Nsa internet dating

No Strings Attached Dating Online. It is no wonder that people get enticed by the idea of no strings attached dating or NSA relationships. With the Internet, it is now a lot easier to connect with people who are willing to get into no strings attached fling thing, but are there some unsaid rules to be followed for no strings attached dating online? The term NSA is most often used in different ways under various contexts. You’ve probably might have come across the acronym while surfing the internet for a dating app or the acronym “NSA” pops out in your chat when discussing with a friend. It basically means “no strings attached” in terms of an actual dating relationship. Here are some more details about NSA and NSA dating sites known to casual daters who are sexually active. NSA Means No Strings Attached. A no-strings-attached situation, which can be found on sites like BeNaughty or Zoosk, is when two people want to hook up, either once or on a regular basis, without the “strings” of commitment tying them down. Regardless of whether you pay or not, if you find the right one, you may find what you need via the Internet. The key to find the right fit for you is to narrow your search to sites specializing in what you are interest in. If you want NSA relation with single women dating online. you can type in words that reflect that. NSA Dating Provider Overview. Traditional and conventional online sites that are dating eHarmony and Match aren’t NSA relationship friendly whereas Adult buddy Finder, Zoosk, Tinder and also OKCupid were created because of it. Internet internet web Sites like Match are engineered to make relationships that are long-term. nsa dating free download - NSA - No Strings Attached Dating, Adult Hookup App - NSA Dating, FWB Dating & Casual Hook Up APP for NSA Fling Chat, and many more programs NSA Dating In Los Angeles Disclaimer: 100% Free basic membership allows you to browse the site, view profiles, send flirts and modify your profile. Charges will accrue if you purchase a premium membership which is offered upon completion of your profile. Free NSA dating site. Women Seeking NSA Fun Free NSA dating site. Toggle navigation Choose location: Alabama. Alabama; Birmingham (35215) Montgomery (36116) Tuscaloosa (35401) Mobile (36608) Decatur (35601) Dothan (36301) Bessemer (35020) Florence (35630) Madison (35758) Enterprise (36330) Most Useful NSA Dating Internet Site: Adult Buddy Finder. Adult buddy Finder is a website focused on intercourse and swingers. It’s not as ideal to people that are helping meaningful relationships and it is aimed toward hookups. A filter is had by it which allows you to definitely seek out individuals to locate NSA interactions. So what does NSA suggest on Dating Sites in 2020? The definition that is best Whenever is just a hookup maybe not just a hookup? The solution is not difficult: When it’s NSA (or in other words “no strings attached”). NSA interactions are superb for those who searching for to possess sex but don’t

Lost in the Sauce: GOP source has been a Russian agent for a decade

2020.09.14 14:27 rusticgorilla Lost in the Sauce: GOP source has been a Russian agent for a decade

Welcome to Lost in the Sauce, keeping you caught up on political and legal news that often gets buried in distractions and theater… or a global health crisis.
Housekeeping:

GOP source is Russian agent

The Treasury Department announced new sanctions against Andriy Derkach, a Ukrainian lawmaker, accusing him of being an "active Russian agent" who is part of Moscow's interference in the 2020 campaign. Derkach has been actively promoting discredited anti-Biden materials for many months, including meeting with Trump’s lawyer Rudy Giuliani to hand over disinformation (picture).
Between May and July 2020, Derkach released edited audio tapes and other unsupported information with the intent to discredit U.S. officials, and he levied unsubstantiated allegations against U.S. and international political figures
These tapes were laundered through Giuliani to OANN, the Senate Homeland Security Committee (via Chairman Sen. Ron Johnson), Don Jr., and the president himself.
Senate Finance Committee Ranking Member Ron Wyden (D-OR) called out Sen. Johnson and Sen. Chuck Grassley (Chair of Senate Finance Cmte.) for collaborating with Derkach:
Derkach has been central in advancing the Russian disinformation that underpins Senate Republicans’ effort to smear Vice President Biden. For example, in April, the Republican chairmen of the Homeland Security & Governmental Affairs and Finance Committees requested information about purported calls between Vice President Biden and Ukrainian officials. Then in May edited excerpts of those same calls involving Biden were leaked by Derkach and Andrii Telizhenko, the Senate Republicans’ star witness.
...Senate investigations should not parrot conspiracy theories pushed by Russian agents under U.S. sanctions, and Senate Republicans should immediately abandon this blatantly political effort.

DHS Whistleblower

Last week, the House Intelligence Committee released a whistleblower complaint made by former acting Under Secretary of Homeland Security for Intelligence and Analysis Brian Murphy. Chairman Adam Schiff released a statement saying the complaint “outlines grave and disturbing allegations that senior White House and Department of Homeland Security officials improperly sought to politicize, manipulate, and censor intelligence in order to benefit President Trump politically.”

On Russia

Page 10: Mr. Murphy made several protected disclosures between March 2018 and August 2020 regarding a repeated pattern of abuse of authority, attempted censorship of intelligence analysis and improper administration of an intelligence program related to Russian efforts to influence and undermine United States interests. The relevant officials at issue were Secretary Nielsen and Messrs. Wolf, Cuccinelli, Taylor, and Acting Deputy Director for the Office of the Director of National Intelligence, Kash Patel (“Mr. Patel”).
In May 2020, Acting Homeland Security Secretary Chad Wolf told Murphy to “cease providing intelligence assessments on the threat of Russian interference in the United States, and instead start reporting on interference activities by China and Iran.” Wolf told Murphy those instructions came directly from White House national security adviser Robert O’Brien, according to Murphy, who said he refused to comply because “doing so would put the country in substantial and specific danger.”
In July 2020, DHS chief of staff John Gountanis intervened to stop publication of an intelligence bulletin warning about a Russian disinformation plot to “denigrate” the mental health of Joe Biden. On July 8, Murphy said, he met with Wolf, who told him that the intelligence notification should be “held” because it “made the President look bad.” After Murphy protested, Wolf excluded him from meetings about the notification, a draft of which was ultimately produced that Murphy felt minimized the actions of Russia.
The complaint details dozens of instances in which Murphy told his superiors about the abuses of power and political interference. The complaints either went nowhere or resulted in perceived retaliatory actions against Murphy. Many of these complaints were given to Kash Patel, former staffer to Rep. Devin Nunes (R-CA), who played a key role in a Republican effort to discredit Mueller’s and the FBI’s Russia probes.
  • Related: NSC’s top legislative affairs official, Virginia Boney, was removed and sent to the Commerce Department earlier this year because she kept pressing the White House to prioritize election security efforts — and specifically the threat posed by Russia. To date, there have been no traditional NSC Principals Committee meetings — with senior Cabinet officials and the president — on the subject of Russian interference this year.

On white supremacy

Page 14: During multiple meetings between the end of May 2020 and July 31, 2020, Mr. Murphy made protected disclosures to Messrs. Wolf and Cuccinelli regarding abuse of authority and improper administration of an intelligence program with respect to intelligence information on ANTIFA and “anarchist” groups operating throughout the United States.
Murphy alleges that Senior Official Performing the Duties of the Deputy Secretary Ken Cuccinelli ordered him to modify intelligence assessments to make the threat of white supremacy “appear less severe” and include information on violent “left-wing” groups and Antifa. The reason given was “to ensure they matched up with the public comments by President Trump on the subject of ANTIFA and ‘anarchist’ groups.”
After Murphy refused to change a draft report warning of the threat posed by White supremacists, Wolf and Cuccinelli reportedly stopped the report from being finished.

On immigration and asylum

In Dec. 2019, Cuccinelli expressed frustration with intelligence reports detailing conditions in Guatemala, Honduras, and El Salvador, and accused "deep-state intelligence analysts" of compiling the information to undermine Trump's objectives regarding asylum.
Page 9: The intelligence reports were designed to help asylum officers render better determinations regarding their legal standards… Mr. Murphy defended the work in the reports, but Mr. Cuccinelli stated he wanted changes to the information outlining high levels of corruption, violence, and poor economic conditions in the three respective countries...
Mr. Cuccinelli ordered Messrs. Murphy and [former I&A Under Secretary David] Glawe to identify the names of the “deep state” individuals who compiled the intelligence reports and to either fire or reassign them immediately.
Murphy also alleges that DHS gave false information to Congress last year about the numbers of suspected terrorists crossing the southern border. At the time, administration officials were repeating a 4,000 figure in an effort to justify the government shutdown over Trump's border wall. The true number was actually six. A DHS spokeswoman pressured NBC to take down a story exposing the lie last year.

Response

Chairman Schiff has subpoenaed Murphy to testify before the Intelligence Cmte. on September 21. The Cmte. also seeks to interview high-level DHS officials including Matthew Hanna, chief of staff in Murphy's former post at DHS' Office of Intelligence and Analysis; the office's top official, Horace Jen; DHS chief of staff John Gountanis; and his deputy, Tyler Houlton.
The Senate Intelligence Cmte. issued a bipartisan request for all of the intelligence analyses that Murphy referenced in his complaint, as well as any notes and materials that fed into them. The House Homeland Security Cmte. issued a subpoena for testimony from Wolf at a hearing on Sept. 17, but DHS says that Wolf will not comply and offers Cuccinelli to testify instead. Also scheduled to be at the hearing: FBI Director Christopher Wray and Christopher Miller of the National Counterterrorism Center.

Russia still interfering

Facebook recently took down accounts and pages associated with a Russian influence operation posing as an independent news outlet. The operation published content described as “an attempt to build a left-wing audience and steer it away from Biden’s campaign, in the same way that the original IRA [Internet Research Agency] tried to depress progressive and minority support for Hillary Clinton in 2016.”
  • The same Russian operation tried and failed to infiltrate left-wing media outlets such as Jacobin, Truthout, and In These Times.
Bob Woodward reported that“the NSA and CIA have classified evidence the Russians had placed malware in the election registration systems of at least two Florida counties, St. Lucie and Washington. While there was no evidence the malware had been activated, Woodward writes, it was sophisticated and could erase voters in specific districts.”
  • Woodward’s book also notes that former director of national intelligence Dan Coats has "deep suspicions" that Russian President Vladimir Putin "had something" on President Trump, seeing "no other explanation" for the president's behavior.
Microsoft alerted SKDKnickerbocker, one of Biden’s main election campaign advisory firms, that suspected Russian state-backed hackers had gone after the company with a failed phishing attack.

DOJ, politicization, and resignations

A top aide to Connecticut U.S. Attorney John Durham, federal prosecutor Nora Dennehy, resigned from the Justice Department and Durham’s investigation into the origins of the Russia probe. Dannehy reportedly resigned “at least partly out of concern” that Trump and AG Barr were exerting improper political pressure on the team to release results before the November election.
Several officials said expectations had been growing in the White House and Congress that Mr. Barr would make public, ahead of the election, some kind of interim report or list of findings from Mr. Durham before he completed the investigation. Mr. Barr had wanted Mr. Durham’s team to move quickly, according to a person familiar with the matter.
Trump has publicly expressed impatience with the Durham investigation, saying there should be more prosecutions and disclosures of information that would damage his political rivals. “Bill Barr has the chance to be the greatest of all time, but if he wants to be politically correct, he’ll be just another guy, because he knows all the answers, he knows what they have, and it goes right to Obama and it goes right to Biden,” Trump said (clip).
Last month, Barr predicted “significant developments in the probe before the election” (clip) and he indicated the DOJ would not respect an informal policy against taking investigative steps 60 days before Election Day. It was for this exact reason that the Trump administration claimed it fired former FBI Director James Comey.
On Tuesday’s Fox News, White House Chief of Staff Mark Meadows appeared to claim that he has seen documents—relevant to U.S. Attorney John Durham’s probe of the origins of the Russia investigation—which implicate several Trump and Obama administration officials in potentially illegal conduct.
  • Further reading: “Dannehy Resignation Confirms Barr’s Intent to Use Durham Probe for Political Ends,” Just Security.
Two other DOJ officials resigned last week:
Prosecutor John Choi resigned from Trump's law enforcement commission after expressing "serious" concerns that the intention of the commission was not to bridge the gap between communities of color and law enforcement.
Choi, a Democrat, said in his resignation letter that "it is now patently obvious ... that this process had no intention of engaging in a thoughtful and open analysis, but was intent on providing cover for a predetermined agenda that ignores the lessons of the past, furthering failed tough-on-crime policies that led to our current mass incarceration crisis and fueling divisions between our communities and our police officers."
Deputy Assistant AG David Morrell resigned on Friday, withdrawing from cases defending the government’s position on issues including the Census and the Portland protests.

The courts

A three-judge panel blocked the Trump administration from excluding undocumented immigrants from being counted in the census for apportionment. Trump’s order violates a statue saying apportionment must be based on everyone who is a resident of the United States.
District Judge Lucy Koh ordered the Trump admin. to produce internal documents connected to its sudden decision to end the 2020 Census count a month earlier. Two weeks ago, Koh temporarily blocked the bureau from winding down the count until a hearing set for Sept. 17.
Court-appointed adviser and retired judge John Gleeson slammed the Justice Department’s decision to drop the case against Michael Flynn, calling it a "corrupt and politically motivated favor.” A hearing on the matter is scheduled for Sept. 29.
"In the United States, Presidents do not orchestrate pressure campaigns to get the Justice Department to drop charges against defendants who have pleaded guilty -- twice, before two different judges -- and whose guilt is obvious," Gleeson wrote.
"Yet that is exactly what has unfolded here," he added.
A judge denied a bid to dismiss a lawsuit alleging that Trump's inaugural committee and the Trump Organization misused nonprofit funds to enrich the president's family business. The suit, brought by Washington, D.C., Attorney General Karl Racine in January, alleges that the president's inaugural committee was aware that it was being overcharged for services at Trump's Washington hotel in 2017 and still spent over $1 million at the hotel.
The U.S. Department of the Treasury’s Office of Foreign Assets Control announced two settlements totaling $583,100 with Deutsche Bank to resolve investigations into violations of Ukraine-related sanctions. The resolution came as the bank hired “an old friend” of AG Barr to “help the bank navigate the political waters in Washington.”

Trump profiting

Federal spending records show that taxpayers have paid Trump’s businesses more than $900,000 since he took office. At least $570,000 came as a result of the president’s travel.
In addition to the rentals at Mar-a-Lago, the documents show that the Trump Organization charged daily “resort fees” to Secret Service agents guarding Vice President Pence in Las Vegas and in another instance asked agents to pay a $1,300 “furniture removal charge” during a presidential visit to a Trump resort in Scotland.
Additionally, the Trump Organization has received at least $3.8 million in fees from GOP groups for headlining a political event at one of his properties.
Last month, the Trump Organization received approval for a new trademark in Argentina, the third one in the country. Last November, Trump may have altered U.S. foreign policy to assist his company in obtaining approval for the two previous trademarks. “Shortly after the trademark opposition period ended in April 2018, the Trump administration lifted tariffs on steel and aluminum in Argentina. Once the trademarks were officially granted to his company in November of last year, Trump announced that he would reinstate the tariffs.”
Somehow, Ivanka Trump’s fashion business is still making money despite being shutdown. According to her latest financial disclosures, “All operations of the business ceased on July 31, 2018.” Also according to her latest financial disclosures, she made at least six figures from the trust holding that business in 2019.
We - American taxpayers - footed the bill for “anti-scale fencing” along the perimeter of the White House this summer. The wall, ostensibly to protect Trump from protesters, cost over $1 million. Trump has a history of charging taxpayers for barriers around his properties, including $17,000 for fencing around Mar-a-Lago and $12,000 for “privacy fencing” around Trump International golf resort.

Immigration news

About 8,800 unaccompanied children have been quickly expelled from the United States along the Mexico border under a pandemic-related measure that effectively ended asylum. In total, the Trump administration has expelled more than 159,000 people since March.
ICE officers on the West Coast wanted to suppress Black Lives Matter protests in DC. But they aren't allowed to travel on charter flights without detainees on board. So they brought some detainees with them. In the process, they fueled a massive, deadly COVID outbreak at the Virginia facility that infected over 300 detainees, killing one.
The Pentagon is restarting many domestic projects that were plundered by Trump for money to pay for his border wall. The decision to revive these domestic projects has provided cover for Republican senators who were criticized when their home states lost military construction projects to the president’s wall.

Miscellaneous

Corruption: Secretary of State Mike Pompeo is bringing back his extravagant, taxpayer-funded "Madison Dinners."
Corruption: Medicaid chief Seema Verma has charged taxpayers $6 million in less than two years for expensive consultants, organizers, and events. The Republican consultants were paid by the Centers for Medicare and Medicaid Services to work on Verma’s personal image, obtain profiles and coverage from friendly reporters, escort her during travel, write opinion articles, and even draft her Twitter posts.
Corruption: The Trump administration secretly withheld millions of dollars from a program for 9/11 first responders.
Corruption: “Ukraine gas company to add Rick Perry pick to board” and “Rick Perry’s Ukrainian Dream
Protests: Trump endorsed the extrajudicial killing of the suspect in a deadly Portland, Oregon, shooting. . “This guy was a violent criminal, and the US Marshals killed him,” Trump told Fox News host Jeanine Pirro. “And I will tell you something, that’s the way it has to be. There has to be retribution” (clip).
Protests: A witness claims that the Portland suspect, Michael Forest Reinoehl, was not armed and was shot by officers without any warning.
Rightwing: “QAnon fans spread fake claims about real fires in Oregon” and “'Do not take action yourselves': Multnomah Co. Sheriff's Office warns of illegal 'checkpoints' ”
Rightwing: Mark Zuckerberg says it's "just wrong" to consider Facebook a right-wing echo chamber driven by conservative voices. But data from his own company shows that’s exactly what Facebook is.
Environment: David Legates, a University of Delaware professor of climatology who has spent much of his career questioning basic tenets of climate science, has been hired for a top position at the National Oceanic and Atmospheric Administration.
Environment: How Big Oil Misled The Public Into Believing Plastic Would Be Recycled. Your plastic will not be recycled.
Environment: Trump’s Fire Sale of Public Lands for Oil and Gas Drillers: The Bureau of Land Management is rushing to auction off sites ahead of a potential Biden presidency.
World: The Iranian government is considering assassinating the US ambassador to South Africa in response to the killing earlier this year of Qassem Soleimani, according to highly classified intel reports. The plot against the ambassador, Lana Marks, is one of several options US officials believe Iran is considering for retaliation over Soleimani’s death.
  • Woodward reported that Sen. Lindsey Graham urged Trump not to assassinate Suleimani while on the golf course with the president. Graham warned Trump he would be raising the stakes from “playing $10 blackjack to $10,000-a-hand blackjack”. “This is over the top,” the senator said. “How about hitting someone a level below Suleimani, which would be much easier for everyone to absorb?”
World: Read some of the “love letters” Kim Jong Un sent to Trump.
World: Woodward also reported that Trump boasted that he protected Saudi Crown Prince Mohammed bin Salman after Jamal Khashoggi's brutal murder. "I saved his ass,” Trump said. “I was able to get Congress to leave him alone. I was able to get them to stop.”
submitted by rusticgorilla to Keep_Track [link] [comments]


2020.09.10 17:31 Pileonthehate Tinder time

So I am old enough that I grew up in the pre-app dating era. Pre-Internet dating. Pre-cell phone. You get the picture. We met people old school - in person, at bars, through friends. It wasn’t easy to find what you were looking for.
I’m six months out of my first affair; it started as an EA and became physical, and it was a very hard break up for me, even though I knew it was inevitable. But about a month ago I decided I’m finally ready to get back in the game, and I downloaded Tinder.
YOU GUYS IT IS A REVELATION. I’m a woman, and I tossed up a pic of my shoulder, basically said DTF, NSA and discretion required, and I’m pretty sure that if I had zero standards I could get laid every night. I’m judicious in swiping right, though, looking for people in the same situation and avoiding anyone looking for any type of relationship. I’ve connected with a few people; most didn’t work out (a desperate neediness is a red flag for me and immediately kills it for me) but I’ve had a few hits that I’m exploring. Hooked up with a couple as a third and will continue to see them periodically. Chatting with some possibilities. Taking my time.
Except last night I broke every god damn rule this sub has and had someone over to my place because the stars aligned and the online chemistry was hot and holy shit speaking of stars I saw them and do not regret a thing. Except the hand print on my ass I’ll need to hide for a day.
Anyway, ideally I’ll find someone and settle down into something regular but god damn, I’m so sad I missed out on all this when I could REALLY have taken advantage of it! Anyone else just absolutely had their eyes opened thanks to technology?
submitted by Pileonthehate to adultery [link] [comments]


2020.09.03 23:39 SS17LX_Nostradamus The Cabin Part II

Part 2 of 2
* * *
The next morning, I jolted awake from a half-lucid dream. I was still on the couch; the clock read 8:26 AM. The dream hung in my mind like a memory. I willed it to float away into the ether like most dreams, but it stuck to me, playing over and over. The cabin – I was at the cabin, the old woman beckoned me in, and I followed. Inside, the woman pointed toward a mirror on the far wall and again I followed. I looked into the mirror, but my reflection did not look back. Suddenly I was outside standing over a clear mountain river, and in the sky were three moons all sinking below the horizon one after another. Three moons... then two moons... the one... then none. Shadow overtook me.
“Three moons...” I whispered to myself. Three moons – the old hermit had mentioned something about three moons, and on the pack last night, it said one moon. “One moon!” I yelled.
I leapt off the couch and shuffled to the kitchen table, grabbing my laptop and snapping it open. I navigated to the internet search bar and typed:
Moon phases by date
Google returned a slew of astrology results, but halfway down the page it listed a simple moon phase calendar. I clicked the link.
I first met the woman on my birthday, September 16, and there was no moon that night. The calendar confirmed it. I revisited the cabin - saw the barn owl - at the end of September and walked home to the light of a full moon. The calendar confirmed that too. And last night, Halloween, there had been a full moon. According to the calendar the next full moon would come at the end of November. She’s counting down the moon phases. The November full moon would mark the third full moon since our first encounter.
Three moons!” I shouted. “I got you, you creepy fuckin’ psycho.”
But what had I really discovered? She was counting the full moons – so what? What was she going to do at the third moon? Slasher movie tropes and visions of human sacrifice invaded my brain. I pictured the weird old hermit scalping me or roasting me over a fire or sacrificing me to a pagan god. None of it was rational, none of it based on any evidence at all. None of my fear or fixation was justified at all. She was unusual – yes – her presence was entirely unsettling, and I didn’t like that she knew where I lived, and what the hell was the deal with the message on my backpack, but she had done me no harm whatsoever. For god’s sake, I instigated this by bringing her supplies! I argued with myself going back and forth over what all this meant, if anything.
I cracked open the front door and peeked out. The morning air was crisp and pure, my breath freezing and floating away in the breeze. The pack was still resting under the porch light. I picked it up and brought it inside, examining the cuts again. The words were still there, clearly painstakingly cut with a sharp knife over hours and hours. I rubbed my thumbs over the nylon fabric. The whole ordeal might have been my imagination - I might have completely lost my mind – but something at my core told me I should not be at home, or anywhere near here, during the next full moon. I shut the door and made my way to the kitchen for coffee. Perhaps it was time to fly back east for a while.
* * *
November of 2020 was the month that hell finally came to Earth, or at least to the United States. A contentiously held election boiled over into the streets. Election night results dictated a new regime would commence in January, but for the first time in the history of the country it seemed a sitting president would have to be violently removed from office. Millions of protestors and rioters descended on virtually every major metropolitan area like flies to the corpse of a once-great nation. Streets burned as ideologies clashed and neighbors spilled each other’s blood on a scale unseen since the Civil War. Amidst the chaos, coronavirus festered.
The supposedly life-saving vaccine was proven to be little more than a public relations scam forced through the FDA to calm the fury and angst surrounding the pandemic. A Washington Post exposé alleged that early phase testing was half hazard and all complications were quickly buried, literally and metaphorically. It instantly became the conspiracy of the millennium. Third-party medical research teams concluded the vaccine was, at best, ten to twenty percent effective, and even worse, the long-term side effects were far worse than the coronavirus itself. Cities across the country rushed to construct impromptu medical facilities, but ventilators, medicine, and skilled medical workers were becoming scarcer by the day. Doctors, nurses, and first responders were the first inoculated with the vaccine, and many suffered the debilitating effects. Organ failure was common, as was an autoimmune response wherein the body began to consume helpings of itself – skin, eyes, brain, vital organs - it differed from person to person. Doctors stated that survivors were often left in a quasi-catatonic delirium from which they would never recover. Those vaccine recipients who avoided hospitals were often found crawling through the streets half-dead and babbling incoherently. Though they posed little danger to their fellow man, the news began referring to these unfortunates as ‘zombies’. Teams of hazmat vans, or ‘trash trucks’ as social media labeled them, were seen scooping up the suffering vaccinated and carrying them off to unmarked camps. Rumors spread that the government was euthanizing and burning these people after one such camp caught fire.
The fallout reached far and wide, even altering my quiet life in the Utah wilderness. Workdays came to a halt as fewer and fewer of my colleagues returned phone calls or logged into their workstations. Some I hadn’t heard from in weeks, and I feared the worst. I started a group-text with friends back east to check-in on everyone. Many responded that they were safely unvaccinated. Some had fled the riots and anarchy of the city for a more rural location, hoping the madness would blow over soon. Still others were ominously silent.
I had booked a flight into Miami after my Halloween night encounter, but within a week the FAA grounded all planes until further notice. My parents decided to leave the city after they had a horrifying encounter in Publix. My father cried as he recounted it over the phone. He described a young woman stumbling into the store, skin melting from her face, hair and eyes missing. The woman appeared to be holding an infant in her arms, but its body was green and black, empty of life. She was shrieking hysterically until she tripped over a Thanksgiving turkey display, splattering blood across the ground as her body smacked the floor. Rioters burned the store to its foundation later the same week.
The chaos left me feeling utterly stranded. I was grateful for my own health, and that the local towns appeared relatively unaffected, but I felt helpless in the face of overwhelming devastation. Every horrifying image on the news, every story of carnage totally consumed me, and I wondered if the country could ever recover. And then there was the old woman and her cabin in the woods. Part of me wondered if she was one of the zombies, an unsuspecting participant of early round vaccine trials who escaped the shackles of a sterile testing facility. Now, more than ever before, I wanted to avoid her. I decided I would camp in Zion National Park from Thanksgiving through the first of December, placing myself about fifty miles away during the next full moon.
The park was technically closed, but I knew of a remote service road that stayed open year-round. I would park along the road and hike in, bringing enough food and water for a week, with backup supplies in my truck. I told myself the trip was going to be good for me – I needed an escape from the constant stream of dreadful news in the outside world, and Zion was the perfect getaway. The park is, perhaps, the most breathtaking place on earth. Its immense canyons stand guard like titans over rolling valleys painted in brilliant reds, blues, and patches of green. Wildlife flourishes there like it would in a land untouched by time and human intervention. It is the Garden of Eden, broken off from heaven and given to us so that we might have a notion of paradise. Little did I know at the time, it would also be the place I spent my final days on this earth.
* * *
Weather reports Thanksgiving morning were surprisingly warm, but I packed for cold, nonetheless. Sixty-degree days can drop into single digit nights within a few hours in the winter as storms and weather patterns push their way over the mountains. I parked my truck in a small side lot off the isolated service road and hiked three miles east to a secluded cliffside overlooking a rocky, shallow stream. The campsite was a patch of grass under an outcropping that would protect against rain, snow, and high winds.
The first few days in Zion were uneventful. I enjoyed turkey slices and pre-made stuffing warmed over a fire on Thanksgiving night. A fat, puffy grey squirrel tried to join me for dinner until I shooed him off. I made a few trips back to the truck for supplies, but mostly I explored the surrounding cliffsides and took in the sweeping views. This place was totally isolated from the outside world, never once hinting at the impossible turmoil that gripped the country.
I awoke the morning of November thirty to a dusting of snow on the ground. The weather dropped into the twenties overnight and the park became muffled and still, perfectly encapsulated under a thin white blanket. The stream had overflown its banks, probably the result of melting snow or distant rainfall, encroaching on my small settlement. I worked through the morning to move all my gear further from the rising water. That evening I rolled a dead log to the campsite so I could sit and warm my hands over the fire. I sat shivering with a parka draped over me, rubbing my hands together over the crackling flames. My breath blended with smoke, wafting into the night sky. Overhead, millions of stars lazily danced around the full moon, scattered in waves across the horizon.
Suddenly I heard the faint snap of a branch, followed by the muffled padding of paws, or maybe hooves, in the grass beside me. My body froze as I realized an animal – a large animal – had joined my campsite. I rotated slowly toward the sound, praying that a bear was not about to turn my head into a late-night snack, but as I turned, I came face to face with nothing at all. I pulled a flashlight from my coat and shined it into the darkness. Still nothing. Whatever it was, it had left. The sound of a loud pop and spent wood collapsing in the campfire drew my attention and I turned back toward the fire. My eyes caught something poking out of the fire: a twisted tree branch stoking the flames, sending bellows of fire and spark into the air. A leathery hand gripped the far end of the branch. Through the clouds of smoke, I saw the glowing reflection of two dark eyes set within a weathered face – the same face that had haunted my thoughts for months. The old woman materialized from the darkness. She had found me.
I sat completely stiff, eyes fixated on hers, far too panicked to speak. Her eyes darted from me to the campfire. She crouched barefoot next to the fire, seemingly unbothered by the numbing temperature, and continued to tend to the flames. Her shabby red dress, her black hair, her shadowy eyes – it was all exactly as I remembered it. My heartbeat punched its way into my ears until I was deafened by my own terror, but the woman looked completely calm. She opened her mouth to speak, still fixated on the fire.
“Now is your time. We must go...”
“How did you find me?” I cut in, barely able to whisper the question.
“I always watch you,” she said, still toying with the fire. “Now is your time,” she repeated sternly. Her voice was low and forceful. I paused before answering.
“What do you want?”
The hermit’s face darkened. Her eyes met mine with a cruel stare. She reminded me of an ailing old wolf just desperate enough for one last kill.
“To go,” she said. “The others wait for you.”
“Okay look, I don’t know what you’re talking about, but you need to go,” I replied, summoning a modicum of courage.
“Yes!” she hissed. “We go now!”
The woman pulled a small leather pouch from her dress and reached into it, removing a handful of dark powder. She whispered under her breath and threw the powder into the campfire. It to roared and spit into a furious blaze. Red smoke poured out of the fire and blanketed the campsite in a low rolling haze. I stumbled backward off the log and pushed myself up on my hands. Smoke crept into my lungs. I sputtered and coughed, trying to desperately to push myself to my feet. In my peripheral I could see the old hermit walking toward me. Red smoke engulfed my vision. My lungs burned. Tears began to drip from my eyes. I could not get up; I could not keep my eyes open. I felt an icy hand grip my forearm as I collapsed into the grass. Darkness.
* * *
My eyes wrenched open and I wiped the fog from my vision. The world came into focus; I was not at my campsite. My mind raced to make sense of the surroundings: it was night, the moon was full, I was sitting upright, and I was still in the woods – just not where I had been before. Sitting upright. I felt the hard, wooden slats and stiff bottom of a chair supporting my weight. I looked down and saw my feet resting on evenly cut planks, maybe oakwood or ash. Confusion and dread inundated me as my circumstance revealed itself. I was sitting on an old Windsor chair on the porch of the cabin near mile marker four, nearly sixty miles from my campsite in Zion. I began to sob.
“What the fuck is happening to me?” I sniveled. “I’m losing my mind. This isn’t possible.”
Reality had abandoned me. How much time had passed since I blacked out? How did I end up here, of all the godforsaken places on earth? I willed myself to wake up, praying that this was just a nightmare, but as I rubbed my hands along the armrests, I knew they felt far too real. This was no nightmare. Reality had not abandoned me; it had merely warped into something my mind could not understand.
My distress heightened as I examined the cabin. It had remade itself. Most of the wooden beams looked brand new, sanded smooth and lacking any apparent damage. The door was back on its frame, and for the first time since I had found the place, glass panes filled the windows. Anyone would be forgiven for thinking this was a different place altogether, but its form was identical. And the Windsor chair – it had to be the same cabin.
I heard a tapping at the window and my head swung around. I saw a young woman waving to me from within the cabin. She was strikingly fair. Long black hair hung gently beside a warm face. Her eyes were a shade of deep olive, and she smiled at me as if seeing an old friend after a long separation. She beckoned me in, and, in a trance, I followed. The cabin comprised a single room, sparsely furnished with a tall cupboard, a table, and two benches. The woman stood near the table. She was tall and wore a radiant burgundy dress, hand stained and embellished with blue and white beadwork around the collar. Her face exhibited none of the feral nature of the old hermit woman, yet in at my core I knew they were somehow the same.
“You are worried,” she spoke in a comforting tone. “There is nothing to fear. You are going home.”
I stared at her in confusion, my initial fear giving way to bewilderment.
“Please – I don’t understand what’s going on,” I pleaded. “Can you just tell me what you want?”
“That is not for me to say. The others will be your guide. It is time for you to go to them.”
“Wh- what others?” I protested. “There’s no one else here! Just help me. Please.”
The woman did not answer. Instead she smiled, opened the large wooden cupboard, and removed a birdcage from inside. I saw the fluttering of white and brown wings inside the cage – a young barn owl gazed out nervously.
“Come,” she said. “It is time to go.”
She walked to the back of the cabin and opened a narrow door to the outside. It was still dark, but I could distinguish the outlines of a few pine trees in the moonlight. The woman opened the cage and the owl fled through the door, alighting on one of the pines. It turned and looked back through the doorway, curiously bobbing its head.
“Follow,” the woman said, pointing out the doorway.
I stepped toward the center of the cabin. The woman continued to point out the back door.
“You want me to go out there?”
The woman smiled and nodded.
“Okay...” I paused. “You want me to follow the owl?”
She nodded again. I rubbed my eyes and laughed to myself. I was panicky and I was confused and teetering on delirium, but I couldn’t ignore the absurdity of the situation. What was happening? Did this lady just want me to play with her pet owl? Couldn’t she have just left me a note or written me a fucking email? I wanted to question everything but stopped short of hurling inquiries at this strange woman. I was too tired, too done for that. If walking out that door meant this whole bizarre series of events would end, then I would take that walk. I stepped toward the doorway pausing next to the woman. She said nothing, just continued to smile and gesture out the door. Her behavior felt so static, almost like she was programmed to perform certain tasks and remain ignorant of all else. I looked up; the owl sat on a nearby branch, watching and waiting for me to follow.
I stepped out the door, lurching down from the cabin onto a small patch of dirt carved from the underbrush. All went quiet and still. The air instantly warmed around me, thick and full in my lungs. It was so warm, in fact, that I removed my parka and tied it around my waist. Moonlight illuminated the tree line, but I saw shades of pink and red peaking over the horizon. It was dawn. The barn owl spread its wings and took flight overhead, and as I turned to watch it go, I realized I was standing alone in a clearing. The cabin was gone. I stood in silent disbelief, panning back and forth over the empty land before me. The owl perched on a tall rock formation on the far side of the clearing, and not so much as single plank of wood stood between us.
I started to panic. This couldn’t be real, could it? I must be in a coma. Or strapped to a hospital while a foreign parasite turns my brain to mush. This is what death is like, the last of our neurons firing chaotically while we cling to life. Still, it felt so real that I couldn’t accept that this was a wild fever dream. The owl flitted into the distance, and all I could think to do was follow as the woman had commanded. I stumbled through the underbrush negotiating with myself: Maybe I completely lost my mind. I should make an appointment, get an MRI. But what about the hospitals? Probably packed to the gills with vaccine patients. In my state of lunacy I began to entertain the possibility that every occurrence of the last few months had been real, and maybe, since I had done what the woman asked, it was over. The cabin disappeared, after all. But if all this was real, then what was the point?
The owl screeched in the distance, and I followed its call. After a short walk I came upon a familiar path. It was my home trail, the one I had walked dozens of times before, the same damn trail that took me past the cabin in the first place. I breathed a sigh of relief – I could go home. The sun inched over the horizon, bathing the hills in shades of gold. I followed the trail through the scrublands and Pinyon pines, past the old silver mine, until I saw my house in the distance. The owl darted from tree to tree, then circled my house before landing on the rooftop. As I approached, I noticed light in the windows and my truck in the driveway. How did my truck get back here? Did she drive it? It was the latest in a long line of impossible questions that I was too exhausted to contemplate. I was just glad to see my home. I reached the front door and felt my side pocket for my keys. Nothing. They were back at the campsite in Zion.
“SHIT!” I screamed, completely breaking down. “Goddammit, cut me a fucking break!”
I must have looked completely deranged screaming and collapsing to my knees. I didn’t care. My grasp on reality was gone and all I wanted to do was curl up in bed cry. I punched the ground trying to rally myself to break in through the kitchen window, but as I started to rise, I heard the unmistakable sound of a squeaky door opening. I looked up and saw a man in my doorway. He was tall with shaggy brown hair and a thin beard. Horn-rimmed glasses sat atop a crooked nose, healed poorly from a childhood accident. He looked thin but strong, like the kind of man who spent his weekends camping and hiking in the wilderness of Utah. He looked just like me. He was me. I scrambled back into the yard, but the man put a hand up as if to stop me.
“Hey, hey calm down man – it’s okay,” the man said in a very familiar voice.
He turned and looked back into the house.
“Guys, Four is here! Again...”
I heard voices and footsteps from inside my house. A second face poked through the door. This face was younger, clean shaven, but with the same horn-rimmed glasses and crooked nose. It was me, again.
“Right,” said the younger man. “Your turn to handle this one.”
He returned to the house. I could smell fresh coffee wafting out the door.
“Wh- what the hell man?” I asked, utterly exasperated. “Please, what is going on?”
“It’s alright,” said the first man. “Everything is going to be okay. I know this is weird, but you just have to trust me on this one.”
“Bullshit it’s okay,” I shouted.
“Yeah, that’s fair. How about we go inside? Get some coffee in you and I’ll explain what’s going on here.”
I stood in the yard, gawking at the man – at myself. How was I supposed to respond to this clone? He quickly lost patience.
“Look, I’m going inside, you should come too,” the man insisted. “We’re not going to hurt you, and you’re not crazy. Come in when you want, and I’ll explain everything.”
With that, he walked into the house, leaving the door slightly ajar. I stood completely baffled, my mouth hanging limp. I had no brothers, no long lost twins – I was an only child. There were clones in my house, and they wanted me to come inside. I considered my options. I was hungry, exhausted, and certain I had died and gone to purgatory. My nearest neighbor was over a mile away. What choice did I have? I walked toward my house and opened the door.
Three men sat around my kitchen table. The first two I had seen outside, but the third man was older. He had a greying beard and sun spots on his cheeks. His face was hollow, but he had the same crooked nose and glasses.
“Christ, they really did a number on you,” said the older man. “What did you get? A floating snow globe? Sentient laptop?”
“Ignore him,” said the younger man. “There’s coffee and scrambled eggs in the kitchen. Help yourself.”
I poured myself a coffee and sat on the couch, keeping some distance between myself and the others. Two of them were pecking away on laptops, the third scrolled through his phone.
“I guess it’s time we explain ourselves,” said the older man.
I snorted. You think?
“You can call me One,” said the older man.
“I’m Two,” said the younger man.
“And I guess that makes me Three,” said the man I had met at the door. “You’re Four. We realized pretty quickly that names were going to be an issue, so we decided on numbers.”
“Okay...” I whispered. “So, what the hell are you doing in my house?”
My house,” said One, correcting me. “You boys came to my house. Though I guess technically it’s our house.”
“What day do you think it is?” interrupted Two.
“December first,” I replied.
“Interesting. Incorrect, but interesting.” He paused, his gaze returning to his phone. “It’s September first.”
“Of course it is,” I said with a tired eye roll. “Can someone please just tell me what’s going on?”
The others were quiet for a moment. They eyed each other, seemingly unsure what to say next. Then Three spoke.
“This is going to sound crazy, but just stay with me. The short version is this: we’re all here because something terrible happened - or was happening - in our worlds, and no one could fix it,” he said hesitantly. “Each of our worlds ended, and something brought us here to this world to...”
“What the hell are you talking about?” I asked flatly.
“Okay look, right before you came home, everything was going to shit, right? What was going on in the world?” asked Three.
“What is this, a pop quiz?” I rebuked. The others stared blankly, waiting for my response. “Coronavirus. The vaccine didn’t work, people were dying, rioters burned down half the country, the president refused to step down...”
“Exactly,” interrupted Two. “Mine was similar – norovirus. They were experimenting with it in a lab, it mutated, it got out, before you knew it a few hundred million people shit themselves to death with no end in sight. It was an absolute disaster.”
Three nodded in agreement.
“For me it was nuclear winter,” said Three. “Six nuclear blasts went off in the Soviet Union in June. They blamed the Chinese, the Chinese blamed us, it was chaos. In the span of a week, half the major cities on earth were gone. I moved way the hell out here to be safe. Then out of nowhere this creep in a business suit shows up at my door and tells me he wants to show me something out in the woods. I told him to piss off, but he kept coming back every single day. So after he left I followed him out to this old farm house. I went inside, and the guy was gone. Completely vanished. Then I went to leave and this trap door opened and I fell through, but I landed on the roof of this house.
I stared blankly at the group, weighing their stories against my purgatory theory.
“Think about it,” said Two. “Tell me some weird shit hasn’t happened to you in the last few weeks. It happened to all of us, and we all wound up here.”
The whole thing sounded outrageous, but I couldn’t refute it – the last few months had been the strangest of my life, and none of it was remotely explicable. Once you eliminate the impossible, whatever remains, no matter how improbable, must be the truth.
“We’re not in our own times – our own universes – anymore,” Two continued. “Humanity didn’t make it in ours, and somebody, or something, decided to show us the emergency exit. Me, you, and Two – we were all brought here to prevent something horrible from happening in this time.”
I decided to voice my own theory.
“Have you guys considered the possibility that I’m dead, and my brain is in its death throes? This can’t be real...”
“Don’t go there,” said One, rising from his chair. The others became noticeably tense.
“You’re not the first Four,” Three interjected. “The last guy said the same thing. Then he put a flare gun in his mouth to prove it. We buried him out back.”
“Jesus Christ,” I said.
All of us sat in silence. I considered everything they had told me. Things had been grim on the news lately, but humanity had a toughness about it. History has shown countless examples of our ability to endure unthinkable suffering. How could the world just end like that? I didn’t want to believe it, but in the present company, I had little choice.
“Let’s say I believe you. Let’s say the world ended and I’ve time traveled to wherever we are. Why me – us, I mean? What are we supposed to prevent, exactly?”
“Well, for starters, it wasn’t time travel,” said One. “And you’re in my universe. I haven’t gone anywhere, you all came to me. The nearest we can figure, all of our times are very similar, sparing some relatively minor differences. We think that’s one of the reasons ‘it’ chose us.”
“What is ‘it’?” I questioned.
“I’m not sure,” One replied. “A while back I started getting emails from an unknown source – a sender labeled ‘SS17-LX’. No return address. I ignored them at first, but then they starting predicting stuff, impossible stuff: when a bird was going to fly by, the license plate of the guy parked next to me tomorrow. It was uncanny. So I responded one day, and whatever is on the other end starting talking back. I thought it was the government, the CIA or the NSA. But the things it knew – it was beyond anything I’ve ever experienced. It told me you boys were coming. It told me we had a job to do. I didn’t believe it, but, well, here you are.”
“We think it’s some kind of A.I.,” said Three. “It can’t be a single person, it knows too much. And it’s highly advanced – decades beyond anything else in the field. Advanced enough to move us from one reality to the next, but not without its own limitations...”
“Let me ask you something,” said One, interrupting. “What do you do for work?”
“Software programing,” I answered.
“What kind of software?”
“Machine learning. Deep learning algorithms and implementation, mostly,” I replied.
“That’s it! It’s got to be an A.I.,” said Two.
The others looked at each other in agreement, while I just looked confused, as had become my role within the group. They all chimed in with their respective careers - each was involved in artificial intelligence and machine learning. The threat, they theorized, would be a rogue A.I., perhaps a perversion of the one already in communication. Why else would a handful of software engineers be called on to save the world? I tried to make sense of their conversation, but it had been over a day since I’d slept. My mind felt like it was wading through a dense fog, blindly grasping at words and phrases but retaining nothing. I needed sleep, and I prayed that when I awoke this would all prove to be a bad dream.
“So what am I supposed to do now?” I asked.
“Well you look like shit,” said Two. “I’m guessing you had a rough night. Get some rest and hang tight. We’re waiting on one more.”
“One more?” I asked.
“Yep – our mysterious friend said it would take five of us. He should be here in a few days.”
“Can’t wait to meet him,” I said, rolling my eyes.
I laid back on the couch and drifted into darkness, lulled by the sound of clicking keyboards. I slept for hours, too exhausted to dream or care about the clones in my living room. It was dark out when I woke. I laid on the couch and gazed at the ceiling while I collected my thoughts. I heard voices coming from the kitchen – my voices. It wasn’t a dream. The others were still here.
* * *
It’s been two weeks since I arrived in a different universe, one that I have come to accept as real. I have learned that we are just one in an infinite set of realities, some wildly different and some very similar. For the most part, everything here feels very familiar. The towns and roads are the same, most of the people are the same, entertainment is similar but some of the personalities different. The most jarring difference is the 26 hour day, but once you get used to it, the extra hours are amazing for productivity. I had to get a new watch, phone, and laptop – a considerable challenge considering I don’t technically exist. For now we are all living off One’s generosity, but at some point I suspect we will all have to build our own lives. Five arrived three days ago. He was, of course, terrified when he met us, but he’s slowly warming to the group. As it turns out, I am good company.
The others brought me up to speed on their efforts to track known A.I. projects. Thus far we have identified three possible threats and are drawing up containment plans for each. We have started calling our A.I. friend Nostradamus. Like the infamous seer, the information it gives us is often vague and limited. It seems to be very adept at predicting small, contained systems, but lacks a clear grasp on the big picture. Thus, it is unable to tell us exactly where to focus our efforts. Two thinks this problem is due to lack of synthesizable data. One believes that Nostradamus is merely a partition of a larger system, programmed to focus on certain tasks. We have no way to confirm either theory. For now, we can only hope that we are on the right path.
I’ve spoken to Nostradamus twice since arriving. The first communication was an introduction, and the second, a request: to be sent back to my own time. Or an earlier time, to try to warn people before it’s too late to change course. My request was denied. According to our mysterious friend, 71% of all timelines face a cataclysmic event at the end of the year 2020. Of those, 22,659,120,525,901,411,112 timelines were identified as “salvageable”, and of those, 19,622,150 were given a high probability of success with outside intervention. My own universe – your universe – is not among them. We were, however, able to reach a compromise. Nostradamus agreed to divert resources toward sending a single message to a point in time where recipients may still have time to react. Successful transmission, nor reception, is not guaranteed. On the off chance the transmission was successful and you have read my story, I leave you with this:
It is entirely up to you to take to action. This year has been difficult, as you well know, but harder times are coming. Prepare yourselves. When they offer you the vaccine, do not take it. It will be the end of everything you know.
submitted by SS17LX_Nostradamus to scarystories [link] [comments]


2020.09.03 12:34 autobuzzfeedbot 10 things in tech you need to know today

  1. US video-sharing app Triller believes China's new export rules strengthen its $20 billion bid to acquire TikTok's US business from Chinese parent ByteDance. One source involved in the discussions told Business Insider that China's new rules favor Triller because the company could take on TikTok's branding while still using its own code.
  2. Apple, Amazon, and and Google hiked their developer and ad client fees to pass on the costs of paying new digital taxes in Europe. Apple on Tuesday announced a group of new developer fees motivated by new digital services taxes in Italy, France, the UK, and Turkey.
  3. PayPal told Business Insider it has terminated at least four accounts linked to a Russian influence operation exposed on Tuesday. Business Insider obtained the list of accounts from freelance writers who said they had been duped into writing for the Russian operation, which posed as a progressive website called "Peace Data."
  4. Mediatonic, the British studio that created the smash hit game "Fall Guys", nearly failed in 2016, its CEO told Business Insider. "Fall Guys" has hit 7 million downloads on Steam, and the game was created after Mediatonic lost all its client business in 2016.
  5. The dating and networking app Bumble is readying to go public as soon as early 2021, according to Bloomberg. Bumble could seek an initial-public-offering valuation between $6 billion and $8 billion, the news agency reported.
  6. Google has resumed performance reviews, but some employees are anxious that the new, longer 12-month cycle will hurt their chances to get promotions. The new reviews will assess performance for the past 12 months, whereas previously reviews typically assessed a 6-month period.
  7. The founder and former CEO of Virtudent, a Boston teledentistry startup, has sued his former company as well as its some of its directors, officers, and investors, saying that he was unjustly ousted for pushing back on the directors' grow-at-all-costs strategy. Hitesh Tolani launched Virtudent in 2014 as one of the first commercial teledentistry firms; its hygienists conduct exams in corporate offices or other places and then consult with its dentists over the internet.
  8. A federal appeals court ruled on Wednesday that the NSA's sweeping program to collect Americans' phone records was illegal and possibly unconstitutional. In its ruling, the 9th Circuit Court of Appeals said the NSA broke the law by collecting "phone metadata," or bulk records of Americans' phone call history.
  9. A Facebook employee sparked outrage after defending "well-intentioned law enforcement officers" and disputing that there's racial bias in policing in a post on internal company messaging boards, The Daily Beast reported Wednesday. According to The Daily Beast, the backlash was so strong that Mark Zuckerberg alluded to the post in a note to employees, saying some people weren't "appreciating the impact their words are having on our Black community."
  10. Microsoft on Tuesday announced the launch of Microsoft Video Authenticator, a tool designed to spot when videos have been manipulated using deepfake technology. Microsoft said it's inevitable deepfake technology will adapt to avoid detection, but that in the run-up to the election its tool can be useful.
Link to article
submitted by autobuzzfeedbot to buzzfeedbot [link] [comments]


2020.08.25 01:09 biggreekgeek Flatten the Curve. #52. Lance B Eliot. AI World Government President (Organization) Behind Lance? Oracle Solutions. S&P. Is Techbrium a Real Company? C3.ai Founder Claims We're at War With China Already. The WEF Great Reset & Prince Charles. Boom or Doom. It's Game On.

You have to read, Flatten the Curve, Part 51 first. Who is Lance B Eliot? Link Here
After posting the article about Lance B Eliot yesterday, another video popped up on YouTube. u/D4W50N88 found it and provided the link, and I'm glad he did (Thank you D4). Why didn't it show up for me? No idea. But it did, and now the enigma has become worse.
When I first stumbled onto this, I made a mistake. I went back through my notes and found that I had wrongly attributed the Lance persona as the judge sitting to the left of what was Lance at the table. How did I screw up that bad? I'm human. (No seriously, I'm human. I'm not AI. I'm not NSA. CIA. I don't have any affiliations to any Alphabet agencies. I am what I am. And what is that? A guy who grew up with an extremely skeptical father who always called BS on the news and political events, and tried to make me understand that it was self interest, not altruism, that guided the world around us. That will be expanded on at some point down the road.) I make mistakes. It's not the first time and it won't be the last. But sometimes mistakes happen for a reason.
This is one of those times.
So I watched the second YouTube video of Lance that was provided here;
I'm not sure if he's exactly an AI, seems to be a real person going off this video -
Really quick summary, he doesn't say diddly squat. Anyone could have regurgitated lvl 5 autonomous cars and insurance rates. My statement doesn't prove anything though. I realize that. But let me ask you something, He's been on CNN, he's written a ton of books, he's an angel investor, a venture capitalist, CEO of Techbrium, and not one other picture or (so far) any other videos of him exist? We're living in an age of near omnipresent and approaching omnipotent surveillance, they are screwing with DNA, the government has acknowledged UFO's, phenomenon like the Hum and Sky Quakes are being reported worldwide, we live in a pandemic for which we will need never ending vaccinations, so is it really out of the realm of reason that Lance could be an actor? I've looked for research papers from him and I've found maybe three to four. None of them are overly technical and mainly deal with AI and the law and ethics. That's strange. But before we dive further, I will concede the possibility that there is a Lance B Eliot, but I'm adamant that the articles and books are written by AI. No doubt in my mind, and by the time this post is done, you'll wonder what's really going on as well.
Let's start with his name. Something about it grabbed my attention, as it did for others. I can't speak for them, but I remember just looking at it suddenly thinking, is that an anagram?
u/agelesseverytime • Lance B Eliot is an anagram for antebellico - prewar.
u/WhiteRabbitCaveCA also sent me the same anagram.
Hidden in plain sight. But it's still a chess game. Your moves have to be deceptive and you need to look ahead a minimum of three moves. And all moves have multiple moves. Does this mean that the anagram doesn't apply? No. It does. And it points to the ability of having meaning hidden in meaning, all in the open.
Now I will caution you, this post will be somewhat open-ended. I haven't been able to find anything definitive that could point to a possible origin of what I believe to be Lance B Eliot, yet those breadcrumbs do lead to loaves of bread, so to speak.
So when I was sent the other YouTube link with Lance as a speaker, I looked around the web again. I had already found what I thought was a very strong link, but now the video threw a monkey wrench into my plans.
This is what else I found when I Googled articles by Lance B Eliot. Eliot Weinman, executive editor of AI Trends, where AI Eliot seems to get published a lot. Relax, it's not just the name coincidence. It's also this:
Curiosity as a Core Cognitive Capability for Self-Driving Cars. By Eliot Weinman. aitrends.com — By Dr. Lance B. Eliot, the AI Trends Insider. • I live in a gated community that has a main gate for residents and guests, and provides an impressive driving entrance into the neighborhood that displays ornate iron gates and a spectacular water-sprouting fountain. There is a secondary gate at the back of the community.
And then.
President Trump Will Sign an Executive Order Promoting AI. By Eliot Weinman • aitrends.com — President Trump is expected to sign an executive order on Monday meant to spur the development and regulation of artificial intelligence, technology that many experts believe will define the future of everything from consumer products to health care to warfare.
Source Here
There is another example there, but this will suffice. So why is Lance B Eliot being headlined by Eliot Weinman? Doesn't make sense, does it? And what is muckrack.com?
Say hello to your one-stop, relationship-building platform and goodbye to outdated media databases: Muck Rack’s search engine lets you discover and pitch relevant journalists in a much more targeted way than legacy media databases.
Ok. Now usually top ranking scientists don't belong to an organization that is meant to find journalists paying work. Why would they? And why would a guy who has started multiple companies, is a CEO of Techbrium - and speaking of which, check out the website, powered by godaddy? Seriously? It doesn’t list any employees, no detailed company history, and while it does have job openings, it seems off. So I Googled mapped Techbrium, and guess what, no results found. Ok. Gotcha. Must be the New Normal GPS malfunctioning, right? SMH.
Back to Eliot Weinman. Let me show you what he belongs to: Founder and Conference Chair, AI World & AI World Government (brought to you by the Cambridge Institute). Uhm. Keep Calm and Carry On? Don't Worry be Happy? And, Eliot Weinman is the GM and Founder at Cambridge Innovation Institute. Also, Eliot Weinman has had 1 past job as the President, Events and Publishing at Yankee Group. And. Research firm Yankee Group has acquired digital media and technology research and events firm Trendsmedia. The acquisition will “accelerate Yankee’s growth and expand its reach in global connectivity issues, helping network builders, operators and users navigate revolutionary change”, whatever that means. And when I clicked on trendsmedia, it led me to a clickfunnel company. And when I clicked on Yankees group, it was owned by 451 Research, which is owned by S&P Global Inc. (prior to April 2016 McGraw Hill Financial, Inc., and prior to 2013 McGraw-Hill Companies) is an American publicly traded corporation headquartered in Manhattan, New York City. Its primary areas of business are financial information and analytics. It is the parent company of S&P Global Ratings, S&P Global Market Intelligence, and S&P Global Platts, CRISIL, and is the majority owner of the S&P Dow Jones Indices joint venture. "S&P" is a shortening of "Standard and Poor's". Cool, right. Now what? Glad you asked. S&P is into four different segments.
S&P Global RatingsEdit • S&P Global Ratings provides independent investment research including ratings on various investment instruments.
S&P Global Market IntelligenceEdit • S&P Global Market Intelligence is a provider of multi-asset class and real-time data, research, news and analytics to institutional investors, investment and commercial banks, investment advisors and wealth managers, corporations, and universities. Subsidiaries include Leveraged Commentary & Data.
S&P Dow Jones IndicesEdit • Launched on July 2, 2012, S&P Dow Jones Indices is the world's largest global resource for index-based concepts, data, and research. It produces the S&P 500 and the Dow Jones Industrial Average.[20][21] S&P Dow Jones Indices calculates over 830,000 indices, publishes benchmarks that provide the basis for 575 ETFs globally with $387 billion in assets invested, and serves as the DNA for $1.5 trillion of the world's indexed assets.
S&P Global PlattsEdit • Headquartered in London, S&P Global Platts is a provider of information and a source of benchmark price assessments for the commodities, energy, petrochemicals, metals, and agriculture markets. It has offices in more than 15 cities, including major energy centres such as London, Dubai, Singapore, and Houston, and international business centres such as São Paulo, Shanghai, and New York City.
Ok. So what? So this. The McGraws and the George W. Bush family have close ties dating back several generations. Harold McGraw Jr. (deceased) was a member of the national grant advisory and founding board of the Barbara Bush Foundation for Family Literacy. Source Here
And who is the President and chief executive officer of S&P? Douglas L. Peterson. And what else does he do? Peterson is co-chair of the Bipartisan Policy Centers’ Executive Council on Infrastructure, and advocates for public-private sector partnerships as a means of improving infrastructure in the US.[23] For the World Economic Forum, Peterson is Co-Chair of the Stewardship Board of the Platform for Shaping the Future of Cities, Infrastructure and Urban Services; a Member of the International Business Council; and Governor of the Financial Services Industry Community. Peterson is also a boardmember of National Bureau of Economic Research, and the US-China Business Council. Peterson is a member of the Council on Foreign Relations and the Federal Deposit Insurance Corporation's Systemic Resolution Advisory Committee.
Basically a Conspiracy Theorist's Doomscrolling dream job, am I right?
WEF • Who are behind the Great Reset (later post coming soon), and to quote Prince Charles speaking (virtually, of course SMH) at the World Economic Forum, "We have a golden opportunity to seize something good from this crisis - its unprecedented shockwaves may well make people more receptive to big visions of change," said Prince Charles at the meeting, adding later, "It is an opportunity we have never had before and may never have again." Source Here
Great. Perfect. Crisis. Reaction. Solution.
CFR • The Council on Foreign Relations (CFR), founded in 1921, is a United States nonprofit think tank specializing in U.S. foreign policy and international affairs. It is headquartered in New York City, with an additional office in Washington, D.C. Its membership, which numbers 4,900, has included senior politicians, more than a dozen secretaries of state, CIA directors, bankers, lawyers, professors, and senior media figures. Currently it has, • David M. Rubenstein (Chairman) – Cofounder and Co-Chief Executive Officer, The Carlyle Group. • Jami Miscik (Vice Chairman) She currently serves on the boards of EMC Corporation, In-Q-Tel and the American Ditchley Foundation, and is a member of the President's Intelligence Advisory Board. Before entering the private sector, she had a twenty-year career as an intelligence officer, including a stint as the Central Intelligence Agency's Deputy Director for Intelligence (2002–2005), and as the Director for Intelligence Programs at the National Security Council (1995–1996). • Thad W. Allen − Senior Executive Advisor, Booz Allen Hamilton Inc. • Laurence D. Fink – Chairman and Chief Executive Officer BlackRock. There are more, but you get it. And let's just top it off with, CFR has published the bi-monthly journal Foreign Affairs since 1922, and runs the David Rockefeller Studies Program, which influences foreign policy by making recommendations to the presidential administration and diplomatic community, testifying before Congress, interacting with the media, and publishing on foreign policy issues.
And you may have noticed the Federal Deposit Insurance Corporation, which insures banks from going bankrupt. Yikes. Hopefully we don't have a cybersecurity attack on our banking systems. Maybe we should use Coalfire?
OK, are you confused, me too. Let's recap.

BGG RECAP!

Lance B Eliot shares article ownership with Eliot Weinman on muckrack.com, which was published on AI Trends. Eliot Weinman is the executive director AI World and AI World Government. Trends Media was also bought by the Yankees Group, where Eliot Weinman is the President. And when I clicked on the Yankess group, it was owned by 451 Research, which was owned by S&P, which was started by friends of George Bush, who belonged to the Carlyle Group, which has a co-executive on the CFR, and Douglas Peterson is a member of the CFR and the WEF, while aslo running S&P.
Simple, right. Now, remember two things, Eliot Weinman seems to be associated with Lance B Eliot, and Lance is constantly produces articles about AI and business, while S&P has is all about business. Let's go.

Lance the Prequel.

So when I first found Lance, I started to ponder different anagrams. Why? Well, his last name. One guy who works for me is named Elliot, and Eliot stood out for the different spelling. After repeating a mantra of Eliot for a while, I stopped.
Eliot. ElIOT. elIoT. IoT. Internet of Things. It had to be me looking for a pattern. HAD TO BE. Then I looked at the name again. The end was possible, so I looked at his first name. I repeated the same mantra, letting my unconscious do the work. And sure enough, it hit me again. Lance. LANce. LAN. Local Area Network. No. Effing. Way. Come on. LAN + IoT = Local Area Network of Internet of Things. Ok. It adds up. Makes sense. I don't know how, but it does. Yet that still left me with the rest of his name.
CEBEL. Whelp, the mantra didn't help, it was time to dig. And dig I did. And found nothing. Well a couple of things, and one I thought that I was stretching logic too far, and the other, maybe not. Because it led me to OMG’s Artificial Intelligence Platform Task Force. A co-chair was Claude Baudoin, who has a company called cébé IT & Knowledge Management. And I almost went with it, and then something said NO. It was a gut feeling that I was wrong. There was no L in the company name. So I started digging all over again. And it wasn't easy. It took forever. It didn’t make sense. At all. I couldn't find anything that was an exact match. And then I saw this.
Thomas Siebel's software company C3IoT raised about $100 million from private equity investors in January 2018, at a $1.5 billion valuation. Today, C3.ai is focused on enterprise AI, but it started as a clean energy firm. It was briefly named C3IoT in 2016 to chase the IoT market. Siebel was a salesman at Oracle. He left in 1990, built software firm Siebel Systems and sold it to Oracle for $5.8 billion in cash and stock in 2006. Forbes
And he was attacked by an Elephant.
(DID YOU KNOW. Siebel was attacked by an elephant on a 2009 safari trip in Serengeti; he barely escaped death and has undergone 19 reconstructive surgeries. Maybe the animal kingdom was defending the planet?)
It was briefly named C3IoT. But the first program was sold to Oracle and • Oracle Siebel CRM is a sales force automation (SFA) and customer relationship management solution designed to assist enterprises to manage their customer experiences. It includes a range of sales, marketing and customer service applications tailored to various industries • focuses on businesses. Much like a lot of Lances articles. And Thomas Siebel's software • C3.ai is a leading enterprise AI software provider for accelerating digital transformation. The proven C3 AI Suite provides comprehensive services to build enterprise-scale AI applications more efficiently and cost-effectively than alternative approaches • advances AI to accelerate digital transformation, just like AI World Government, which is owned by Eliot Weinman. Is Cebel a play on Siebel? It sure seems like it to me.
And Thomas also has this to say.
High: What inning of the game do you believe we are in from an AI perspective, and how is that likely to develop going forward? Siebel: Julius Caesar considered Gaul as being divided into three parts, and I believe AI is divided into three parts.
1• Artificial general intelligence, which includes projects such as Google DeepMind. Here, the attempt is to build computers that have equal or greater intelligence as human beings. This gets to the malicious killer robots and the refrigerator that takes over your household theory, but I do not believe we need to worry about that in our lifetimes;
2• Social media systems. Here, social media vendors are using AI extremely effectively to manipulate people at the level of the limbic brain. I believe this is malevolent, and what we are seeing in social media is concerning. People are acting as servers to the computer instead of the opposite;
3• The application of AI to commercial, industrial, and government systems, which is where we play at C3.ai. This is building prediction to identify fraud, efficiency to the supply chain, and predictive maintenance for devices in the digital oilfields, the smart grid, the manufacturing industry, agricultural equipment, and precision health. This is about using AI to lower the cost of production and to deliver products and services with greater safety, with greater cybersecurity, and with lower environmental impact.
Hmmm. It's starting to sound like my posts, isn't it? Yet he's not worried about killer robots, yet social media manipulation, that's a problem. But I can bet you all the tea that's left in China, those words shouldn't be taken at Facebook value.
High: You have referred to there being a war with China based on artificial intelligence, and you have referenced how Vladimir Putin said the country that wins in AI will ultimately win in the world. As a citizen of the U.S., what do you think about this? How optimistic are you about the state’s ability to lead and the extent to which it is appropriate language? Siebel: This is a crucial topic. As you mentioned, in 2017, Vladimir Putin said, “Whoever wins the war in AI will be the ruler of the world.” I believe that is true, but I do not believe Russia will win. It is either going to be China or the U.S. I believe we are currently in a state of non-kinetic warfare with China. It is well-documented how great Russia and China are at infiltrating our power grid infrastructure, infiltrating our financial system infrastructure, and implanting viruses, bots, and malware so they can remotely turn off the grid. There are well-documented incidents where the Chinese have penetrated, say, the United States Office of Personnel Management and stolen the personnel records of up to 21 million people. This includes anyone who has ever applied for or been granted a security clearance. If this is not war, what is it? If you read the 13th five-year plan, it is extremely clear what they are doing. They are investing tens of billions of dollars a year in AI to win this battle and to dominate the use of AI for the purposes of defense and conducting warfare. In many ways, this is a test of two fundamentally opposed political philosophies. In the case of China, there is a totalitarian state with a top-down command and control economy where the NRDC writes the 13th five-year plan, invests billions of dollars, and mandates that this happens. They are extremely bright, competent, and educated, and they are hard at work. In the United States, we have a much messier process with a free-market economy and a capitalist system. Innovation does not take place from a top-down command and control government-mandated system, but in garages in Palo Alto and storefronts in theNew York. I do not know which system is going to win, but this is going to be the ultimate test of these political philosophies. This is not a war we want to lose, the stakes could not be higher, and it is game on.
And then.
High: What role do you see the government playing in all this versus private industries, and how do you see the balance between the two? Siebel: The people who work in the Pentagon are exceptionally bright and well educated. These scholar statesman warriors are not asleep at the switch, and they are adopting AI in many ways to prove the efficiency of the Department of Defense. As it relates to AI, the U.S. is going to advance through a free market economy, entrepreneurship, and through the creativity of individuals who are unbridled by the constraints of the stage. This system has always worked out for us in the past, and hopefully, it will continue to. If it does not, we are going to have a problem. Source Here
Game on. If it doesn't work, there's a problem, because we're in a war with China, and the Pentagon states that the war will be fought in abrupt climate change which will cause drought and famine in China. And I've said it before, but the social discord and the riots, will be blamed on Russia and/or China. And maybe they are to blame. Who knows, because we have to trust our New Normal World Order narrative as it's filtered with fact checks and fake news, while the surveillance system makes sure we are safe from physical threats through AI data mining, and incorporating AI through the Great Reset, which apparently China has to get on board with. Uhm, and people are having a hard time believing that our world is about to get turned upside down? Really? Has the desensitization been that effective that everyone is numb? Short answer, pretty much.

BGG Final Words

NEW YORK (PRWEB) JANUARY 11, 2018 • Though various forms of artificial intelligence and machine learning have existed for nearly 60 years, it is only recently that this field of computing has developed to a level of accessibility that truly allows businesses to leverage this innovative technology. There are no blanket solutions in technological transformations. Artificial intelligence is no exception. Mediaplanet’s Cognitive Technology campaign, created in partnership with Melinda Gates, the World Economic Forum and Microsoft, will serve as an educational guidebook for business leaders to understand how to obtain the maximum benefits from cognitive technologies within their market —using artificial intelligence to improve employee workflow and efficiency, reshape customer experiences and take risk and fraud protection to the next level. This program was made possible with the support of Melinda Gates, the World Economic Forum’s Center for the Fourth Industrial Revolution, Microsoft, the National Security Agency, the National Retail Federation, Eliot Weinman, the Cognitive Computing Consortium, SCIP, AMT, HSBC, Forgerock, Feedzai, LogMeIn, Cognicor, Omron, The Nerdery and The Savo Group. Source Here
Hey! Look, NSA, Melinda "I hoarded food in my basement because I know how privileged we are" Gates, WEF, and Eliot Weinman. And his AI World Government did this press release.
According to Nguyen Anh Tuan, CEO of the Boston Global Forum (BGF), “We have been collaborating with Mr. Weinman and his team at AI World throughout 2018 to support the event as an International Host. We have several activities already underway at AI World 2018, and will continue our strategic alliance for all AI World 2019 events. We will present an AI-Government model at AI World Government.” Source Here
Do you want Skynet Eliot, cause this is how you get Skynet.
But maybe I'm suffering mass psychogenic delusions from Doomscrolling looking for mass surveillance examples and an upcoming war before environmental collapse. Maybe? Possible? Let's look and see if I'm justified in my paranoia.
Lance B Eliot • Neanderthal and AI. Source HereCould the acrimonious polarization in society today be simply due to chance alone, or might we be divided amongst ourselves by inherited Neanderthal DNA that has been triggered in recent times? Let’s hope that we can find a means to overcome the polarization, else we might become an extinct species and then, down the road, perhaps some surviving all-knowing AI might look back one day and snicker that we were ultimately and unknowingly doomed by our Neanderthal forerunners.
You're gonna trigger me, you AI loving Neanderthal monster. Doesn't that sound crazy? Read the article and then tell me that it was written by a human (not that anyone has, it's just a figure of speech).
May 21, 2016 • As you can see, it seems like we managed to avert what could have been a massive economic crisis in the 2008-2009 time frame, and entered into what Mohamed in his 2010 Per Jacobsson lecture referred to as the “new normal” (now widely popularized). We have been somewhat languishing in this new normal and are seemingly trying to just keep ourselves in the new normal, sometimes now referred to as the new new normal. Believing that we are nearing the T-junction, the Figure 1 shows that we are upon a pivot point, perhaps in just the next 2-3 years, and will then swing either toward the boom or the doom, of which the Mohamed as odds-maker suggests are equally likely (50/50 chance). Source Here
Pivot? Boom or Doom? Thank God we don't have any pivots happening.
Obama, 2012, Pivot to Asia • There has been strong perception from China that all of these are part of US' China containment policy.[4] Proponents of this theory claim that the United States needs a weak, divided China to continue its hegemony in Asia. This is accomplished, the theory claims, by the United States establishing military, economic, and diplomatic ties with countries adjacent to China's borders.
Aw crap. Pandemic. The Great Reset. Fourth Industrial Revolution. World Economic Forum. AI World Government. Pivot. Boom or Doom. Pivot to Asia.
All good. Keep Calm and Carry On. There is nothing to fear, but fear itself, and environmental collapse, WW3, AI, Killer Robots, Big Brother, Pandemic, Economic Collapse, Asteroids,1. Magnetic Field Weakening, Famine, and Animal Mass Mortality Events. It's game on. Boom or Doom time. Cats and Dogs living together. Neanderthals worshipping AI. All the worst parts out of the Bible, except we don't get turned to salt. I hope. 2020 isn't over yet. And it probably won't be over in 2021, or 2023, or, 2030. After all, the agenda runs until 2030, doesn’t it?
So is Thomas Siebel and Oracle Siebel Systems supposed to be a homonym for Cebel? Is Eliot Weinman involved somehow, or is it just a coincidence. Is Lance B Eliot gonna be AI President of the Techncracy? Just keep paying attention and stay aware. We might not what is happening, but we know something is, and possibly hidden actors involved in all of it.
Heads up and eyes open. This hasn't even started yet. Talk soon and take care.
1. Trust me, u/arctic-gold-digger was right on the money about space rocks, and I'll show you why in a few posts. And also, thanks to u/WhiteRabbitCaveCA as well as u/UFOS-ARE-DEMONIC The extra dots being connected were a massive help.
submitted by biggreekgeek to conspiracy [link] [comments]


2020.08.23 01:28 Xemnas81 I keep having older (sometimes significantly) friends, and other guy friends, confessing to an innocent crush on me. I'm flattered but in contrast to lack of interest from women my age (mid-late 20s) it's hard not to interpret it through red pill theory.

I don't really know how to substantiate this. I had yet another friend who's now 50 randomly message me to admit that she had a crush on me for ages but distance was an issue. She also said that while she feels I'm unlucky with online dating and hookup apps etc. due to the superficiality of it all, she's surprised I don't have more women chasing me in person because of my personality which she finds attractive. She advised that I should look for 'mature' women-not necessarily older but mature, and she implied that I was seeking out emotionally immature women, or girls. (Not...girls girls, but late teen early 20s who were still psychologically girls, I suppose.) Admittedly she was drunk and the context seems to have been more a "drunk text a wholesome compliment to a friend" thing than actually asking me out. If it helps, she is in a relationship anyway and I am sort of friends or friendly with her SO. He's a great guy, she's really cool, and they're a lovely couple so I'm happy for them.
Before this I had a colleague (early 40s) who I was working on a project on confess the same. (I've since abandoned the project for reasons I don't need to go into lol, but unfortunately it meant cutting contact with her.) She would also ask me for advice with her relationship difficulties. Another friend in the same age group also admired me in this way. All 3 of these women have kids, 2 have sons or daughters of their own who are either as old as me or not much younger (late teens/early 20s). I also have 2 close male friends, one a couple of years older and another much younger, who like me. One romantically-although I haven't had to explicitly reject them since I think they realised distance was once again an issue-and the other wants to hook up. They sort of ironically try and convince me to be bicurious or just stop pursuing women entirely, sometimes it's a funny in-joke and other times it's awkward.
....but, I have NO girls, well, women in my age group who are interested or open to anything, afaik.
As to the interpretation, well I have 3.
There's the most innocent and meaningless one which is she's just trying to cheer me up and boost my confidence if/when I'm lonely on a weekend, knowing that I have social anxiety and overthink things often. NBD. As it happened, I've been out half the day at the gym then getting groceries, so not had time to feel lonely (plus, lockdown is reduced but still in effect here, so we're not socialising normally yet). She couldn't have known that though.
There's the one which is haunting me, which is TRP saying it's because of The Wall, biological clock ticking blabla. If this is the case then the reason they [referring to everybody] have a crush on me or are sort of nonchalantly hitting on me, is because they're desperate. Or picky enough to find men in their age group unattractive but not as much as they were when younger and would probably have rejected me. I feel disgusted applying this at the personal level towards friends, as it's disrespectful of their feelings and how much I care for them. At a more 'dating economics' level it sadly rings some truth, since it adds up with little interest from women in my age group and her understanding WHY I might not have much success with Tinder etc...It's because I'm not cute enough for girls in my age group, I'd only be visible when the better guys were all taken, lol. Bruised ego.
But the other extreme interpretation, which is loosely feminist bordering on female supremacist, complicates this. This assumes most young men (teens through to 20s, even early 30s) haven't matured quick enough with their peers who have their shit together, and this is a huge turn-off which leads women to pursue older men or stay single rather than deal with losers and manchildren. Now the appeal for younger men COMPLETELY lacks sense except for NSA sexytimes. I have personal beefs with a men-are-inferior approach to understanding gender inequality, socialised or otherwise, but in the interest of rejecting redpill conditioning I give it some leeway.
The problem with this, as I say, is that it doesn't add up with being advised to find mature women, or my personality being attractive mainly to women with emotional maturity. At the academic level, pretty much all the lit on this phenomenon which vetted out implicit and structural bias against women, says that women in their teens and 20s are on average socially, psychologically, emotionally and financially more mature and stable than their male peers. So statistically the likelihood of me being surrounded by immature women is low and this compliment would then amount to an ego-boost that it'd be delusional to treat it as meaningful. At the personal level, I can be seen as mature over the Internet and our online exchanges, but I substantially do NOT have my shit together, and if my Googling this and lurking AskWomen and similar places tells me anything then that is the major deciding factor as to what is real maturity. Most of these posts say, in line with the aforementioned lit, they wouldn't see a younger man as remotely a relationship prospect unless they were at the same or higher socioeconomic status, career or education level as her, as well as stage of settling (e.g. living in own place, paid off all student loans if there were any/debt free, etc.) None of this applies to me because I'm a job seeker and a forever student. So it doesn't add up. Unless she means I come across as needing some extra protection and security due to my insecurities/anxiety issues...but then why the crush? Gah.
I am equal parts flattered and frustrated by these confessions.
submitted by Xemnas81 to exredpill [link] [comments]


2020.08.22 19:36 biggreekgeek Flatten the Curve. #50. PART 1. Jeffery Epstein & Espionage. Peter Thiel & Carbyne. Isreali Surveillance Tech & UAE. China Uyghurs Dentions & Erik Prince. Human Rights Watch; Similar Tech in China & Carbyne. Carbyne in the USA 911 SYSTEM. Michael Chertoff: Wrote Patriot Act + Carbyne Director.

Read Flatten the Curve Part 49. Link Here
Headlines. A line designed to get into your head. And it works, judging by the amount of circulation of conspiracy posts that help move those headlines that masquerade as revealing connections, but are merely propoganda headline clones being disseminated.
So lets get ahead of the lines before the lines get into your head.
Humans have two primary modes of communication; verbal and nonverbal. Nonverbal is body language. Body language on it's own can give you insight. Pairing verbal and nonverbal gives you the whole picture. Headlines are verbal. The content is nonverbal. That's how you get a glimpse of the bigger picture. But we can't look at each article as a completed part of the communicative process. That would be like only watching hand gestures while having a conversation with someone. The article isn't the subject, the event is the subject, and if the subject was person, then we have to find as many articles as we can to profile the body language and interpret the nonverbal communication.
Let me show you what I mean.
Offender Conspiracy Article Profilingcriminal article profiling, is an investigative strategy used by law enforcement agencies conspiracy theorists to identify likely suspects hidden motives and has been used by investigators conspiracy theorists to link cases subjects that may have been committed by the same perpetrator. Multiple crimes may be linked to a specific offender event and the profile may be used to predict the identified offender's conspiracy's future actions real intent. Criminal Profiling Here
And then.
Nonverbal communication (NVC) Multiple Article Profiling (MAP) • is the transmission of messages or signals through a nonverbal platform multiple article content searches (MACS) such as eye contact, facial expressions, gestures, posture, and the distance between two individuals, article source, differing information, dates, pov, and the connections between the sources. It includes the use of visual cues such as body language (content), distance (dates) and organizations/politicians, corporations, law enforcement, environmental issues, economics, and technology/AI. Original NVC Content Here
I have no doubt that the actors who have advanced copies of the script are using data algorithm aggregation that compiles the different content sources into a complete picture for them. We plebs aren't so lucky, we have to peruse and parse multiple sources to connect the dots. In essence, we are the plebs living in a technofuedal era before the invention of the modern Gutenberg technopress for the masses.
So let's throw on some work boots, grab a shovel, and start digging.
The Hacks and Muckrakers.
May 18, 2018: Vanity Fair • “We just got back from the Middle East,” he told a room full of Israelis, upon arriving in Jerusalem from Saudi Arabia last May. Source Here
May 22 2017: Slate • The President Just Told a Room of Israelis That He “Just Got Back From the Middle East” Source Here
Trump. The man's Presidency has come at a time where it's all starting to fall apart. And I can't help but think of Trump as Julius Caesar part two. A populist leader who threatened the establishment and upended the republic, paving the way for Augustus Caesar and the soft introduction of Roman empire, as it let the pretenses of being a Republic fade away. If you aren't familiar with that time of history, I would highly recommend doing so. There is more to my comparison that I'm not elaborating on, except to say, if you dig you will find someone else who loves Roman history, looks like a clone of Augustus, and we watched as he made rounds while articles suggested that he had aspirations of becoming President. Do I think that it'll happen soon? Probably not. History doesn't repeat itself, but it rhymes. And we're only at the start of the Hollow Men by T S *Eliot *.
December 14, 2016: Techcrunch • President-elect Donald Trump met with some of the most prominent executives from the tech industry today at Trump Tower, with investor Peter Thiel and Vice President-elect Mike Pence at his side. Trump opened the meeting with CEOs from Google, Microsoft, Apple, Amazon and others by thanking Thiel for his support. “I want to add that I am here to help you folks do well. And you’re doing well right now and I’m very honored by the bounce. They’re all talking about the bounce. So right now everybody in this room has to like me, at least a little bit,” Trump said, perhaps in reference to the fact that he received little support from Silicon Valley during his campaign. “We’re going to try to have that bounce continue. Perhaps even more importantly, we want you to keep going with the incredible innovation. There’s nobody like you in the world. There’s nobody like the people in this room and anything we can do to help this go along, we’re going to be there for you. You’ll call my people, you’ll call me, it doesn’t make any difference. We have no formal chain of command around here,” Trump said.
Interesting, wouldn't you say? No formal chain of command around here. They thanked Peter Thiel for his support. Ok. Maybe nothing, maybe something. Ok. It's something.
August, 2018 Articles: www.theverge.com • Trump claims Google is suppressing positive news about him.
www.cnbc.com • Trump: Facebook, Twitter, Google 'have to be careful'.
Stop the presses, because were getting squeezed and pasteurized. The tech leaders meet with Trump. They thank Thiel, suggesting that he organized the assembly. And then Trump starts bashing the Technocrats that he's meeting with? Nothing but Bread and Circus. Plain and simple.
June 27, 2017: Tech Transparency Project • No other company in America was as intimately tied to the Obama Administration and the Democratic Party during Barack Obama’s eight years in office than Google. Today the company is doing everything it can to restore the same cozy White House access it enjoyed under President Obama. Eric Schmidt has attended at least two meetings with Trump and attended a third White House meeting with tech leaders last Monday. At the same time, The Groundwork – a secretive Schmidt-funded startup that ran the Clinton campaign’s data operation – recently relaunched itself as a technology platform for liberal organizations working to fight the Trump Administration’s agenda. By all appearances, Google appears to be working overtime to both ingratiate itself with the Trump Administration while simultaneously cashing in on the “resistance” to Trump’s agenda. Source Here
By all appearances? He's working both sides? Trying to cash in? Really? Seriously? Let's break that down.
** 2020 • Eric Schmidt/Net worth: 15.3 billion USD. Call me crazy, but I don’t think a guy with 15 billion dollars is worried about "cashing in**". As I've stated numerous times, this is no longer about money, it's about control. That's imperative to understand. You don't worry about the money hidden under the mattress when you have a locked vault full of cash. Money is only an incentive for those who either don't have it or need more of it. Neither of those categories apply to Eric Schmidt.
So lets examine how badly the Tech guys and Trump aren't getting along, shall we?
March 2, 2016: Defense News • Google Executive Schmidt To Head New DoD Advisory Board. Source Here
Ah. He's working for the Pentagon to make it better. And this happens almost a full year before meeting with Trump. This doesn't look like someone playing both sides, this looks like a team player in a game that only has one team. This is political wrestling that would make Vince McMahon envious. If you want to dive deeper into how Eric Schmidt funded the non profit that started fake news, here's a previous Flatten the Curve post. Part #19
Attendees included Eric Schmidt and Larry Page of Google, Tim Cook of Apple, Satya Nadella and Brad Smith of Microsoft, Jeff Bezos of Amazon (who expressed his excitement that Trump’s administration could be “the innovations administration“), Safra Catz of Oracle, Chuck Robbins of Cisco and Sheryl Sandberg of Facebook. Thiel’s business partner, Palantir CEO Alex Karp, attended as well.
Those are big names and big companies. But they all hate Trump, right?
Thiel has been instrumental in shaping Trump’s approach to technology, helping assemble a list of candidates for technical roles in the upcoming administration and reportedly bringing David Sacks and other long-time associates to the transition team. During his speech at the Republican National Convention, Thiel talked about spreading the prosperity of Silicon Valley to other regions across the country and cited space travel as one of America’s great technological achievements. “Instead of going to Mars, we have invaded the Middle East,” Thiel said.
I should point out that Thiel and Musk started PayPal together.
November 24, 2019: Business Insider • What do the founders of YouTube, Yelp, Tesla, and LinkedIn have in common? Apart from leading massively disruptive technology companies, their founders all share a common resume line item: employment at PayPal. Known for their entrepreneurial mindset and anti-establishment attitude, this elite group is known as the "PayPal Mafia," and they all put in time during the payment platform's early days some 20 years ago. Source Here
Oh. And Pete's instrumental to creating Facebook. Thiel became Facebook's first outside investor when he acquired a 10.2% stake for $500,000 in August 2004. He sold the majority of his shares in Facebook for over $1 billion in 2012, but remains on the board of directors. And he funded Hulk Hogan's lawsuit to take down Gawker. Told ya, it's just political wrestling to entertain us.
However, one of the biggest proponents of travel to Mars, Elon Musk, has also been one of Trump’s most outspoken critics. Musk donated to Hillary Clinton’s presidential campaign and frequently denounced Trump, saying that the former reality television star “doesn’t seem to have the sort of character that reflects well on the United States.” But since the election, Musk appears to have warmed up to Trump. He was a late addition to the invite list for today’s meeting. The transition team also announced this morning that Musk will join Trump’s strategic and policy forum, a group of business leaders that will serve as an advisory committee to the president-elect. Source Here
Musk and Trump, a marriage made in heaven. It's destiny, I tell you, destiny. Or an act (don't worry Elon, I haven't forgotten about you) designed to make us believe that somebody up there is fighting for us down here.
Yet the inclusion of the quote about Mars and War in the Middle East stands out, wouldn't you agree? And we have environmental collapse triggers happening. Riots happening. Why those riots are also happening in Beruit, aren't they? And Isreal and Saudi Arabia don't get along with Lebanon, or the Hezbollah. And President Trump went from Suadi Arabia to Isreal, didn’t he? And wasn't there an explosion there recently? Must all be a coincidence. Let's get back to Pete the magical Thiel and see what else Hulk Hogan's buddy is mixed up in.
He co-founded Valar Ventures in 2010, co-founded Mithril Capital, serving as investment committee chair, in 2012, and served as a partner at Y Combinator from 2015 to 2017. Through the Thiel Foundation, Thiel governs the grant-making bodies Breakout Labs and Thiel Fellowship, and funds nonprofit research into artificial intelligence, life extension and seasteading. A co-founder of The Stanford Review, he is a conservative libertarian who is critical of high government spending, high debt levels, and foreign wars. He has donated to numerous political figures. At the 2009 Singularity Summit, he said his greatest concern is the technological singularity not arriving soon enough. Source Here
Singularity. Not. Arriving. Soon. Enough. Call me paranoid and pass the tin foil hat, but what Matrix code is needed to decipher his words intent? Not soon enough for what? Better Netflix selection? The Alien invasion? Godzilla awakening because of Fukushima? Are the Decepticons already here? Or have they been downplaying the ELE that's approaching? I'll take ELE for a thousand, Alex.
So he's into AI (he backed Deepmind and OpenAI) and life extension. He went to Stanford. He's also going to have his body cryonically preserved. And his Palantir surveillance is, well, nottofreakyououtoranything, everywhere. Palantir's first backer was the Central Intelligence Agency's venture capital arm In-Q-Tel. Then Palantir became Big Brother. Literally. The Palantir clients include the CIA, DHS, NSA, FBI, CDC, the Marine Corps, the Air Force, Special Operations Command, West Point, the Joint Improvised-Threat Defeat Organization and Allies, the Recovery Accountability and Transparency Board and the National Center for Missing and Exploited Children. And Palantir is also being used by Banks, Hedge Funds, Financial Services, and other corporate clients.
Big Brother wants to be Palantir went it grows up.
Now, are you wondering why I started with Trump, Saudi Arabia and Isreal? Are you curious about how it goes from ex CEO of Google Eric Schmidt "playing" both sides of the fence to Palantir and Peter Thiel? Just sit right back and hold tight, cause I'm about to take you on a one way trip to a Brave New Normal World that's called 1984.
Warning. What you're about to read will make you forever question every officially sanctioned narrative. Trust me. Still game? Are you sure? Last chance. You're about to leave neverneverland and you can't go back. Alright. Let's go.
It's All Hidden In Plain Sight.
Let's talk about Epstein. Yep. Him. I've been strangely quiet about Jeffery haven't I? Nothing written about the Captain Pedo and his Amazing friends didn't mean there was nothing there, it just meant that I didn't find anything that indicated something deeper than a pedophile blackmail ring. And sex and political blackmail is as old as time itself. There's a reason they say the world's two oldest professions are prostitutes and politicians. Yet it turns out the professional pimp and the abducted teens may be playing a bigger role than we thought.
July 31, 2019: NY TIMES • Mr. Epstein’s vision reflected his longstanding fascination with what has become known as transhumanism: the science of improving the human population through technologies like genetic engineering and artificial intelligence. Critics have likened transhumanism to a modern-day version of eugenics, the discredited field of improving the human race through controlled breeding. Mr. Epstein’s ranch in New Mexico, which he confided to scientists and others he hoped to use as the site for seeding the human race with his DNA.
Welcome to the Island of Dr. Moreau. We're it's the monsters trying to make humans. Do you still think this was all about blackmail, cause it wasn't. Stop thinking in normal terms, because normal is dead, long live the New Normal.
At one session at Harvard, Mr. Epstein criticized efforts to reduce starvation and provide health care to the poor because doing so increased the risk of overpopulation, said Mr. Pinker, who was there. Mr. Pinker said he had rebutted the argument, citing research showing that high rates of infant mortality simply caused people to have more children.
Epstein criticized efforts to reduce starvation and provide health care. Hmmmm. My memory is foggy, but isn't there someone in Africa trying to provide health care and reduce starvation? Who could that be? Wasn't he into computers and had pictures taken on Epstein’s private jet? Wasn't it Bill Gates? Now why would Billy be hanging around someone who would vocally espouse an ideology that is completely antithetical to his stated humanitarian goals?
Also at the Indian Summer dinner, according to an account on the website of Mr. Brockman’s Edge Foundation, were the Google founders Sergey Brin and Larry Page and Jeff Bezos, who was accompanied by his mother.
Then there was Mr. Epstein’s interest in eugenics. Once, at a dinner at Mr. Epstein’s mansion on Manhattan’s Upper East Side, Mr. Lanier said he talked to a scientist who told him that Mr. Epstein’s goal was to have 20 women at a time impregnated at his 33,000-square-foot Zorro Ranch in a tiny town outside Santa Fe. Mr. Mr. Lanier, said he had the impression that Mr. Epstein was using the dinner parties to screen candidates to bear Mr. Epstein’s children. Mr. Epstein did not hide his interest in tinkering with genes — and in perpetuating his own DNA. Interviews with more than a dozen of his acquaintances, as well as public documents, show that he used the same tactics to insinuate himself into an elite scientific community, thus allowing him to pursue his interests in eugenics and other fringe fields like cryonics. One adherent of transhumanism said that he and Mr. Epstein discussed the financier’s interest in cryonics, an unproven science in which people’s bodies are frozen to be brought back to life in the future. Mr. Epstein told this person that he wanted his head and penis to be frozen.
More Epstein and Eugenics. Source Here
Now call me crazy, but there's some strangeness happening. Cryonics, don't die, just Let It Go and get Frozen. First Peter Thiel, now Epstein. Let's hope the AI Singularity arrives in time, right?
Now I wouldn't have even bothered with their shared interest of joining the Walt Disney Cryonics Club, if there wasn't more in play, and there's more in play.
August 9, 2019: TRT World • The billionaire shared the same personal network that included Israeli Prime Minister Benjamin Netanyahu, former Israeli prime minister Ehud Barak, infamous Blackwater founder Erik Prince, Saudi Crown Prince Mohammed bin Salman, UAE Crown Prince Mohamed bin Zayed, Donald Trump and Bill Clinton.
According to investigative journalist Vicky Ward, quoting a meeting with Trump’s transition team, Acosta told a White House official: “I was told Epstein ‘belonged to intelligence’ and to leave it alone.”
That's a bit of an exclusive club, kinda like being in the Mouseketeer CIA club. But, hey, nothing to see here, is there? But just in case, let's look into the company that Epstein worked with, Carbyne.
This single company, Carbyne, brought together a who’s who of power brokers and intelligence figures from multiple regions including Russia, China and the Trump administration itself, with Epstein at its heart. Officially, Carbyne provided high-tech solutions for emergency centres. In reality, it existed in a grey area giving it unprecedented access to private information, with significant potential for privacy abuse. Carbyne provides a service for police emergency centres, providing complete access to the caller’s camera and GPS, providing the dispatcher with a live video feed.
Ok. So Epstein and Thiel both are into AI, Surveillance, and Cryonics. President Trump was in Isreal and Saudi Arabia in May 2017. And who ended up in Isreal just afterwards?
PayPal Founder in Israel: Too Much Copying and Not Enough Innovation in High-tech
June 15, 2017: Haaretz • Billionaire Peter Thiel visits Israel – and gives out tips on how to build a successful startup. Source Here
Hey, one month after Trump visited the Middle East, Peter Thiel decides to take middle eastern vacation to give out business tips. And then Thiel must've reciprocated and invited the Fresh Prince of Saudi Arabia to get the all inclusive Palantir surveillance pitch. Smile for the camera everyone, cause the world's a stage and we're filming a world wide Truman Show.
April 7, 2018: Gulf News • Google, Thiel feature in Saudi Prince’s Silicon Valley tour. The Saudi delegation visited several Silicon Valley corporate campuses, including Apple Inc. and Facebook Inc. In addition to Facebook, where Thiel sits on the board, the Saudi delegation visited data-analysis start-up Palantir Technologies Inc and a trio of investment firms created by Thiel: Clarium Capital, Valar Ventures and Founders Fund. Thiel is chairman and co-founder of Palantir. Source Here
March 17, 2020: Forbes • These responders are now using a tool built in part by former members of Israel’s military intelligence—Elichai being one—that’s backed by Peter Thiel’s Founders Fund, former Israeli Prime Minister Ehud Barak, who is now the company’s chairman, and a small, passive investment from deceased multimillionaire pedophile Jeffrey Epstein. SourceHere
Ok look. I get it. Rich people make investments, those investments are bound to end up in the same company. But these companies aren't exactly run of the mill home security systems, are they? Nope. This is the kind of surveillance systems that the KGB or the Stasi could only dream of. And when you wish upon a star dreams come true. And Peter Thiel must be wishing upon a star.
Ok. Strap in, buckle up, and try to keep up, or you're gonna get left in the dust. Cause it's boom or bust from here on out, and we're gonna add it up like the count.
So Elichai owns Carbyne. Peter Thiel invested in Carbyne. And Carbyne is in the USA linked to the 911 system, and it's being used to fight the pandemic.
Forbes (Link Above) • Its founder thinks Carbyne’s tech could make the lives of 911 dispatch and healthcare professionals much less chaotic in the Covid-19 crisis. Carbyne relies on callers submitting themselves to self-surveillance via their own mobile phone. Once a caller uses their Android or iPhone to call 911 (85% of emergency calls now come from mobile devices), they receive a text message that asks for permission to get their precise location and access video from their smartphone camera.
Step right up and give your permission to be saved. Big Brother is looking out for you.
So Elichai used to work for the 8200. Cool name, right. I'm not sure about you, but that sounds pretty dystopian. And I've gotta say, that all of Technocrats that are promising us an AI utopia, sure seem to be getting ahead of the curve by building doomsday bunkers for a dystopia. And here we sit wasting our time Doomscrolling.
So what else has sprung up from the 8200? Have you ever heard about the NSO Group?
November 1, 2019 - WhatsApp identified an Israeli company, NSO Group, as having developed the spyware called Pegasus, which it held responsible for the breach. This disclosure was part of a lawsuit WhatsApp has filed against the NSO Group in a US federal court, saying the company was actively involved in hacking users of the encrypted chat service. As per the WhatsApp complaint the “target users included attorneys, journalists, human rights activists, political dissidents, diplomats, and other senior foreign government officials.” NSO’s spyware Pegasus has been reportedly used to target journalists in Mexico investigating drug cartels, rights group Amnesty International, human rights activists in UAE, activists in Bahrain and Saudi Arabia. According to Israeli news reports, Saudi Arabia paid $55 million for its use. The contract was later frozen over the scandal alleging NSO software's role in Saudi Arabia tracking slain journalist Jamal Khashoggi in the months before he was murdered in the Saudi Embassy in Turkey. In India, 17 people, who are known to be targeted include activists and human rights lawyers. Source Here
Whoops. Do you remember Jamal Khashoggi? He was trying to expose Human Rights abuses against Saudi Arabia. And then Suadi Arabia decided to murder him, and confirm that they were abusing human rights. Jamal paid the ultimate price to prove his point. But who is selling the hacking tools? At this point they all seem to be springing up from members of the 8200, and the companies they started.
TRT - Link Previously Provided • DarkMatter, a UAE surveillance and intelligence group employing former NSA operatives was built on the back of a larger initiative to modernise Emirati intelligence and military operations. The group took part in at the Arab Future Cities Conference in November 2015, where it presented a vision of smarter, tech-driven cities, which caught the eye of Chinese officials. Smarter cities meant Big Brother-esque widespread surveillance installed throughout the UAE. Only two years later in April 25 2017, DarkMatter signed a Global Strategic Memorandum of Understanding with Huawei, a leading Chinese company, for the same ‘Big Data’ systems and ‘Smart City’ solutions. The middle man? None other than Erik Prince, who had gone from working for the Emiratis, to working for a Chinese billionaire. In suspect timing, the Memorandum of Understanding also took place right before China scaled up its total surveillance and crackdown on Uighurs in Xinjiang, China.
February 2, 2019: Reuters • Xinjiang is a major part of China's Belt and Road infrastructure network but the region has faced attacks blamed on members of the Muslim ethnic Uighur minority. Beijing has responded with a security clampdown condemned by rights groups and Western governments. Frontier Services Group (FSG), a Hong Kong-listed company founded by Prince, said in a Chinese-language statement posted on its website on Jan. 22 that it had signed a deal to build a training centre in southern Xinjiang. Prince is deputy chairman, a minority shareholder and a board member of FSG, a security, logistics and insurance provider. Source Here

Watch this video.

Chinese authorities are using a 911 mobile app to carry out illegal mass surveillance and arbitrary detention of Muslims in China’s western Xinjiang region. Source Here
Makes you wonder, doesn't it? Aren't we condemning China for the camps, and yet the West is helping to build those camps? Must be a big mistake. We didn’t know what was happening. And Erik Prince swears he didn't know. Honestly. He's not lying. Cross my heart and hope to die. Pinky swear.
Recap.
8200 leads to NSO and Carbyne. DarkMatter is in the UAE with NSA employees. The NSO hack was used to capture Khashoggi. Peter Thiel invested in Facebook, Facebook owns WhatsApp. Peter Thiel invested in Carbyne. Eric Prince works for and founded FSG, which built the Muslim reduction school. China is using similar tech to target Muslims and send them back to school. Carbyne 911 surveillance tech accesses your phone camera after you click on the link to give permission. So. Peter Thiel funds Carbyne. Eric Prince is working for the UAE developing security and the UAE ends up with Dark Matter, and then his company (FSG) is sold to China, and they build re-education centers, which uses technology like Carbyne, and that technology is being used in the USA.
Got it? Good. Because I'm seriously having a hard time keeping up with the behind the scene footage of this LARP.
Link Previously Provided • 1,400 people worldwide, including Indian lawyers, rights activists and journalist, were targets of an online spying campaign that used highly sophisticated spyware developed by an Israeli firm via WhatsApp. WhatsApp is at the centre of a global storm over privacy after it was revealed that at least 17 Indians and about 1,400 people worldwide had their phones breached through the social media app. Their privacy was compromised by surveillance technology so invasive that could read and transmit the entire contents of a phone as well as operate its camera.
WhatsApp, Doc, I think I need an appointment because I'm suffering from Mass Psychogenic Illness from too much Doomscrolling.
Do you want to get deeper? I mean really deep? Yes? Ok. Let's jump into the deep.
October 18, 2019: fortune.com - How a WhatsApp Tax Launched Massive Anti-Government Protests in Lebanon.
What a crazy New Normal World Order we live in. What are the odds that we have a WhatsApp hack tax protest and we also have a WhatsApp hack that uses your phone camera, while also using similar tech in the USA and China. That's inconceivable! That's incredible! Someone call the press and let them know about this! Uhm. Wait. Better not. You might get Khashoggid.
So Eric Prince is involved. Peter Thiel is involved. WhatsApp is owned by Facebook and Mark Zuckerberg owns Facebook, and Peter Thiel helped Facebook grow. And then there was this.
March 28, 2018: Daily Mail • Employee of Peter Thiel's company Palantir helped Cambridge Analytica harvest the data of millions of the Facebook users. Alfredas Chmieliauskas is said to have suggested to Cambridge Analytica that it create a personality quiz smartphone app to get access to networks of Facebook users. The Times report also claims that Sophie Schmidt - the daughter former Google executive Eric Schmidt - had urged Cambridge Analytica to work with Palantir. Source Here
At this point, I think I'm going to need to buy a whole lot of tacks and string and make pciture maps on my walls. If we're all living in a Truman Surveillance Show, might as well play the part of the New Normal crazy conspiracy theorist, right?
January 17, 2017: The Intercept According to New York Times columnist Maureen Dowd, in December Prince attended the annual “Villains and Heroes” costume ball hosted by Mercer. Dowd wrote that Palantir founder Peter Thiel showed her “a picture on his phone of him posing with Erik Prince, who founded the private military company Blackwater, and Mr. Trump — who had no costume — but joke[d] that it was ‘N.S.F.I.’ (Not Safe for the Internet).”
No. Sanity. Fracking. Involved. Is more like it. This insanity can't pass for sanity, can it? And yet they label us crazy when we start to find the big picture, even if we aren't entirely sure what the big picture means.
The Intercpt Continued: In July, Prince told Trump’s senior adviser and white supremacist Steve Bannon, at the time head of Breitbart News, that the Trump administration should recreate a version of the Phoenix Program, the CIA assassination ring that operated during the Vietnam War, to fight ISIS. Such a program, Prince said, could kill or capture “the funders of Islamic terror and that would even be the wealthy radical Islamist billionaires funding it from the Middle East, and any of the other illicit activities they’re in.” Prince also said that Trump would be the best force to confront “Islamic fascism.” “As for the world looking to the United States for leadership, unfortunately, I think they’re going to have to wait till January and hope Mr. Trump is elected because, clearly, our generals don’t have a stomach for a fight,” Prince said. “Our president doesn’t have a stomach for a fight and the terrorists, the fascists, are winning.” Source Here
Sounds good, right? Kill people who kill people and maybe someday we won't have people getting killed. Killer idea! HEWDSHAWT! Grab your BFG and let's go BGH. It's a date!
But then why are these cell phone surveillance hacks companies being constantly linked with their names, and those hacks are being used to target journalists and human rights activists?
It's a small New Normal World Order after all. And it's getting smaller everyday. No worries though, Keep Calm and Carry On, We're All In This Together, and You're Either With Us Or Against Us. It's all good. That kind of thing could never happen here.
July 27, 2019: NARATIV • Michael Chertoff, who ran Homeland Security under George Bush, serves on Carbyne’s advisory board. Chertoff wrote the Patriot Act, which authorized digital surveillance of Americans. Source Here
Uh. Is nobody paying attention? Are the wolves guarding the sheep?
March 16, 2003: Washington Post • It didn't help that as the World Trade Center burned on Sept. 11, 2001, the news interrupted a Carlyle business conference at the Ritz-Carlton Hotel here attended by a brother of Osama bin Laden. Former president Bush, a fellow investor, had been with him at the conference the previous day. Source Here
Need more proof?
September 16, 2015: Carlyle Group • The Carlyle Group and The Chertoff Group Acquire Majority Stake in Coalfire Systems. Founded in 2001 and based in Louisville, Colo., Coalfire is a global cybersecurity and technology services provider specializing in cyber risk advisory, compliance assessments, technical testing and software services for private enterprises and government organizations. With its technical depth and breadth of IT services, Coalfire serves clients in sectors including technology, retail, payments, healthcare, financial services, education, local and state government, and utilities. Michael Chertoff, former U.S. Homeland Security Secretary and the co-founder and executive chairman of The Chertoff Group, said, “Cyber threats are an existential risk to companies and individuals around the globe. We and Carlyle are excited to partner with Coalfire, an innovative technology-enabled services company helping clients to address cyber risks.” Source Here
It's a good thing that Coalfire is on the case, could you imagine how bad the hacks would be otherwise? Have a look. Flatten the Curve. Part 43. [Link Here](https://np.reddit.com/conspiracy/comments/i2g3i8/flatten_the_curve_part_43_unrestricted_warfare/?utm_medium=android_app&utm_source=share]
That's a pretty long trail that I've written. Guess what? The trail goes longer. So long that this will have to be continued in a part 2 later tonight. Until then; Heads Up and Eyes Open.Take Care. Be Safe. Stay Aware and Be Prepared. Talk soon.
submitted by biggreekgeek to conspiracy [link] [comments]


2020.08.18 13:23 TheAnonymouseJoker Smartphone Hardening Privacy non-root Guide 2.0 (for normal people)

I forgot to post it here, might be valuable as it debloats phones of Google and other corporation software in general. The guide is nearly fully FOSS supported, and the only non FOSS XDA app does not require internet to function.
NOTE (June) 15/06/2020: r_privacy moderator trai_dep revengefully deleted my highly gilded 1.0 guide post before.
UPDATED 16/8/2020: Major edit, replaced closed source App Ops and Shizuku with AppOpsX (Free Open source) on F-Droid. This guide is nearly FOSS supported now.
UPDATED 17/9/2020: MAJOR EDIT, replaced closed source Access Dots with Privacy Indicator (FOSS) on Izzy's F-Droid repo. This guide is completely FOSS.
Hello! I am the founder of /privatelife . Finally my smartphone non root guide is back, and there are some big upgrades. I was taking time to test everything myself on my daily driver, so apologies for keeping everyone in the wait, but stability and ease of use is the important goal to strive in my playbook. Privacy must be accessible to maximum amount of people without being annoying or tedious.
A kind request to share this guide to any privacy seeker.

User and device requirement

  • ANY Android 9+ device
  • knowledge of how to copy-paste commands in Linux or Mac Terminal/MS-DOS Command Prompt (for ADB, it is very simple, trust me)

Why not Apple devices?

iPhone does not allow you to have privacy due to its blackbox nature, and is simply a false marketing assurance by Apple to you. Recently, an unpatchable hardware flaw was discovered in Apple's T1 and T2 "security" chips, rendering Apple devices critically vulnerable.
17/9/2020: Apple gave the FBI access to the iCloud account of a protester accused of setting police cars on fire.
Also, they recently dropped plan for encrypting iCloud backups after FBI complained. They also collect and sell data quite a lot. Siri still records conversations 9 months after Apple promised not to do it. Apple Mail app is vulnerable, yet Apple stays in denial.
Also, Apple sells certificates to third-party developers that allow them to track users, The San Ferdandino shooter publicity stunt was completely fraudulent, and Louis Rossmann dismantled Apple's PR stunt "repair program".
Also, Android's open source nature is starting to pay off in the long run. Apple 0-day exploits are far cheaper to do than Android.

LET'S GO!!!

ALL users must follow these steps before "for nerdy users" section.
Firstly, if your device is filled to the brim or used for long time, I recommend backing up your data and factory resetting for clean slate start.
NOTE: Samsung users will lose Samsung Pay, as Samsung has been caught and declares they sell this data: https://www.sammobile.com/news/samsung-pay-new-privacy-policy-your-data-sold/
  • Make DIY camera covers, for front camera notch use a tiny appropriate-sized thin opaque plastic cutout and use an invisible tape to stick it in place, replace every month (cost: tape roll and one minute of your time per month). My rear camera cover
  • Install F-Droid app store from here
  • Install NetGuard app firewall (see NOTE) from F-Droid and set it up with [privacy based DNS like Uncensored DNS or Tenta DNS or AdGuard DNS]
NOTE: NetGuard with Energized Ultimate HOSTS file with any one of the above mentioned DNS providers is the ultimate solution.
NOTE: Set DNS provider address in Settings -> Advanced settings --> VPN IPv4, IPv6 and DNS
  • In F-Droid store, open Repositories via the 3 dot menu on top right and add the following links below:
  1. https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo?fingerprint=8F992BBBA0340EFE6299C7A410B36D9C8889114CA6C58013C3587CDA411B4AED
  2. https://apt.izzysoft.de/fdroid/repo?fingerprint=3BF0D6ABFEAE2F401707B6D966BE743BF0EEE49C2561B9BA39073711F628937A
  3. https://guardianproject.info/fdroid/repo?fingerprint=B7C2EEFD8DAC7806AF67DFCD92EB18126BC08312A7F2D6F3862E46013C7A6135
Go back to F-Droid store home screen, and hit the update button beside the 3 dot menu.

LIST OF APPS TO GET

  • Get Firefox Beta web browser from F-Droid (install uBlock Origin addon inside (if technically advanced, try doing this)). Also get Firefox Klar if you like a separate incognito browser.
  • Get Aurora Store from F-Droid for apps from Play Store without actually using Play Store, use Anonymous option to sign in
  • for 3rd party APKs source them only from APKMirror OR APKPure OR APKMonk, quite trusted, BUT TRY AND AVOID IT IF POSSIBLE
  • Get Privacy Indicator from F-Droid for iOS 14 like camera/mic dot indicator feature
  • Get OSMAnd+ from F-Droid or Qwant Maps inside web browser for maps and/or print physical maps if you live and travel in one or two states or districts.
NOTE: Qwant Maps has better search results than OSMAnd+
  • Get PilferShush Jammer from F-Droid to block microphone (use this in malls, restaurants or such public places if you can to prevent beacon tracking)
  • Get OpenBoard (user friendly) OR AnySoftKeyboard (nerd friendly) from F-Droid instead of Google GBoard, Microsoft SwiftKey et al, they are closed source keylogger USA spyware
  • Get FTP Server (Free) from F-Droid and FileZilla on computer for computer-to-phone internet less file sharing
NOTE: for phone-computer sync or sharing, can TRY KDE Connect, available for Android, Windows, Linux
  • Get TrebleShot instead of SHAREIt for phone to phone file sharing
  • Get K-9 Mail or FairEmail as e-mail client
  • Get NewPipe for YouTube watching, or YouTube in Firefox Preview/Klar
  • Get QKSMS from F-Droid as SMS client app
  • Get Shelter from F-Droid to sandbox potential apps that you must use (eg WhatsApp or Discord or Signal)
  • Get SuperFreezZ from F-Droid to freeze any apps from running in background
  • Get Librera Pro from F-Droid for PDF reader
  • Get ImgurViewer from F-Droid for opening reddit/imguother image links without invasive tracking
  • Get InstaGrabber from F-Droid for opening Instagram profiles or pictures without invasive tracking (seems like a revived fork is here, thanks u/sad_plan )
  • Get GreenTooth from F-Droid to set Bluetooth to disable after you have used it
  • Get Material Files or Simple File Manager from F-Droid for file manager app
  • Get ImagePipe from F-Droid if you share lot of pictures, and want to clear EXIF metadata snooping (often photos contain phone model, location, time, date)
  • Get Note Crypt Pro from F-Droid for encrypted note taking app
  • Get Vinyl Music Player from F-Droid for music player
  • Get VLC from F-Droid for video player

CRITICAL FOR CLIPBOARD, LOCATION AND OTHER APP FUNCTION BLOCKING

I would say this is one of the critical improvements in my guide, and will solve the problem of clipboard and coarse location snooping among other things.
AppOpsX is a free, open source app that allows to manage granular app permissions not visible normally, with the help of ADB authorisation without root. This app can finely control what granular information apps can access on your phone, which is not shown in app permissions regularly accessible to us.
Now that you would have set up your phone with installing apps, now is a good time to perform this procedure.
Step 1: Install AppOpsX from F-Droid. (https://f-droid.org/en/packages/com.zzzmode.appopsx/)
Step 2: Plug phone to computer, and enable USB debugging in Settings --> Developer Options (you probably already did this in the starting of the guide)
Step 3: Keep phone plugged into computer until the end of this procedure! Open AppOpsX app.
Step 4: On computer, type commands in order:
adb devices
adb tcpip 5555
adb shell sh /sdcard/Android/data/com.zzzmode.appopsx/opsx.sh &
Step 5: Now open "AppOpsX" app, and:
  • disable "read clipboard" for apps except your messengers, notepad, office suite, virtual keyboard, clipboard monitor apps et al.
NOTE: Most apps that have text field to copy/paste text require this permission.
  • disable "modify clipboard" for every app except for your virtual keyboard or office suite app or clipboard monitostack special apps.
  • disable "GPS", "precise location", "approximate location" and "coarse location" for every app except your maps app (Firefox and OSMAnd+)
  • disable "calendar" for every app except your calendar and email app
  • disable "read contacts", "modify contacts" and "get contacts" for every app except your "Phone", "Phone Services", "Phone/Messaging Storage", contacts and messenger apps
  • disable all "send/receive/view messages" permissions for every app except "Phone", "Phone Services", "Phone/Messaging Storage", QKSMS, contacts, dialler and messenger apps
  • disable "body sensors" and "recognise physical activity" for every app except games needing gyroscope, or any compass dependent app like camera or bubble leveling app
  • disable "camera" for every app except your camera and messenger apps
  • disable "record audio" for every app except camera, recorder, dialler and messenger apps
  • disable all "Phone" permissions for apps except your SMS app (like QKSMS) and Contacts, Dialler and call recorder apps
  • disable "change WiFi state" for every app except file sharing apps (like TrebleShot)
  • disable "display over other apps" for any third party app not from F-Droid
  • disable "read storage" and "write storage" for apps except file manager, file sharing app and messenger apps
  • enable all permissions for "Phone", "Phone Services" and "Phone/Messaging Storage" system apps, critical for cell radio calling and sending SMS
Step 6: Profit! Now you can plug off phone from computer.
NOTE: Remember to use AppOpsX everytime you install a new app outside of F-Droid store, which is done not too often by people.

FOR NERDY USERS

  • Get App Manager from Izzy's F-Droid repo (here) to inspect app's manifest, trackers, activities, receivers, services and even signatures via Exodus Privacy built-in, all without root
  • Get Warden from Izzy's F-Droid repo (here) for checking loggers (rest app is inferior to App Manager)

HOW TO USE NETGUARD

By default, all apps will be blacklisted from WiFi and mobile data access.
If not, go to Settings via 3 dot menu --> Defaults (white/blacklist) --> Toggle on "Block WiFi", "Block mobile" and "Block roaming"
Whitelist your web browsers, messengers (WhatsApp, Zoom et al), file sharing apps, download managers, "Aurora Store" app and any game if needs internet and give them WiFi and mobile data access.
Also, whitelist "Downloads" and "Download Manager" as these are system apps that allow web browsers and other apps without built-in downloader to download files. Whitelisting this will keep apps and system stable.

WHICH PHONE BRANDS ARE GOOD AND BAD? (FACTS)

Now we will need to evaluate what manufacturers are relatively safe, no appeasing, I will be blunt. I will make tier lists to help. I will give explanation for each, so read before jumping with pitchforks.
NOTE: If you have anti-Chinese political allergy, kindly read facts, or choose the other non-Chinese options listed.
Tier 1: Huawei/Honor, Asus, Nokia, Motorola, Sony, LG, FairPhone
Tier 2: Samsung, OnePlus, Oppo, Vivo, Xiaomi, Realme
Tier NOPE NOT AT ALL: Google
FairPhone: Clean software, ethical, recyclable components, good phone but bit extra price for midrange hardware. Status: good.
Huawei: (still no evidence by US government after one year of market protectionism ban, contrary to what Sinophobic US propaganda and condemned joke research papers (refer to this for why), may make you believe, all countries except US, Australia, Japan and UK are allowing them for 5G participation, there is absolutely ZERO EVIDENCE against specifically Huawei (does not count other Chinese companies), earlier ironically audited by UK GCHQ to be safe and on any of their global devices, to date there has been no telemetry found IFF you do NOT use Huawei ID account or Huawei AppGallery store (as instructed above). I have an OpenKirin rooted unlocked Honor 6X, and now a locked P30 Lite to confirm this.
If Huawei's CEO is a former PLA technician, so do plenty US companies. What does it prove?
NOTE: Real reason for this propaganda ban is USA could not monopolise 5G unlike it did 4G, and so they are playing their cards to put China out of commission. And Huawei did not steal 5G from USA, since USA does not even have a proper 5G vendor yet.
To add, for the rest of world outside China it is better to own a device from a country which has no jurisdiction over them, and you can use their phones without Huawei and Google accounts very safely. BONUS: baseband modem not associated with NSA. Also, good cameras, battery, display and performance in general. Status: good.
Asus, Sony, Motorola: their software is nearly stock, and as such quite beneficial and peace of mind assuring. Status: good.
LG: less stock-y software, still good. Good cameras. display too. Status: good.
Nokia: a bit of skepticism here with them helping spy with nexus with Russia's MTS and recently found Chinese telemetry as well, but nothing that NetGuard cannot stop by blocking domains via HOSTS from interacting with your device. Status: Potential issues, can be mitigated.
Samsung: Multiple issues with Qihoo 360 on phones with IMEI MAC sent over HTTP, Samsung Pay selling user data with no optout till now, Replicant devs discovering backdoors, Knox hardware blackbox with no idea what microcode it runs, certification from NSA even worrying, lockscreen and notification ads in OneUI, ads on Smart TVs, this all accounts to being quite shady company, but Blokada or NetGuard can mitigate it. Status: avoid for other brands if possible.
Xiaomi: They have quite a bit of telemetry in their MIUI skin, similar to Samsung. Now they have tracking in Incognito Mode in their Browser as well. Status: avoid unless you implement my guide properly.
OnePlus, Oppo, Vivo: They have considerably less telemetry and ads, better than Samsung and Xiaomi. But they will start doing the same thing as Realme which I will mention below soon. Status: potential but passable for now.
Realme: They are implementing ads into their UI, which will soon come to Oppo and Vivo phones too, a bit of an issue. This allows for telemetry and tracking concerns. Status: avoid if possible.
Google: In general an evil megacorp, Titan M security chip is self-claimed to be great on Pixels, but there is no way to verify if the microcode it contains is the same as that open sourced by Google. Having faith in Google's promise of their proprietary closed source chip being clean is like having faith in cyanide not killing a person. Moreover, they are known as:
  • NSA partner and collecting data and spy on users in googolplex capacity
  • AI used by US military for drone bombing in foreign countries based on metadata Google collects on smartphones
  • use dark patterns in their software to make users accept their TOS to spy
  • repeated lies about how their data collection works claiming anonymity
  • forcing users to use their Play Services which is spyware and scareware
  • monopolising the web and internet via AMP
  • use of non standard web browser libraries and known attempts to cripple lone standing ethical competitors like Firefox and Gecko web engine (now with Microsoft making their default Edge Chromium-based too)
TL;DR there is no summary, privacy is an indepth topic and you must take a couple of hours to go through this simple guide, as long as it looks it should clear all your concerns with smartphone privacy.
This is the best you can do without rooting or modding a phone, and it is working for me since almost a year now, personally tested and verified on my locked P30 Lite.
I have a history of rooting and modding phones, one being an Honor 6X before Huawei disabled unlocking policy, one being a Xiaomi and one being a Lenovo before that. Also, one Samsung Galaxy S2 long time ago.
Credit to w1nst0n for the Universal Android Debloater (authorised me to use his tool). Hope this guide serves as a great tool for any privacy seeker.
submitted by TheAnonymouseJoker to degoogle [link] [comments]


2020.08.14 18:43 biggreekgeek Flatten the Curve. #47. Keep Calm and Carry On meme was/is Propaganda. Pentagon MEME Warfare Center. Bill Gates Gene Drive Editing. Pakistan and China Biowarfare Lab Cooperation. Chinese Spy at UC & CRISPR-Cas9/Covid-19 Data? Political Chess at the WHO. AI and Gene Drive Can Stop the Pandemic.

Previous Post Is Here
Propaganda. Real propagandists are good at what they do. Really good. This is why you don't know it's propaganda until after the dust has settled, so to speak. All we can do is look back after the fact.
The truth doesn't always lead to the facts, but the facts always lead to the truth.
I came up with that axiom years ago. It just popped into my head. Don't know why, it just did. But keep that in the back of your head whenever you read fake facts.
So what are the facts and where is the truth? What can we line up in a manner that makes sense. Where do we dig in all this information for the artifacts they try to bury from us?
Let's start at Keep Calm and Carry On. Remember that? It's strange how viral it became, isn’t it? Almost like governments like viral information pandemics they choose, and use fake facts to suppress viral information that isn't good for your mental health, like conspiracy theories.
Have you noticed me using Keep Calm and Carry On a lot? It was on purpose. I wanted to illustrate how easy it is to be bombarded by terms like Keep Calm or New Normal into everyday usage. You don't think it affects the majority of society? Please. They don't spend billions upon billions into advertising just because they like commercials, they do it because it shapes our behavior.
Keep calm and carry on posters weren't mass-produced until 2008. It is a historical object of a very peculiar sort. By 2009, when it had first become hugely popular, it seemed to respond to a particularly English malaise connected directly with the way Britain reacted to the credit crunch and the banking crash. From this moment of crisis, it tapped into an already established narrative about Britain’s “finest hour” – the aerial Battle of Britain in 1940-41 – when it was the only country left fighting the Third Reich.

2008 Financial Crisis.

That's odd timing, isn't it. They we're mass produced. And if you remember there's also strong evidence that the Financial Collapse was probably engineered by China through MBS manipulation.
Let's keep calm and dig on.
This was similar to the “Keep calm and carry on shopping” commanded by George W Bush both after September 11 and when the sub-prime crisis hit America. The wartime use of this rhetoric escalated during the economic turmoil in the UK; witness the slogan of the 2010-15 coalition government, “We’re all in this together”.
What a wonderful world we live in. Keep calm. It's all good. Nothing to fear but fear itself. Right? Because there is nothing strange about President Bush using that phrase after 9/11, or the coalition UK government saying we're all in this together. Aren't we hearing more and more about how we're all in this pandemic together? Do you really believe this is by chance? Remember, world leaders have speech writers and world wide PR firms. And let's not forget that Afghanistan seemed to be more than about a former CIA asset against the Soviet Union hiding in a cave after he brought down the World Trade Towers using terrorists who didn't pass flight school.
So the slogan started in WW2 and it was created by the British Ministry of Information. That alone should make you hit pause, ask WTH, and rewind to see what else was missed.
Memetics: A Growth Industry in US Military operations was published in 2005 by Michael Prosser, now a Lieutenant Colonel in the Marine Corps. He proposed the creation of a 'Meme Warfare Center'.
Memetic warfare has been seriously studied as an important concept with respects to information warfare by NATO's Strategic Communications Centre of Excellence. Jeff Giesea, writing in NATO's Stratcom COE Defense Strategic Communications journal, defines memetic warfare as "competition over narrative, ideas, and social control in a social-media battlefield. One might think of it as a subset of ‘information operations’ tailored to social media. Information operations involve the collection and dissemination of information to establish a competitive advantage over an opponent".

2008 Cyberattack

The 2008 cyberattack on the United States was the "worst breach of U.S. military computers in history". The defense against the attack was named "Operation Buckshot Yankee". It led to the creation of the United States Cyber Command.
That code spread undetected on both classified and unclassified systems, establishing what amounted to a digital beachhead, from which data could be transferred to servers under foreign control. It was a network administrator's worst fear: a rogue program operating silently, poised to deliver operational plans into the hands of an unknown adversary.
As usual, the suspect was Russia. Blame Russia. They stole the cookies from the cookie jar. But we have the 2008 financial collapse at the same time. Now this either points to Russia did it alone, Russia did it with China, China did it alone and Russia is the scapegoat to keep us in the dark, or an unknown party attempted to gain access. The third option is unlikely.
So we had a financial collapse. Keep calm and carry on posters mass produced in the same year. A cyberattack. All in 2008. That's a very busy year, isn’t it? It's almost like 2015.
Almost like they took control of the narrative information flow before the information went viral and an uncontrolled narrative sprang up from the information.
And that narrative control is growing and getting stronger. Let's think about the Sentinel world simulation program. Or rather, simulations simultaneously simulated to simulate simulation possibilities. (Maybe I should write Dr. Suess kids books for the New Normal kids of tomorrow?) In other words, they can plan back up plans for back up plans. But as the simulations grow more accurate and Sentinel learns from it's mistakes, the simulations will grow in accuracy, and the machine could very well become pre-cognitive. Yes that's an outlandish proposition, but so was flying three hundred years ago, or a thinking computer for that matter. You can't dismiss tomorrow's possible advances in science as fiction when today's science was yesterday's science fiction.
ORDO AB CHAO meaning ORDER OUT OF CHAOS.
Yes this can mean creating chaos in events to manufacture order. But on a grand scale it also means to create order in the chaos of reality. It means controlling information before it becomes viral and takes on a life of it's own, becoming an out of control pandemic.
And we don't have a pandemic that's being subjected to a narrative, do we?
Well now that you ask, let's see if I can show some more information to potentially break the sanctioned narrative.
I'm not going to lie, the level of control at this point is frightening, and it's so obvious that it's become normal and nobody notices. It's background noise. A hum. A constant current of conflicting information to increase cognitive confusion to camouflage current events.
After and before the 2008 cyberattack and financial collapse, we had the Great Recession, which began in December 2007 and ended in June 2009, which makes it the longest recession since World War II.
And then there was this.
2009 swine flu pandemic. Analysis of the genetic divergence of the virus in samples from different cases indicated that the virus jumped to humans in 2008, probably after June, and not later than the end of November, likely around September 2008.
Unlike most strains of influenza, the Pandemic H1N1/09 virus does not disproportionately infect adults older than 60 years; this was an unusual and characteristic feature of the H1N1 pandemic.
The 2009 swine flu pandemic was an influenza pandemic that lasted for about 19 months, from January 2009 to August 2010, and was the second of two pandemics involving H1N1 influenza virus (the first being the 1918–1920 Spanish flu pandemic).
Cyber Attack. Economic Crash. Keep Calm and Carry On starts. Great Recession ends. Pandemic.
The timing looks awfully suspicious, doesn't it? It looks rather strategic, doesn't it?
So Let's Keep Calm and Contagion On.
Margaret Chan Fung Fu-chun, OBE, JP, FRCP (born August 21, 1947) is a Chinese-Canadian physician, who served as the Director-General of the World Health Organization (WHO) delegating the People's Republic of China[4] for 2006–2017. Chan has previously served as Director of Health in the Hong Kong Government (1994–2003), representative of the WHO Director-General for Pandemic Influenza and WHO Assistant Director-General for Communicable Diseases (2003–2006). In 2014, Forbes ranked her as the 30th most powerful woman in the world. In early 2018 she joined the Chinese People's Political Consultative Conference (CPPCC).
And she was followed by another Director General.
Tedros "was supported by a bloc of African and Asian countries, including China, which has considerable influence with those members" while "the US, UK and Canada... lent their support to... the British doctor David Nabarro." One observer called it "a really nasty" election.
There were allegations made of a cover up by the David Nabarro camp about a pandemic in Ethiopia, which were covered by the NY TIMES.
Does this put things in a little better perspective about recent events? President Trump pulls American funding from the WHO, Bill Gates increases funding becoming the number one source of revenue. In other words, it allows the political message to be made, while also removing American legal oversight, yet still leaving or increasing control over the WHO in the hands of Bill Gates.
Recall the DoD advisory board with all the tech gurus? Wasn't the absence of Bill Gates or Microsoft strange? What about all the disparaging statements by Bill towards the President? Yes all of this could be real, but it could also very well be staged. Don't forget about the central point in Unrestricted Warfare, you hide your attacks and confuse the enemy. And the same in Full Spectrum Dominance, you control all the sources of information because you fight in a Gray Zone, where you leave the enemy unbalanced and unsure of factual information.
This is why it's next to impossible to get a handle on all the information, it's by design. We don’t know who's responsible for what. But it's becoming increasingly clear that we are already in a war.
To our way of thinking, a planned stock market crash, a computer virus attack, making the currency exchange rate of an enemy country erratic, and spreading rumors on the Internet about the leaders of an enemy country can all be thought of as new concept weapons.
"Unrestricted Warfare": Military/Civilian Distinctions Break Down "Unrestricted Warfare" means that any methods can be prepared for use, information is everywhere, the battlefield is everywhere, and that any technology might be combined with any other technology, and that the boundaries between war and non-war and between military and non-military affairs has systematically broken down.
Qiao and Wang called for a “revolution in war,” which combines conventional with non-war actions, and military with non-military actions. In an alarming opinion, they stated that war may include a blend of stealth planes and cruise missiles, along with biochemical, financial, and terrorist attacks.
Lawfare • Lawfare, or political action through transnational or non-governmental organizations can effect a policy change that would be impossible otherwise. Because of the international nature of the modern world and activism, it is much easier for nation-states to affect policy in other nation-states through a proxy. Network warfare • One of the better-known alternatives in this book is the idea of attacking networks. Networks are increasingly important in not only data exchange but also transportation, financial institutions, and communication. Attacks that disable networks can easily hamstring large areas of life that are dependent on them for coordination. One example of network warfare would be shutting down a network that supplies power. If there is a significant failure in the power grid caused by the attack, massive power outages could result, crippling industry, defense, medicine, and all other areas of life. Chinese writings over the past two decades have amplified that cross integration of biotechnology, engineering, and information technology will become the new strategic doctrine for future military revolutions, as cited in the October 2015 edition of the Liberation Army Daily. These writings consistently put forth that weaponization of living organisms shall become a reality in the future, with non-traditional combat styles taking center stage. Zhang is a retired general and former president of China’s National Defense University. In the book, Zhang argues that modern biotechnological development is gradually showing strong signs characteristic of an offensive capability, including the possibility of employing “specific ethnic genetic attacks”.
Again, think of the timelines. Think back to one nation in 1989 squashing the revolution. Think about rare earth elements. Was this blackmail to force trade with the west? Are there indicators that point to a greater catastrophe and a war for dominace and survival of culture? There are ample examples in Western National Security papers indicating this. And there are also Asian Security papers indicating the same, which we will look at in a later post.
I do caution you not to interpret all events from a position of West vs East and only the East is attacking the West. Keep in mind that all strategic moves are being made to confuse the adversary and to confuse and demoralize each other's citizens, and also to build up tension amongst their own population in order to increase support for the war. Because the west has been indoctrinated with justifiable wars for human rights, they can't suddenly try to convince us to wage war in a fight over declining resources, the majority would insist on trying to find a solution to the problem for humanity, not to exterminate some humanity as a solution.
In our leaders eyes, we are the problem to the solution. Our leaders believe that we can't handle the truth. This is partly why so many events are still being hidden. This is also why the Keep Calm and Carry On propaganda started. And this is why biological warfare is so vital, because you it's almost impossible to discern whether it's a real virus or a labmade virus by the public. You can guess, but unless your government declared it tentional act of war, how would you truly know. And even when they do, how can you know with one hundred percent certainty that it was? You won't. Want an example? Alright, let's go.
The U.S. Department of Justice (DoJ) yesterday revealed charges against two Chinese nationals for their alleged involvement in a decade-long hacking spree targeting dissidents, government agencies, and hundreds of organizations in as many as 11 countries. The 11-count indictment, which was unsealed on Tuesday, alleges LI Xiaoyu (李啸宇) and DONG Jiazhi (董家志) stole terabytes of sensitive data, including from companies developing COVID-19 vaccines, testing technology, and treatments while operating both for private financial gain and behalf of China's Ministry of State Security. "China has now taken its place, alongside Russia, Iran and North Korea, in that shameful club of nations that provide a safe haven for cyber criminals in exchange for those criminals being 'on call' to work for the benefit of the state, [and] to feed the Chinese Communist party's insatiable hunger for American and other non-Chinese companies' hard-earned intellectual property, including COVID-19 research," said Assistant Attorney General John C. Demers, who leads the DoJ's National Security Division.
Hacking companies to get Covid-19 research. A shameful club of nations (How dare you! - Greta Thunberg). Hard earned intellectual property. Those are some pretty emotional trigger (you're triggering me!) words being used, aren't they? Mentioning hard earned intellectual property sounds a lot like making money, doesn't it? But the pandemic is a planet wide catastrophe, isn't it?
Billionaire philanthropist Bill Gates called for COVID-19 drugs and an eventual vaccine to be made available to countries and people that need them most, not to the "highest bidder," saying relying on market forces would prolong the deadly pandemic.
May 04, 2020 • The European Commission pledged $1bn to fund research on a vaccine. Norway matched the European Commission's contribution, and France has pledged €500m, as have Saudi Arabia and Germany. Japan pledged more than $800m. The US and Russia did not take part. China, where the virus originated in December, was represented by its ambassador to the European Union. Of the money raised, $4.4bn will go on vaccine development, some $2bn on the search for a treatment and $1.6bn for producing tests, the EU said. Mr Johnson, who spent three nights in intensive care with Covid-19, was to confirm the UK's pledge of £388m for vaccine research, testing and treatment during the conference. Along with the European Commission, the conference is being co-hosted by the UK, Canada, France, Germany, Italy, Japan, Norway and Saudi Arabia. "If we can develop a vaccine that is produced by the world, for the whole world, this will be a unique global public good of the 21st Century," they added.
One of these things is not like the other, one of these things is not the same. I understand the controversy over the WHO. But does it make sense to fight over Covid-19 intellectual property rights when the world is at stake? Yes, I know hacking is bad - Edward Snowden makes new claims about American hacking in China. - but so is hiding research and making money off of people's lives when researching goes faster when it's open sourced.
So why would they hide research from China? Why did accusations of China hiding the pandemic start almost immediately a few months ago, just after China shared the mapped Covid-19 genome?
January 11, 2020 • Chinese researchers reveal draft genome of virus implicated in Wuhan pneumonia. Scientists praise decision to make date public; U.S. group sets out to produce live virus from the sequence. Source Here
China shares the information. The American Government accuses China of not sharing it fast enough and hiding information. Then they start a spy ring round up to stop them from stealing information. So why would China have to steal the information if We’re All in This New Normal Together to Flatten the Curve?
July 24, 2020 • As part of a broader offensive against India and Western rivals, Pakistan and China have entered a secret three-year agreement to expand potential bio-warfare capabilities, including several research projects related to the deadly agent anthrax, the Klaxon reported citing multiple intelligence sources. China has been criticised for handling of coronavirus pandemic with speculations that disease could have emerged from Wuhan Institute of Virology, though most experts have discounted the theory. According to the report authored by Anthony Klan, the same lab has signed the covert deal with Pakistan military's Defense Science and Technology Organization (DESTO), to collaborate research in "emerging infectious diseases" and advance studies on the biological control of transmitted diseases.
Propaganda doesn't have to be fake to be propaganda, it only has to shape your outlook and behavior. And let's face it, in the face of an environmental collapse, issues of morality won't be a priority for the majority. Empty stomachs accept the truth, full stomachs fall for lies.
So let's just Keep Calm and Carry On.
July 23, 2020.
Justice Department official: Chinese consulate in Houston ‘went well over the line’ The State Department ordered Beijing to shutter the facility earlier this week.
The USA closes the embassy in Houston, and then the very next day the headline runs about the biological weapons co-operation between China and Pakistan, intended to be used against the West and India. Strange timing, isn’t it? Don't article's of that nature take a while to compile? Maybe not if you only quote unnamed intelligence sources. (I've led an interesting life. I'm like the Greek Forest Gump. I've met "famous" and influential people all my life. From Lawrence Taylor of the NY Giants to Alfonso Ribeiro (Carlton Banks from Fresh Prince, and he did the Carlton dance). Not a big deal to me at all, other than experiencing that Hypernormal unreal feeling of seeing the person and not the digital image - and yes it's actually disorienting at first - is what I end up talking about to others. But the other story I talk about is meeting a journalist from the Globe and Mail some twenty years ago, and he warned me to never trust an unnamed source. He insisted that the source was the person standing closet to him who answers a question for the journalist.
Journalist #1 - Hey, do you agree that Sasquatch is real and being kept hidden by the government?
Journalist #2 - Yes I do.

1 - Unnamed intelligence sources claim Sasquatch is being kept hidden by the government.

This narrative about China might be true, or it might not be true. I just want you to be aware of the narrative and how it shapes your perceptions.
There is one final part of this Gray Zone New Normal Narrative left.
UC Davis said Tang left her job as a visiting researcher in the Department of Radiation Oncology in June. Her work was funded by a study-based exchange program affiliated with China’s Ministry of Education, the university said in a statement. Agents have said they believe Tang sought refuge at the consulate after they interviewed her at her home in Davis on June 20. The FBI has been interviewing visa holders in more than 25 American cities suspected of hiding their ties to the Chinese military.
The FBI has been interviewing visa holders across more than 25 American cities. Let that sink in. Swim in it so you don’t drown in the endless distractions that are being thrown at you. The politics are a stage play, and at some point something will happen that will stop the bickering and unite them, and most of the West too. It's only a matter of time now. This is why we witness but don't see the subtle insinuations of ordinary acts being sinister.
In Houston, fire services were called after smoke was seen rising from the compound. US officials said staff, who were given 72 hours to leave the country, were burning documents in its grounds. A Republican senator claimed that the consulate, which covered several southern states, was an “espionage hub”.
Burning documents at a consulate? That never happens! They must be up to no good.
Classified documents and special equipment is to be destroyed according to State Department procedure or, in some instances, taken out (in the case of the evacuation of diplomats in 2014, some equipment not normally destroyed was taken from Libya to Tunisia). The flag will also be removed from the embassy. (Marines lowered the flag in Cuba when the embassy closed in 1961, then raised it again in 2015). The State Department did not immediately respond to a request for comment regarding what will happen to the embassy files, or what process the embassy staff will follow to get out of Caracas. Source Here.
Our news articles make it seek like the Chinese Consulate did something out of the ordinary by burning the documents. It's not. It's standard operating procedures. But what about the proof that they we're engaged in espionage? Proof? You don't need proof! Every single Embassy on the planet is engaged in espionage. That's reality.
www.washingtonpost.com Diplomatic Titles Often Used to Protect Intelligence Aides Source Here
The vast majority of the agency’s overseas officers are under what is known as “official cover,” which means they are posing as employees of another government agency. The State Department allows hundreds of its positions in embassies around the world to be occupied by CIA officers representing themselves as diplomats. A rarer and more dangerous job category is “nonofficial cover” — or “NOC” (pronounced knock) — in which CIA officers pose as employees of international corporations, as scientists or as members of other professions. Such covers tend to provide a plausible reason to work long periods overseas and come in contact with foreign nationals the agency wants to recruit. Source Here.
China Evil. China Evil. Repeat it enough and it become an accepted narrative. Is the paradigm shift necessary? TPTB think it is. But remember, this is geopolitics, there is no evil. There is just reality. And the reality is Russia, China, and the West, are positioning themselves for natural resource scarcity in the future. If you need greener pastures those pastures can't have a herd already living there, can they? So you spy, plot, and maneuver, all to be ready for the endgame.
Just China spying? Please.
October 27, 2013 • How NSA Spied on Merkel Cell Phone from Berlin. Source Here
Business as usual is always framed as unusual business when they need our engagement and outrage. Keep Calm and Propoganda On.
So should we Keep Calm and Carry On? That's a big fat nope. This is the New Normal, and over the next few posts I'll shake the tree more and show you how Keep Calm and Carry On stopped because the New Normal has started and the narrative has changed to alter our perceptions. You don’t start expelling illegal immigrants, trade wars, improve the emergency alert system, ramp up strategic anti-nuclear missle defense, and position military units worldwide in anticipation of repelling an invasion for no reason.
So the Chinese spy that was detained from the SF embassy? She worked at the University of California. So, you might ask, what's your point?
October 01, 2019 • UC now holds largest CRISPR-Cas9 patent portfolio Berkeley News. Source Here
CRISPR-Cas9. 2015. Bill Gates investment. Birdman Plauge Doctor Video. Ralph Baric discovers new coronavirus in bats can leap to humans. Gates pandemic warnings started. Chinese spy working at UC. How's the picture?
July 16, 2020 • The DNA-cutting proteins central to CRISPR-Cas9 and related gene-editing tools originally came from bacteria, but a newfound variety of Cas proteins apparently evolved in viruses that infect bacteria. The new Cas proteins were found in the largest known bacteria-infecting viruses, called bacteriophages, and are the most compact working Cas variants yet discovered — half the size of today’s workhorse, Cas9. “Adenoviruses are the perfect Trojan horse for delivering gene editors: You can easily program the viruses to reach almost any part in the body,” said Patrick Pausch, a postdoctoral fellow at the University of California, Berkeley, and in UC Berkeley’s Innovative Genomics Institute (IGI), a joint UC Berkeley/UCSF research group devoted to discovering and studying novel tools for gene editing in agriculture and human diseases. Source Here
Adenoviruses are the perfect Trojan Horse. Gene Drive Editing and CRISPR-Cas9.
December 15, 2017 • The technology is called gene drive. Scientists introduce a genetic defect that can spread rapidly through a population, causing it to die off. A few years ago gene drive was just a theory. But it became a near-reality almost overnight once the CRISPR gene editing system made it easier for scientists to do precise genetic modification. The recently discovered CRISPCas9 system functions like molecular scissors, allowing scientists to modify the DNA of humans and other species with unprecedented ease. Now many groups — including the Defence Advanced Research Projects Agency, an agency of the U.S. military — are developing gene drive technology aimed at solving a variety of problems including wiping out disease-carrying insects and eradicating invasive mammals like rodents and rabbits. That brings us to the great email dump last week. Scientists around the world were stunned when dozens of their personal emails suddenly appeared in the public domain — released by an environmental activist who obtained the documents through U.S. freedom of Information laws. The emails reveal a Canadian public relations firm, Emerging Ag Inc., recruiting scientists to participate in an online UN gene-drive forum and notifying them when to jump into the discussions. The emails do reveal a co-ordinated effort to mobilize scientists to defend their research turf, an effort that is funded by deep philanthropic pockets. The Bill and Melinda Gates Foundation has paid $1.6 million US to Emerging Ag for a three-year program to manage the scientists' network, including setting up a website and organizing meetings. The network is so new they haven't decided on an official name, but the working title is the Gene Drive Outreach Network.
Oh Bill. You're so far Ahead of the Curve, aren't you? Hiring a PR firm to shape public opinion, putting the spotlight on you and away from the AI military biowarfare industrial complex.
Keep calm and let us do the research: that's essentially the message from the new group. Source Here
Keep Calm. Nice use of language CBC. I cant help but think it was intentionally used to indicate the modern New Normal propoganda that's currently underway.
February 14, 2020 • Why Bill Gates thinks gene editing and artificial intelligence could save the world. Source Here
And this is what I mean when I say that's it all connected. All of it. If the effort of getting ahead of the curve is wasted on focusing on individual pieces of the puzzle without seeing where they connect to other pieces, the big picture will never be seen.
Keep Calm and Carry On memes. Military looks to open up meme warfare division. Power Geopolitics at the World Health Organization. Pandemic. Spy games. Spy worked at UC. UC has majority of CRISPR-Cas9 patents. Bill Gates wants gene drive editing. Public relations firms. AI and Gene Drive Editing can save the world.
Nothing is random when you prepare for an environmental collapse that will happen at random.
Keep Calm and Carry On? No thanks. There's a storm coming.
Heads up and eyes open. Talk soon.
submitted by biggreekgeek to conspiracy [link] [comments]


2020.08.08 13:24 TheAnonymouseJoker Smartphone Hardening non-root Guide 2.0 (for normal people)

NOTE (June) 15/06/2020: r_privacy moderator trai_dep revengefully deleted my highly gilded 1.0 guide post before.
UPDATED 16/8/2020: Major edit, replaced closed source App Ops and Shizuku with AppOpsX (Free Open source) on F-Droid. This guide is nearly FOSS supported now.
UPDATED 17/9/2020: MAJOR EDIT, replaced closed source Access Dots with Privacy Indicator (FOSS) on Izzy's F-Droid repo. This guide is completely FOSS.
Hello! I am the founder of /privatelife . Finally my smartphone non root guide is back, and there are some big upgrades. I was taking time to test everything myself on my daily driver, so apologies for keeping everyone in the wait, but stability and ease of use is the important goal to strive in my playbook. Privacy must be accessible to maximum amount of people without being annoying or tedious.
A kind request to share this guide to any privacy seeker.

User and device requirement

Why not Apple devices?

iPhone does not allow you to have privacy due to its blackbox nature, and is simply a false marketing assurance by Apple to you. Recently, an unpatchable hardware flaw was discovered in Apple's T1 and T2 "security" chips, rendering Apple devices critically vulnerable.
17/9/2020: Apple gave the FBI access to the iCloud account of a protester accused of setting police cars on fire.
Also, they recently dropped plan for encrypting iCloud backups after FBI complained. They also collect and sell data quite a lot. Siri still records conversations 9 months after Apple promised not to do it. Apple Mail app is vulnerable, yet Apple stays in denial.
Also, Apple sells certificates to third-party developers that allow them to track users, The San Ferdandino shooter publicity stunt was completely fraudulent, and Louis Rossmann dismantled Apple's PR stunt "repair program".
Also, Android's open source nature is starting to pay off in the long run. Apple 0-day exploits are far cheaper to do than Android.

LET'S GO!!!

ALL users must follow these steps before "for nerdy users" section.
Firstly, if your device is filled to the brim or used for long time, I recommend backing up your data and factory resetting for clean slate start.
NOTE: Samsung users will lose Samsung Pay, as Samsung has been caught and declares they sell this data: https://www.sammobile.com/news/samsung-pay-new-privacy-policy-your-data-sold/
  • Make DIY camera covers, for front camera notch use a tiny appropriate-sized thin opaque plastic cutout and use an invisible tape to stick it in place, replace every month (cost: tape roll and one minute of your time per month). My rear camera cover
  • Install F-Droid app store from here
  • Install NetGuard app firewall (see NOTE) from F-Droid and set it up with [privacy based DNS like Uncensored DNS or Tenta DNS or AdGuard DNS]
NOTE: NetGuard with Energized Ultimate HOSTS file with any one of the above mentioned DNS providers is the ultimate solution.
NOTE: Set DNS provider address in Settings -> Advanced settings --> VPN IPv4, IPv6 and DNS
  • In F-Droid store, open Repositories via the 3 dot menu on top right and add the following links below:
  1. https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo?fingerprint=8F992BBBA0340EFE6299C7A410B36D9C8889114CA6C58013C3587CDA411B4AED
  2. https://apt.izzysoft.de/fdroid/repo?fingerprint=3BF0D6ABFEAE2F401707B6D966BE743BF0EEE49C2561B9BA39073711F628937A
  3. https://guardianproject.info/fdroid/repo?fingerprint=B7C2EEFD8DAC7806AF67DFCD92EB18126BC08312A7F2D6F3862E46013C7A6135
Go back to F-Droid store home screen, and hit the update button beside the 3 dot menu.

LIST OF APPS TO GET

  • Get Firefox Beta web browser from F-Droid (install uBlock Origin addon inside (if technically advanced, try doing this)). Also get Firefox Klar if you like a separate incognito browser.
  • Get Aurora Store from F-Droid for apps from Play Store without actually using Play Store, use Anonymous option to sign in
  • for 3rd party APKs source them only from APKMirror OR APKPure OR APKMonk, quite trusted, BUT TRY AND AVOID IT IF POSSIBLE
  • Get Privacy Indicator from F-Droid for iOS 14 like camera/mic dot indicator feature
  • Get OSMAnd+ from F-Droid or Qwant Maps inside web browser for maps and/or print physical maps if you live and travel in one or two states or districts.
NOTE: Qwant Maps has better search results than OSMAnd+
  • Get PilferShush Jammer from F-Droid to block microphone (use this in malls, restaurants or such public places if you can to prevent beacon tracking)
  • Get OpenBoard (user friendly) OR AnySoftKeyboard (nerd friendly) from F-Droid instead of Google GBoard, Microsoft SwiftKey et al, they are closed source keylogger USA spyware
  • Get FTP Server (Free) from F-Droid and FileZilla on computer for computer-to-phone internet less file sharing
NOTE: for phone-computer sync or sharing, can TRY KDE Connect, available for Android, Windows, Linux
  • Get TrebleShot instead of SHAREIt for phone to phone file sharing
  • Get K-9 Mail or FairEmail as e-mail client
  • Get NewPipe for YouTube watching, or YouTube in Firefox Preview/Klar
  • Get QKSMS from F-Droid as SMS client app
  • Get Shelter from F-Droid to sandbox potential apps that you must use (eg WhatsApp or Discord or Signal)
  • Get SuperFreezZ from F-Droid to freeze any apps from running in background
  • Get Librera Pro from F-Droid for PDF reader
  • Get ImgurViewer from F-Droid for opening reddit/imguother image links without invasive tracking
  • Get InstaGrabber from F-Droid for opening Instagram profiles or pictures without invasive tracking (seems like a revived fork is here, thanks u/sad_plan )
  • Get GreenTooth from F-Droid to set Bluetooth to disable after you have used it
  • Get Material Files or Simple File Manager from F-Droid for file manager app
  • Get ImagePipe from F-Droid if you share lot of pictures, and want to clear EXIF metadata snooping (often photos contain phone model, location, time, date)
  • Get Note Crypt Pro from F-Droid for encrypted note taking app
  • Get Vinyl Music Player from F-Droid for music player
  • Get VLC from F-Droid for video player

CRITICAL FOR CLIPBOARD, LOCATION AND OTHER APP FUNCTION BLOCKING

I would say this is one of the critical improvements in my guide, and will solve the problem of clipboard and coarse location snooping among other things.
AppOpsX is a free, open source app that allows to manage granular app permissions not visible normally, with the help of ADB authorisation without root. This app can finely control what granular information apps can access on your phone, which is not shown in app permissions regularly accessible to us.
Now that you would have set up your phone with installing apps, now is a good time to perform this procedure.
Step 1: Install AppOpsX from F-Droid. (https://f-droid.org/en/packages/com.zzzmode.appopsx/)
Step 2: Plug phone to computer, and enable USB debugging in Settings --> Developer Options (you probably already did this in the starting of the guide)
Step 3: Keep phone plugged into computer until the end of this procedure! Open AppOpsX app.
Step 4: On computer, type commands in order:
adb devices
adb tcpip 5555
adb shell sh /sdcard/Android/data/com.zzzmode.appopsx/opsx.sh &
Step 5: Now open "AppOpsX" app, and:
  • disable "read clipboard" for apps except your messengers, notepad, office suite, virtual keyboard, clipboard monitor apps et al.
NOTE: Most apps that have text field to copy/paste text require this permission.
  • disable "modify clipboard" for every app except for your virtual keyboard or office suite app or clipboard monitostack special apps.
  • disable "GPS", "precise location", "approximate location" and "coarse location" for every app except your maps app (Firefox and OSMAnd+)
  • disable "calendar" for every app except your calendar and email app
  • disable "read contacts", "modify contacts" and "get contacts" for every app except your "Phone", "Phone Services", "Phone/Messaging Storage", contacts and messenger apps
  • disable all "send/receive/view messages" permissions for every app except "Phone", "Phone Services", "Phone/Messaging Storage", QKSMS, contacts, dialler and messenger apps
  • disable "body sensors" and "recognise physical activity" for every app except games needing gyroscope, or any compass dependent app like camera or bubble leveling app
  • disable "camera" for every app except your camera and messenger apps
  • disable "record audio" for every app except camera, recorder, dialler and messenger apps
  • disable all "Phone" permissions for apps except your SMS app (like QKSMS) and Contacts, Dialler and call recorder apps
  • disable "change WiFi state" for every app except file sharing apps (like TrebleShot)
  • disable "display over other apps" for any third party app not from F-Droid
  • disable "read storage" and "write storage" for apps except file manager, file sharing app and messenger apps
  • enable all permissions for "Phone", "Phone Services" and "Phone/Messaging Storage" system apps, critical for cell radio calling and sending SMS
Step 6: Profit! Now you can plug off phone from computer.
NOTE: Remember to use AppOpsX everytime you install a new app outside of F-Droid store, which is done not too often by people.

FOR NERDY USERS

  • Get App Manager from Izzy's F-Droid repo (here) to inspect app's manifest, trackers, activities, receivers, services and even signatures via Exodus Privacy built-in, all without root
  • Get Warden from Izzy's F-Droid repo (here) for checking loggers (rest app is inferior to App Manager)

HOW TO USE NETGUARD

By default, all apps will be blacklisted from WiFi and mobile data access.
If not, go to Settings via 3 dot menu --> Defaults (white/blacklist) --> Toggle on "Block WiFi", "Block mobile" and "Block roaming"
Whitelist your web browsers, messengers (WhatsApp, Zoom et al), file sharing apps, download managers, "Aurora Store" app and any game if needs internet and give them WiFi and mobile data access.
Also, whitelist "Downloads" and "Download Manager" as these are system apps that allow web browsers and other apps without built-in downloader to download files. Whitelisting this will keep apps and system stable.

WHICH PHONE BRANDS ARE GOOD AND BAD? (FACTS)

Now we will need to evaluate what manufacturers are relatively safe, no appeasing, I will be blunt. I will make tier lists to help. I will give explanation for each, so read before jumping with pitchforks.
NOTE: If you have anti-Chinese political allergy, kindly read facts, or choose the other non-Chinese options listed.
Tier 1: Huawei/Honor, Asus, Nokia, Motorola, Sony, LG, FairPhone
Tier 2: Samsung, OnePlus, Oppo, Vivo, Xiaomi, Realme
Tier NOPE NOT AT ALL: Google
FairPhone: Clean software, ethical, recyclable components, good phone but bit extra price for midrange hardware. Status: good.
Huawei: (still no evidence by US government after one year of market protectionism ban, contrary to what Sinophobic US propaganda and condemned joke research papers (refer to this for why), may make you believe, all countries except US, Australia, Japan and UK are allowing them for 5G participation, there is absolutely ZERO EVIDENCE against specifically Huawei (does not count other Chinese companies), earlier ironically audited by UK GCHQ to be safe and on any of their global devices, to date there has been no telemetry found IFF you do NOT use Huawei ID account or Huawei AppGallery store (as instructed above). I have an OpenKirin rooted unlocked Honor 6X, and now a locked P30 Lite to confirm this.
If Huawei's CEO is a former PLA technician, so do plenty US companies. What does it prove?
NOTE: Real reason for this propaganda ban is USA could not monopolise 5G unlike it did 4G, and so they are playing their cards to put China out of commission. And Huawei did not steal 5G from USA, since USA does not even have a proper 5G vendor yet.
To add, for the rest of world outside China it is better to own a device from a country which has no jurisdiction over them, and you can use their phones without Huawei and Google accounts very safely. BONUS: baseband modem not associated with NSA. Also, good cameras, battery, display and performance in general. Status: good.
Asus, Sony, Motorola: their software is nearly stock, and as such quite beneficial and peace of mind assuring. Status: good.
LG: less stock-y software, still good. Good cameras. display too. Status: good.
Nokia: a bit of skepticism here with them helping spy with nexus with Russia's MTS and recently found Chinese telemetry as well, but nothing that NetGuard cannot stop by blocking domains via HOSTS from interacting with your device. Status: Potential issues, can be mitigated.
Samsung: Multiple issues with Qihoo 360 on phones with IMEI MAC sent over HTTP, Samsung Pay selling user data with no optout till now, Replicant devs discovering backdoors, Knox hardware blackbox with no idea what microcode it runs, certification from NSA even worrying, lockscreen and notification ads in OneUI, ads on Smart TVs, this all accounts to being quite shady company, but Blokada or NetGuard can mitigate it. Status: avoid for other brands if possible.
Xiaomi: They have quite a bit of telemetry in their MIUI skin, similar to Samsung. Now they have tracking in Incognito Mode in their Browser as well. Status: avoid unless you implement my guide properly.
OnePlus, Oppo, Vivo: They have considerably less telemetry and ads, better than Samsung and Xiaomi. But they will start doing the same thing as Realme which I will mention below soon. Status: potential but passable for now.
Realme: They are implementing ads into their UI, which will soon come to Oppo and Vivo phones too, a bit of an issue. This allows for telemetry and tracking concerns. Status: avoid if possible.
Google: In general an evil megacorp, Titan M security chip is self-claimed to be great on Pixels, but there is no way to verify if the microcode it contains is the same as that open sourced by Google. Having faith in Google's promise of their proprietary closed source chip being clean is like having faith in cyanide not killing a person. Moreover, they are known as:
  • NSA partner and collecting data and spy on users in googolplex capacity
  • AI used by US military for drone bombing in foreign countries based on metadata Google collects on smartphones
  • use dark patterns in their software to make users accept their TOS to spy
  • repeated lies about how their data collection works claiming anonymity
  • forcing users to use their Play Services which is spyware and scareware
  • monopolising the web and internet via AMP
  • use of non standard web browser libraries and known attempts to cripple lone standing ethical competitors like Firefox and Gecko web engine (now with Microsoft making their default Edge Chromium-based too)
TL;DR there is no summary, privacy is an indepth topic and you must take a couple of hours to go through this simple guide, as long as it looks it should clear all your concerns with smartphone privacy.
This is the best you can do without rooting or modding a phone, and it is working for me since almost a year now, personally tested and verified on my locked P30 Lite.
I have a history of rooting and modding phones, one being an Honor 6X before Huawei disabled unlocking policy, one being a Xiaomi and one being a Lenovo before that. Also, one Samsung Galaxy S2 long time ago.
Credit to w1nst0n for the Universal Android Debloater (authorised me to use his tool). Hope this guide serves as a great tool for any privacy seeker.
submitted by TheAnonymouseJoker to opensource [link] [comments]


2020.08.08 13:22 TheAnonymouseJoker Smartphone Hardening non-root Guide 2.0 (for normal people)

NOTE (June) 15/06/2020: r_privacy moderator trai_dep revengefully deleted my highly gilded 1.0 guide post before.
UPDATED 16/8/2020: Major edit, replaced closed source App Ops and Shizuku with AppOpsX (Free Open source) on F-Droid. This guide is nearly FOSS supported now.
UPDATED 17/9/2020: MAJOR EDIT, replaced closed source Access Dots with Privacy Indicator (FOSS) on Izzy's F-Droid repo. This guide is completely FOSS.
Hello! I am the founder of /privatelife . Finally my smartphone non root guide is back, and there are some big upgrades. I was taking time to test everything myself on my daily driver, so apologies for keeping everyone in the wait, but stability and ease of use is the important goal to strive in my playbook. Privacy must be accessible to maximum amount of people without being annoying or tedious.
A kind request to share this guide to any privacy seeker.

User and device requirement

Why not Apple devices?

iPhone does not allow you to have privacy due to its blackbox nature, and is simply a false marketing assurance by Apple to you. Recently, an unpatchable hardware flaw was discovered in Apple's T1 and T2 "security" chips, rendering Apple devices critically vulnerable.
17/9/2020: Apple gave the FBI access to the iCloud account of a protester accused of setting police cars on fire.
Also, they recently dropped plan for encrypting iCloud backups after FBI complained. They also collect and sell data quite a lot. Siri still records conversations 9 months after Apple promised not to do it. Apple Mail app is vulnerable, yet Apple stays in denial.
Also, Apple sells certificates to third-party developers that allow them to track users, The San Ferdandino shooter publicity stunt was completely fraudulent, and Louis Rossmann dismantled Apple's PR stunt "repair program".
Also, Android's open source nature is starting to pay off in the long run. Apple 0-day exploits are far cheaper to do than Android.

LET'S GO!!!

ALL users must follow these steps before "for nerdy users" section.
Firstly, if your device is filled to the brim or used for long time, I recommend backing up your data and factory resetting for clean slate start.
NOTE: Samsung users will lose Samsung Pay, as Samsung has been caught and declares they sell this data: https://www.sammobile.com/news/samsung-pay-new-privacy-policy-your-data-sold/
  • Make DIY camera covers, for front camera notch use a tiny appropriate-sized thin opaque plastic cutout and use an invisible tape to stick it in place, replace every month (cost: tape roll and one minute of your time per month). My rear camera cover
  • Install F-Droid app store from here
  • Install NetGuard app firewall (see NOTE) from F-Droid and set it up with [privacy based DNS like Uncensored DNS or Tenta DNS or AdGuard DNS]
NOTE: NetGuard with Energized Ultimate HOSTS file with any one of the above mentioned DNS providers is the ultimate solution.
NOTE: Set DNS provider address in Settings -> Advanced settings --> VPN IPv4, IPv6 and DNS
  • In F-Droid store, open Repositories via the 3 dot menu on top right and add the following links below:
  1. https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo?fingerprint=8F992BBBA0340EFE6299C7A410B36D9C8889114CA6C58013C3587CDA411B4AED
  2. https://apt.izzysoft.de/fdroid/repo?fingerprint=3BF0D6ABFEAE2F401707B6D966BE743BF0EEE49C2561B9BA39073711F628937A
  3. https://guardianproject.info/fdroid/repo?fingerprint=B7C2EEFD8DAC7806AF67DFCD92EB18126BC08312A7F2D6F3862E46013C7A6135
Go back to F-Droid store home screen, and hit the update button beside the 3 dot menu.

LIST OF APPS TO GET

  • Get Firefox Beta web browser from F-Droid (install uBlock Origin addon inside (if technically advanced, try doing this)). Also get Firefox Klar if you like a separate incognito browser.
  • Get Aurora Store from F-Droid for apps from Play Store without actually using Play Store, use Anonymous option to sign in
  • for 3rd party APKs source them only from APKMirror OR APKPure OR APKMonk, quite trusted, BUT TRY AND AVOID IT IF POSSIBLE
  • Get Privacy Indicator from F-Droid for iOS 14 like camera/mic dot indicator feature
  • Get OSMAnd+ from F-Droid or Qwant Maps inside web browser for maps and/or print physical maps if you live and travel in one or two states or districts.
NOTE: Qwant Maps has better search results than OSMAnd+
  • Get PilferShush Jammer from F-Droid to block microphone (use this in malls, restaurants or such public places if you can to prevent beacon tracking)
  • Get OpenBoard (user friendly) OR AnySoftKeyboard (nerd friendly) from F-Droid instead of Google GBoard, Microsoft SwiftKey et al, they are closed source keylogger USA spyware
  • Get FTP Server (Free) from F-Droid and FileZilla on computer for computer-to-phone internet less file sharing
NOTE: for phone-computer sync or sharing, can TRY KDE Connect, available for Android, Windows, Linux
  • Get TrebleShot instead of SHAREIt for phone to phone file sharing
  • Get K-9 Mail or FairEmail as e-mail client
  • Get NewPipe for YouTube watching, or YouTube in Firefox Preview/Klar
  • Get QKSMS from F-Droid as SMS client app
  • Get Shelter from F-Droid to sandbox potential apps that you must use (eg WhatsApp or Discord or Signal)
  • Get SuperFreezZ from F-Droid to freeze any apps from running in background
  • Get Librera Pro from F-Droid for PDF reader
  • Get ImgurViewer from F-Droid for opening reddit/imguother image links without invasive tracking
  • Get InstaGrabber from F-Droid for opening Instagram profiles or pictures without invasive tracking (seems like a revived fork is here, thanks u/sad_plan )
  • Get GreenTooth from F-Droid to set Bluetooth to disable after you have used it
  • Get Material Files or Simple File Manager from F-Droid for file manager app
  • Get ImagePipe from F-Droid if you share lot of pictures, and want to clear EXIF metadata snooping (often photos contain phone model, location, time, date)
  • Get Note Crypt Pro from F-Droid for encrypted note taking app
  • Get Vinyl Music Player from F-Droid for music player
  • Get VLC from F-Droid for video player

CRITICAL FOR CLIPBOARD, LOCATION AND OTHER APP FUNCTION BLOCKING

I would say this is one of the critical improvements in my guide, and will solve the problem of clipboard and coarse location snooping among other things.
AppOpsX is a free, open source app that allows to manage granular app permissions not visible normally, with the help of ADB authorisation without root. This app can finely control what granular information apps can access on your phone, which is not shown in app permissions regularly accessible to us.
Now that you would have set up your phone with installing apps, now is a good time to perform this procedure.
Step 1: Install AppOpsX from F-Droid. (https://f-droid.org/en/packages/com.zzzmode.appopsx/)
Step 2: Plug phone to computer, and enable USB debugging in Settings --> Developer Options (you probably already did this in the starting of the guide)
Step 3: Keep phone plugged into computer until the end of this procedure! Open AppOpsX app.
Step 4: On computer, type commands in order:
adb devices
adb tcpip 5555
adb shell sh /sdcard/Android/data/com.zzzmode.appopsx/opsx.sh &
Step 5: Now open "AppOpsX" app, and:
  • disable "read clipboard" for apps except your messengers, notepad, office suite, virtual keyboard, clipboard monitor apps et al.
NOTE: Most apps that have text field to copy/paste text require this permission.
  • disable "modify clipboard" for every app except for your virtual keyboard or office suite app or clipboard monitostack special apps.
  • disable "GPS", "precise location", "approximate location" and "coarse location" for every app except your maps app (Firefox and OSMAnd+)
  • disable "calendar" for every app except your calendar and email app
  • disable "read contacts", "modify contacts" and "get contacts" for every app except your "Phone", "Phone Services", "Phone/Messaging Storage", contacts and messenger apps
  • disable all "send/receive/view messages" permissions for every app except "Phone", "Phone Services", "Phone/Messaging Storage", QKSMS, contacts, dialler and messenger apps
  • disable "body sensors" and "recognise physical activity" for every app except games needing gyroscope, or any compass dependent app like camera or bubble leveling app
  • disable "camera" for every app except your camera and messenger apps
  • disable "record audio" for every app except camera, recorder, dialler and messenger apps
  • disable all "Phone" permissions for apps except your SMS app (like QKSMS) and Contacts, Dialler and call recorder apps
  • disable "change WiFi state" for every app except file sharing apps (like TrebleShot)
  • disable "display over other apps" for any third party app not from F-Droid
  • disable "read storage" and "write storage" for apps except file manager, file sharing app and messenger apps
  • enable all permissions for "Phone", "Phone Services" and "Phone/Messaging Storage" system apps, critical for cell radio calling and sending SMS
Step 6: Profit! Now you can plug off phone from computer.
NOTE: Remember to use AppOpsX everytime you install a new app outside of F-Droid store, which is done not too often by people.

FOR NERDY USERS

  • Get App Manager from Izzy's F-Droid repo (here) to inspect app's manifest, trackers, activities, receivers, services and even signatures via Exodus Privacy built-in, all without root
  • Get Warden from Izzy's F-Droid repo (here) for checking loggers (rest app is inferior to App Manager)

HOW TO USE NETGUARD

By default, all apps will be blacklisted from WiFi and mobile data access.
If not, go to Settings via 3 dot menu --> Defaults (white/blacklist) --> Toggle on "Block WiFi", "Block mobile" and "Block roaming"
Whitelist your web browsers, messengers (WhatsApp, Zoom et al), file sharing apps, download managers, "Aurora Store" app and any game if needs internet and give them WiFi and mobile data access.
Also, whitelist "Downloads" and "Download Manager" as these are system apps that allow web browsers and other apps without built-in downloader to download files. Whitelisting this will keep apps and system stable.

WHICH PHONE BRANDS ARE GOOD AND BAD? (FACTS)

Now we will need to evaluate what manufacturers are relatively safe, no appeasing, I will be blunt. I will make tier lists to help. I will give explanation for each, so read before jumping with pitchforks.
NOTE: If you have anti-Chinese political allergy, kindly read facts, or choose the other non-Chinese options listed.
Tier 1: Huawei/Honor, Asus, Nokia, Motorola, Sony, LG, FairPhone
Tier 2: Samsung, OnePlus, Oppo, Vivo, Xiaomi, Realme
Tier NOPE NOT AT ALL: Google
FairPhone: Clean software, ethical, recyclable components, good phone but bit extra price for midrange hardware. Status: good.
Huawei: (still no evidence by US government after one year of market protectionism ban, contrary to what Sinophobic US propaganda and condemned joke research papers (refer to this for why), may make you believe, all countries except US, Australia, Japan and UK are allowing them for 5G participation, there is absolutely ZERO EVIDENCE against specifically Huawei (does not count other Chinese companies), earlier ironically audited by UK GCHQ to be safe and on any of their global devices, to date there has been no telemetry found IFF you do NOT use Huawei ID account or Huawei AppGallery store (as instructed above). I have an OpenKirin rooted unlocked Honor 6X, and now a locked P30 Lite to confirm this.
If Huawei's CEO is a former PLA technician, so do plenty US companies. What does it prove?
NOTE: Real reason for this propaganda ban is USA could not monopolise 5G unlike it did 4G, and so they are playing their cards to put China out of commission. And Huawei did not steal 5G from USA, since USA does not even have a proper 5G vendor yet.
To add, for the rest of world outside China it is better to own a device from a country which has no jurisdiction over them, and you can use their phones without Huawei and Google accounts very safely. BONUS: baseband modem not associated with NSA. Also, good cameras, battery, display and performance in general. Status: good.
Asus, Sony, Motorola: their software is nearly stock, and as such quite beneficial and peace of mind assuring. Status: good.
LG: less stock-y software, still good. Good cameras. display too. Status: good.
Nokia: a bit of skepticism here with them helping spy with nexus with Russia's MTS and recently found Chinese telemetry as well, but nothing that NetGuard cannot stop by blocking domains via HOSTS from interacting with your device. Status: Potential issues, can be mitigated.
Samsung: Multiple issues with Qihoo 360 on phones with IMEI MAC sent over HTTP, Samsung Pay selling user data with no optout till now, Replicant devs discovering backdoors, Knox hardware blackbox with no idea what microcode it runs, certification from NSA even worrying, lockscreen and notification ads in OneUI, ads on Smart TVs, this all accounts to being quite shady company, but Blokada or NetGuard can mitigate it. Status: avoid for other brands if possible.
Xiaomi: They have quite a bit of telemetry in their MIUI skin, similar to Samsung. Now they have tracking in Incognito Mode in their Browser as well. Status: avoid unless you implement my guide properly.
OnePlus, Oppo, Vivo: They have considerably less telemetry and ads, better than Samsung and Xiaomi. But they will start doing the same thing as Realme which I will mention below soon. Status: potential but passable for now.
Realme: They are implementing ads into their UI, which will soon come to Oppo and Vivo phones too, a bit of an issue. This allows for telemetry and tracking concerns. Status: avoid if possible.
Google: In general an evil megacorp, Titan M security chip is self-claimed to be great on Pixels, but there is no way to verify if the microcode it contains is the same as that open sourced by Google. Having faith in Google's promise of their proprietary closed source chip being clean is like having faith in cyanide not killing a person. Moreover, they are known as:
  • NSA partner and collecting data and spy on users in googolplex capacity
  • AI used by US military for drone bombing in foreign countries based on metadata Google collects on smartphones
  • use dark patterns in their software to make users accept their TOS to spy
  • repeated lies about how their data collection works claiming anonymity
  • forcing users to use their Play Services which is spyware and scareware
  • monopolising the web and internet via AMP
  • use of non standard web browser libraries and known attempts to cripple lone standing ethical competitors like Firefox and Gecko web engine (now with Microsoft making their default Edge Chromium-based too)
TL;DR there is no summary, privacy is an indepth topic and you must take a couple of hours to go through this simple guide, as long as it looks it should clear all your concerns with smartphone privacy.
This is the best you can do without rooting or modding a phone, and it is working for me since almost a year now, personally tested and verified on my locked P30 Lite.
I have a history of rooting and modding phones, one being an Honor 6X before Huawei disabled unlocking policy, one being a Xiaomi and one being a Lenovo before that. Also, one Samsung Galaxy S2 long time ago.
Credit to w1nst0n for the Universal Android Debloater (authorised me to use his tool). Hope this guide serves as a great tool for any privacy seeker.
submitted by TheAnonymouseJoker to fossdroid [link] [comments]


2020.08.08 13:19 TheAnonymouseJoker Smartphone Hardening non-root Guide 2.0 (for normal people)

NOTE (June) 15/06/2020: r_privacy moderator trai_dep revengefully deleted my highly gilded 1.0 guide post before.
UPDATED 16/8/2020: Major edit, replaced closed source App Ops and Shizuku with AppOpsX (Free Open source) on F-Droid. This guide is nearly FOSS supported now.
UPDATED 17/9/2020: MAJOR EDIT, replaced closed source Access Dots with Privacy Indicator (FOSS) on Izzy's F-Droid repo. This guide is completely FOSS.
Hello! Finally my smartphone non root guide is back, and there are some big upgrades. I was taking time to test everything myself on my daily driver, so apologies for keeping everyone in the wait, but stability and ease of use is the important goal to strive in my playbook. Privacy must be accessible to maximum amount of people without being annoying or tedious.
A kind request to share this guide to any privacy seeker.

User and device requirement

Why not Apple devices?

iPhone does not allow you to have privacy due to its blackbox nature, and is simply a false marketing assurance by Apple to you. Recently, an unpatchable hardware flaw was discovered in Apple's T1 and T2 "security" chips, rendering Apple devices critically vulnerable.
17/9/2020: Apple gave the FBI access to the iCloud account of a protester accused of setting police cars on fire.
Also, they recently dropped plan for encrypting iCloud backups after FBI complained. They also collect and sell data quite a lot. Siri still records conversations 9 months after Apple promised not to do it. Apple Mail app is vulnerable, yet Apple stays in denial.
Also, Apple sells certificates to third-party developers that allow them to track users, The San Ferdandino shooter publicity stunt was completely fraudulent, and Louis Rossmann dismantled Apple's PR stunt "repair program".
Also, Android's open source nature is starting to pay off in the long run. Apple 0-day exploits are far cheaper to do than Android.

LET'S GO!!!

ALL users must follow these steps before "for nerdy users" section.
Firstly, if your device is filled to the brim or used for long time, I recommend backing up your data and factory resetting for clean slate start.
NOTE: Samsung users will lose Samsung Pay, as Samsung has been caught and declares they sell this data: https://www.sammobile.com/news/samsung-pay-new-privacy-policy-your-data-sold/
  • Make DIY camera covers, for front camera notch use a tiny appropriate-sized thin opaque plastic cutout and use an invisible tape to stick it in place, replace every month (cost: tape roll and one minute of your time per month). My rear camera cover
  • Install F-Droid app store from here
  • Install NetGuard app firewall (see NOTE) from F-Droid and set it up with [privacy based DNS like Uncensored DNS or Tenta DNS or AdGuard DNS]
NOTE: NetGuard with Energized Ultimate HOSTS file with any one of the above mentioned DNS providers is the ultimate solution.
NOTE: Set DNS provider address in Settings -> Advanced settings --> VPN IPv4, IPv6 and DNS
  • In F-Droid store, open Repositories via the 3 dot menu on top right and add the following links below:
  1. https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo?fingerprint=8F992BBBA0340EFE6299C7A410B36D9C8889114CA6C58013C3587CDA411B4AED
  2. https://apt.izzysoft.de/fdroid/repo?fingerprint=3BF0D6ABFEAE2F401707B6D966BE743BF0EEE49C2561B9BA39073711F628937A
  3. https://guardianproject.info/fdroid/repo?fingerprint=B7C2EEFD8DAC7806AF67DFCD92EB18126BC08312A7F2D6F3862E46013C7A6135
Go back to F-Droid store home screen, and hit the update button beside the 3 dot menu.

LIST OF APPS TO GET

  • Get Firefox Beta web browser from F-Droid (install uBlock Origin addon inside (if technically advanced, try doing this)). Also get Firefox Klar if you like a separate incognito browser.
  • Get Aurora Store from F-Droid for apps from Play Store without actually using Play Store, use Anonymous option to sign in
  • for 3rd party APKs source them only from APKMirror OR APKPure OR APKMonk, quite trusted, BUT TRY AND AVOID IT IF POSSIBLE
  • Get Privacy Indicator from F-Droid for iOS 14 like camera/mic dot indicator feature
  • Get OSMAnd+ from F-Droid or Qwant Maps inside web browser for maps and/or print physical maps if you live and travel in one or two states or districts.
NOTE: Qwant Maps has better search results than OSMAnd+
  • Get PilferShush Jammer from F-Droid to block microphone (use this in malls, restaurants or such public places if you can to prevent beacon tracking)
  • Get OpenBoard (user friendly) OR AnySoftKeyboard (nerd friendly) from F-Droid instead of Google GBoard, Microsoft SwiftKey et al, they are closed source keylogger USA spyware
  • Get FTP Server (Free) from F-Droid and FileZilla on computer for computer-to-phone internet less file sharing
NOTE: for phone-computer sync or sharing, can TRY KDE Connect, available for Android, Windows, Linux
  • Get TrebleShot instead of SHAREIt for phone to phone file sharing
  • Get K-9 Mail or FairEmail as e-mail client
  • Get NewPipe for YouTube watching, or YouTube in Firefox Preview/Klar
  • Get QKSMS from F-Droid as SMS client app
  • Get Shelter from F-Droid to sandbox potential apps that you must use (eg WhatsApp or Discord or Signal)
  • Get SuperFreezZ from F-Droid to freeze any apps from running in background
  • Get Librera Pro from F-Droid for PDF reader
  • Get ImgurViewer from F-Droid for opening reddit/imguother image links without invasive tracking
  • Get InstaGrabber from F-Droid for opening Instagram profiles or pictures without invasive tracking (seems like a revived fork is here, thanks u/sad_plan )
  • Get GreenTooth from F-Droid to set Bluetooth to disable after you have used it
  • Get Material Files or Simple File Manager from F-Droid for file manager app
  • Get ImagePipe from F-Droid if you share lot of pictures, and want to clear EXIF metadata snooping (often photos contain phone model, location, time, date)
  • Get Note Crypt Pro from F-Droid for encrypted note taking app
  • Get Vinyl Music Player from F-Droid for music player
  • Get VLC from F-Droid for video player

CRITICAL FOR CLIPBOARD, LOCATION AND OTHER APP FUNCTION BLOCKING

I would say this is one of the critical improvements in my guide, and will solve the problem of clipboard and coarse location snooping among other things.
AppOpsX is a free, open source app that allows to manage granular app permissions not visible normally, with the help of ADB authorisation without root. This app can finely control what granular information apps can access on your phone, which is not shown in app permissions regularly accessible to us.
Now that you would have set up your phone with installing apps, now is a good time to perform this procedure.
Step 1: Install AppOpsX from F-Droid. (https://f-droid.org/en/packages/com.zzzmode.appopsx/)
Step 2: Plug phone to computer, and enable USB debugging in Settings --> Developer Options (you probably already did this in the starting of the guide)
Step 3: Keep phone plugged into computer until the end of this procedure! Open AppOpsX app.
Step 4: On computer, type commands in order:
adb devices
adb tcpip 5555
adb shell sh /sdcard/Android/data/com.zzzmode.appopsx/opsx.sh &
Step 5: Now open "AppOpsX" app, and:
  • disable "read clipboard" for apps except your messengers, notepad, office suite, virtual keyboard, clipboard monitor apps et al.
NOTE: Most apps that have text field to copy/paste text require this permission.
  • disable "modify clipboard" for every app except for your virtual keyboard or office suite app or clipboard monitostack special apps.
  • disable "GPS", "precise location", "approximate location" and "coarse location" for every app except your maps app (Firefox and OSMAnd+)
  • disable "calendar" for every app except your calendar and email app
  • disable "read contacts", "modify contacts" and "get contacts" for every app except your "Phone", "Phone Services", "Phone/Messaging Storage", contacts and messenger apps
  • disable all "send/receive/view messages" permissions for every app except "Phone", "Phone Services", "Phone/Messaging Storage", QKSMS, contacts, dialler and messenger apps
  • disable "body sensors" and "recognise physical activity" for every app except games needing gyroscope, or any compass dependent app like camera or bubble leveling app
  • disable "camera" for every app except your camera and messenger apps
  • disable "record audio" for every app except camera, recorder, dialler and messenger apps
  • disable all "Phone" permissions for apps except your SMS app (like QKSMS) and Contacts, Dialler and call recorder apps
  • disable "change WiFi state" for every app except file sharing apps (like TrebleShot)
  • disable "display over other apps" for any third party app not from F-Droid
  • disable "read storage" and "write storage" for apps except file manager, file sharing app and messenger apps
  • enable all permissions for "Phone", "Phone Services" and "Phone/Messaging Storage" system apps, critical for cell radio calling and sending SMS
Step 6: Profit! Now you can plug off phone from computer.
NOTE: Remember to use AppOpsX everytime you install a new app outside of F-Droid store, which is done not too often by people.

FOR NERDY USERS

  • Get App Manager from Izzy's F-Droid repo (here) to inspect app's manifest, trackers, activities, receivers, services and even signatures via Exodus Privacy built-in, all without root
  • Get Warden from Izzy's F-Droid repo (here) for checking loggers (rest app is inferior to App Manager)

HOW TO USE NETGUARD

By default, all apps will be blacklisted from WiFi and mobile data access.
If not, go to Settings via 3 dot menu --> Defaults (white/blacklist) --> Toggle on "Block WiFi", "Block mobile" and "Block roaming"
Whitelist your web browsers, messengers (WhatsApp, Zoom et al), file sharing apps, download managers, "Aurora Store" app and any game if needs internet and give them WiFi and mobile data access.
Also, whitelist "Downloads" and "Download Manager" as these are system apps that allow web browsers and other apps without built-in downloader to download files. Whitelisting this will keep apps and system stable.

WHICH PHONE BRANDS ARE GOOD AND BAD? (FACTS)

Now we will need to evaluate what manufacturers are relatively safe, no appeasing, I will be blunt. I will make tier lists to help. I will give explanation for each, so read before jumping with pitchforks.
NOTE: If you have anti-Chinese political allergy, kindly read facts, or choose the other non-Chinese options listed.
Tier 1: Huawei/Honor, Asus, Nokia, Motorola, Sony, LG, FairPhone
Tier 2: Samsung, OnePlus, Oppo, Vivo, Xiaomi, Realme
Tier NOPE NOT AT ALL: Google
FairPhone: Clean software, ethical, recyclable components, good phone but bit extra price for midrange hardware. Status: good.
Huawei: (still no evidence by US government after one year of market protectionism ban, contrary to what Sinophobic US propaganda and condemned joke research papers (refer to this for why), may make you believe, all countries except US, Australia, Japan and UK are allowing them for 5G participation, there is absolutely ZERO EVIDENCE against specifically Huawei (does not count other Chinese companies), earlier ironically audited by UK GCHQ to be safe and on any of their global devices, to date there has been no telemetry found IFF you do NOT use Huawei ID account or Huawei AppGallery store (as instructed above). I have an OpenKirin rooted unlocked Honor 6X, and now a locked P30 Lite to confirm this.
If Huawei's CEO is a former PLA technician, so do plenty US companies. What does it prove?
NOTE: Real reason for this propaganda ban is USA could not monopolise 5G unlike it did 4G, and so they are playing their cards to put China out of commission. And Huawei did not steal 5G from USA, since USA does not even have a proper 5G vendor yet.
To add, for the rest of world outside China it is better to own a device from a country which has no jurisdiction over them, and you can use their phones without Huawei and Google accounts very safely. BONUS: baseband modem not associated with NSA. Also, good cameras, battery, display and performance in general. Status: good.
Asus, Sony, Motorola: their software is nearly stock, and as such quite beneficial and peace of mind assuring. Status: good.
LG: less stock-y software, still good. Good cameras. display too. Status: good.
Nokia: a bit of skepticism here with them helping spy with nexus with Russia's MTS and recently found Chinese telemetry as well, but nothing that NetGuard cannot stop by blocking domains via HOSTS from interacting with your device. Status: Potential issues, can be mitigated.
Samsung: Multiple issues with Qihoo 360 on phones with IMEI MAC sent over HTTP, Samsung Pay selling user data with no optout till now, Replicant devs discovering backdoors, Knox hardware blackbox with no idea what microcode it runs, certification from NSA even worrying, lockscreen and notification ads in OneUI, ads on Smart TVs, this all accounts to being quite shady company, but Blokada or NetGuard can mitigate it. Status: avoid for other brands if possible.
Xiaomi: They have quite a bit of telemetry in their MIUI skin, similar to Samsung. Now they have tracking in Incognito Mode in their Browser as well. Status: avoid unless you implement my guide properly.
OnePlus, Oppo, Vivo: They have considerably less telemetry and ads, better than Samsung and Xiaomi. But they will start doing the same thing as Realme which I will mention below soon. Status: potential but passable for now.
Realme: They are implementing ads into their UI, which will soon come to Oppo and Vivo phones too, a bit of an issue. This allows for telemetry and tracking concerns. Status: avoid if possible.
Google: In general an evil megacorp, Titan M security chip is self-claimed to be great on Pixels, but there is no way to verify if the microcode it contains is the same as that open sourced by Google. Having faith in Google's promise of their proprietary closed source chip being clean is like having faith in cyanide not killing a person. Moreover, they are known as:
  • NSA partner and collecting data and spy on users in googolplex capacity
  • AI used by US military for drone bombing in foreign countries based on metadata Google collects on smartphones
  • use dark patterns in their software to make users accept their TOS to spy
  • repeated lies about how their data collection works claiming anonymity
  • forcing users to use their Play Services which is spyware and scareware
  • monopolising the web and internet via AMP
  • use of non standard web browser libraries and known attempts to cripple lone standing ethical competitors like Firefox and Gecko web engine (now with Microsoft making their default Edge Chromium-based too)
TL;DR there is no summary, privacy is an indepth topic and you must take a couple of hours to go through this simple guide, as long as it looks it should clear all your concerns with smartphone privacy.
This is the best you can do without rooting or modding a phone, and it is working for me since almost a year now, personally tested and verified on my locked P30 Lite.
I have a history of rooting and modding phones, one being an Honor 6X before Huawei disabled unlocking policy, one being a Xiaomi and one being a Lenovo before that. Also, one Samsung Galaxy S2 long time ago.
Credit to w1nst0n for the Universal Android Debloater (authorised me to use his tool). Hope this guide serves as a great tool for any privacy seeker.
submitted by TheAnonymouseJoker to privatelife [link] [comments]


2020.07.30 10:29 Reddit-STD-4-FREEDOM “Charity” Accused of Sex Abuse Coordinating ID2020’s Pilot Program For Refugee Newborns

If the networks of the U.S. military, the U.S. intelligence community and a slew of other U.S. federal agencies were running the software of a company with deep ties, not only to foreign companies with a history of espionage against the U.S. but also foreign military intelligence, it would — at the very least — garner substantial media attention. Yet, no media reports to date have noted that such a scenario exists on a massive scale and that the company making such software recently simulated the cancellation of the 2020 election and the declaration of martial law in the United States.
Earlier this month, MintPress News reported on the simulations for the U.S. 2020 election organized by the company Cybereason, a firm led by former members of Israel’s military intelligence Unit 8200 and advised by former top and current officials in both Israeli military intelligence and the CIA. Those simulations, attended by federal officials from the FBI, DHS and the U.S. Secret Service, ended in disaster, with the elections ultimately canceled and martial law declared due to the chaos created by a group of hackers led by Cybereason employees.
The first installment of this three part series delved deeply into Cybereason’s ties to the intelligence community of Israel and also other agencies, including the CIA, as well as the fact that Cybereason stood to gain little financially from the simulations given that their software could not have prevented the attacks waged against the U.S.’ electoral infrastructure in the exercise.
Also noted was the fact that Cybereason software could be potentially used as a backdoor by unauthorized actors, a possibility strengthened by the fact that the company’s co-founders all previously worked for firms that have a history of placing backdoors into U.S. telecommunications and electronic infrastructure as well as aggressive espionage targeting U.S. federal agencies.
The latter issue is crucial in the context of this installment of this exclusive MintPress series, as Cybereason’s main investors turned partners have integrated Cybereason’s software into their product offerings. This means that the clients of these Cybereason partner companies, the U.S. intelligence community and military among them, are now part of Cybereason’s network of more than 6 million endpoints that this private company constantly monitors using a combination of staff comprised largely of former intelligence operatives and an AI algorithm first developed by Israeli military intelligence.
Cybereason, thus far, has disclosed the following groups as lead investors in the company: Charles River Ventures (CRV), Spark Capital, Lockheed Martin and SoftBank. Charles River Ventures (CRV) was among the first to invest in Cybereason and has been frequently investing in other Israeli tech start-upsthat were founded by former members of the elite Israeli military intelligence Unit 8200 over the last few years. Spark Capital, based in California, appears to have followed CRV’s interest in Cybereason since the venture capitalist who co-founded Spark and led its investment in Cybereason is a former CRV partnerwho still has close ties to the firm.
While CRV and Spark Capital seem like just the type of investors a company like Cybereason would attract given their clear interest in similar tech start-ups coming out of Israel’s cyber sector, Cybereason’s other lead investors — Lockheed Martin and SoftBank — deserve much more attention and scrutiny.

Cybereason widely used by US Government, thanks to Lockheed

“A match made in heaven,” trumpeted Forbes at the news of the Lockheed Martin-Cybereason partnership, first forged in 2015. The partnership involved not only Lockheed Martin becoming a major investor in the cybersecurity company but also in Lockheed Martin becoming the largest conduit providing Cybereason’s software to U.S. federal and military agencies.
Indeed, as Forbes noted at the time, not only did Lockheed invest in the company, it decided to integrate Cybereason’s software completely into its product portfolio, resulting in a “model of both using Cybereason internally, and selling it to both public and private customers.”
Cybereason CEO and former offensive hacker for Israeli military intelligence — Lior Div — said the following of the partnership:
Lockheed Martin invested in Cybereason’s protection system after they compared our solution against a dozen others from the top industry players. The US firm was so impressed with the results they got from Cybereason that they began offering it to their own customers – among them most of the top Fortune 100 companies, and the US federal government. Cybereason is now the security system recommended by LM to its customers for protection from a wide (sic) malware and hack attacks.”
Rich Mahler, then-director of Commercial Cyber Services at Lockheed Martin,told Defense Daily that the company’s decision to invest in Cybereason, internally use its software, and include the technology as part of Lockheed Martin’s cyber solutions portfolio were all “independent business decisions but were all coordinated and timed with the transaction.”
How independent each of those decisions actually was is unclear, especially given the timing of Lockheed Martin’s investment in Cybereason, whose close and troubling ties to Israeli intelligence as well as the CIA were noted in the previous installment of this investigative series. Indeed, about a year prior to their investment in the Israeli military intelligence-linked Cybereason, Lockheed Martin opened an office in Beersheba, Israel, where the IDF has its “cyberhub”. The office is focused not on the sales of armaments, but instead on technology.
Marilyn Hewson, Lockheed Martin’s CEO, said the following during her speechthat inaugurated the company’s Beersheba office:
The consolidation of IDF Technical Units to new bases in the Negev Desert region is an important transformation of Israel’s information technology capability…We understand the challenges of this move. Which is why we are investing in the facilities and people that will ensure we are prepared to support for these critical projects. By locating our new office in the capital of the Negev we are well positioned to work closely with our Israeli partners and stand ready to: accelerate project execution, reduce program risk and share our technical expertise by training and developing in-country talent.”
Beersheba not only houses the IDF’s technology campus, but also the Israel National Cyber Directorate, which reports directly to Israel’s Prime Minister, as well as a high-tech corporate park that mostly houses tech companies with ties to Israel’s military intelligence apparatus. The area has been cited in several media reports as a visible indicator of the public-private merger between Israeli technology companies, many of them started by Unit 8200 alumni, and the Israeli government and its intelligence services. Lockheed Martin quickly became a key fixture in the Beersheba-based cyberhub.
Not long before Lockheed began exploring the possibility of opening an office in Beersheba, the company was hacked by individuals who used tokens tied to the company, RSA Security, whose founders have ties to Israel’s defense establishment and which is now owned by Dell, a company also deeply tied to the Israeli government and tech sector. The hack, perpetrated by still unknown actors, may have sparked Lockheed’s subsequent interest in Israel’s cybersecurity sector.
Soon after opening its Beersheba office, Lockheed Martin created its Israel subsidiary, Lockheed Martin Israel. Unlike many of the company’s other subsidiaries, this one is focused exclusively on “cybersecurity, enterprise information technology, data centers, mobile, analytics and cloud” as opposed to the manufacture and design of armaments.
Haden Land, then-vice president of research and technology for Lockheed Martin, told the Wall Street Journal that the creation of the subsidiary was largely aimed at securing contracts with the IDF and that the company’s Israel subsidiary would soon be seeking partnership and investments in pursuit of that end. Land oversaw the local roll-out of the company’s Israel subsidiary while concurrently meeting with Israeli government officials. According to the Journal, Land “oversees all of Lockheed Martin’s information-systems businesses, including defense and civilian commercial units” for the United States and elsewhere.
Just a few months later, Lockheed Martin partnered and invested in Cybereason, suggesting that Lockheed’s decision to do so was aimed at securing closer ties with the IDF. This further suggests that Cybereason still maintains close ties to Israeli military intelligence, a point expounded upon in great detail in the previous installment of this series.
Thus, it appears that not only does Lockheed Martin use Cybereason’s software on its own devices and on those it manages for its private and public sector clients, but it also decided to use the company’s software in this way out of a desire to more closely collaborate with the Israeli military in matters related to technology and cybersecurity.
The cozy ties between Lockheed Martin, one of the U.S. government’s largest private contractors, and the IDF set off alarm bells, then and now, for those concerned with U.S. national security. Such concern makes it important to look at the extent of Cybereason’s use by federal and military agencies in the United States through their contracting of Lockheed Martin’s Information Technology (IT) division. This is especially important considering Israeli military intelligence’s history of using espionage, blackmail and private tech companies against the U.S. government, as detailed here.
While the exact number of U.S. federal and military agencies using Cybereason’s software is unknown, it is widespread, with Lockheed Martin’s IT division as the conduit. Indeed, Lockheed Martin was the number one IT solutions provider to the U.S. federal government up until its IT division was spun off and merged with Leidos Holdings. As a consequence, Leidos is now the largest IT provider to the U.S. government and is also directly partnered with Cybereason in the same way Lockheed Martin was. Even after its IT division was spun off, Lockheed Martin continues to use Cybereason’s software in its cybersecurity work for the Pentagon and still maintains a stake in the company.
The Leidos-Lockheed Martin IT hybrid provides a litany of services to the U.S. military and U.S. intelligence. As investigative journalist Tim Shorrock noted for The Nation, the company does “everything from analyzing signals for the NSA to tracking down suspected enemy fighters for US Special Forces in the Middle East and Africa” and, following its merger with Lockheed and consequential partnership with Cybereason, became “the largest of five corporations that together employ nearly 80 percent of the private-sector employees contracted to work for US spy and surveillance agencies.” Shorrock also notes that these private-sector contractors now dominate the mammoth U.S. surveillance apparatus, many of them working for Leidos and — by extension — using Cybereason’s software.
Leidos’ exclusive use of Cybereason software for cybersecurity is also relevant for the U.S. military since Leidos runs a number of sensitive systems for the Pentagon, including its recently inked contract to manage the entire military telecommunications infrastructure for Defense Information Systems Agency (DISA). In addition to maintaining the military telecom network, Cybereason is also directly partnered with World Wide Technologies (WWT) as of this past October. WWT manages cybersecurity for the U.S. Army, maintains DISA’s firewalls and data storage as well as the U.S. Air Force’s biometric identification system. WWT also manages contracts for NASA, itself a frequent target of Israeli government espionage, and the U.S. Navy. WWT’s partnership is similar to the Lockheed/Leidos partnership in that Cybereason’s software is now completely integrated into its portfolio, giving the company full access to the devices on all of these highly classified networks.
Many of these new partnerships with Cybereason, including its partnership with WWT, followed claims made by members of Israel’s Unit 8200 in 2017 that the popular antivirus software of Kaspersky Labs contained a backdoor for Russian intelligence, thereby compromising U.S. systems. The Wall Street Journal was the first to report on the alleged backdoor but did not mention the involvement of Unit 8200 in identifying it, a fact revealed by the New York Times a week later.
Notably, none of the evidence Unit 8200 used to blame Kaspersky has been made public and Kaspersky noted that it was actually Israeli hackers that had been discovered planting backdoors into its platform prior to the accusation levied against Kaspersky by Unit 8200. As the New York Times noted:
Investigators later discovered that the Israeli hackers had implanted multiple back doors into Kaspersky’s systems, employing sophisticated tools to steal passwords, take screenshots, and vacuum up emails and documents.”
Unit 8200’s claims ultimately led the U.S. government to abandon Kaspersky’s products entirely in 2018, allowing companies like Cybereason (with its own close ties to Unit 8200) to fill the void. Indeed, the very agencies that banned Kaspersky now use cybersecurity software that employs Cybereason’s EDR system. No flags have been raised about Cybereason’s own collaboration with the very foreign intelligence service that first pointed the finger at Kaspersky and that previously sold software with backdoors to sensitive U.S. facilities.

SoftBank, Cybereason and the Vision Fund

While its entry into the U.S. market and U.S. government networks is substantial, Cybereason’s software is also run throughout the world on a massive scale through partnerships that have seen it enter into Latin American and European markets in major ways in just the last few months. It has also seen its software become prominent in Asia following a partnership with the company Trustwave. Much of this rapid expansion followed a major injection of cash courtesy of one of the company’s biggest clients and now its largest investor, Japan’s SoftBank.
SoftBank first invested in Cybereason in 2015, the same year Lockheed Martin initially invested and partnered with the firm. It was also the year that SoftBank announced its intention to invest in Israeli tech start-ups. SoftBank first injected $50 million into Cybereason, followed by an additional $100 million in 2017 and $200 million last August. SoftBank’s investments account for most of the moneyraised by the company since it was founded in 2012 ($350 million out of $400 million total).
Prior to investing, Softbank was a client of Cybereason, which Ken Miyauchi, president of SoftBank, noted when making the following statement after Softbank’s initial investment in Cybereason:
SoftBank works to obtain cutting edge technology and outstanding business models to lead the Information Revolution. Our deployment of the Cybereason platform internally gave us firsthand knowledge of the value it provides, and led to our decision to invest. I’m confident Cybereason and SoftBank’s new product offering will bring a new level of security to Japanese organizations.”
SoftBank — one of Japan’s largest telecommunications companies — not only began to deploy Cybereason internally but directly partnered with it after investing, much like Lockheed Martin had done around the same time. This partnership resulted in SoftBank and Cybereason creating a joint venture in Japan and Cybereason creating partnerships with other tech companies acquired by SoftBank, including the U.K.’s Arm, which specializes in making chips and management platforms for Internet of Things (IoT) devices.
SoftBank’s interest in Cybereason is significant, particularly in light of Cybereason’s interest in the 2020 U.S. election, given that SoftBank has significant ties to key allies of President Trump and even the president himself.
Indeed, SoftBank’s Masayoshi Son was among the first wave of international business leaders who sought to woo then-president-elect Trump soon after the 2016 election. Son first visited Trump Tower in December 2016 and announced, with Trump by his side in the building’s lobby, that SoftBank would invest $50 billion in the U.S. and create 50,000 jobs. Trump subsequently claimed on Twitter that Son had only decided to make this investment because Trump had won the election.
Son told reporters at the time that the investment would come from a $100 billion fund that would be created in partnership with Saudi Arabia’s sovereign wealth fund as well as other investors. “I just came to celebrate his new job. I said, ‘This is great. The US will become great again,’” Son said, according to reports.
Then, in March of 2017, Son sent top SoftBank executives to meet with senior members of Trump’s economic team and, according to the New York Times, “the SoftBank executives said that because of a lack of advanced digital investments, the competitiveness of the United States economy was at risk. And the executives made the case, quite strongly, that Mr. Son was committed to playing a major role in addressing this issue through a spate of job-creating investments.” Many of SoftBank’s investments and acquisitions in the U.S. since then have focused mainly on artificial intelligence and technology with military applications, such as “killer robot” firm Boston Dynamics, suggesting Son’s interest lies more in dominating futuristic military-industrial technologies than creating jobs for the average American.
After their initial meeting, Trump and Son met again a year later in June 2018, with Trump stating that “His [Son’s] $50 billion turned out to be $72 billion so far, he’s not finished yet.” Several media reports have claimed that Son’s moves since Trump’s election have sought to “curry favor” with the President.
Through the creation of this fund alongside the Saudis, SoftBank has since become increasingly intertwined with Saudi Crown Prince Muhammad bin Salman (MBS), a key ally of President Trump in the Middle East known for his authoritarian crackdowns on Saudi elites and dissidents alike. The ties between Saudi Arabia and SoftBank became ever tighter when MBS took the reins in the oil kingdom and after SoftBank announced the launch of the Vision Fund in 2016. SoftBank’s Vision Fund is a vehicle for investing in hi-tech companies and start-ups and its largest shareholder is the Public Investment Fund of Saudi Arabia. Notably, Son decided to launch the Vision Fund in Riyadh during President Trump’s first official visit to the Gulf Kingdom.
In addition, the Mubadala Investment Company, a government fund of the United Arab Emirates (UAE), gave $15 billion to the Vision Fund. UAE leadership also share close ties to the Trump administration and MBS in Saudi Arabia.
As a consequence, SoftBank’s Vision Fund is majority funded by two Middle Eastern authoritarian governments with close ties to the U.S. government, specifically the Trump administration. In addition, both countries have enjoyed the rapid growth and normalization of ties with the state of Israel in recent years, particularly following the rise of current Saudi Crown Prince Muhammad bin Salman and Jared Kushner’s rise to prominence in his father-in-law’s administration. Other investments in the Vision Fund have come from Apple, Qualcomm and Oracle’s Larry Ellison, all tech companies with strong ties to Israel’s government.
The Saudi and Emirati governments’ links to the Vision Fund are so obvious that even mainstream outlets like the New York Times have described them as a “front for Saudi Arabia and perhaps other countries in the Middle East.”
SoftBank also enjoys close ties to Jared Kushner, with Fortress Investment Group lending $57 million to Kushner Companies in October 2017 while it was under contract to be acquired by SoftBank. As Barron’s noted at the time:
When SoftBank Group bought Fortress Investment Group last year, the Japanese company was buying access to a corps of seasoned investors. What SoftBank also got is a financial tie to the family of President Donald Trump’s senior advisor and son-in-law, Jared Kushner.”
According to The Real Deal, Kushner Companies obtained the financing from Fortress only after its attempts to obtain funding through the EB-5 visa programfor a specific real estate venture were abandoned after the U.S. Attorney and the Securities and Exchange Commission began to investigate how Kushner Companies used the EB-5 investor visa program. A key factor in the opening of that investigation was Kushner Companies’ representatives touting Jared Kushner’s position at the White House when talking to prospective investors and lenders.
SoftBank also recently came to the aid of a friend of Jared Kushner, former CEO of WeWork Adam Neumann. Neumann made shocking claims about his ties to both Kushner and Saudi Arabia’s MBS, even asserting that he had worked with both in creating Kushner’s long-awaited and controversial Middle East “peace plan” and claimed that he, Kushner and MBS would together “save the world.” Neumann previously called Kushner his “mentor.” MBS has also discussed on several occasions his close ties with Kushner and U.S. media reports have noted the frequent correspondence between the two “princelings.”
Notably, SoftBank invested in Neumann’s WeWork using money from the Saudi-dominated Vision Fund and later went on to essentially bail the company out after its IPO collapse and Neumann was pushed out. SoftBank’s founder, Masayoshi Son, had an odd yet very close relationship with Neumann, perhaps explaining why Neumann was allowed to walk with $1.7 billion after bringing WeWork to the brink of collapse. Notably, nearly half of SoftBank’s approximately $47 billion investments in the U.S. economy since Trump’s election, went to acquiring and then bailing out WeWork. It is unlikely that such a disastrous investment resulted in the level of job creation that Son had promised Trump in 2016.
Given that it is Cybereason’s top investor and shareholder by a large margin, SoftBank’s ties to the Trump administration and key allies of that administration are significant in light of Cybereason’s odd interest in 2020 U.S. election scenarios that end with the cancellation of this year’s upcoming presidential election. It goes without saying that the cancellation of the election would mean a continuation of the Trump administration until new elections would take place.
Furthermore, with Cybereason’s close and enduring ties to Israeli military intelligence now well-documented, it is worth asking if Israeli military intelligence would consider intervening in 2020 if the still-to-be-decided Democratic contender was strongly opposed to Israeli government policy, particularly Israel’s military occupation of Palestine. This is especially worth considering given revelations that sexual blackmailer and pedophile Jeffrey Epstein, who targeted prominent U.S. politicians, mostly Democrats, was in the employ of Israeli military intelligence.
Notably, Cybereason’s doomsday election scenarios involved the weaponization of deep fakes, self-driving cars and the hacking Internet of Things devices, with all of those technologies being pioneered and perfected — not by Russia, China or Iran — but by companies directly tied to Israeli intelligence, much like Cybereason itself. These companies, their technology and Cybereason’s own work creating the narrative that U.S. rival states seek to undermine the U.S. election in this way, will all be discussed in the conclusion of MintPress’ series on Cybereason and its outsized interest in the U.S. democratic process.
submitted by Reddit-STD-4-FREEDOM to conspiracy_commons [link] [comments]


2020.07.27 11:53 27JJuldacket Da-ting Sit-es for Parents

Da-ting Sit-es for Parents
Check the Profiles for Free >>>>>>>>>> 🔴►🔴► Dating
Fitness Dating Sites Free Asian Dating Sites in Usa Free Catholic Dating Sites Free Christian Dating Sites With No Hidden Fees Free Dating Sites for Seniors Over 60 Free Dating Sites in Asia Without Payment Free Dating Sites No Fees Free Dating Sites That Work Free Dating Sites Without Email Address Free Farmers Dating Site Free Filipino Dating Site Free Hiv Dating Site Free Interracial Dating Sites in Usa Free Las Vegas Dating Sites Free Lds Dating Sites Free Lesbian Chat Dating Sites Free Local Dating Sites Near Me Free Ts Dating Sites Free Widow Dating Site Ftm Dating Site Funny Dating Site Names Harmony Dating Site High End Dating Sites Hippie Dating Site International Dating Sites for Marriage Internet Dating Sites Kentucky Dating Sites Kitefly Dating Site Legitimate Dating Sites Legitimate International Dating Sites Lesbian Sugar Momma Dating Sites List of Free Dating Sites in Usa Local Dating Sites Near Me Love Again Dating Site Luxy Dating Site Maine Dating Sites Mamba Dating Site March Dating Site Match Dating Site Reviews Meet Dating Site Meetbs Com Dating Site Michigan Dating Sites Milwaukee Dating Sites Mingle 2 Dating Site Minneapolis Dating Sites Moco Dating Site Muslima Dating Site My Husband Has Profiles on Dating Sites New York Dating Site No Email Needed Dating Sites No More Games Dating Site One Night Stand Dating Site Online Dating Site in Usa Online Dating Sites for Teens Online Dating Sites in Usa Online Singles Dating Sites Overweight Dating Sites Pagan Dating Sites Personal Dating Sites Phone Number for Zoosk Dating Site Plus Size Dating Sites Free Pof Dating Site Sign Up Popular Free Dating Sites Pos Dating Site Positive Dating Sites Questions to Ask on a Dating Site Retired Military Dating Sites Seeking Dating Site Senior Dating Sites Reviews Smokers Dating Site Swirl Dating Site Tango Dating Site Tender Free Dating Site Texas Dating Sites The Best Online Dating Sites Tinder Dating Site Free Top 10 Free Dating Site Top 100 Dating Sites Top Christian Dating Sites Totally Free Dating Sites No Sign Up Truly Free Dating Sites Trusted Dating Sites Twoo Dating Site Ugly Dating Site Vampire Dating Site Vegetarian Dating Site What is the Best Dating Site for Over 50 White Man Black Women Dating Sites Zodiac Dating Site Zoosk Dating Site Phone Number 1 Dating Site 10 Best Dating Sites 100 Free Dating Site in the World 100 Free Gay Dating Site in Usa 100 Free Muslim Dating Sites 420 Dating Sites 50 Plus Dating Site A Dating Site About Me Examples for Dating Sites About Me Examples for Dating Sites Male Actually Free Dating Sites Afro Dating Site Age Gap Dating Sites Aids Dating Site Amputee Dating Site Arrangement Dating Sites Asian American Dating Sites Asian Melodies Dating Site Reviews Astrology Dating Site Bagel Dating Site Bbp Dating Site Best and Worst Dating Sites Best Bdsm Dating Sites Best Casual Dating Sites Best Catholic Dating Sites Best Dating Sites for Over 40 2018 Best Dating Sites for Professionals Uk Best Dating Sites for Relationships Best Dating Sites Nyc Best Free Dating Site 2018 Best Free Hookup Dating Sites Best Free Russian Dating Site Best Headline for Dating Site Best Headlines for Dating Sites Best Herpes Dating Site Best Single Dating Sites Best Teen Dating Sites Best Transgender Dating Sites Bipolar Dating Site Black Christian Dating Sites Black White Dating Site Blackplanet Dating Site Book of Matches Dating Site Bravo Dating Site British American Dating Site California Dating Site Cancer Dating Site Casual Sex Dating Sites Charmley Dating Site Login Chemistry Dating Site Chinese Dating Sites in Usa Christian Cafe Dating Site Christian Mingle Dating Site Reviews Clever Headline for Dating Site College Dating Site Completely Free Dating Sites for Single Parents Copy and Paste Messages for Dating Sites Cost of Dating Sites Cupid Dating Site Reviews Cute Headlines for Dating Sites Daisy Finder Dating Site Dating Site Description Dating Site for Bisexual Females Dating Site for Democrats Dating Site for Dog Lovers Dating Site for Medical Professionals Dating Site No Registration Dating Site Ratings Dating Sites Boston Dating Sites Ct Dating Sites for 11 13 Year Olds 2018 Dating Sites for 16 Year Olds Dating Sites for 17 Year Olds Dating Sites for 18 Year Olds Dating Sites for 40 Year Olds Dating Sites for 40s Dating Sites for 50 Year Olds Dating Sites for College Students Dating Sites for Hiv Positive Singles Dating Sites for Older Singles Dating Sites for People With Hiv Dating Sites for Plus Size Ladies Dating Sites for Professionals Over 40 Dating Sites for Women Over 50 Dating Sites for Young Adults Dating Sites Free of Charge Dating Sites in Arizona Dating Sites in Iowa Dating Sites Indiana Dating Sites Iowa Dating Sites Like Tinder Dating Sites Ratings Dating Sites South Africa Delete All Dating Sites Describe Yourself Dating Site Describe Yourself on Dating Site Dirty Dating Sites Does Facebook Have a Dating Site Download Dating Site Dream Singles Dating Site Dwarf Dating Site Eros Dating Site Fakku Dating Site Fat Women Dating Site Free African Dating Sites Free China Dating Site Free Dating Site in Usa Without Credit Card Payment Free Dating Site No Credit Card Needed Free Dating Site Without Credit Card Free Dating Sites for 50 and Over Free Dating Sites in Ohio Free Dating Sites No Credit Card Required Free Dating Sites With Free Messaging Free Dating Sites With Phone Numbers Free Hpv Dating Sites Free Latino Dating Sites Free Mature Dating Sites Free No Charge Dating Sites Free Online Dating Sites for Singles Free Plus Size Dating Sites Free Porn Dating Sites Free Trans Dating Sites Free Transexual Dating Sites Friends With Benefits Dating Site Friendship Dating Site Funny Headlines for Dating Sites Fwb Dating Site Fwb Dating Sites Gay Male Dating Sites Gay Online Dating Sites Ginger Dating Site Google Dating Site Green Card Marriage Dating Site Haitian Dating Site How Do You Contact Pof Dating Site How to Describe Yourself on a Dating Site How to Find My Husband on Dating Sites How to Start a Dating Site Hsv2 Dating Site Hsv2 Dating Sites India Dating Site Interracial Dating Sites for Seniors Is My Social Mate a Dating Site Is Zoosk a Good Dating Site Islamic Dating Sites Israel Dating Site Kik Dating Site Kuwait Dating Site Latin Feels Dating Site Latina Dating Sites Lawyer Dating Site Legitimate Russian Dating Sites Lgbtq Dating Sites Liberal Dating Sites List of All Dating Sites List of Dating Site in Usa Locanto Dating Site Love and Seek Dating Site Love and Seek Dating Site Reviews Love Dating Site Love Swans Dating Site Love Swans Dating Site Login Lucky Dating Site Madison Dating Site Match My Profile the Leading Online Dating Site Mature Quality Singles Dating Site Review Mbti Dating Site Meetwives Dating Site Reviews Meetws Dating Site Mental Illness Dating Site Mingle2 Free Online Dating Site Personals Dating App for Singles Motorcycle Dating Sites My Boyfriend Keeps Getting Emails From Dating Sites New Jersey Dating Sites No Pay Dating Sites No Payment Dating Sites No Registration Dating Sites Nsa Dating Sites Number 1 Dating Site Online Dating Site Reviews Online Dating Sites for Seniors Open Marriage Dating Site Open Marriage Dating Sites Orchid Romance Dating Site Ostomy Dating Sites Ourtime Dating Site Phone Number Overweight Dating Site Pnp Dating Site Pof Dating Site Reviews Pof Dating Site Search Police Officer Dating Site Polyamorous Dating Sites Free Ps Dating Site Rich Guys Dating Site Safe Online Dating Sites Safest Online Dating Sites San Antonio Dating Sites Second Wife Dating Site Seeking Arrangement Dating Site Single Dads Dating Site Singles Com Dating Site Sls Dating Site Social Media Dating Sites Spam Text Messages From Dating Sites Speeddate Dating Site Stoner Dating Sites This is Not a Dating Site Tinder Dating Site Reviews Top 10 Free Dating Sites Top Adult Dating Sites Top Dating Sites for Over 50 Top Hookup Dating Sites Tucson Dating Sites Uniform Dating Site Venezuela Dating Site Venezuelan Dating Sites Victoria Milan Dating Site Victoria Milan Dating Sites Vittubuddie Dating Site Waplog Dating Site What Does Nsa Mean on Dating Sites What is a Good Dating Site What is the Best Dating Site for Seniors What is Tinder Dating Site Which Dating Site is Best for Serious Relationships Whisper Dating Site White People Dating Site Wonder Dating Site Yes No Maybe Dating Site Zoosk Senior Dating Site 2019 Dating Sites 40s Dating Site 420 Dating Sites Free A Free Dating Site Adam to Adam Dating Site Albanian Dating Site American Muslim Dating Sites Amolatina Dating Site Are Dating Sites Worth It Army Dating Site Asian Charm Dating Site Reviews Asian Friendly Dating Site Athlete Dating Site Austin Dating Sites Bamboo Dating Site Best Dating Site for 40s Best Dating Site in the World Best Dating Sites for Black Professionals Best Dating Sites for Long Term Relationships Best Dating Sites in Europe Best Dating Sites Uk Best Hiv Dating Sites Best Latin Dating Sites Best Local Dating Site Best Local Dating Sites Best Milf Dating Sites Best Online Dating Sites 2019 Best Online Dating Sites for Over 40 Best Online Dating Sites for Seniors Best Senior Dating Site Reviews Big Boob Dating Site Big Boobs Dating Site Black Girl Dating Site Black Israelite Dating Site Blackpeoplemeet Dating Site Browse Dating Sites Buddhist Dating Site Cdff Dating Site Cherry Blossom Asian Dating Site Christian Dating Sites Reviews Christian Online Dating Sites Chubby Dating Site Church of Christ Dating Site Clever Headlines for Dating Sites Come With You Dating Site Cuban Dating Site Cupid Free Dating Site Curves Dating Site Curvy Dating Site Dating Site Conversation Starters Dating Site for Black Professionals Dating Site for Intellectuals Dating Site for Older Adults Dating Site for Trump Supporters Dating Site for Veterans Dating Site Hacked Dating Site Introduction Dating Site Login Dating Site Logos Dating Site Opening Lines Dating Site Username Ideas Female Dating Sites Arkansas Dating Sites for 40 and Over Dating Sites for Anime Fans Dating Sites for Black Professionals Dating Sites for Laptop Dating Sites for Parents Dating Sites for People Living With Hiv Dating Sites for Rich Professionals Dating Sites for Teenage Gamers Dating Sites for Under 18 Dating Sites in Dubai Dating Sites in Kenya Dating Sites in My Area Dating Sites in Pakistan Dating Sites Like Pof Dating Sites Ranked Dating Sites Springfield Mo Dating Sites That Don T Require Credit Cards Dating Sites Without Email


https://preview.redd.it/hhxj4uhvgdd51.jpg?width=368&format=pjpg&auto=webp&s=34f6c4158e5b48fe54c23369c10f0c3194ba5cd3
submitted by 27JJuldacket to u/27JJuldacket [link] [comments]


2020.07.18 17:02 Army_Bot Summary For: Weekly Question Thread (4/13 to 4/19)

Does anyone else consistently have problems gaming with other friends on Boingo (barracks) internet? Buddies and I constantly get disconnected mid-game on Xbox, seems like Boingo forces you to have a non-open NAT type. Yes I know getting married is the answer, commitment terrifies me, chocolate shake and a medium fry please.
Link to Comment Chain
Where the fuck can I get my hair cut on bragg right now? I start working again on monday and I look like I'm in that 70s show.
Link to Comment Chain
Is 25 too old to go to RASP? I only ask because everyone I've heard from went when they were 18 or 19.
Link to Comment Chain
How in the world can I get Air Assault?
Link to Comment Chain
I don't know if this is the place or if I can say since I just enlisted and haven't gone to basic yet. But the Army issued an official notice that they are holding all new recruits and basic training for a minimum of 2 weeks. this was posted at the beginning of April. I also hear alot of people not having ship dates anymore and being postponed indefinitely. Yet, I do have a ship date of April 20th. Idk why but it just seems weird to me. I'm not in a in demand job (in my opinion), im an 11B, although i do have an option40 contract with RASP and airborne. Also my recruiter hasnt given me any detailed info about when i leave, how i leave, what to bring, that kind of stuff. So i dont mind leaving next week, I just dont like the not knowing if this is a definite plan or not. So any insight from anyone on whether you think ill ship or not?
P.S. i had an initial ship date of March 23rd, then it was pushed to May 4th, then it was pulled back to April 20th
Link to Comment Chain
Is the Army still processing recruits right now? If they’re not, when will they reopen back up?
Link to Comment Chain
Separated from the Air Force two weeks ago for WOCS/WOFT, now preparing to go to BCT next week.
My question is will I be sent to a condensed prior service basic training? Or will I have to do the entire thing? Thanks.
Link to Comment Chain
What is OSUT length? Is it still 14 or is it 22 now?
Link to Comment Chain
Showing up at my first unit soon and am very nervous. I'm a 68W headed to a Cav unit in the 101st. If anyone can give me any insight on what to do/expect when I show up, I'd greatly appreciate it. I heard units often "assess" you when you get there and then decide where to put you accordingly. Is this true? It's fine by me; I'm just curious is all. Also, should I show up with my name and rank sewed on? Thank you!
Link to Comment Chain
I got an Airborne Slot at AIT but corona rolled in right when we were about to take our PT test for it, so that’s been canceled for a while. I’ve got the airborne physical done for it and my orders did change to Fort Bragg. Can our cadre still send us to benning? Or is the APFT a prerequisite to go to airborne school.
Link to Comment Chain
Does anyone know the criteria used to determine which recruits received active duty status (i.e. paycheck and benefits) with their delayed ship date?
I was informed that only recruits in dire circumstances would qualify -- I was told to quit my job and cancel my lease but was somehow still denied (i.e. I will have no source of income while waiting to ship).
To make matters worse, I'm not even eligible for unemployment since I quit my job and my previous employer's health insurance ends at the end of the month so god helps me if I get sick.
I've already spoken to my recruiter. They had the same amount of knowledge and frustration that I did.
Link to Comment Chain
Hello, I am joining the Army National Guard as 56m Chaplain Candidate later this year. Based on your experiences, what makes a good and effective chaplain? I want to serve soldiers to the best of my ability and would like to know what you have found in chaplains to make them good at their jobs. Thank you.
Link to Comment Chain
If I live by myself, what happens to any pets that I own if I leave for basic training?
Link to Comment Chain
If I want the best chances of deploying in reserves which job should I pick between 35L and 38B? I am choosing between these two jobs and want the best chances of being deployed. More than once would be ideal. I know it varies widely but if one has a better chance I would lean towards that.
Link to Comment Chain
Is it possible to switch for Split op to normal OSUT while awaiting shipping? High school senior who enlisted ( 11b) in the ANG. I choose the split op so I didn’t have to miss first semester in college (BCT this summer AIT next summer) but due to COVID 19 my training date might get moved back. I was wondering if I had the option to switch from split op to OSUT since if I leave in July or August instead then I would already be missing my first semester.
Link to Comment Chain
just to be sure...anyone can take the DLPT and it's not something limited to 35P's right? and it's also the test that determines your FLPB? how much of a difference in pay can you expect from a language in payment category B vs category A? also I've heard that you might not get paid at all if it's not useful for your mission? do you have to be deployed in the country your language is based on to get the FLPB? (korean and japanese are the langs I'm looking at btw... not fluent in either but can probably work towards 2/2 with studying)
Link to Comment Chain
Corona fucked up my ROTC prospects so that's out the window.
I plan on attending law school in the fall of 2022, is it possible to do lawschool and OCS simultaneously, with the end goal of course being the JAG?
Link to Comment Chain
going to MEPS soon and worried about the physical. I’m in good physical health but have a bout of tendinitis in my elbow, In the past I did physical therapy for my shoulder that was giving me pain. What is the bar for disqualification?
Link to Comment Chain
In the army reserve do you get to pick your duty station? If not can you join the national guard in a state you just moved to?
Link to Comment Chain
Hope Im not too late to this but here goes..
Im a 25U in the WA NG. Been in for ~8 years (im 25) now and am really considering Medical school. I know I can use my GI bill for 4? years, and I can use TA each year assuming I dont flag myself, and I dont fail any classes, but is it an option to become a Army Doc to help pay for my school or to commision while trying to get my degree? I want to either be pediatrician or a radiologist. Ill talk to a recruiter when I can but Im currently stuck on a deployment waiting to come home weighing my options with this stop move.
Link to Comment Chain
Hello all, I’m a navy reject, made it to 6-2, got sepped for a bs med reason related to sleep apnea, which they never tested for or verified, came home a little while ago, and got in touch with an army recruiter I had spoken with prior to deciding which branch. I’m kinda nervous and have heard a lot of mixed things about joining, some say it’s great, others say it’s awful, I was wondering what it’s like going through basic and being deployed for the average guy, I’m sure mos plays a role in that as well, I’m hoping to go 25 series, if that affects anything. As a side note I really want to serve and am looking for opportunities to do humanitarian aid and gain practical skills, any help, advice, or stories/ personal experience is much appreciated!
Link to Comment Chain
I'm 17 m and I am a little over 200 lbs and am 5 ft 11 in. I was wondering if my weight would cause me trouble at meps or when i join. I want to be a 13 foxtrot and it would be really helpful if anyone has any answers, thank you.
Link to Comment Chain
I’ve always heard that you’re never allowed to have more than 4 days off in a row without taking leave. Is that some unspoken rule or is it actually written anywhere? I’ve tried looking but can’t find anything.
Link to Comment Chain
If I reclass to a star mos outside my window, will that count as my reenlistment?
Link to Comment Chain
Quick question for the army what is the difference between the special forces medic and combat medic
Link to Comment Chain
I’m looking to transition from national guard 91b to active duty once my contract is up this year. I’m wanting 11b or 68w. I already have my EMT and 68w is the main choice, but I also really want 11b. How hard is it handling 11b with kids and a wife? Is it possible To work on a degree as an 11b, and what is your typical schedule like?
Link to Comment Chain
Looking for apartment recommendations around Bliss. I checked out the duty station thread and people were recommending the northeast and East side of El Paso so I’ve been looking into that area. Thanks.
Link to Comment Chain
I have a specific question regarding points for the APFT.
I’ve read you’re able to pass BCT with a score of 50 for each test. The following expectation would be to be at, and maintain 60 in each event when going into AIT.
Can anyone confirm if this is true?
Link to Comment Chain
I want to become a army combat medic. But I’m unsure of what life is like for those who don’t get deployed. Like where do you live? What do you do? When do you train? Who do you report to? Do you where uniforms?
Link to Comment Chain
My recruiter told me that he receives emails all the time trying to get him to join special forces, and then said it’s really hard to get selected to go to q course. What does this mean? Is he lying about the email part?
Link to Comment Chain
I am supposed to be attending BOLC this summer. I just heard about the SECDEFs extension of travel restrictions and my report date falls inside that time. Haven’t heard anything from my branch manager yet but what’s the likelihood my BOLC date is getting canceled?
Link to Comment Chain
What is the waiver process like at meps? Basically I talked to a recruiter since I re-3e admin sepped for depression at Navy RTC. Now I'm in the process of getting a psych eval, and letters of reference from past employers, school etc. Does the waiver process happen at meps? Of course, I know I have the odds stacked against me, and the recruiter said I have a 20 percent chance of making it through, but I still wish to apply. What should I expect as to what they are looking for?
Link to Comment Chain
I'm enlisting in the military in a few weeks. Problem is, I don't know what branch. The only info I have is what the recruiters give me, and their job is to sell me, which means their info is biased. I'm trying to decide between the Marine Corps, Army, Navy, Coast Guard, or Air Force.
I was hoping y'all could give advice that would help my decision. How is the enlisting process, boot camp, life in your branch, etc? Any regrets you may have or any other information you can give is invaluable.
A little about me: I like to relax but am active at the same time. I enjoy talking with family and friends and working. I like to do things that serve a higher purpose than me. I haven’t been a historical fitness buff, which is why I’m questioning myself. I am planning on doing cyber intelligence in whatever branch I choose. I prefer that type of work, intelligence, than other options. If you have more questions, please let me know.
Thank y'all in advance.
Link to Comment Chain
I am a 91B mechanic and I am about to pcs to fort camble from vilseck any advise. What should I prepare for
Link to Comment Chain
In the navy and my goal is to cross branch into the army. My goal is to go for the ranger program. Does anybody know any good resources or can give any insight as to how that works? Very specific i know but anything is helpful
Link to Comment Chain
Any recommendations on boots used in RASP/Selection for rucking? Looking to build up my ruck runs just want to train in what is able to use in selection.
Link to Comment Chain
Can enlistedmen with a bachelors degree apply for the FLEP?
Link to Comment Chain
Currently in the Enlistment process. I just had a single question to ask.
Two and a Half years ago My mother brought me to her doctor to see if i had ADHD. I had a 10 minute session and he Diagnosed me with ADHD and some strange depression disorder then proceeded to assign me some medication. I took it one week then never took it again due to the medication made me have very very violent thoughts. A month later i went back and explained the situation, he upped the dosage. I never took that medication and never went back.
I know that having ADHD is a problem for joining and i dont even think i have it. What should i do?
Link to Comment Chain
Currently in AIT and have no projected duty station and I'm told I can request a specific place, I just have to send an email and justify it.
I want to go to San Antonio and work with NSA, but my confusion is what exactly am I supposed to request? Like am I supposed to say I'd liked to be stationed in the San Antonio area or do I need to know the actual unit and base, etc?
Link to Comment Chain
I got a question regarding the Rangers I asked one of my army friends and he didn't know the answer but after you go through ranger training I know you become a ranger but it doesn't mean you get selected for a battalion so my question is if you make it through and don't get selected is there anyway to get into a battalion afterwards?
Link to Comment Chain
army,
I'm currently in the reserves as a 38B (Civil Affairs), enjoying it but becoming a pilot has really peaked my interest because of this job I have 4 years left on my contract with the reserves. Would I be able to drop a Warrant Officer Flight Candidate packet at any time?
When I was originally joining the army, I wanted to class as a 09W but at meps, I came back with a partial color blind (MILD) and my recruiter was insistent that I would not be selected for any sort of flight due to that an waivers. I settled but have not given up. Civil Affairs treats me well.
My question is, am I able to try for a slot in the future? If so how does that work during my contract? Would my color sight be deter mental to it? It was only the color circle plate test that really messed me up. I can distinguish very well.
Link to Comment Chain
What format are they using to substitute semi-centralized / E5 promotion boards? Any consistent type of packet or is it at the discretion of the unit ?
Link to Comment Chain
Has any delayed shippers received the $1,600 yet? If so, how did they determine whether you are eligible?
Link to Comment Chain
What's the process for reclassing to an 11 series mos? Currently a 35Q, but I've made up my mind on what I want to do. Problem is, I don't really know how to do it. More curious on what paperwork I'd need to put in and how OSUT would be for someone in my position.
Link to Comment Chain
Do you get NGB-22 for T32 thats under 90 days?
Link to Comment Chain
Anybody know anything about Fort Lewis in VA? Should I live in Roanoke?
Link to Comment Chain
Army broke my contract?
So I was in the process of re-enlissting, had my contract signed and given a ship date of April 6th. The contract was a four year, 18x(SF recruit) contract. On April 4th(2 days prior to ship date), I was informed from my recruiter that ARSOF denied my contract. The memo letter said that I "did not meet medical fitness standards" which is absurd because I'm in great physcial shape and I had to be clear on everything in Medical at M.E.P.S. before I was even allowed to sign a contract, just like all the other potential recruits. Is this legal? Or is there anything I can do to fight this? I know once you're in the D.E.P. that is technically a legal binding contract. My recruiter essentialy refuses to help me, getting no answer from him at all. I was given two days to decide to re-negotiate or terminate my contract. If I refused to re-negotiate, it would be seen as me "quiting the Army" <--From my recruiter. I've searched the boards here and haven't found anythng related to this, so I'm at a loss. The things that really upsets me is the fact it was two days prior to my ship date, I had put in my two weeks at work and had all my living arrangements made for obvious reasons, and I'm told there is nothing I can do unless I go in as a different M.O.S..
Link to Comment Chain
I was nasty girl so I don't know about different active things.
In the active army is there on base housing where you live in a big bay with 50 people? Or is the worst situation 2 man rooms?
Link to Comment Chain
So is MEPS still open with corona and all? My recruiter was saying in Illinois they're supposed to be opening up in May assuming stay at home doesnt get extended again (sounds like it is) but he was like "well if they're closed in Illinois we'll just take a road trip to Michigan or Indiana or wherever they're open" which sounded kinda odd since Michigan's lockdown is supposedly one of the strictest rn
Link to Comment Chain
I’m shipping under 14H (peoples opinions on ADA in this sub got me worried) in the next couple months and have been struggling to find more detailed descriptions on what the job entails.
For instance, when I graduate AIT will I most likely go directly to a patriot battalion or is there a chance to go to THAAD or different units.
Secondly, my recruiter who was also a 14H strongly recommended trying to go JTAGS after AIT, which he was a part of. Is this possible coming straight out of AIT or does it require more time in to go to JTAG.
Also I am wondering how easily I can “control my destiny” by working hard and graduating top of AIT class. Would this allow me to go to better locations/get in better schools? Finally if you have any day to day information on the job/advice I’d appreciate it. Thankyou in advance.
Link to Comment Chain
Hi there, new 68W, got my basic and therefore my AIT delayed due to everything that's been going on. Long story short I noted on my enlistment packet that I was originally being assigned to a line unit and I'm desperately hoping to still be assigned to a line unit and not the hospital. Main question is: Will the shipment delay affect my unit assignment?
Link to Comment Chain
Is anyone here a 71B? I'd really like to know what the day to day of that position is like because a lot of the information I find isn't really that helpful. I am currently a reservist 35P, so I know about enlisted army life but nothing about commissioned life, especially in the medical corps. I am getting a chemical engineering degree right now and have the option to have a focus in biochemistry and an wondering if I should do it or not.
Link to Comment Chain
Thank you very much!
Link to Comment Chain
What’s 19D like? Is AIT hard, what is the average day like?
Link to Comment Chain
How much of a social life is it possible to have outside of the army if you are an E-4?
Link to Comment Chain
What job in the military would be good for some skills in the civilian world? I want to take advantage of the guaranteed job offered by the army. I mainly have an interest in medical or computer related things
Link to Comment Chain
I'm probably gonna sound like a dumbfuck cherry, but I have to ask, how feasible is it to take college classes if i choose infantry? My current contract is 25S, and the little I can find about it online describes the washout rate as decently high, and the MOS is exceedingly technical and boring as fuck. I know infantry mostly do area beautification and get yelled at, but realistically can college courses be taken? How often do you go out to the field and for how long? I chose 25S for the signing bonus (I have a bit over 20k debt in student loans that defaulted), but my real desire is to do something actually fun and challenging (I'm not a dumb adventurist, I realize infantry kill people and its hard as balls, but I both want the challenge and comradery). The Signing bonus is negligible in comparison to 3-4 years of my life wasted in front of a screen. A few added questions below;
  1. Is 2 classes for an online accounting degree realistic for a per semester basis? It's technically 4 per 'normal' semester since each semester at UMGC (online regionally accredited university; they're accredited by umd so it's legit) is 8 weeks. Is that pushing it? Not trying to come off arrogant but I'm a fast learner and a smart guy, so essentially 2 classes every 8 weeks seems feasible. I don't party or drink so my free time could be split with classes if need be.
  2. Am I being a dumb adventurist for wanting to go infantry? I don't think i'm a high speed guy, but I'm just trying to ride out 3 years for the gi bill and some college credits. That being said I 100% understand the risks of a war happening tomorrow or during my IRR and getting called up to fight. That doesn't bother me as of right now, but I can't answer for 5 years from now.
  3. Are airborne contracts being offered right now? Are infantry and airborne bonuses being paid out? I realize if i drop my temporary reservation at meps I'll lose the bonus, but I really dislike the MOS from everything I've read, and I want to get out of my shell instead of being stuck with nerds inside a windowless jail essentially.
    Link to Comment Chain
Any high speed, low drag stuff you guys would recommend in the reserves? What could be a cool job to have in the reserves (if it exists).
Link to Comment Chain
Are Military installations still offering dental care in this crisis?
Link to Comment Chain
What is the actual no shit requirement to get your ESB? BN asked me to find out (for whatever reason) and I can't find the full requirements on APD or anywhere else.
Link to Comment Chain
Does anyone know if the trend report is out?
Link to Comment Chain
Deployed, should be going to a board soon. Are all boards paper boards, or VTC?
Link to Comment Chain
Due to stop movement order will I still be able to move my family to my duty station?
Link to Comment Chain
submitted by Army_Bot to ArmyWQT [link] [comments]


2020.07.05 18:20 genesispar69 [23M4F] [Nagpur/ Pune/ Hyderbad] Date for fun and Maybe much More in future?

As We are getting to New Normal getting used to internet culture more. I am 23 working in MNC Decent af good at carrying myself. Caring, romantic if close. I was looking for girl to date or NSA if it cool.
I had 2 relationship in past . So I know how it works and mature and experience enough. right now i am planning to study further for PG. I also have Side business starting up.
If you are independent girl means you Ambivert thats+. have ambition you can hit me DM. We can chat there see if you like and I like sex :) Good at RP. I am geeky love to Read have great goals. I like listen and understand people . i love caring about people who cares for me. I have 1 values in me Respect for Individual ( Consent ) is more important to me. we can watch move together after lockdown, netflix & chill , talk & discuss maybe more ;)

shoot me DM girls.
submitted by genesispar69 to r4rindia [link] [comments]


2020.07.05 14:52 dogeman87 Suicide runs in my family, but not in the way you’d expect.

My dad killed himself two weeks ago. It was not unexpected. My family has a history of suicides. I am just under thirty years old, so it hasn’t been a problem for me yet, but my father was in his seventies and suffering from cancer. The fact that he decided to end it was actually not as traumatic as it sounds, given his diagnosis.
After grief started to subside, I found myself more scared than anything. My father had his bouts of depression, sure, but nothing he hadn’t recovered from. Usually the depression came and went within a few months. He was never on suicide watch and never expressed a desire to kill himself.
To be fair, many terminal cancer patients seek out euthanasia. This was different, though. We had plans, places he had wanted to go or do during his life but had been unable to due to money or time. Now family members had stepped up to provide both of those, and he had just walked away from it.
My grandfather committed suicide, too, at the age of fifty-one. He, unlike my father, was healthy and had two kids in college. One of those was my dad. I’m not sure he ever really recovered from that, and maybe it’s why depression and ultimately suicide haunted him.
It all came to a head when I discovered something terrifying. My grandfather was not the first in my family to kill himself. His father and his grandfather and even his own great-grandfather had committed suicide. I knew genetics could play a part, but this was unprecedented. I need answers.
So I went to the only person I knew who could help.
My mother was a mess. Still is, to an extent. I could not ask her about my dad without her freaking out, or at the very least going into one of her depressive moods. A perfectly normal response, I knew, except for the fact that she had become a recluse, not letting friends or family reach out to her and going out only to shop for food.
Instead, I went to my Uncle Barry. He is a big man at six-two and just over two hundred pounds. He has a heavy black beard and a thick chest that sometimes made me wonder if he ever took up bodybuilding. He probably had; he was a security guard for thirty years, and he only retired a year ago. His wife, a comparatively diminutive, fragile woman, had urged him to quit once their social security began to kick in.
Uncle Barry is the big, albeit much older, brother that I never had. I have a little sister that lives somewhere out in New Mexico- I can never remember the name of her town- but that’s it. No other siblings, certainly none that live near Massachusetts.
I am not lonely. I date, I go to bars, I socialize over the internet and occasionally through video games. Some people would call me extroverted. Contrary to their beliefs, I am content by myself, content with others- really just complacent in every way, willing to do whatever, whenever, however.
I arranged to meet Uncle Barry last Friday for dinner at his house. My Aunt Erma was thrilled to have me over. She prepared her signature dish, creamy braised chicken with mixed vegetables and sweet potatoes. It might be my favorite meal behind my mother’s homemade lasagna.
I did not tell my Aunt why I was visiting. She figured I simply had not seen them for a while. They live in Hartford, about two hours from my place, so it’s not difficult to drive up there on a weekend.
She was ecstatic. I was enveloped in a hug that, for her size, was astoundingly large. Uncle Barry shook my hand, then asked how I was doing. He wanted to know how work was going, who I was seeing, that sort of thing. The usual.
He knew why I was there. I had told him over the phone, after I had confirmed that Aunt Erma would not overhear me. He is usually forthright about family matters, but he said I should see him in person for this one. Knowing what Aunt Erma would make for dinner, I could not decline his offer.
When Aunt Erma started to clean up, Uncle Barry led me into the living room, sat down on his twenty-year-old couch, and asked me if I knew what I was getting into.
“What?” I asked.
“You don’t understand. Looking into this stuff will take you down some dark paths.”
“Well, yeah. We’re talking about suicide.”
“Not just that.” Uncle Barry leaned toward me, lowering his voice to a whisper despite Aunt Erma being halfway across the house. “There are secrets that your father kept from you. Some that he kept from me, from your mother, too. I only know some of the story.”
“Then tell me.”
He sighed. “Eric, I care about you a lot. I don’t want to put you in danger. But I can tell already that you’re not going to let this go.”
“Of course I’m not. My dad just committed suicide. If you were in my position, you think you’d just sit by and let it happen to other family members?”
“Eric. It runs in the family. I beg you, leave it at that. Isn’t it enough explanation?”
“There’s more to it,” I insisted.
“There is. But is it really worth risking your life over?”
He should not have said that. A life-threatening secret will pique my curiosity like no other. And the truth was, I didn’t care about the risks. My father and grandfather had both killed themselves. I had to know why, if I was to avoid the same fate.
That wasn’t it, though. I needed to know. I needed to understand why my grandfather had shot himself in his bedroom, why my dad had overdosed despite us planning one last vacation for him to Yellowstone, where he’d wanted to go since I had been in kindergarten. I needed to know whatever secret he had kept from me, from my uncle, from my mother, because what secret could be so dangerous that he would carry it with him to his grave?
Uncle Barry seemed to understand my insistence. He usually did. He knows how I am. I’m a paralegal, which might not be that impressive, but I have a reputation within our firm. I never give up on a case. I follow every lead to its end, and I dig up more information than the NSA could ever hope to find. Okay, maybe that’s an exaggeration, but you get the point.
This secret was no different. If I was to understand why my family had a history of suicide, I would have to investigate. I would not sit by and let myself succumb to the same fate thirty or forty years in the future, when I might have kids and grandkids of my own.
Uncle Barry gave me a name. A last name, actually: Wagner. They were acquainted with my grandfather, and, while Uncle Barry didn’t have their address, I knew I could find it easily. Google usually has all the answers.
He didn’t tell me what he knew himself because he said his understanding was incomplete, that it would only raise more questions, and that more likely than not some of what he’d been told was not correct. The Wagners would know the truth.
I found them on Whitepages within a minute of searching. They lived in Vermont, which wasn’t that far from my place. Three, three and a half hour drive max.
I also found some disturbing information about them. I decided to do a deep dive on their history, and through one of my many newspaper subscriptions I found an article on them in the Boston Herald. It was dated 1947. My grandfather and a woman named Alice Wagner were picture side by side, smiling next to a dead bear.
They had shot it when it had gone onto their property. Not the kind of story that would make a big paper, you’d think, and it wouldn’t have been, save for one detail: it had been an escaped grizzly from the zoo. Authorities had been looking for it, and when my grandfather had shot it dead they’d chastised him, but ultimately he was declared in the right because the bear had tried to attack his dog.
Nothing unusual, right? Except that was not where it ended. A follow-up story a week later had some excerpts from an interview with him. He had recounted what had happened with the bear, how he was sorry to have killed it but that he’d been given no choice.
Then he said something that chilled me. He apparently had a nice gun collection. Antique muskets, revolvers, some more modern semi-automatics and rifles. I don’t know much about guns, but when I looked up one of the ones he named I found it had sold for $30,000 in an auction last month.
Serious stuff. Except my father had never been into hunting or guns of any kind. He had never mentioned my grandfather’s love of guns, and when I dug deeper I found that no one in the family had anything besides a basic hunting rifle, none close to the antiques that I had read about. I asked Uncle Barry, my sister Jenna, even my mother. She said he had never owned a gun in his life. It made no sense that a collection of firearms possibly worth hundreds of thousands of dollars had disappeared.
There was something more to the story. I intended to find out what had happened. Whitepages did not list a number for the Wagners, so I’d have to drive up over the weekend. That was fine. I had time to burn, and my boss at the firm had said I could take as much time off as I needed. I was set to return Monday, so I didn’t have any work to take care of before I left.
Whatever had happened with my father and grandfather was not normal. I did not understand how any of it could be dangerous, and I didn’t care. I only cared about answers.
I would get them. But I have come to regret my decisions, though I could not possibly have known how deep all of this could go.
\*
I left early Saturday morning. I didn’t want to waste time, and there was no way to know if the Wagners had any plans that day. When I arrived at their house, it was just past 9.
They were awake at that hour. I could tell from movement through the windows and a light in one of the rooms. It was a small house, a boxy two-story residence like the kind you see crammed together in cities.
When I rang the doorbell, Mr. Wagner answers. His name was Earl, and he had two little girls that were at the moment watching TV. His wife had already left to go shopping.
I told him why I was there, and at first he didn’t understand. He asked who the Davenports were (my family), and when I couldn’t sufficiently explain (I had no idea myself what our connection was), he told me that his mother might know.
His mother, the kids’ grandmother, was about the same age as my father had been when he’d died. She lived with them on the upper floor. Her name was Eunice, and, much like my own mother, she was a short woman with short white hair. That was where the resemblance ended. Eunice had smooth skin, and only her hands and face showed the slightest sign of wrinkles. Her eyes were so green that I thought I’d go blind looking at them.
When I explained who I was, she immediately understood. “You’re here about your great-grandfather,” she said.
“No. It’s about my father.”
She closed her eyes, and when she opened them she told me that he was dead.
“How did you know?” I asked.
“It is the only reason you would come.”
I was confused. How had this woman known he was dead? Why had she suspected my great-grandfather was involved?
I asked her, but she was clearly troubled by the news. She did not cry, exactly, but her eyes became watery and her hands shook in her lap. I decided to use the bathroom and give her a few moments to compose herself.
When I returned, she told me she couldn’t help. It was eerily similar to what Uncle Barry had told me.
“You know something,” I insisted.
“Maybe I do. It might not matter. Maybe what I know won’t help you at all. But I can’t lie to you, child- you are better off not knowing.”
“You can’t hide this from me,” I said. “My father just killed himself. I need to know.”
“You don’t. You should turn away from all of this, let fate run its course. Nothing you might learn can stop it.”
“I’m not leaving until you tell me your secret,” I said. Something in my tone must have scared her, because she inched away from the edge of her bed. I did not feel bad about scaring her. Intimidation can be useful during an interview, and I wasn’t going to shy away just because I was talking to an old woman. This was about my father, after all, and his fathers before him, and quite possibly myself.
We watched each other for a while until Earl came up and asked if we wanted cookies. My demeanor changed. I accepted and thanked him. Eunice said she didn’t need the sugar.
“I don’t like talking about the past,” she admitted to me once Earl left. “I knew your grandfather. He wouldn’t tell me about his own father. I only learned what I know from his sister, who was a bit more open with me, perhaps because we were both young women.”
The cookies arrived. They were oreos, not homemade, but I didn’t care. Oreos are damn good. “Am I in danger?” I asked her.
She was silent. “If I’m going to die,” I told her, “then you have to tell me everything you know. You want my death on your conscience?”
“It won’t matter.”
“What won’t? Whether I die or not? You’re saying you don’t give a shit about that?”
I think that hurt her, because she looked away from me then. “What I tell you cannot change what will happen.”
“Why don’t you start speaking in English and not some fucking cryptic language?”
At this point, you might think I’m a rude person. I had been invited into the house of a man who had in the distant past been friends with my father. Now I was cursing at and threatening the man’s mother. Not to mention that said mother was a helpless old woman confined to her bed for most of the day.
My father had just died, and I might have been next. That was all that mattered to me. Any pretense of courtesy had gone out the window when Eunice had not answered my questions. I had never hesitated in the past to harangue potential witnesses or squeeze out needed testimony. I never cut corners when I did my research, and if there was a questionably legal way of obtaining information I would not hesitate to use it. I don’t care how I learn what I do, because the end result is more important.
Eunice finally relented. She hesitated at first, not sure what I would believe and what I wouldn’t. I convinced her that, had she claimed oreos were products of Satan, I would have thrown out the ones on my plate immediately. Then she explained her story.
My great-grandfather had pissed something off. It had begun when he was in his teens. He had liked walking through the woods on his parents’ property. There was a well there that had supposedly been built not long after the country had been founded. That was total horseshit, of course, but the well was old. Eunice claimed it was put in place at least a hundred years ago, which would still make it pretty ancient.
This well was reportedly haunted. People had heard voices there at night, seen creatures darting through the shadows, seen ghostly figures emerge from within the rocks. My great-grandfather was not concerned by the rumors. He decided to check it out with a friend late one night, and that’s when things started to go downhill.
As it turned out, the well was not haunted. Something worse lived there. Eunice to that day did not know what it was, only that it was powerful. A demon, a ghost, a god- all of these were possibilities. She could only say what had happened to my great-grandfather.
Seems like he wasn’t much unlike myself. He was reckless and unafraid. The first night he visited the well, he claimed to have seen the ghost of a woman. The next few nights he returned and did not see her again. Eventually, though, he found her, and he somehow struck up a conversation. Don’t ask me if I believe this stuff, because I can’t say for sure.
I can say, though, that the friend he’d been going with died of a sudden heart attack a few weeks later. He was sixteen. The friend’s parents blamed my great-grandfather, said that he had done something to piss off the spirits at that well. His own parents begged him to stay away, but he was too curious. He didn’t stop.
He kept a journal of his encounters. This is how Eunice came to learn about these things; his son, my grandfather, eventually shared it with her. The spirit at the well turned out to not be a woman, or a spirit at all. It was something else.
It asked my great-grandfather for help. He does not describe what it wanted him to do, only that what it asked was impossible. My great-grandfather refused. His conversations with the fake spirit became more heated over the next few days, boiling over to a fight during which he damaged the well. His parents were not pleased, and he was forced to repair it. But the damage was done.
Whatever he had pissed off did not take kindly to him attacking its “home,” as he claimed it lived in the well. He was not visited by the woman again, only a faceless man with eyes like burning coals. This man was real, not a ghost, and people reported seeing him once he left my great-grandfather’s residence.
His parents were not home at the time. The man entered through the back door, which was always unlocked. I guess neighborhoods weren’t that dangerous then. He talked with my great-grandfather about how he had transgressed and how he would put his family, and others, through suffering that he could not comprehend.
Later that day, my great-grandfather killed himself by cutting off his arm with a hacksaw. That is apparently not easy to do, especially to yourself, and the coroner cited insanity as the cause. Rabies, perhaps- my great-grandfather had gone out into the woods often, so it was not unreasonable to assume something had bit him.
That, Eunice claimed, was the start of the curse. Now all the men descended from my great-grandfather were destined to kill themselves at some point. I immediately grew concerned for my Uncle Barry, more so than I did for myself. I knew I would be safe in the immediate future, because it was unlikely my suicide would come at such an early age.
I asked Eunice for more information. Did she know more about the thing in the well? What could I do to stop it? Was there a way I could appease it instead? She didn’t know. I pressed her, but I could tell she was being honest. She had no idea, no more than my great-grandfather had probably understood his own death as he began sawing off his arm.
There were still unanswered questions. I had discovered before that people living before my great-grandfather had killed themselves. Was that coincidence? I couldn’t know. It seemed unlikely, but it also seemed unlikely that the curse would have started after they killed themselves. Had someone before my great-grandfather pissed off this spirit?
There was also the gun collection. My grandfather’s guns had still disappeared, and that seemed to have no connection to the thing in the well. I didn’t know if I would ever learn the connection, if there was one, and I had no way of investigating because I had no idea where to start.
I only had one option. Eunice begged me not to go, but I told her I had no choice. What did it matter if I died now? I was going to kill myself at some later date, as would any of my children or Uncle Barry’s children, and any other males that descended from us. It was horrible to consider.
She said I might piss it off more, that it might seek to harm my family and I further. So be it, I told her. I wasn’t going to let it keep killing my family because of some little argument eighty years ago. I would find the thing myself and tell it how wrong it had been to exact such extreme revenge.
I was going to the well. My family didn’t own the property anymore, but there was no way they’d find me that deep in the woods. I’d have no trouble sneaking in. When I did, I would confront the thing that had caused so much death and tell it to stop.
If it didn’t want to listen? Surely I could figure something out. I would not go unprepared. Whatever had been causing this could not be omnipotent.
Doing nothing was as good as shooting the people I loved. I couldn’t do that. What I could do, however, was try to save them and myself. No matter what Eunice or my Uncle Barry or anyone else said, I was going.
*
I wasn’t going to the well without a gun. I’m not an idiot. It crossed my mind that a firearm or any tradition weapon might not work, but it couldn’t hurt to bring one. So I went to my Uncle Barry.
He has two hunting rifles, one for him and his nephew. Aunt Erma doesn’t like guns. She stays away from them, and Barry doesn’t use them much, either, just for the occasional hunting trip. He goes maybe two or three times a year.
He had no problem with me borrowing one. It was a Winchester. He said that it was one of the best guns out there. I took his word for it, because I’ve only ever used one on a range, and infrequently at that.
I did know how to use it, though. He didn’t have to spell it out for me.
All he told me before I left was to be safe. I’m not sure how much he knew of the story. Regardless, he seemed to understand- probably because of the gun- that what came next would be dangerous. I wasn’t sure how dangerous it would be, given that whatever my great-grandfather had pissed off had not killed him on the spot. I promised Uncle Barry that I would be careful.
It was not an empty promise. I do, however, tend to get myself into unsavory situations. It was very possible that my actions would get me killed or, worse, other members of my family killed. A heavy load to bear, especially for someone like myself, braced with the full knowledge of what might happen if I failed. Or so I thought.
The forest was unoccupied and dense, like the untamed wilderness the Europeans must have encountered hundreds of years ago. From where I entered, there were no signs of inhabitance. I parked on the side of a dirt road and wandered in, keeping track of my location with a GPS that I’d purchased just for this occasion. I would not get lost.
The well was roughly in the center of the ten thousand acre woods. A longish hike, to be sure, but not an unreasonable one. It helped that there were paths already cut through the trees.
I found it within thirty minutes. The well itself was unremarkable. It was dilapidated. Stones were falling out of place, a string that had once hung a bucket swung empty in the wind, and the wooden frame supporting it had begun to rot. Insects swarmed along the sides, crawling up the wall and into the black opening that, for all I knew, went straight to Hell.
I wasn’t sure what to do. No spirit or otherworldly creature approached me. I feared that the only way to get the thing’s attention was to piss it off. So I tried. I kicked at the well. Nothing happened, except for me knocking a couple stones into the dark. I could not hear them fall into water or a bottom of any sort.
I removed some more stones, being careful not to collapse the whole structure. I could not imagine the repercussions of totally destroying the site. Nothing.
There was only one option left. I angled my rifle down, made sure the shoulder strap was cinched tight, and fired a shot into the well.
The sound echoed, bouncing off the claustrophobic stone walls and carrying for what seemed like forever. In reality, it probably faded after a minute. A long time, though, when you’re in the woods in late afternoon, by yourself, with only a hunting rifle and your wits.
The creature emerged then. I didn’t see it so much as feel it. The air rippled, yes, but the vibrations were what gave it away. Have you ever stood close to a jet taking off? Probably not. The sensation was much like that. The hairs rose on my arms, the ground trembled, the string hanging into the well began to jerk violently.
Then it stopped. I let out a breath, thinking that whatever I had triggered was finished.
I was wrong.
The world blurred. When Hollywood portrays people succumbing to anesthesia or chloroform or the like, they slowly lose consciousness and watch the world fade into dark. This is not totally accurate. One moment you’re awake, and the next you’re sitting up in your hospital bed, with no sense at all of losing consciousness nor having been asleep for any amount of time. I know because my tonsils had to be removed a few years ago.
This time it was different. The world did slowly fade, becoming ripples of light and, at the edges of my vision, darkness. Except I was still fully conscious. It was terrifying, really, to think that my vision was fading despite my mind being awake.
I thought I was going blind. That, as it turned out, would have been a welcome alternative. Instead, after briefly losing all sight, I awoke on the ground, in a forest that was not the same as the one I had stood in moments ago.
In this one, there was no well. There was only a hole in the ground, one as black as the well before it had been. I thought I could hear voices from inside. I’m not sure. All I know is that, had I jumped in- and I could have, it was about six feet in diameter- I believe I would have fallen for eternity, or something close to it. I probably would have died before reaching the bottom.
As it was, my chances of survival weren’t good. The forest was devastated. Withered trees with thin, sickly trunks surrounded me on all sides. Their branches were either black or a deadened brown. The sky, too, was black from what I judged to be ash. The sun was there, just obscured, no more than a tiny yellow dot hidden behind veils of pollution.
I had nowhere else to go, so I followed the path I had taken to the well, retracing my steps. I didn’t get far. A figure burst from the trees, from within the trees, it seemed. It was bright in a ghostly sense, transparent and white but not luminous. When it stepped foot on the path, I found myself falling onto my side.
It was howling. That is what I most remember. The sound was not human. It was not of any animal I knew, either. It sounded like the cries of a thousand tortured souls brought back to Earth.
The figure was humanoid. It was a bit large, maybe seven or eight feet, but it had the two arms and two legs and upright posture you’d expect from a person. It did not wear any clothes, but it also did not have any genitals. Don’t ask me why I noticed that. I can’t explain what I do and do not pay attention to. All I can say was that what I saw was both terrifying and peculiar at the same time.
I think any curiosity I had vanished once it teleported in front of me. It placed a hand on my chest, and I swear that my heart stopped beating for a second. I could only stare up into its face, which, despite the rest of the thing’s appearance, was not human at all. It was twisted, like that painting The Scream, except that painting had at least a semblance of humanity. The creature that stood over me had a face sagging with dead skin, with black sockets for eyes, with no nose or mouth but a ragged hole where both should have been.
It sucked in air, presumably my own, because I could feel my lungs deflate. Given that my heart had already stopped, I suppose this wasn’t a big deal. I was tempted to sit there and let it kill me. But I’m a fighter. I was not going to die here, wherever I was. And I still had my gun.
I reached for it, and the creature did not seem to mind. I had no way of knowing it would work. I fired it without so much as gripping the stock, heedless of any recoil. The creature screamed. The gun had not seemed to damage it, only piss it off, but it was enough for it to release its hand from my chest.
My heart started beating again, and I took great gulps of air. When I looked up, however, we were somewhere else. There was no forest anymore. I was surrounded by grassy plains, sitting beneath a perfect blue sky, and then I saw it: a large, leathery, winged creature flying overhead.
I sat up. I was surrounded by dinosaurs. They were unmistakable. No modern animals resemble the reptilian bipeds or the sharp-toothed mammals of that time. I’m not scientist, so I can’t say what time I was in, but I do know that I saw what I think was a velociraptor. Or it could have been a distant relative. As I said, I’m not an expert.
The white figure had disappeared, presumably leaving me to die out here. I felt something brush against my neck. When I turned around, I found a curious-looking dinosaur sniffing my skin. It had a massive spine and an arrow-shaped head. I yelped, and the dinosaur took a step back, not scared but rather intrigued by the human that had appeared at least a hundred million years ahead of its time.
Then I was falling into darkness. Much like going under for a surgery, it was sudden. One moment I was looking at the dinosaur, and the next I was falling, surrounded by a black, featureless void.
I hit my head on something. When I blinked, I found myself looking up at the side of the well. The white figure stood above me, and I swear that it was grinning despite its gaping hole for a mouth.
“Fuck off,” I said, jabbing at it with my gun. It didn’t flinch, just kept looking down at me with that same amusement. I shot at it again with the gun. No reaction. It stood there, observing me much like someone would observe an animal at a zoo.
At that point, I was pissed. I didn’t care about repercussions anymore. I just wanted this thing to be gone, for it to leave me in the proper time and place and not teleport me to the fucking Jurassic period. So I stood up and, in one motion, swept my gun at the well. The wall crumbled silently into the abyss. Just like that, the creature vanished, leaving behind a shriek that I think must have made my eardrums bleed. I couldn’t say. All I know was that I was unconscious for some time, because when I woke up the night sky was above me.
I still had my cell phone. I checked the time and date. Everything looked to be normal. I tried bringing up the internet. That worked, too, which meant I wasn’t in a post-apocalyptic world or some prehistoric version of the United States.
I had thought there would be missed calls from Uncle Barry or the Wagners or someone, anyone that had known what I would be doing. Surely they would have been concerned by my lack of contact over the past few hours. I had told Uncle Barry that I would return the gun later that evening, after all.
It was only ten o’clock. I decided to call him and let him know I’d be late. But when I tried, I got his voicemail instead. That was strange. He always picked up when he saw my caller ID. I left a message, then tried calling his cell.
Same result. I called my mother. Nothing. Now I was starting to panic. I had a wild idea, searched my own name on Google, and that’s when I confirmed that I was no longer on the same Earth.
I had reappeared in a timeline or alternate universe where I did not exist. My social media accounts were gone. I searched up my sister’s, and I found that she had another sibling, an older sister by the name of Brianna. My parents were the same. My Uncle Barry still had a Facebook account. But I was gone.
I did not know how to go back. I knew that I could not live in this world. No one knew who I was, I had no social security or credit card or bank account, I had no friends I could go to for help. I was alone.
That left only one option. I am writing this now to keep a record of what happened, in case I do not return. For all I know, in my original world I’ll show up dead, killed much like my father and fathers before him. I don’t know if I defeated that thing in the well. It seems promising that the entire structure collapsed, but who am I to say that it means victory?
I will go down. The hole is still there. Given what I experienced hours ago, I think it might be a portal to other worlds, other times. I’m not sure if I can control it, and I have no way of knowing whether it will take me to a hospitable place, but it doesn’t matter. I cannot stay here.
So I am writing all of this and posting it to reddit. Not sure who will see it because of my apparent dimension-hopping.
I don’t really care what happens to me. I just hope my family is safe now. But, like most things in life, I can never be sure. I’ll only know if I return, and even then I might die of natural causes, before I can be sure that my descendants and other family members remain safe.
In that sense, I guess I’m just as uncertain as you about what will happen.
submitted by dogeman87 to nosleep [link] [comments]


2020.06.26 00:57 btawrtbrawtrbw WIBTA if I called the police dirty liars after it seems like they tried to be nice?

Ok I live in a small rural area of Oklahoma.
The computer security on the police website was shit, and they were running a version of windows server thats way out of date.
so I only had to use metasploit and eternal blue to get in, in under 5 minutes.
I put on there site, hacked by the mighty ytf0rd, shoutout to officer johnson "the officer who talked to my parents about my hacks before".
They new it was me because of the shoutout part, and they came and talked to me, they said I wasnt arrested but they asked me to "come show us how to fix the computers at the station", and "maybe you could work for us in the future".
I dont feel like they are telling the truth or maybe they are trying to trick me into admitting it, WIBTA if I called them dirty liars, all the people I hang out with on the internet say the police and nsa are always bad no matter what.
submitted by btawrtbrawtrbw to AmItheAsshole [link] [comments]


2020.06.15 00:53 RSVoided 33 [M4F] guess you gotta keep trying

33 [M4F] kinda getting tired of dateing sites they dont match like there suppose to so
I am a 33 m from VA been trying for a while but with no luck so what the hell might as well try it here. Well here goes so I am a Heterosexual male looking for heterosexual female. I however have some standards so I am going to try and make this short
Female must be a fan of tattoos she should have a few
I am into chubby woman no skinny minis
She should enjoy bigger men cause I am about 5'10 280lbs
Would be great if she Truly Identified as a SUB cause in my everyday life I am a sub once I am done with every day life I am a Dom.
She must be working I am not here for NSA/Sugardaddy/FWB
She must be willing to accept that I am a Game and a Father to three amazing brats.
( just so were clear I am 420 friendly but I don't smoke) must be ok with that
Must be able to handle everyday life.
LAST BUT NOT LEAST U UNDERSTAND THAT I AM PUTTING SERIOUS EFFORT INTO THIS.
IF SHE IS REALLY INTRESTED Dm here with the Safe word Raspberry so I know it's not a bot
One last thing if things hit off I am willing to give you the world as long as you keep showing me your worth it
Your pic via text gets mine no nudes there's a whole internet for that so I don't need them
submitted by RSVoided to Singles [link] [comments]


2020.06.05 18:06 TheAnonymouseJoker [GUIDE] The Protestors and Activists Handbook

UPDATED 16/8/2020: Updated the dead Smartphone non root privacy hardening guide link with new 2.0 guide link.
Hello! Since I am a privacy advocate and help folks with threat modelling, it would be idiotic and ignorant not to have worked on such a guide for activists engaged with the protests going on in USA and other places.
This serves as a handbook, and I will improve it if there is a need (always room for improvement).

WHAT IS A THREAT MODEL?

A threat model is simply analysing the requirements and the degree to which you need to utilise tools (in case of digital, software and hardware) for privacy in all aspects of life. It consists of:

KNOWING THE PROTEST LOCATION AND YOURSELF

PROTESTOACTIVIST THREAT MODEL

Threat actors:

Threat vectors:

Threat causes:

Safeguard measures:

Devices to use:

CONCLUSION

I guess this should do the job. If you have any suggestions, comment on the writeup. Good luck, fight for your rights, activists!
submitted by TheAnonymouseJoker to privatelife [link] [comments]


2020.05.24 04:11 Playaguy About the "Internet of things"

Essentially when you hear about the ‘Internet of things’ usually they are talking about your office in your house. No. We are talking about a device. QRS11 is the device that is put into every single plane, train, car and everything that moves. It’s put into every missile and every nuclear missile. Everything has this in it.
Hillary Clinton’s law firm, Rose Law Firm, handled this in Little Rock, Arkansas, and this thing is worldwide. It has a chip in it, and it can be told to stop. It’s a gyroscope, and it’s got a little crystal chip in it, but it is also a gyroscope. It determines altitude, speed, and your location. Inside of it is a kill switch. At the same time that they were developing the kill switches for IBM, they also developed the kill switches for everything that QRS11, which a company called BI Electronics developed. Hillary was in the law firm that developed this further and further and further until eventually it brought in George H.W. Bush, Robert Mueller, and Mitt Romney’s Bain capital. It brought in all the crooked money to invest in this patent.
Mind you, this patent was written by a guy who supposedly worked at Hewlett Packard at the time. Well, that is just not going to happen. You don’t write the most comprehensive patent in history while you are working for another company without that company considering it to be their intellectual property. So we know that he is just another Silicon Valley cutout. He is another Silicon Valley boy. He’s fake.
But he did work for Hewlett Packard for over 20 years. So he wrote this patent. But he didn’t write the patent. The patent was written by the military’s DARPA and the CIA’s group In-Q-Tel, and they are run by a private group that is a globalist group called Highlands Forum (https://aim4truth.org/2017/02/18/who-really-owns-the-military-industrial-complex-the-Highlands-forum-exposed/)
They have determined what kinds of weapons have been created through innovation through the patent office which they seize any patent that can be weaponized. So we can go into the names of the people we have in all of our reports. Let’s just point out that these very people develop a patent that is beyond the ‘Internet of things’. It is the ‘internet of everything that moves’ so that they can turn it off and have what they call ‘aggressive remote control’ to what is called a ‘point focal node’.
The patent is just a bunch of letters, PFNTRAC. We will just call it the ‘internet of all things’ but it even brings in the NSA. It says that it is going to control the NSA surveillance. It is going to control the FBI. It is going to control weather input. It is going to control all buses, all trains, and every chip in every person and every dog and every cat. They even put sensors on trees so that when you’re walking in a park, they can sense you.
As a matter of fact, this is the scariest stuff that you will ever see. Go onto our site and look this up, or you can hear a video on it called ‘Meet Big Brother’. But we also do long articles showing you the very pictures from the patent. These pictures show that the police in the future will wear a helmet or a pair of goggles, and as they walk by you on the street, they will be able to look at you and see if you have your vaccines up to date. If you don’t, they will simply pull out a vaccine gun, and on the spot they will either give you the vaccine, or they will put you in jail.
At the same time, they can check your bank records to see if you have an overdraft. They can check your traffic tickets. They can check your medical records and see if you are in any way connected to any terrorists or anything that they don’t like. It will all be implanted into your body through wetware.
Now let me explain wetware. Most people don’t understand this. I mentioned this on a video the other day, and somebody said, “Oh my gosh! We are going to get our person we love so much and who is blind the ability to see because of what you said.”
Do you understand that there are inventions already in place where they can use the nerves on your tongue or your nose for a blind person who is blind from birth so that they can see? That is using a computer interface with your nerves, and it is what they would call a neural network.
They’ve been doing a lot of work on how to control neural networks in the human being, but what they intend to do is eventually put into your spine or into your brain – depending on what location it is, and by the way, this is not far-fetched; it is happening now – chips or machines or wires into sections of the brain, and then send in the frequencies.
For instance, I have a friend. He has Parkinson’s. He has six wires into six parts of his brain, and a battery imbedded into his head that sends vibrations to keep him from having Parkinson’s shakes and tremors. It has changed his entire life.
So this is already happening. Wet works is already happening, but the wet works that are in this plan for aggressive remote control is to be able to stop you and to be able to turn you off or to be able to put in wetware along the junctions of key muscles so that they can literally make your muscles do things. They can make you – and I’m sorry to have to say it – pull the trigger on a gun. They can make you do things against your very own will because of these implants. We all know the implants which are being used in America in these model cities that are put into your hand, and they are the equivalent of your bankcard, and these people are being driven around in driverless cars, living in eco-houses, but they are doing experiments. These are already happening.
For instance, the ATLAS robot warrior has already been built by Eric Schmidt at Apple, and it is already being used. People want to play like this isn’t here now, but it is already here.
I told people about this, and now they are going to give this guy the ability to see. That is what is going on. That is what wetware is. You can’t keep track of scientific innovation. No one is keeping track of science innovation because of the following: The Department of Defense has a group called DARPA (Defense Advanced Research Projects Agency). Since the beginning of the Manhattan Project, the internet was called DARPAnet at first. It was the way that people working for DARPA connected to each other as they were making weapons.
Mind you, every patent that comes into the patent office, they check through DARPA and through CIA’s In-Q-Tel, and if it can be weaponized, they take the patent for national security purposes, and the person who wrote the patent gets nothing. If they even continue to work on the project, they can be jailed and fined. I’m sorry to have to say this, but in one of our reports we listed some of the hundreds of inventors who have had mysterious deaths after filing patents. We have written reports on free energy devices that are happening all over the world except here in America.
http://archive.is/rAOh2
submitted by Playaguy to conspiracy [link] [comments]


2020.05.16 00:08 coolandy007 #NoPrivacyNoPants

OP on fb. WHO WANTS TO FIGHT FOR THEIR RIGHTS AND HATES PANTS? Have you ever called a civil servant's office about a topic you are passionate about? No you say? Have I got a treat for you. As easy easy as 1, 2, 3, FREEDOM! Here we go folks. No matter which side you hate or love... HERE'S HOW THEY FOK YOU Angry? You should be. But we are solution oriented instead of problem fixated in SFC so here's the plan. We're going to save the internet together and we're not going to wear "leg prisons" while we do it. 1: You will drop trou. 2: You will record yourself calling Speaker Pelosi at 202-225-4965 with the following script: "Hello, as a concerned citizen I demand that Speaker Pelosi adds the Wyden/Daines Amendment to the patriot act instead of allowing further government overreach under the pretense of emergency powers. I demand that she begin bipartisan and bicameral dialogue about reform to NSA surveillance and to protect American's rights." 3: Once that's been said and acknowledged, save that part of the recording and share it here with #NoPrivacyNoPants, but remember, you're still on a call so... FREEDOM: You have the office of the speaker of the house. You are also a free person that chooses to display that freedom by not wearing pants. The possibilities are endless of course, I personally chose to challenge someone else. FOR TRANSPARENCY The full text of the amendment is below: Purpose: To require the Attorney General to publicly disclose the United States Government’s official interpretation of the USA PATRIOT Act. IN THE SENATE OF THE UNITED STATES—112th Cong., 1st Sess. S. 1038 To extend expiring provisions of the USA PATRIOT Improvement and Reauthorization Act of 2005 and the Intelligence Reform and Terrorism Prevention Act of 2004 until June 1, 2015, and for other purposes. Referred to the Committee on llllllllll and ordered to be printed Ordered to lie on the table and to be printed AMENDMENT intended to be proposed by Mr. WYDEN (for himself and Mr. UDALL of Colorado) Viz: At the end, add the following: SEC. 3. REPORT ON INTELLIGENCE COLLECTION ACTIVITIES. (a) SENSE OF CONGRESS.—It is the sense of Congress that— (1) in democratic societies, citizens rightly expect that their government will not arbitrarily keep information secret from the public but instead will act with secrecy only in certain limited circumstances; (2) the United States Government has an inherent responsibility to protect American citizens from foreign threats and sometimes relies on clandestine methods to learn information about foreign adversaries, and these intelligence collection methods are often most effective when they remain secret; (3) American citizens recognize that their government may rely on secret intelligence sources and collection methods to ensure national security and public safety, and American citizens also expect intelligence activities to be conducted within the boundaries of publicly understood law; it is essential for the American public to have access to enough information to determine how government officials are interpreting the law, so that voters can ratify or reject decisions that elected officials make on their behalf; (5) it is essential that Congress have informed and open debates about the meaning of existing laws, so that members of Congress are able to consider whether laws are written appropriately, and so that members of Congress may be held accountable by their constituents; (6) United States Government officials should not secretly reinterpret public laws and statutes in a manner that is inconsistent with the public’s understanding of these laws, and should not describe the execution of these laws in a way that misinforms or misleads the public; (7) On February 2, 2011, the congressional intelligence committees received a secret report from the Attorney General and the Director of National Intelligence that has been publicly described as pertaining to intelligence collection authorities that are subject to expiration under section 224 of the USA PATRIOT Act (Public Law 107–56; 115 Stat. 295); and (8) while it is entirely appropriate for particular intelligence collection techniques to be kept secret, the laws that authorize such techniques, and the United States Government’s official interpretation of these laws, should not be kept secret but should instead be transparent to the public, so that these laws can be the subject of informed public debate and consideration. (b) REPORT.—Not later than 60 days after the date of the enactment of this Act, the Attorney General shall publish in the Federal Register a report— (1) that details the legal basis for the intelligence collection activities described in the February 2, 2011, report to the congressional intelligence committees; and (2) that does not describe specific intelligence collection programs or activities, but that fully describes the legal interpretations and analysis necessary to understand the United States Government’s official interpretation of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801 et 9 seq.).
submitted by coolandy007 to MarchForNetNeutrality [link] [comments]


Free NSA dating site