fighting terrorism.” malicious purposes.” “The creation of a biometric payment Knowing how government likes to But unfortunately, such Orwellian system would mean surrendering regulate above and beyond its stated proposals are not unique to Europe. fingerprint data to companies with a purpose, “extreme” speech would In the United States, the Obama history of security breaches,” Corinne likely include any online speech that administration is spearheading a Chi- Iozzio wrote in the Feb. 2014 issue of questions government policy. nese-style ID system for Internet users Popular Science. “If prints were irre- The Clean IT project would also in a program called the “National producible, that might not be such a coerce Internet Service Providers into Strategy for Trusted Identities in concern, but it’s not particularly hard implementing “real name” rules to Cyberspace.” to hack a fingerprint.” prevent completely anonymous use The program would replace the cur- “A laser printout of a digital finger- of the Internet, according to a leaked rent system of usernames and pass- print has just enough relief for a coun- document on the project not meant to words with biometrics, fingerprints terfeiter to cast a glue-based copy.” be seen by the public. for example, used for web access to The document also lists other stated government services such as license She also pointed out that a German goals of Clean IT, such as: applications. hacker group successfully used a simi- - Allowing police to remove online While the program is initially slated lar technique to trick Touch ID, Apple’s content “without following the more for government web sites, there’s no fingerprint recognition technology. labour-intensive and formal proce- reason why it or a similar program Unlike passwords or compromised dures for ‘notice and action’,” won’t be used for private sites in the credit cards, you can’t change or - Appealing any existing laws that future as well, considering that the cancel your fingerprints; they are prevent companies from monitoring private sector is already taking steps yours for life. their employees’ Internet use, to replace passwords with biometrics. “A fingerprint’s greatest strength — - Strict penalties for “knowingly” pro- Both Samsung and Apple have its uniqueness — is also its greatest viding links to undefined “extremist” already added fingerprint authentica- weakness,” Iozzio added. “And once content, and tion technology to their smartphones it’s compromised, you’ll never get it 52 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 53 DID YOU KNOW? back.” is a basic liberty which all people it happen.” But how does the public feel about have,” he said. “We have to be able A business graduate pointed out both the use of biometrics on the Inter- to express anything while of course that even with the government’s past net as well as government’s increasing respecting everybody.” encroachments on Internet freedoms, surveillance online? So he doesn’t believe that it’s wise people are already saying less online Recently, the University of Texas at for government to restrict free speech. than before. Austin held its spring graduation out- “We have to be aware of govern- “The government is already play- side on campus, attracting thousands ment,” Xavier added. “Government ing a role,” she said. “I think family from around the world, so we took the has to have power but it cannot have members play the immediate role, [as opportunity to ask a wide variety of more power than the people.” in] What is my family going to think attendants for their take on the sub- Similarly, one of the parents at the of me? What are my friends going to ject. graduation, Bob, said that free speech think of me?” and then “What is the Xavier, who hails from Bolivia, said on the Internet should “never, ever be government even looking at [about] that allowing police to monitor social restricted.” me?” media for so-called “extremist” talk “I don’t know if I have any fears, but “I think every day you have to be would be a very big mistake. I have concerns,” he said when asked careful of what you say because it’s “They shouldn’t do that because for his opinion on Internet ID. “I don’t the society that we live in right now unlimited expression, free expression, agree with it; never, ever, ever should [where] anything you say could be 54 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM NET NEUTRALITY IS THE PRINCIPAL OF HAVING AN OPEN INTERNET. THE THOUGHT THAT INTERNET SERVICE PROVIDERS AND GOVERNMENTS SHOULD ALLOW NO BIT OF INFORMATION TO BE PRIORITIZED OVER ANOTHER. THIS PRINCIPLE IMPLIES THAT AN INFORMATION NETWORK SUCH AS THE INTERNET IS MOST EFFICIENT AND USEFUL TO THE PUBLIC WHEN IT IS LESS FOCUSED ON A PARTICULAR AUDIENCE AND INSTEAD ATTENTIVE TO MULTIPLE USERS. THE TERM WAS COINED BY COLUMBIA MEDIA LAW PROFESSOR TIM WU IN 2003. criticized, like the LA Clippers owner, tication, Harlan believes that most are propagated through mainstream a perfect example of a private conver- Americans would find it “really media outlets; rather they came up sation turning into a global outrage.” creepy.” with their own conclusions about The graduate also disagreed with the “I know I do,” he stated. “I can’t these new developments. latest push for biometric-based Inter- speak for everyone else but I think it A lot of that can be contributed to net ID, stating that it gives too much would be a horrible, horrible use of both Edward Snowden’s revelations control to the government. technology.” on government surveillance and the Harlan, who owns a business near “I think people would probably turn rise of the alternative media which campus, called the Clean IT program away from those sorts of technologies doesn’t shy away from covering real “devastating to people who want to and join ones that didn’t incorporate issues such as the government’s push share information.” those sorts of things, but I could be for biometrics. “Who deems what information is wrong.” This is exactly why governments clean and what information is dirty?” It is definitely refreshing to see such across the world are moving against He asked. “It seems like that kind of strong opposition to the erosion of the Internet: they simply want to regulation is just fraught with all types both free speech and privacy. replace the flow of truth that reaches of peril that will only endanger free For one thing, the individuals we millions every day with their own false speech in the future.” interviewed didn’t just parrot big narratives which cement their control On the subject of biometric authen- government talking points which over the population. VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 55 W R I T T E N BY KU RT N I M M O A NEW ECONOMY OF CORPORATE DOMINATION ON THE WEB FCC Approves Plan To Allow Large ISPs To Charge Websites More To Receive Preferential Bandwidth Treatment A Democrat dominated likely face additional obstacles against and asks for further comments on the Federal Communications bigger rivals. And consumers could approach.” Commission (FCC) has see a trickle-down effect of higher The remarks by the FCC boss arrived approved a plan that prices as Web sites try to pass along following a federal appeals court will allow large Internet new costs of doing business with ruling in February. According to U.S. service providers (ISPs) to charge Internet service providers,” the Post District Court of Appeals for the Dis- bandwidth hungry sites like Netflix reported following the FCC party-line trict of Columbia, the agency over- and Youtube more to receive preferen- vote ahead of final changes to be stepped its authority on net neutrality tial bandwidth treatment. The tiered implemented later this year. rules when it moved to prevent large arrangement in favor of large corpo- In addition to the bandwidth issue, internet service providers like Time rate sites will ultimately force smaller commissioners are concerned large Warner Cable and Verizon from block- sites with less capital and resources ISPs will block content in competition ing traffic by Netflix, Amazon, Google, into a ghetto with internet speed with them or deemed inappropriate. In Ebay and other bandwidth-intensive bumps comparable to the old days of February, FCC chairman Tom Wheeler, services. The court ruling opened the dial-up access. a former telecom lobbyist appointed door for the latest foray by large ISPs This fundamental change will signifi- by Obama, said he will make sure new to carve out high speed internet toll cantly modify the web in favor of large rules prevent content blocking. roads and charge accordingly. telecom and entertainment corpora- “There has been a great deal of mis- “I intend to accept that invitation tions. It was approved in May follow- information that has recently surfaced by proposing rules that will meet the ing a three-to-two vote along partisan regarding the draft Open Internet court’s test for preventing improper political lines. If adopted the plan will Notice of Proposed Rulemaking that blocking of and discrimination among “unleash a new economy on the Web,” we will today circulate to the Com- Internet traffic, ensuring genuine according to The Washington Post. It mission,” Wheeler posted on the FCC transparency in how Internet Ser- will undoubtedly result in less choice blog in April. “The Notice proposes the vice Providers manage traffic, and for consumers. Large players like NBC reinstatement of the Open Internet enhancing competition,” Wheeler and Disney with lavish budgets will concepts adopted by the Commission said in a statement after the court effectively monopolize the medium as in 2010 and subsequently remanded ruling. “Preserving the Internet as they now do with cable and broadcast by the D.C. Circuit. The Notice does an open platform for innovation and television. Consumers will pay more not change the underlying goals of expression while providing certainty to receive sanitized and highly com- transparency, no blocking of lawful and predictability in the marketplace mercialized corporate content. They content, and no unreasonable dis- is an important responsibility of this will face frustrating load times when crimination among users established agency.” they decide to visit smaller websites by the 2010 Rule. The Notice does The new decision by the FCC does containing multimedia content. follow the roadmap established by the not violate the federal agency’s pre- “[S]maller companies that can’t Court as to how to enforce rules of the vious commitment to discourage afford to pay for faster delivery would road that protect an Open Internet “behavior harmful to consumers or 56 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM “CONSUMERS WILL PAY MORE TO RECEIVE SANITIZED AND HIGHLY COMMERCIALIZED CORPORATE CONTENT. THEY WILL FACE FRUSTRATING LOAD TIMES WHEN THEY DECIDE TO VISIT SMALLER WEBSITES CONTAINING MULTIMEDIA CONTENT.” competition by limiting the openness ident of the advocacy group Public “Profits and corporate disfavor of of the Internet.” It will, however, put Knowledge, told John Nichols of The controversial viewpoints or competing a premium price on what consumers Cap Times he is “concerned that the services could change both what you presently expect when they pay $50 or FCC is considering some kind of paid can see on the Internet and the qual- $60 per month for high speed inter- prioritization.” ity of your connection,” the American net. Moreover, consumers may experi- According to Nichols “paid prioriti- Civil Liberties Union warns. “And the ence many sites previously accessible zation” would “recreate the Internet as need to monitor what you do online on the internet’s level playing field as a place where there would be super- in order to play favorites means even unbearably slow or, as prices rise on highway service for big-ticket custom- more consumer privacy invasions premium bandwidth, go away alto- ers and dirt roads for small businesses, piled on top of the NSA’s prying eyes.” gether. creative artists and citizen groups. In a It is important that you express your It remains to be seen if the FCC will political context, it has the potential opinion about the FCC’s effort to implement the new rules. “There is to narrow access to ideas and reduce establish a two tiered system that will one Internet,” Wheeler mused prior the range of debate.” either seriously hobble or eliminate to the vote. “Not a fast Internet, not For the political establishment this is outright many websites, especially a slow Internet. One Internet... Noth- good news. For nearly two decades the small political websites operating on ing in this proposal authorizes paid Internet has provided an open forum shoestring budgets. prioritization. The potential for there for diverse political groups challeng- to be some kind of fast lane has many ing the establishment and the status You can add a comment via the people concerned... I will work to see quo dominated by corporate interests. FCC’s Electronic Comment Filing that does not happen.” A growing and vibrant alternative System. The URL for the comment Some, however, believe Wheeler is media has flourished on the Internet system is: fuzzing the margins as the four month and this will undoubtedly change if window for comment and deliber- the FCC allows large corporations like http://apps.fcc.gov/ecfs/upload/ ation on the FCC proposals counts Comcast and Time Warner Cable to display?z=6inmu down. Michael Weinberg, vice pres- dominate the fast lane. VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 57 “TRANSHUMANISTS ENVISION A DAY WHEN TECHNOLOGY WILL ALLOW HUMANITY TO BECOME SO ADVANCED THAT SICKNESS, DISEASE, POVERTY AND WAR WILL ESSENTIALLY BE ERADICATED. THEY BELIEVE THAT MERGING WITH MACHINES WILL PERMIT US TO BECOME TRILLIONS OF TIMES MORE INTELLIGENT THAN WE ARE TODAY, AND THEY ALSO BELIEVE THAT RADICAL LIFE EXTENSION TECHNOLOGIES WILL MAKE IT POSSIBLE FOR HUMANITY TO ACTUALLY ACHIEVE IMMORTALITY.” 58 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM W R I T T E N BY M I C H A EL S N Y D E R TRANSHUMANISTS: SUPERHUMAN POWERS & LIFE EXTENSION TECH WILL ALLOW US TO BECOME LIKE GOD Merging Man With Machine Is What Elite Have Planned I f you could merge your current The key moment that most trans- the human mind on a computer. If mind and body with technology humanists are looking forward to is your entire consciousness could be that would give you superhuman known as “the Singularity”. That is “uploaded” into a computer, it could powers and would allow you to the moment when artificial intelli- conceivably later be downloaded into live forever, would you do it? This gence will actually surpass human a futuristic avatar of some sort once is essentially what the transhumanism intelligence and a massive technolog- that technology has been developed. movement is seeking to accomplish. ical chain reaction will be triggered. But that is not the only life extension Transhumanists envision a day when At that time, most transhumanists technology that transhumanists are technology will allow humanity to believe that biological intelligence working on. Some other examples become so advanced that sickness, will merge with non-biological intel- include embedding nanobots in our disease, poverty and war will essen- ligence and humanity will become bodies and brains and eliminating dis- tially be eradicated. They believe that vastly more intelligent than it is today. eases through the process of “genetic merging with machines will permit During this transition, society will be reprogramming”… us to become trillions of times more fundamentally transformed… Other futurists and transhumanists intelligent than we are today, and they After the Singularity occurs, it is are working toward improving lon- also believe that radical life extension predicted that vast changes will sweep gevity through more biological means, technologies will make it possible through society; changes so drastic such as growing new organs from for humanity to actually achieve that they are nearly inconceivable stems cells, replacing worn out parts immortality. Many transhumanists are at the present time. Experts in the of the body with high-tech updated convinced that such a world can be movement say that after the Singu- models, and curing diseases through achieved within their lifetimes. They larity, indefinite human life extension genetic reprogramming. A third point to Moore’s Law and to the fact will rapidly become the norm. Many method of achieving a transhuman that technology already appears to be scientists working in this field are par- state of being may come through merg- growing at an exponential rate. As the ticularly interested in the concept of ing the biological and non biological technology curve continues to steepen, achieving immortality. in equal measure, such as embedding transhumanists believe that our world To most people, the idea of achieving nano robots into the bloodstream and will rapidly become transformed into immortality in our decaying physical brain; and replacing atoms with nano a place that would be unrecognizable bodies would sound absolutely ridic- computers to solve the degeneration to us today. Just a few decades from ulous. that comes with aging. now, transhumanists believe that But transhumanists are very serious According to transhumanists, not superhuman powers and extremely about this. only will we be able to live much advanced life extension technologies One way they are seeking to longer, but our quality of life will also will allow them to essentially become accomplish this is by searching for a be so much better in the future. The like gods. method that will enable them to store following is how one transhumanist VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 59 envisions what life will be like in the useful in the workforce? But transhumanists are not really 2050s… In a recent article by Andrew Smart, concerned with such matters. They Robots have become an important he suggests that these “enhance- insist that we will become so intelli- family acquisition. Ability to repli- ments” could just turn us into “better gent that we will easily figure out the cate self-assembling robot parts in slaves”… solutions to such social issues. nanofactories, make these machines Could it be that we’ve been tricked Yes, most transhumanists concede easily available and affordable. By into pouring our innovative energy that there will be bumps on the road 2050, technologies advancing at into making ourselves better slaves? If to utopia, but they argue that it would “Moore’s Law” speeds have produced the digital elite achieves its dream of be foolish not to “take control of our an android-like creature nearly indis- a perfect union with machines, what own evolution”. They believe that cernible from a human. becomes of the rest of us who either we can use science and technology Programmed with Internet-down- can’t afford cyborgification or who to guide the evolution of society and loaded software, 2050s household actually enjoy life as a regular human that this will create a far better world robots cater to our every whim. They being? Would one Singularitized than we have today. The following is also manage the nanorobots that whiz human be expected to handle the what one participant stated at a recent through our veins keeping us healthy workload of 100 unenhanced work- conference about transhumanism and 24/7, and monitor our safety when ers? Robots will have of course taken religion… we connect to simulation events that the rest of the jobs. Transhumanism is a thrust toward whisk us away in a Star Trek Holo- In fact, robots are already taking our transcendence. It is not classical mys- deck-like adventure. jobs at a staggering pace. This is even ticism but seeks a temporal transcen- That sounds wonderful doesn’t it? happening in low wage countries such dence The driving force behind this is But how will we earn the money to as China… evolution… pay for all of those things? Chinese company Hon Hai, the What is reality? Reality is evolution. If robots are so advanced at that world’s largest contract electronics It has a direction from the simple to point, why would companies even manufacturer, has announced it the complex; the most complex [out- need human workers? intends to build a robot-making fac- come] is intelligence. Thus evolution Or will we have to “enhance” our- tory and replace 500,000 workers is aimed at intelligence. selves with technology just to be with robots over the next three years. We should thus have a will to evolve. 60 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM We have a moral responsibility to are systematically moving us in the We know all this. Because we know increase evolution and do so by con- direction of becoming more like God… it, we seek something more—a tran- tinually striving to expand our abilities “Evolution moves toward greater scendence of transience, translation throughout life by acting in harmony complexity, greater elegance, greater to incorruptible form. An escape if with the evolutionary process… knowledge, greater intelligence, you will, a stop to the wheel. We seek, Science and technology move us greater beauty, greater creativity, and therefore, to bless ourselves with per- toward Utopia. One of the most excit- greater levels of subtle attributes such fect knowledge and perfect will; To ing things about transhumanism is as love. In every monotheistic tradi- become as gods, take the universe in that all will be fixed. tion God is likewise described as all hand, and transform it in our image— That all sounds so alluring. of these qualities, only without any for our own delight. As it is on Earth, After all, who wouldn’t want to live limitation: infinite knowledge, infinite so it shall be in the heavens. The inev- in a “utopia” where everything that is intelligence, infinite beauty, infinite itable result of incredible improbabil- currently wrong with our planet has creativity, infinite love, and so on. Of ity, the arrow of evolution is lipping us been “fixed”? course, even the accelerating growth into the transhuman – an apotheosis But transhumanists don’t just stop of evolution never achieves an infinite to reason, salvation – attained by good there. They believe that eventually level, but as it explodes exponentially works.” we will possess such superhuman it certainly moves rapidly in that And what transhumanist Dr. Richard powers and will enjoy such radical life direction. So evolution moves inexo- Seed has to say about all of this is extension technologies that we will rably toward this conception of God, quite frightening. He warns of “war- essentially be like God. although never quite reaching this fare” if anyone tries to prevent him The most famous transhumanist ideal. We can regard, therefore, the from becoming a god… on the globe, Ray Kurzweil, takes freeing of our thinking from the severe If you want to get an idea of where 150 vitamin supplements a day in an limitations of its biological form to be transhumanists want to take us, just attempt to extend his life until more an essentially spiritual undertaking.” check out the YouTube video posted advanced life extension technologies Transhumanist Mark Pesce is even below. It was produced by “the 2045 can be developed. In chapter 7 of “The more extreme. He openly states that Initiative”, and as you can see, they Singularity Is Near: When Humans he believes that transhumanism will believe that the world will be infinitely Transcend Biology”, he expresses his allow us “to become as gods”… superior in the year 2045 than it is belief that evolution and technology “Men die, planets die, even stars die. today… VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 61 62 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 63 “THE PROGRAMMER EXPLAINS HOW GOOGLE CHROME’S SPEECH RECOGNITION FUNCTION REMAINS OPERATIONAL EVEN AFTER THE USER HAS LEFT THE WEBSITE ON WHICH THEY GAVE PERMISSION FOR THE BROWSER TO RECORD THEIR VOICE.” “WHEN YOU CLICK THE BUTTON TO START OR STOP THE SPEECH RECOGNITION ON THE SITE, WHAT YOU WON’T NOTICE IS THAT THE SITE MAY HAVE ALSO OPENED ANOTHER HIDDEN POP UNDER WINDOW. THIS WINDOW CAN WAIT UNTIL THE MAIN SITE IS CLOSED, AND THEN START LISTENING IN WITHOUT ASKING FOR PERMISSION. THIS CAN BE DONE IN A WINDOW THAT YOU NEVER SAW, NEVER INTERACTED WITH, AND PROBABLY DIDN’T EVEN KNOW WAS THERE,” WRITES THE WHIS- TLEBLOWER.” 64 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM W R I T T EN BY PAUL J OS EP H WATS O N WHISTLEBLOWER: GOOGLE CHROME CAN LISTEN TO YOUR CONVERSATIONS Programmer goes public four months after company A failed to fix exploit whistleblower who pri- The window can be disguised as an that computers would use in-built vately informed Google advertising banner so the user has no microphones to spy on users. We also four months ago that indication that Chrome is listening to revealed how digital cable boxes had their Chrome browser their voice, whether that be on the embedded microphones that had the had the ability to record phone, talking to someone on Skype, capability of recording conversations conversations without the user’s or merely having a conversation with since the late 1990′s. knowledge has gone public after the someone near the computer. As we have previously highlighted, tech giant failed to fix the issue. The exploit is a “serious security terms of agreement for both Android In the video above, the program- breach” that has compromised the and iPhone apps now require users to mer explains how Google Chrome’s privacy of millions of Google Chrome agree to allow their microphone to be speech recognition function remains users, according to the programmer, activated at any time without confir- operational even after the user has who warns, “as long as Chrome is still mation before they can download the left the website on which they gave running, nothing said next to your app. permission for the browser to record computer is private.” Facebook’s term’s of agreement their voice. The exploit turns Google Chrome also allow the social network giant “When you click the button to start into an “espionage tool,” adds the pro- to record your phone calls, read your or stop the speech recognition on the grammer, noting that the recording phone’s call log and “read data about site, what you won’t notice is that the function can be activated by the use of contacts stored on your phone, includ- site may have also opened another sensitive keywords and be passed on ing the frequency with which you’ve hidden pop under window. This “to your friends at the NSA.” called, emailed or communicated in window can wait until the main site The programmer reported the other ways with specific individuals.” is closed, and then start listening in exploit to Google on September 19 We are now fully ensconced in a without asking for permission. This last year and was met with assur- world that even George Orwell would can be done in a window that you ances that it would be quickly fixed. have laughed off as inconceivable. never saw, never interacted with, and However, despite apparently fixing Embedded microphones in everything probably didn’t even know was there,” the bug within two weeks, the update from Xbox Kinect consoles to high-tech writes the whistleblower. was never released to Chrome users, street lights that can record private The video shows a pop-under with Google telling the programmer, conversations in real time represent browser window recording and typing “Nothing is decided yet.” the final nail in the coffin of privacy. the programmer’s words as she speaks. As far back as 2006, we warned LISTENING... VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 65 W R I T T EN BY PAUL J OS EP H WATS O N WHITE HOUSE WANTS CHINESE-STYLE ID SYSTEM FOR INTERNET USERS Government Moves To Create “Identity Ecosystem” T esting is set to begin next col that works for any website, from too draconian, but the Obama admin- month on a pilot program your Facebook account to your health istration is pushing ahead with its that could lead to the intro- insurance company,” writes Meghan own Internet ID system in pursuit of duction of a Chinese-style Neal, warning that the proposal is “a a wider cybersecurity agenda that ID system for Internet scary can of worms to open”. Senator Joe Lieberman publicly stated users, an “identity ecosystem” that The scope of the program could even- back in 2010 is aimed at mimicking critics fear would create a backdoor tually be expanded into an ID card to Chinese-style censorship of the world to government regulation of the world access the Internet itself, greasing the wide web. wide web. skids for every citizen to require gov- Back when the NSTIC plan was first The White House’s “National Strategy ernment permission to use the world introduced, CNet’s Declan McCul- for Trusted Identities in Cyberspace” wide web, a privilege that could be lagh noted that it represented “the would replace the current system of denied to criminals, accused terrorists virtual equivalent of a national ID using passwords to access sensitive and other undesirables, which accord- card” because it would eventually be online accounts with something akin ing to federal government literature mandatory for filing IRS tax returns, to a biometric ID card that would link includes people who hold certain applying for benefits or renewing one individual to all their government anti-establishment political beliefs. licenses. services, such as food stamps, welfare The program bears more than a pass- The notion of the US government as well as a myriad of other things like ing resemblance to a 2007 proposal being able to provide a secure “identity mortgage applications and applica- by China that threatened to force ecosystem” immune from hacking and tions for licenses. bloggers to register their real identi- data theft is also naive given previous “The original proposal was quick ties and personal details via a single instances of information being stolen. to point out that this isn’t a federally centralized ID system as a means for The train wreck that was the launch of mandated national ID. But if suc- the Communist government to control the Obamacare website is also a very cessful, it could pave the way for an information and punish dissenters. strong argument for the government interoperable authentication proto- That idea was scrapped for being to stay out of such programs. “BACK WHEN THE NSTIC PLAN WAS FIRST INTRODUCED, CNET’S DECLAN MCCUL- LAGH NOTED THAT IT REPRESENTED “THE VIRTUAL EQUIVALENT OF A NATIONAL ID CARD” BECAUSE IT WOULD EVENTUALLY BE MANDATORY FOR FILING IRS TAX RETURNS, APPLYING FOR BENEFITS OR RENEWING LICENSES.” 66 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM 67 68 VOL. 2 ISSUE 10 JUNE 2014 INFOWARS MAGAZINE INFOWARS.COM
Pages to are hidden for
"Death Of The Internet 21 st Issue Infowars Magazine"Please download to view full document