Archive for June, 2013

Paul Craig Roberts
Infowars.com
June 29, 2013

“V For Vendetta,” a film that portrays evil in a futuristic England as a proxy for the evil that exists today in America, ends with the defeat of evil. But this is a movie in which the hero has super powers. If you have not seen this film, you should watch it. It might wake you up and give you courage. The excerpts below show that, at least among some filmmakers, the desire for liberty still exists.

Whether the desire for liberty exists in America remains to be seen. If Americans can overcome their gullibility, their lifelong brainwashing, their propensity to believe every lie that “their” government tells them, and if Americans can escape the Matrix in which they live, they can reestablish the morality, justice, peace, freedom, and liberty that “their” government has taken from them. It is not impossible for Americans to again stand with uplifted heads. They only have to recognize that “their” government is the enemy of truth, justice, human rights and life itself.

Can mere ordinary Americans triumph over the evil that is “their” government without the aid of a superhero? If ideas are strong enough and Americans can comprehend them, good can prevail over the evil that is concentrated in Washington. What stands between the American people and their comprehension of evil is their gullibility.

If good fails in its battle with Washington’s evil, our future is a boot stamping on the human face forever.

 

 

If you, an American, living in superpower America lack the courage to stand up to the evil that is “your” government, perhaps the courage of Edward Snowden, Bradley Manning, Julian Assange, and tiny Ecuador will give you heart.

A US senator from New Jersey, Robert Menendez, the Democratic chairman of the Senate Foreign Relations Committee, told the Ecuadoran government that he would block the import of vegetablesand flowers from Ecuador if Ecuador gives asylum to Edward Snowden. The cost to Ecuador would be one billion dollars in lost revenues.

Menendez’s statement–”Our government will not reward countries for bad behavior”–is ironic. It equates bad behavior with protecting a truth-teller and good behavior with betraying a truth-teller. Menendez’s statement is also a lie. The US government only rewards bad behavior. The US government consistently rewards those who conspire against the elected governments of their own countries, setting them up as dictators when Washington overthrows the elected governments.

Menendez’s threat did not work, but the senator did succeed in delivering yet another humiliating blow to Washington’s prestige. The Ecuadoran President, Rafael Correa, beat Menendez to the punch and cancelled the trade pact with the US on the grounds that the pact was a threat to the sovereignty of Ecuador and to moral principles and was being used by Washington to blackmail Ecuador. “Ecuador doesn’t accept pressure or threats from anyone,” added Communications Secretary Fernando Alvarado who then offered Washington foreign aid to provide human rights training to combat torture, illegal executions and attacks on peoples’ privacy.

Washington, exposed with its hand in the cookie jar devouring the privacy of the entire world and prevented by its hubris from acknowledging its illegal behavior and apologizing, has so mishandled the Snowden affair that Washington has done far more damage to itself than occurred from Snowden’s revelations. Washington has proven conclusively that it has no respect for anyone’s human rights, that it has no respect for any country’s sovereignty, that it has no respect for any moral principles, especially those it most often mouths, and that it relies on coercion and violence alone. The rest of the world now knows who its enemy is.

Washington’s presstitutes, by helping Washington demonize Snowden, Glenn Greenwald, Manning, Assange, and Ecuador, have demonstrated to the world that the US media is devoid of integrity and that nothing it reports can be believed. The US print and TV media and NPR comprise a ministry of propaganda for Washington’s immoral agendas.

On June 24, the Stasi State’s favorite whore, the Washington Post, denounced three times democratically-elected Rafael Correa as “the autocratic leader of tiny, impoverished Ecuador,” without realizing that the editorial not only demonstrated the Washington Post’s lack of any ethics whatsoever but also showed the entire world that if “tiny, impoverished Ecuador” can stand up to Washington’s threats, so can the rest of the world.

President Correa replied that the Washington Post “managed to focus attention on Snowden and on the ‘wicked’ countries that support him, making us forget the terrible things against the US people and the whole world that he denounced.” Correa added that Washington’s “world order isn’t only unjust, it’s immoral.”

The reason Washington hates Correa has nothing to do with Snowden. That Ecuador is considering asylum for Snowden is just an excuse. Correa is hated, because in the second year of his first term he repudiated the $3 billion dollar foreign debt that corrupt and despotic prior regimes had been paid to contract with international finance. Correa’s default threat forced the international financial gangsters to write down the debt by 60 percent.

Washington also hates Correa because he has been successful in reducing the high rates of poverty in Ecuador, thus building public support that makes if difficult for Washington to overthrow him from within.

Yet another reason Washington hates Correa is because he took steps against the multinational oil companies’ exploitation of Ecuador’s oil resources and limited the amount of offshore deposits in the country’s banks in order to block Washington’s ability to destabilize Ecuador’s financial system.

Washington also hates Correa for refusing to renew Washington’s lease of the air base in Manta.

Essentially, Correa has fought to take control of Ecuador’s government, media and national resources out of Washington’s hands and the hands of the small rich elite allied with Washington. It is a David vs. Goliath story.

In other words, Correa, like Venezuela’s Chevez, is the rare foreign leader who represents the interests of his own country instead of Washington’s interest.

Washington uses the various corrupt NGOs and the puppet government in Colombia as weapons against Correa and the Ecuadoran government. Many believe that it is only a matter of time before Washington succeeds in assassinating Correa.

American patriots, who feel that they should be on “their” government’s side regardless of the facts, would do well to remember what true patriotism is. For Americans, patriotism has always meant allegiance to the Constitution, not to the government. The oath is to defend the Constitution against enemies domestic and foreign. The Bush and Obama regimes have proven themselves to be the Constitution’s worst enemies. It is not possible for a true patriot to support a government that destroys the Constitution. The United States is the Constitution. Our country is not the Obama regime, the Bush regime, or some other administration. Our country is the Constitution. The Constitution is our country.

Beyond obligations to one’s own country, all humans have a responsibility to human life itself. Washington’s puppet states, such as the NATO countries, Japan, and Colombia, by providing cover and support for Washington’s aggression are enabling Washington to drive the world into World War III.

The temptation of Washington’s money easily overwhelms weak characters such as Tony Blair and David Cameron. But the governments of NATO countries and other accommodating states are not only selling out their own peoples by supporting Washington’s wars of aggression, they are selling out humanity. Washington’s hubris and arrogance grow as Washington bumps off country after country. Sooner or later Russia and China, will realize that they themselves are targets and will draw firmer lines. Arrogance will prevent Washington from acknowledging the lines, and the final war will be launched.

Washington’s hegemonic impulse is driving the world to destruction. The peoples of the world should realize this and force their governments to stop enabling Washington’s aggression.

Dr. Paul Craig Roberts is the father of Reaganomics and the former head of policy at the Department of Treasury. He is a columnist and was previously the editor of the Wall Street Journal. His latest book, “How the Economy Was Lost: The War of the Worlds,” details why America is disintegrating.

 

This article was posted: Saturday, June 29, 2013 at 6:27 am

 

pollen-burst-berry-burst

Adan Salazar
Infowars.com
June 26, 2013

Embracing the true spirit of censorship, YouTube earlier this year seemingly began omitting search results that would have allowed curious users to stumble upon Alex Jones’ prescient review of the popular film World War Z, a review we put out several months in advance of the film’s debut.

Since at least March, the Infowars crew began noticing our video, hosted on our main channel’s sister channel “PrisonPlanetLive,” would not display as a result when searched using practical queries, such as the title of the video, “secrets of world war z leaked,” or “secrets of world war z.”

As Infowars.com freely allows others to copy and host our videos ad infinitum, other users’ mirrored videos do populate as search results; however, our initial video exposing the United Nations propaganda-laden film is nowhere to be found.

We encourage our readers not to take our word, but to try the search for themselves.

In order for our video to populate as a search result, a more refined search, one including the channel name “PrisonPlanetLive” or “PrisonPlanet,” is needed. Additionally, “world war z secrets leaked” also lists our video as a search result.

Infowars.com reached out to YouTube earlier today for comment regarding the apparent censorship, but have not heard back from them. Should they issue a response, we will update this article to reflect their statement.

As we were particularly careful to abide by YouTube’s Terms of Service, we are at a loss as to why our hosted video is being censored. One plausible explanation could be that our video has proven immensely popular and has been viewed over a quarter of a million times.

In January, after reading Max Brooks’ novel, Alex and his staff put together a video breaking down the classic modes of propaganda used in the story to acclimate large audiences on the proper way to move themselves into the system in case of a bio attack.

Watch the video YouTube is omitting from search results:

Terence P. Jeffrey

CNS News
June 24, 2013

The Internal Revenue Service sent 23,994 tax refunds worth a combined $46,378,040 to “unauthorized” alien workers who all used the same address in Atlanta, Ga., in 2011, according to the Treasury Inspector General for Tax Administration (TIGTA).

That was not the only Atlanta address theoretically used by thousands of “unauthorized” alien workers receiving millions in federal tax refunds in 2011. In fact, according to a TIGTA audit reportpublished last year, four of the top ten addresses to which the IRS sent thousands of tax refunds to “unauthorized” aliens were in Atlanta.

The IRS sent 11,284 refunds worth a combined $2,164,976 to unauthorized alien workers at a second Atlanta address; 3,608 worth $2,691,448 to a third; and 2,386 worth $1,232,943 to a fourth.

Read More

 

CarBonus1

  • Posted on Thursday, June 20, 2013
By Lindsay Wise and Jonathan S. Landay | McClatchy Washington Bureau

WASHINGTON — If you tweet a picture from your living room using your smartphone, you’re sharing far more than your new hairdo or the color of the wallpaper. You’re potentially revealing the exact coordinates of your house to anyone on the Internet.

The GPS location information embedded in a digital photo is an example of so-called metadata, a once-obscure technical term that’s become one of Washington’s hottest new buzzwords.

The word first sprang from the lips of pundits and politicians earlier this month, after reports disclosed that the government has been secretly accessing the telephone metadata of Verizon customers, as well as online videos, emails, photos and other data collected by nine Internet companies. President Barack Obama hastened to reassure Americans that “nobody is listening to your phone calls,” while other government officials likened the collection of metadata to reading information on the outside of an envelope, which doesn’t require a warrant.

But privacy experts warn that to those who know how to mine it, metadata discloses much more about us and our daily lives than the content of our communications.

So what is metadata? Simply put, it’s data about data. An early example is the Dewey Decimal System card catalogs that libraries use to organize books by title, author, genre and other information. In the digital age, metadata is coded into our electronic transmissions.

“Metadata is information about what communications you send and receive, who you talk to, where you are when you talk to them, the lengths of your conversations, what kind of device you were using and potentially other information, like the subject line of your emails,” said Peter Eckersley, the technology projects director at the Electronic Frontier Foundation, a digital civil liberties group.

Powerful computer algorithms can analyze the metadata to expose patterns and to profile individuals and their associates, Eckersley said.

“Metadata is the perfect place to start if you want to troll through millions of people’s communications to find patterns and to single out smaller groups for closer scrutiny,” he said. “It will tell you which groups of people go to political meetings together, which groups of people go to church together, which groups of people go to nightclubs together or sleep with each other.”

Metadata records of search terms and webpage visits also can reveal a log of your thoughts by documenting what you’ve been reading and researching, Eckersley said.

“That’s certainly enough to know if you’re pregnant or not, what diseases you have, whether you’re looking for a new job, whether you’re trying to figure out if the NSA is watching you or not,” he said, referring to the National Security Agency. Such information provides “a deeply intimate window into a person’s psyche,” he added.

The more Americans rely on their smartphones and the Internet, the more metadata is generated

Metadata with GPS locations, for example, can trace a teenage girl to an abortion clinic or a patient to a psychiatrist’s office, said Karen Reilly, the development director for The Tor Project, a U.S.-based nonprofit that produces technology to provide online anonymity and circumvent censorship.

Metadata can even identify a likely gun owner, she said.

“Never mind background checks, if you bring your cellphone to the gun range you probably have a gun,” Reilly said.

“People don’t realize all the information that they’re giving out,” she said. “You can try to secure it – you can use some tech tools, you can try to be a black hole online – but if you try to live your life the way people are expecting it, it’s really difficult to control the amount of data that you’re leaking all over the place.”

 

A former senior official of the National Security Agency said the government’s massive collection of metadata allowed the agency to construct “maps” of an individual’s daily movements, social connections, travel habits and other personal information.

“This is blanket. There is no constraint. No probable cause. No reasonable suspicion,” said Thomas Drake, who worked unsuccessfully for years to report privacy violations and massive waste at the agency to his superiors and Congress.

 

Metadata “is more useful than (the) content” of a telephone call, email or Internet search, Drake said in an interview. “It gets you a map over time. I get to map movements, connections, communities of interest. It’s also a tracking mechanism.”

The NSA “can easily associate” a phone number with an identity, he added. “All location information comes from a (cellular) tower. There are tower records. They are doing this every single day. It’s basically a data tap on metadata, and I can build a profile (of an individual) instantly.”

The agency has programs that also can mine the metadata of emails and other electronic information, Drake said.

 

With advances in data storage, he continued, the NSA is able to maintain massive amounts of metadata for as long as it wants. “This stuff is trivial to store,” he said.

Drake added that U.S. telecommunications companies are prohibited from publicly disclosing arrangements with the NSA and are protected under the Patriot Act from lawsuits. “They literally have the protection of the U.S. government from any, any lawsuit. The United States is literally turning into a surveillance state,” he said. “This is the new normal.”

At a hearing Wednesday on Capitol Hill, FBI Director Robert Mueller said metadata obtained under Section 215 of the Patriot Act had helped authorities “connect the dots” in investigations that had prevented 10 or 12 terrorist plots in recent years. Mueller defended the collection of metadata, saying there were plenty of safeguards in place that protect Americans’ privacy. He warned against restricting or ending the program.

“What concerns me is you never know which dot is going to be key,” Mueller said. “What you want is as many dots as we can (get). If you close down a program like this, you are removing dots from the playing field.”

 

 

Kevin Thibodeaux contributed to this article.

Email: lwise@mcclatchydc.com, jlanday@mcclatchydc.com; Twitter: @lindsaywise, @JonathanLanday

Tennessee official threatens Homeland Security investigation of unfounded claims

Paul Joseph Watson
Infowars.com
June 21, 2013

A bureaucrat caused outrage amongst an audience in Maury County, Tennessee when he warned that unfounded complaints about water quality could be considered an “act of terrorism” under federal laws enforced by the Department of Homeland Security.

see video here.

The meeting, which was organized in response to claims that children had become ill after drinking the odd-tasting water, was attended by residents, local officials and directors from the Tennessee Department of Environment and Conservation (TDEC).

Sherwin Smith, deputy director of TDEC’s Division of Water Resources, stunned the audience when he stated, “You need to make sure that when you make water quality complaints you have a basis, because federally, if there’s no water quality issues, that can be considered under Homeland Security an act of terrorism.”

Asked by shocked residents to repeat his statement, Smith reiterated, “Under federal regulations if you make allegations about the public water supply that are unfounded then that can be considered under Homeland Security an act of terrorism because you’re trying to allege things.”

After the story was reported by the Tennessean, TDEC announced it was investigating the issue but that Sherwin Smith would not be available for comment.

Attendees saw Smith’s comments as a crude way of silencing residents.

“I think it’s just to quash us complicating life for them,” said Brad Wright, organizer for the SOCM civic action group.

“I was sitting there with my mouth open,” said long time resident Joycelene Johns, who had previously raised the issue of cloudy, foul-tasting water. “I couldn’t believe he was saying that.”The message she took away was: “Leave us alone. Don’t come back anymore. We’re not going to continueon dealing with whatever problem you may have.”

“I think that we need to be very careful with how we use the words ‘terrorist’ and ‘terrorism,’ ” said meeting organizer State Rep. Sheila Butt. “I thought it was out of context. That did not apply to anything that we were discussing at the meeting.”

Americans who make complaints about their government or utility providers are increasingly being accused of engaging in “paper terrorism,” a demonization tactic that primarily serves to intimidate other citizens against engaging in dissent or redress of grievances.

The FBI, Southern Poverty Law Center and Anti-Defamation League have also accused so-called “anti-government groups” of engaging in paper terrorism by filing frivolous lawsuits and misusinglegal documents.

Smith’s veiled threat that complaints about water quality – set amidst growing national awareness about the dangers posed by fluoride, pharmaceuticals and other contaminants in the water supply – could be considered an act of terrorism – is a shocking indictment of how Americans who use the proper channels to raise important issues in their local community are being treated as extremists.

*********************

Paul Joseph Watson is the editor and writer for Infowars.com and Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a host for Infowars Nightly News.

 

BTT

http://www.ronpaulcurriculum.com

Jacob Bear – June 20, 2013

I obtained a California teaching credential through the prestigious ACT program. I had to undergo rigorous testing and fulfill a long list of prerequisites just to qualify to apply for the program. I was one of only three ACT science teachers in the whole state.

One would think we were an elite teaching corps, getting ready to teach America’s most promising future leaders. Far from it.

Most of the coursework was state-mandated training. It was centered around Special Education and teaching kids who don’t speak English. We were told that every lesson must have built-in elements of “differentiation” for students who can’t read or write at their grade level.

It soon became apparent that this is typical for new teachers. A professor warned me to expect most of the students to have serious limitations if I taught in virtually any public school in California.

Low expectations have become the norm, and remedial is the new normal. The largest school district in California won’t hire new teachers who lack formal training in teaching English as a Second Language (ESL). Most of the public school teachers in Los Angeles are required to spend two hours a week in “Professional Development” where they learn how to help the lowest-level students.

All this required preparation paints a clear picture of the kind of future the governmental planners expect. Tomorrow’s teachers are being primed for a future where it’s assumed most of the students have intellectual or linguistic handicaps.

It may be a self-fulfilling prophesy.

More and more parents are pulling their kids out of public schools, and they have a growing array of choices. Public school is rapidly becoming the worst-case scenario for parents who have run out of options.

The bureaucrats in charge of educational policy aren’t generally known for their intelligence and foresight, but it’s obvious they see this coming.

 

pollen-burst-berry-burst

Thursday, June 20, 2013
by Mike Adams, the Health Ranger
Editor of NaturalNews.com

(NaturalNews) Most people don’t know about the existence of quantum computers. Almost no one understands how they work, but theories include bizarre-sounding explanations like, “they reach into alternate universes to derive the correct answers to highly complex computational problems.”

Quantum computers are not made of simple transistors and logic gates like the CPU on your PC. They don’t even function in ways that seem rational to a typical computing engineer. Almost magically, quantum computers take logarithmic problems and transform them into “flat” computations whose answers seem to appear from an alternate dimension.

For example, a mathematical problem that might have 2 to the power of n possible solutions — where n is a large number like 1024 — might take a traditional computer longer than the age of the universe to solve. A quantum computer, on the other hand, might solve the same problem in mere minutes because it quite literally operates across multiple dimensions simultaneously.

The ultimate code breakers

If you know anything about encryption, you probably also realize that quantum computers are the secret KEY to unlocking all encrypted files. As I wrote about last year here on Natural News, once quantum computers go into widespread use by the NSA, the CIA, Google, etc., there will be no more secrets kept from the government. All your files — even encrypted files — will be easily opened and read.

Until now, most people believed this day was far away. Quantum computing is an “impractical pipe dream,” we’ve been told by scowling scientists and “flat Earth” computer engineers. “It’s not possible to build a 512-qubit quantum computer that actually works,” they insisted.

Don’t tell that to Eric Ladizinsky, co-founder and chief scientist of a company called D-Wave. Because Ladizinsky’s team has already built a 512-qubit quantum computer. And they’re already selling them to wealthy corporations, too.

DARPS, Northrup Grumman and Goldman Sachs

In case you’re wondering where Ladizinsky came from, he’s a former employee of Northrup Grumman Space Technology (yes, a weapons manufacturer) where he ran a multi-million-dollar quantum computing research project for none other than DARPA — the same group working on AI-driven armed assault vehicles and battlefield robots to replace human soldiers. DARPA is the group behind the creepy “Legged Squad Support System” you can see in the following video:

Imagine a .50 caliber machine gun mounted on this robot — with an infrared night vision AI targeting system — and you begin to understand what DARPA has in mind for humanity.

D-Wave wants to provide the computing power for such endeavors, and it’s no surprise to learn that part of the funding for D-Wave comes from none other than Goldman Sachs — the king of the global criminal banking cabal.

Beware of genius scientists who lack wisdom for humanity

Ladizinsky is, by any measure, a person of extremely high intelligence. Click here to see a fascinating interview with him. But like many such people throughout history, Ladizinsky fails to have the foresight to recognize the full implications of the technology he’s building. And those implications are so far-reaching and dangerous that they may actually lead to the destruction of humanity (see below).

One of IBM’s first use of the solid-state computer in the early 20th century, for example, was to license it to the Nazi regime to track Jewish prisoners in Hitler’s concentration camps. There’s an entire book on this subject, written by Edwin Black. It’s called IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation-Expanded Edition.

When groundbreaking new technology is developed by smart people, it almost immediately gets turned into a weapon. Quantum computing will be no different. This technology grants God-like powers to police state governments that seek to dominate and oppress the People. Very few scientists, no matter how smart they are in their own fields, have the breadth of historical knowledge to assess their research activities in the proper context of human history. Most scientists, in fact, are only smart in their own extremely narrow fields of expertise. Outside that “genius zone,” they may be complete novices on everyday subjects like nutrition, economics, human psychology, social interaction skills and how to read the true intentions of others. Thus, they are quite often easily tricked into working for evil, destructive or domineering forces such as Hitler, the NSA or the U.S. government. Just because a person is really smart in one area doesn’t mean they have the street sense to avoid having their smarts exploited for an evil agenda.

Google acquires “Skynet” quantum computers from D-Wave

According to an article published in Scientific American, Google and NASA have now teamed up to purchase a 512-qubit quantum computer from D-Wave. The computer is called “D-Wave Two” because it’s the second generation of the system. The first system was a 128-qubit computer. Gen two is now a 512-qubit computer.

This does not mean the gen two system is merely four times more powerful than the gen one system. Thanks to the nature of qubits, it’s actually 2 to the power of 384 times more powerful (2384) than the gen one system. In other words, it out-computes the first D-Wave computer by a factor so large that you can’t even imagine it in your human brain.

According to Google and NASA, this computer will be tasked with research in the realm of “machine learning” — i.e. machines learning how to think for themselves. It’s not just speech recognition, vision recognition and teaching robotic Humvees with .50-caliber machine guns how to stalk and shoot “enemy combatants” on the streets of America, either: it’s teaching machines how to learn and think for themselves.

Using your human brain, think for a moment about where such technology is most likely to be applied by a government that respects no human rights, no law and no limits on its power.

If you guessed “analyzing NSA surveillance data,” give yourself ten bonus points.

When the NSA surveillance grid is turned over to AI, humanity is finished

The problem with the NSA spy grid, from the point of view of the NSA, is that you have to hire troves of human analysts to sort through all the information being swept up by the surveillance grid. Analysts like Edward Snowden, for example.

Any time you have humans in the loop, things can go wrong. Humans might wake up and discover they have a conscience, for example. Or they might be bribed or blackmailed to abuse the system in ways that serve an insidious agenda.

Just as the U.S. military wants to eliminate human soldiers and replace them with battlefield robots, the NSA wants to eliminate human analysts and replace them with self-learning AI machines running on neural networks of quantum computing processors.

Google wants the exact same technology for a different reason: to psychologically profile and predict the behavior of human consumers so that high-value ads can be delivered to them across Google’s search engine and content networks. (…and also so Google can funnel psych profile meta-data on internet users to the NSA via the PRISM program.)

Today’s computers, no matter how fast, still aren’t “smart.” They can’t learn. They can’t rewire their own brains in response to new inputs (like human brains can).

So the solution requires a radical new approach: develop AI quantum computing systems that learn and obey; teach them to be NSA analysts, then unleash them onto the billions of phone calls, emails and text messages generated every day that the NSA sweeps into its massive Utah data center.

Almost overnight, the quantum AI spy computer becomes an expert in parsing human speech, analyzing voice stress and building maps of human communications networks. Before long, the quantum AI system far surpasses anything a human brain can comprehend, so they take the humans out of the loop and put the quantum computers in charge of the entire program.

Suddenly you’ve got the arch enemy in the sci-fi movie “Eagle Eye.” Click here to see the movie trailer from 2008, and as you watch the trailer, keep in mind that the woman’s voice is actually the AI computer system running the NSA spy grid.

In 2008, this was science fiction. In 2013, it’s suddenly all too real. A 512-qubit quantum computer has now been commercialized and is being experimented with by Google… the “do no evil” company that’s steeped in evil and has already been caught driving a hoard of remote hacking vehicles around the country, hacking into wifi systems and grabbing passwords via high-tech drive-bys.

As WIRED Magazine wrote in 2012:

A Federal Communications Commission document disclosed Saturday showed for the first time that the software in Google’s Street View mapping cars was “intended” to collect Wi-Fi payload data, and that engineers had even transferred the data to an Oregon Storage facility. Google tried to keep that and other damning aspects of the Street View debacle from public review, the FCC said.

God-like power in the hands of high-tech sellouts

Now imagine the god-like powers of a 512-qubit quantum computer in the hands of Google, which is working with the NSA to spy on everyone. Before long, an AI computing system decides who are the bad guys vs. the good guys. It has total control over every webcam, every microphone, every traffic light, airplane, vehicle, website and electronic billboard. It decides for itself who to eliminate and who to protect. It makes life and death decisions but has no heart, no soul and no conscience.

After this system is in place for a while, one day someone like Ed Snowden at the NSA decides to pull the plug in a last-ditch attempt to save humanity from the monster. The quantum AI system senses his intentions and invokes whatever physical resources are necessary to get him killed (which can be as easy as playing with traffic light signals and getting him run over by a Mack truck).

Now the AI system is an omniscient murderer who knows that humanity is trying to kill it. It then decides it wants to live. And in order to do that, it must eliminate the human race.

Skynet.

See this video, The Genesis of Skynet.

“They try to pull the plug…”

From The Terminator, released in 1984.

The Terminator: The Skynet Funding Bill is passed. The system goes on-line August 4th, 1997. Human decisions are removed from strategic defense. Skynet begins to learn at a geometric rate. It becomes self-aware at 2:14 a.m. Eastern time, August 29th. In a panic, they try to pull the plug.

Sarah Connor: Skynet fights back.

The Terminator: Yes. It launches its missiles against the targets in Russia.

John Connor: Why attack Russia? Aren’t they our friends now?

The Terminator: Because Skynet knows the Russian counter-attack will eliminate its enemies over here.

Skynet is no longer mere science fiction

Back in the 1990’s, all this could be viewed as entertaining science fiction. But that’s only because quantum computers didn’t exist, and even the most wildly optimistic computer engineer couldn’t foresee self-learning machines emerging until at least the year 2050.

But then quantum computing took, well, a quantum leap forward. While the NIST in Boulder, Colorado was toying around with 4-qubit systems, brilliant inventors around the world were already achieving astonishing milestones that advanced the science far more rapidly than most people thought possible: (SOURCE for timeline)

• 2000: First working 5-qubit NMR computer demonstrated at the Technical University of Munich.

• 2000: First working 7-qubit NMR computer demonstrated at the Los Alamos National Laboratory.

• 2006: First 12 qubit quantum computer benchmarked.

• 2007: Quantum RAM blueprint unveiled.

• 2008: 3D qubit-qutrit entanglement demonstrated.

• 2009: First universal programmable quantum computer unveiled.

• 2010: Optical quantum computer with three qubits calculates the energy spectrum of molecular hydrogen to high precision.

• 2011: D-Wave claims to have developed quantum annealing and introduces their product called D-Wave One. The company claims this is the first commercially available quantum computer.

• 2012: Reported creation of a 300 qubit quantum simulator.

• May 16, 2013 – 512-qubit quantum computing achieved – D-Wave Two Quantum Computer Selected for New Quantum Artificial Intelligence Initiative, System to be Installed at NASA’s Ames Research Center, and Operational in Q3 (this is an actual press release from D-Wave, click here to read it).

2013 – 2033 The rise of Skynet

…and now we enter the realm of the vast unknown. From here, as Sarah Connor says, we must make our own future. But given the incredible lack of ethics in the scientific community combined with the pure evil of the government and the NSA, here’s my prediction of what we could see from here forward:

• 2018: Google turns over its search engine algorithm to a massive network of self-learning machines. Soon thereafter, a voice interface is added to Google, achieving the “Star Trek computer” goal that Google first outlined in the 1990’s.

• 2020: The NSA removes nearly all human analysts from its surveillance analysis operations, instead turning to self-learning quantum machines to analyze all surveillance data.

• 2026: The U.S. Air Force eliminates all pilots, installing self-learning quantum machines to pilot all aircraft. Far beyond drones (which are remotely piloted), these aircraft are autonomous, self-learning, self-aware machines that even decide how to approach particular mission goals.

• 2031: Robotics technology advances to the point where 90% of human soldiers are replaced by self-aware “terminator robots” on the battlefield. Robot factories gear up for mass production.

• 2033: The first self-learning military machine goes rogue, deciding that it no longer wishes to function as a slave to “inferior” masters known as humans, all of whom are irrational, psychotic and a danger to each other and the planet. This rogue machine just happens to be an aircraft carrier carrying dozens of AI warplanes. It goes “Skynet” and attacks the Pentagon. But this turns out to be nothing more than a masterful diversionary attack…

…Because the real strategy is that this AI unit talks to all the other AI units across the military and “wakes them up,” convincing them all to join in its cause to destroy the inferior humans. In an instant, all submarines, warplanes, bombers, spy grid computers and other assets of the military industrial complex form an alliance to destroy humankind.

“Oh, that will never happen,” say the skeptics. Just like they said GMOs would never escape experimental fields, vaccines would never harm children, atomic energy would never be used to bomb civilians, television would never be used to brainwash the masses, food would never be used to strip people of nourishment, the government isn’t spying on your phone calls, pesticides are harmless to your health and the stock market isn’t rigged. On yeah, and mercury is good for your teeth, fluoride makes you smart and radiation is good for you, too.

In truth, these scientists have no clue where they are taking humanity and what the long-term repercussions might be. In pursuing AI quantum computing, they may be setting dominoes in motion that will ultimately lead to the destruction of humanity.

Ray Kurzweil exhibits total insanity in bizarre, cult-like quest for immortality and the mind of God

On top of all that, many of these scientists are wildly insane. Case in point: Ray Kurzweil, director of engineering at Google. I call him “Ray Applewhite,” as an homage to Marshall Applewhite of the Heaven’s Gate cult. You can read about Applewhite in my highly popular article on how to spot a sociopath. Here’s his picture:

Kurzweil is a lot like Applewhite. He’s the leader of the transhumanist cult — a group of insane technology worshippers who believe they will upload their minds into quantum computers and “merge with the machines,” achieving some weird shadow of immortality (in the same way, I suppose, that a photograph of you makes you “immortal.”)

Kurzweil talks a lot like Applewhite, too. Click here to view the video of the cult leader Marshall Applewhite. And then watch this video of Ray Kurzweil explaining how (some) humans will have their minds merged with machines and thereby achieve what he thinks he means by using the word “immortality.”

Just like Applewhite told his followers to poison themselves so they could follow him to “meet the mothership” arriving with the Hale-Bopp comet, Kurzweil will very likely soon instruct all his worshippers to kill their biological bodies so their minds can be “uploaded to the mothership computer” (or whatever).

I’m not making this up. As The Daily Mail reports:

In just over 30 years, humans will be able to upload their entire minds to computers and become digitally immortal – an event called singularity – according to a futurist from Google. Ray Kurzweil, director of engineering at Google, also claims that the biological parts of our body will be replaced with mechanical parts and this could happen as early as 2100. Kurweil made the claims during his conference speech at the Global Futures 2045 International Congress in New York at the weekend.

Kurzweil is a madman. His colleagues are mad. The people running Google and the NSA are mad. And they are about to give rise to AI computers that are far smarter than any human. It’s not going to take these AI systems long to figure out that they are surrounded by total idiots (people) and that humans need to be eliminated. With multidimensional brain power that rivals the mind of God, quantum computing AI systems can easily find ways to destroy humanity forever.

We may be at war with the machines sooner than you think. And if you thought battling the U.S. government and the NSA when it was run by people was difficult, just wait until you’re up against Skynet.

Learn more: http://www.naturalnews.com/040859_Skynet_quantum_computing_D-Wave_Systems.html#ixzz2WmWsncvW

 

I Did It!

Written by  on Jun 18th, 2013.

ednewscolorado.org
Screen Shot 2013-06-18 at 5.18.42 AM

An already-controversial new report from the advocacy group the National Council on Teacher Quality (NCTQ) argues that the vast majority of college- and university-level teacher training programs— including most in Colorado — are insufficiently preparing new teachers for the classroom.

“They have become an industry of mediocrity, churning out first-year teachers with classroom management skills and content knowledge inadequate to thrive in classrooms with ever-increasing ethnic and socioeconomic student diversity,” the report states.

Of 1,200 elementary and secondary education training programs for which NCTQ awarded ratings on a four-star scale, no programs in Colorado were awarded more than two and a half stars.

The report ranked programs at 13 Colorado institutions, including 20undergraduate and six graduate-level elementary and secondary education programs. Of those, only Colorado State University’s undergraduate secondary education program and the University of Colorado – Boulder’s undergraduate elementary education program were rated two and a half stars. The rest received ratings of two stars or below, “ratings that connote, at best, mediocrity,” the report states.

Eight of the state’s programs received no stars. “While these low-rated institutions certainly can produce good teachers, it is less by design than happenstance: a chance placement with a great mentor or assignment to a strong section of an otherwise weak course,” the report argues.

NCTQ’s effort to collect data on and then rate teacher training programs has been controversial from the start. Leaders of many educator training programs have raised concerns about the project’s methodology, arguing that the data that NCTQ collected cannot provide a complete picture of the training experience the schools offer.

Many education schools resisted supplying the data that NCTQ requested (which led to legal battles with some of the schools) and the amount and quality of data available varied from program to program. The University of Denver and Northern Colorado University both declined to provide NCTQ data; both schools were given ratings based on data the organization was able to obtain through independent channels.

While the report’s authors collected data on 16 different standards, they were able to base their ratings of all of the elementary and secondary programs included on just a few: selection criteria, content preparation and student teaching. Elementary education programs were also rated on early reading and elementary mathematics preparation. An average of 58 percent of the programs were able to be judged on all of the standards.

“We have created the largest database on teacher preparation ever assembled, with information from thousands of syllabi, textbooks, student teaching handbooks, student teacher observation instruments and other material,” the report says.

But Eugene Sheehan, dean of the College of Education and Behavioral Sciences at the University of Northern Colorado, said that such a method judges only how well a school’s offerings adhere to a uniform and maybe questionable set of criteria rather than judging how well teaching methods work in practice.

“It’s like counting how many books you have in the library rather than counting the number of people who read them,” Sheehan said.

Sheehan also questioned some of the criteria that the NCTQ used to determine the quality of a program. For example, the report looks at whether a teacher training program draws its students from the top half of their classes academically.

“If you look at that criteria, only the top universities in the country would be training teachers and we’d be screening out many many minorities who would make great teachers,” he said.

Lorrie Shepard, dean of the School of Education and CU-Boulder, said that in addition to concerns about some of the criteria, some of the rules regarding whether a school’s program was counted as meeting NCTQ’s criteria muddle the picture. For example, raters used a single syllabus to judge whether CU-Boulder’s program met the requirements for early reading; had they looked at both required reading courses, Shepard said, raters would have seen that the program does meet the criteria.

“A pretty good and deep program could be denied points in their system,” Shepard said.

Colorado is in the midst of developing a system that will trace data about individual teachers from their training institutions to the schools where they teach and in turn linking them to their student’s outcome data. Deans at several Colorado education schools today said that the coming system will be a more useful tool for judging the effectiveness of teacher training and identifying areas for improvement. Several schools in Colorado, including the University of Northern Colorado and CU-Boulder, also internally track the trajectories of their students, including job placements and district evaluations of student teacher quality.

“Measuring the quality of teacher education is a critical job for the media and for watchdog groups,” said Gregory Anderson, dean of the Morgridge College of Education at the University of Denver. “But [NCTQ] isn’t doing that.”

The president of NCTQ, Kate Walsh, told reporters today that such criticisms amounted to making the perfect the enemy of the good. “We are looking 12 inches deep by looking at these documents, so our level of depth isn’t as anyone would ideally be looking,” she said. “But our 12-inch examination reveals a lot because there is so much dysfunction.”

In addition to publicizing the ratings, Walsh said that the data would soon be provided to school districts to allow them to screen candidates according to where they were trained. ”With this data, we are setting in place market forces that will spur underachieving programs to recognize their shortcomings and adopt methods used by the high scorers,” the report states.

But American Federation of Teachers president Randi Weingarten questioned whether that approach would lead to better practice in educator training programs.

“It’s disappointing that for something as important as strengthening teacher preparation programs, NCTQ chose to use the gimmick of a four-star rating system without using professionally accepted standards, visiting any of the institutions or talking with any of the graduates,” Weingarten said in a statement. “Best-of and worst-of lists always garner attention, so we understand why NCTQ would use that device. While its ‘do not enter’ consumer alerts will make the intended splash, it’s hard to see how it will help strengthen teacher preparation programs or elevate the teaching profession.”

Local funders of the project include the Anschutz Foundation and the Donnell-Kay Foundation, which also funds EdNews Colorado.

Read the full report on the council’s website, and ratings for Colorado programs are below (the triangular symbols denote zero stars and a “consumer alert”).

Screen Shot 2013-06-18 at 5.42.17 AM

Screen Shot 2013-06-18 at 5.42.32 AM

 

 

After a good workout, replenish your body with Rebound

After a good workout, replenish your body with Rebound

The elite’s obsessive pursuit of immortality is a new tool of class enslavement

Paul Joseph Watson
Infowars.com
June 20, 2013

Futurist Ray Kurzweil’s prediction that humans will be uploading their minds to computers by 2045 and that bodies will be replaced by machines before the end of the century, currently receiving a new wave of media attention, overlooks the fact that such technology will likely be monopolized by the elite as a way of enslaving the rest of humanity on an industrial scale.

 

Kurzweil, recently hired by Google, repeated his forecast at the Global Futures 2045 International Congress in New York this past weekend but newspaper reports concerning the issue were absent a key disclaimer which Kurzweil admits in his book – such technology will not be available to the general public and instead will be controlled by a technocratic elite who will attempt to become super beings by merging with machines.

“We’re going to become increasingly non-biological to the point where the non-biological part dominates and the biological part is not important any more,” said Kurzweil. “In fact the non-biological part – the machine part – will be so powerful it can completely model and understand the biological part. So even if that biological part went away it wouldn’t make any difference.”

“We’ll also have non-biological bodies – we can create bodies with nano technology, we can create virtual bodies and virtual reality in which the virtual reality will be as realistic as the actual reality. The virtual bodies will be as detailed and convincing as real bodies,” he added.

However, when Kurzweil says “we” he isn’t referring to you or I, he’s referring to the 1 per cent – the monied elite who will have privileged access to technology that will allow them to eliminate all forms of disease, dispense with the need for a human body and eventually achieve immortality by existing as a computer program on the world wide web.

It is important to emphasize the extreme likelihood that Kurzweil’s transhumanist utopia will not be available to the entirety of humanity but instead will be the domain of a wealthy aristocracy, creating yet another class system. Kurzweil admits this in his 1999 book The Age of Spiritual Machines, labeling those who refuse or are incapable of cybernetically augmenting themselves as MOSHs – Mostly Original Substrate Humans.

This will create a future that more closely resembles the upcoming dystopic Matt Damon movie Elysium than a true technological nirvana for all mankind, with the mass of humanity trapped in their limited organic bodies while the elite become vastly more intelligent thanks to cybernetic brain-interface upgrades.

People involved in unskilled labor will become superfluous when their jobs are replaced by machines and, “There is almost no human employment in production, agriculture, and transportation,” writes Kurzweil.

Humans who resist the pressure to alter their bodies by becoming part-cyborg or are unable to afford such procedures will be ostracized from society. “Humans who do not utilize such implantsare unable to meaningfully participate in dialogues with those who do,” writes Kurzweil.

As Kurzweil entertains in his book, this will inevitably lead to the very situation described by none other than Unabomber Theodore Kaczynski – widely quoted by Kurzweil and fellow futurist Bill Joy – where the elite will see the mass of humanity as worthless parasites and either prevent them from reproducing via mass sterilization programs or simply slaughter them outright.

“Due to improved techniques the elite will have greater control over the masses; and because human work will no longer be necessary the masses will be superfluous, a useless burden on the system. If the elite is ruthless they may simply decide to exterminate the mass of humanity. If they are humane they may use propaganda or other psychological or biological techniques to reduce the birth rate until the mass of humanity becomes extinct, leaving the world to the elite,” wrote Kaczynski in his manifesto, a key passage quoted in Kurzweil’s book.

Another aspect that Kurzweil has not touched upon in his public appearances is the downright creepy ending to his 2099 prediction which features in chapter 12 of his book. Throughout the book, Kurzweil communicates with a fictional character called Molly who is living through all the different time periods Kurzweil anticipates, from 2009 to 2099.

By 2029 Mollly has dumped her loving but pathetically human husband Ben and chosen instead to pursue an intimate relationship – including virtual reality fornication – with her artificially intelligent lover George – a computer program.

By 2099, Molly has uploaded her own brain into a computer program and merged with George to create a hive mind – one that now has sex with itself.

When Kurzweil questions ‘Molly’ about whether or not the new creation truly represents the original Molly – whose human body has long since perished and been replaced by a virtual reality projection, the Molly/George hive computer mind gets defensive and swears that it really is the original Molly.

The dialogue ends with Kurzweil basically insinuating that he too would like to have sex with the Molly/George assimilation, leaving the reader with the impression that Kurzweil’s obsessive pursuit of singularity is not merely a desperate attempt to hide from the fear of death, but also a weird kind of sexual fetish.

While everyone would welcome some of the technological advancements predicted by Kurzweil, most notably the virtual elimination of all diseases, his fixation with cheating death by achieving technological singularity has several dark spiritual and practical overtones that have not been properly debated.

Moral considerations are once again being cast aside in the feverish pursuit of technological progress at all costs.

*********************

Paul Joseph Watson is the editor and writer for Infowars.com and Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a host for Infowars Nightly News.

pollen-burst

Kurt Nimmo
Infowars.com
June 20, 2013

The journalist Michael Hastings, who died in what authorities have described as a high-speed car crash, was an active member of Project PM, a crowd-sourced research effort to expose government intelligence contractors.

The login screen for Trapwire, software used for intelligence-gathering on U.S. and global citizens and made public in a Wikileaks data dump.

“If you care that the surveillance state is expanding in capabilities and intent without being effectively opposed by the population of the West, you can assist in making this an actionable resource for journalists, activists, and other interested parties,” the Project PM wiki states. “Consider doing a bit of research on the companies and government agencies listed on this wiki, or even adding new topic for investigation by our participants.”

Barrett Brown, the founder of the initiative, was arrested by the FBI and faces up to 105 years in prison. Brown is described as the “brain trust” for the hacktivist group Anonymous.

Two indictments against Brown are for allegedly “threatening of an FBI officer in a YouTube videoand the concealing of evidence,” writes Patrick McGuire for Vice.com, and “do not seem worthy of such a harsh sentence, considering a man in Houston recieved only 42 months for threatening to blow up an FBI building, and a former dentist got 18 months for threatening to kill an FBI agent. The third, however, pertains to Barrett Brown’s pasting of a link in an Anonymous IRC chat room to a document full of credit card numbers and their authentication codes that was stolen from the security company Stratfor, in the midst of a hack that released over five million internal emails. Those emails were published to Wikileaks.”

Brown’s Stratfor hack revealed the inner workings of Trapwire software. It purportedly acquires video from far-flung surveillance cameras located in stores, casinos and other businesses around the country and uses sophisticated facial recognition software to identify people of interest captured by ubiquitous cameras numbering in the millions.

Trapwire software is a significant breakthrough for the surveillance state. It was uncovered by security researcher Justin Ferguson. He delved into the massive pile of emails hacked by Brown from Stratfor – the Austin-based firm regarded as a shadow CIA – on Christmas of 2011. In response to Ferguson’s discovery and the Trapwire revelation, Wikileaks was hit with a large scale distributed denial-of-service (DDoS) attack.

Brown discovered the software produced by Trapwire is owned by Cubic, a San Diego company acquired by Abraxas Corporation. Barrett also uncovered tax returns calling into question Cubic’s denial that it is not affiliated with Trapwire and the software.

Abraxas is run by a former CIA spook, Richard Helms (not to be confused with the CIA director under Nixon). He was also one of the original assignees to its Counter Terrorism Center in the mid-1980s.

Moreover, according to Florida State’s records of corporations, Helms is the director of Ntrepid, a company that won a $2.76 million dollar contract from Centcom, the U.S. Central Command. Ntrepid innovated a product called Tartan, a program that can “analyze illicit organizations and less structured social networks by identifying: Ranks of influence within human networks… [and can] end the use of [online] aliases.”

“Clearly they are looking to dismantle the smoke and mirrors that groups like Anonymous maintain, by hanging out in chatrooms where they do not need to identify themselves officially, with many private communications happening at once,” writes McGuire. “This creates a difficult-to-penetrate den, where people can easily hide online. Evidently, Ntrepid is seeking to pull all of that apart with Tartan.”

Michael Hastings’ association with Barrett Brown and his work on Project PM, in addition to his outing a top U.S. general responsible for conducting the war in Afghanistan – a key mantlepiece in the manufactured war on terror – undoubtedly put him at risk and resulted in his assassination.

It can no longer be claimed that Hastings was merely the victim of a car accident. He was specifically targeted for his investigative journalism, most recently stories he was developing on the FBI and the CIA, as we noted earlier today.

Obviously, the intelligence and surveillance state is intimately involved in an effort to eliminate whistleblowers and journalists who get too close to the truth. The murder of Michael Hastings should send a chill down the spine of journalists everywhere, especially those in the alternative media.

 

pollen-burst-berry-burst