Now is the Revolution.
This site will help explain the true nature of the world.
The thoughts expressed here are not those of the Republic of Dan but they have stimulated further thinking within the Republic.
The truth is often only discernible by the hole it left when it was taken away.
Best of luck to you my friend on your journey.
Feds Deploy National Spy System of Microphones Capable of Recording Conversations Hidden in plain sight: The next level of NSA snooping will detect dissent via ubiquitous audio sensors
Paul Joseph Watson & Alex Jones
November 11, 2013
The revelations of Edward Snowden shone fresh light on
NSA spying targeting the American people, but what has gone largely
unnoticed is the fact that a network of different spy systems which can
record real time conversations are already in place throughout many
urban areas of the United States, as well as in the technology products
we buy and use on a regular basis.
These systems are no secret – they are hiding in plain
view – and yet concerns about the monolithic potential for their abuse
have been muted.
That lack of discussion represents a massive lost opportunity for the privacy community because whereas polls have shown apathy, indifference, or even support for NSA spying, anecdotal evidence suggests that people would be up in arms if they knew the content of their daily conversations were under surveillance.
The dystopian movie V for Vendetta features a
scene in which goons working for the totalitarian government drive down
residential streets with spy technology listening to people’s
conversations to detect the vehemence of criticism against the state.
Such technology already exists or is rapidly being
introduced through a number of different guises in America and numerous
other developed countries.
The Washington Post recently published a feature length article
on gunshot detectors, known as ShotSpotter, which detailed how in
Washington DC there are now, “at least 300 acoustic sensors across 20
square miles of the city,” microphones wrapped in a weather-proof shell
that can detect the location of a sound down to a few yards and analyze
the audio using a computer program.
While the systems are touted as “gunshot detectors,” as the New York Times reported
in May 2012, similar technology is already installed in over 70 cities
around the country, and in some cases it is being used to listen to
“In at least one city, New Bedford, Mass., where sensors
recorded a loud street argument that accompanied a fatal shooting in
December, the system has raised questions about privacy and the reach of
police surveillance, even in the service of reducing gun violence,”
states the report.
Frank Camera, the lawyer for Jonathan Flores, a man
charged with murder, complained that the technology is “opening up a
whole can of worms.”
“If the police are utilizing these conversations, then the issue is, where does it stop?” he said.
This led the ACLU to warn that the technology could represent a clear violation of the Fourth Amendment if misused.
The ACLU’s Jay Stanley asked, “whether microphones can
be remotely activated by police who want to listen to nearby
conversations,” noting that it was illegal for police “to make audio
recordings of conversations in which they are not a participant without a
“If the courts start allowing recordings of
conversations picked up by these devices to be admitted as evidence,
then it will provide an additional incentive to the police to install
microphones in our public spaces, over and above what is justified by
the level of effectiveness the technology proves to have in pinpointing
gun shots,” wrote Stanley.
Eventually, if indeed it is not already happening in
some major metropolitan areas, voices will be linked to biometric facial
profiles via the Trapwire system, which allows the government to monitor citizens via public and private CCTV networks.
As we have also previously highlighted, numerous major
cities in the Unites States are currently being fitted with
Intellistreets ‘smart’ street lighting systems that also have the
capability of recording conversations and sending them directly to
authorities via wi-fi.
As we reported on Sunday, the Las Vegas Public Works Department has begun testing the devices, which act as surveillance cameras, Minority Report-style advertising hubs, and Homeland Security alert systems. As ABC 7 reported in 2011, they are “also capable of recording conversations.”
Televisions, computers and cellphones are already
utilizing technology that records conversations in order to bombard
users with invasive targeted advertising. Last year, Verizon followed
Google’s lead and officially filed a patent for a set-top box that will actively spy on Americans in their own homes by turning TVs into wiretaps.
The patent application says that the technology will be
capable of detecting “ambient action” including “cuddling, fighting and
talking” in people’s living rooms.
The box will even listen to your conversations, according to the communication giant’s patent.
“If detection facility detects one or more words spoken
by a user (e.g., while talking to another user within the same room or
on the telephone), advertising facility may utilize the one or more
words spoken by the user to search for and/or select an advertisement
associated with the one or more words,” the document states.
In an article we published back in 2006,
we highlighted the fact that, “Digital cable TV boxes, such as
Scientific Atlanta, have had secret in-built microphones inside them
since their inception in the late 1990′s.”
This technology is now commonplace, with products like the Xbox utilizing in-built microphones
to allow voice control. Microsoft promises that it won’t use the
microphones to record your conversations, which is a fairly hollow
guarantee given that Microsoft collaborated with the NSA to allow the federal agency to bypass its encryption services in order to spy on people.
App providers on the Android network also now require users to agree
to a condition that, “Allows the app to record audio with the
microphone,” on cellphones and other ‘smart’ devices. “This permission
allows the app to record audio at any time without your confirmation,”
states the text of the agreement.
Image: David Petraeus welcomes the ‘smart’ spy grid.
Virtually every new technological device now being
manufactured that is linked to the Internet has the capability to record
conversations and send them back to a central hub. Is it really any
wonder therefore that former CIA director David Petraeus heralded the arrival of the “smart home” as a boon for “clandestine statecraft”?
Whistleblowers such as William Binney
have warned that the NSA has virtually every US citizen under
surveillance, with the ability to record all of their communications.
The agency recently completed construction of a monolithic heavily
fortified $2 billion facility deep in the Utah desert to process and analyze all of the information collected.
If the revelations of Edward Snowden taught us one thing
then it’s that if the NSA has the capability to use a technology to spy
on its primary target – the American people – then it is already doing
The state already has already had blanket access to phone records since at least 1987 under the Hemisphere program, under which AT&T gave the Drug Enforcement Agency access to call logs.
This network of computer programs, urban wi-fi
infrastructure and technological products inside our homes that all have
the capability of recording our conversations represents an even more
invasive and Orwellian prospect than anything Edward Snowden brought to
light, and yet discussion of its threat to fundamental privacy has been
Ground Wave Emergency Network
(GWEN) sites - was the most practical method available to adequately
fulfil the PDD and meet the user agency operational and technical needs.
is a superb system, in combination with cyclotron resonance, for
producing behavioural alterations in the civilian population. The
average strength of the steady geomagnetic field varies from place to
place across the United States. Therefore, if one wished to resonate a
specific ion in living things in a specific locality, one would require a
specific frequency for that location. The spacing of GWEN transmitters
200 miles apart across the United States would allow such specific
frequencies to be 'tailored' to the geomagnetic-field strength in each
(GWEN) sites and equipment to USDOT for use to establish the NDGPS
radionavigation service as authorized under Public Law 105-66, Section
346 (Attachment (C))."
- Robert O. Becker, M.D., in "Crosscurrents: The Perils of Electropollution"
A Must Watch For All Australians
The Manipulation Of The Human Psyche
Alan Watt: Shock And Awe -
Alan Watt features in this exclusive interview for Prison Planet.tv
members, in which he discusses how the same laws are enacted at the
same time across different countries under the structure of global
governance. Watt explains in detail how the people of the world are
moved around by the elite like a domesticated herd of animals by a
series of contrived crises and "revolutions," be they cultural,
political, sexual or musical, so that the controllers can manipulate
human behavior to the outcome they require.
Watt reveals how the
population are kept in a constant state of panic and terror, so that
authority figures who speak with confidence are then more willingly
trusted, using psychological "shock and awe" to generate fear and
helplessness by bombarding the population with a myriad of different
threats that they cannot personally cope with, and so turn to the state
for reassurance and leadership.
Ten Steps You Can Take Right Now Against Internet Surveillance
of the trends we've seen is how, as the word of the NSA's spying has
spread, more and more ordinary people want to know how (or if) they can
defend themselves from surveillance online. But where to start?
The bad news is: if you're being personally targeted by a powerful
intelligence agency like the NSA, it's very, very difficult to defend
yourself. The good news, if you can call it that, is that much of what
the NSA is doing is mass surveillance on everybody. With a few small
steps, you can make that kind of surveillance a lot more difficult and
expensive, both against you individually, and more generally against
Here are ten steps you can take to make your own devices secure. This
isn't a complete list, and it won't make you completely safe from
spying. But every step you take will make you a little bit safer than
average. And it will make your attackers, whether they're the NSA or a
local criminal, have to work that much harder.
Use end-to-end encryption. We know the NSA has been working to undermine encryption, but experts like Bruce Schneier who have seen the NSA documents feel that encryption is still "your friend".
And your best friends remain open source systems that don't share your
secret key with others, are open to examination by security experts, and
encrypt data all the way from one end of a conversation to the other:
from your device to the person you're chatting with. The easiest tool
that achieves this end-to-end encryption is off-the-record (OTR) messaging,
which gives instant messaging clients end-to-end encryption
capabilities (and you can use it over existing services, such as Google
Hangout and Facebook chat). Install it
on your own computers, and get your friends to install it too. When
you've done that, look into PGP–it's tricky to use, but used well it'll
stop your email from being an open book to snoopers. (OTR isn't the same
as Google Chat's option to "Go off the record"; you'll need extra
software to get end-to-end encryption.)
Encrypt as much communications as you can. Even if you can't do end-to-end, you can still encrypt a lot of your Internet traffic. If you use EFF's HTTPS Everywhere
browser addon for Chrome or Firefox, you can maximise the amount of web
data you protect by forcing websites to encrypt webpages whenever
possible. Use a virtual private network (VPN) when you're on a network you don't trust, like a cybercafe.
Encrypt your hard drive. The latest version of Windows, Macs, iOS
and Android all have ways to encrypt your local storage. Turn it on.
Without it, anyone with a few minutes physical access to your computer,
tablet or smartphone can copy its contents, even if they don't have your
Strong passwords, kept safe. Passwords these days
have to be ridiculously long to be safe against crackers. That includes
the password to email accounts, and passwords to unlock devices, and
passwords to web services. If it's bad to re-use passwords, and bad to
use short passwords, how can you remember them all? Use a password manager.
Even write down your passwords and keeping them in your wallet is safer
than re-using the same short memorable password -- at least you'll know
when your wallet is stolen. You can create a memorable strong master
password using a random word system like that described at diceware.com.
Use Tor."Tor Stinks",
this slide leaked from GCHQ says. That shows much the intelligence
services are worried about it. Tor is an the open source program that
protects your anonymity online by shuffling your data through a global
network of volunteer servers. If you install and use Tor,
you can hide your origins from corporate and mass surveillance. You'll
also be showing that Tor is used by everyone, not just the "terrorists"
that GCHQ claims.
Turn on two-factor (or two-step) authentication.Google and Gmail has it; Twitter has it; Dropbox
has it. Two factor authentication, where you type a password and a
regularly changed confirmation number, helps protect you from attacks on
web and cloud services. When available, turn it on for the services you
use. If it's not available, tell the company you want it.
Don't click on attachments. The easiest ways to get
intrusive malware onto your computer is through your email, or through
compromised websites. Browsers are getting better at protecting you from
the worst of the web, but files sent by email or downloaded from the
Net can still take complete control of your computer. Get your friends
to send you information in text; when they send you a file, double-check
it's really from them.
Keep software updated, and use anti-virus software.
The NSA may be attempting to compromise Internet companies (and we're
still waiting to see whether anti-virus companies deliberately ignore
government malware), but on the balance, it's still better to have the
companies trying to fix your software than have attackers be able to
exploit old bugs.
Keep extra secret information extra secure. Think about the data you have, and take extra steps to encrypt and conceal your most private data. You can use TrueCrypt
to separately encrypt a USB flash drive. You might even want to keep
your most private data on a cheap netbook, kept offline and only used
for the purposes of reading or editing documents.
Be an ally. If you understand and care enough to
have read this far, we need your help. To really challenge the
surveillance state, you need to teach others what you've learned, and
explain to them why it's important. Install OTR, Tor and other software
for worried colleagues, and teach your friends how to use them. Explain
to them the impact of the NSA revelations. Ask them to sign up to Stop Watching Us and other campaigns against bulk spying. Run a Tor node, or hold a cryptoparty. They need to stop watching us; and we need to start making it much harder for them to get away with it.
Google are clearly gathering information
about us but refuse to tell us why. It's nothing new to us, but while
they cannot control normal SERPs, they do however control who is viewing
what and when. We run Google adverts in order to survive.
Does this mean we shouldn't share the information below? If you know an
alternative way to sustain costs please get in touch.
Please note, Google does not track you by simply viewing pages containing their adverts.
1.Google's immortal cookie:Google
was the first search engine to use a cookie that expires in 2038. This
was at a time when federal websites were prohibited from using
persistent cookies altogether. Now it's years later, and immortal
cookies are commonplace among search engines ; Google set the
standard because no one bothered to challenge them. This cookie places a
unique ID number on your hard disk. Anytime you land on a Google page,
you get a Google cookie if you don't already have one. If you have one,
they read and record your unique ID number.
2. Google records everything they can: For
all searches they record the cookie ID, your Internet IP address, the
time and date, your search terms, and your browser configuration.
Increasingly, Google is customizing results based on your IP number.
This is referred to in the industry as "IP delivery based on
3. Google retains all data indefinitely: Google
has no data retention policies. There is evidence that they are able to
easily access all the user information they collect and save.
4. Google won't say why they need this data: Inquiries to Google about their privacy policies are ignored. When the New York Times (2002-11-28) asked Sergey Brin about whether Google ever gets subpoenaed for this information, he had no comment.
5. Google hires spooks: Matt
Cutts, a key Google engineer, used to work for the National Security
Agency. Google wants to hire more people with security clearances, so
that they can peddle their corporate assets to the spooks in Washington.
6. Google's toolbar is spyware: With
the advanced features enabled, Google's free toolbar for Explorer
phones home with every page you surf, and yes, it reads your cookie too.
a class-action lawsuit when their toolbar did the same thing, and their
updates to new versions quietly, and without asking. This means that if
you have the toolbar installed, Google essentially has complete access
to your hard disk every time you connect to Google (which is many times a
day). Most software vendors, and even Microsoft, ask if you'd like an
updated version. But not Google. Any software that updates automatically
presents a massive security risk.
7. Google's cache copy is illegal: Judging
from Ninth Circuit precedent on the application of U.S. copyright laws
to the Internet, Google's cache copy appears to be illegal. The only way
a webmaster can avoid having his site cached on Google is to put a
"noarchive" meta in the header of every page on his site. Surfers like
the cache, but webmasters don't. Many webmasters have deleted
questionable material from their sites, only to discover later that the
problem pages live merrily on in Google's cache. The cache copy should
be "opt-in" for webmasters, not "opt-out."
8. Google is not your friend: By
now Google enjoys a 75 percent monopoly for all external referrals to
most websites. Webmasters cannot avoid seeking Google's approval these
days, assuming they want to increase traffic to their site. If they try
to take advantage of some of the known weaknesses in Google's
semi-secret algorithms, they may find themselves penalized by Google,
and their traffic disappears. There are no detailed, published standards
issued by Google, and there is no appeal process for penalized sites.
Google is completely unaccountable. Most of the time Google doesn't even
answer email from webmasters.
9. Google is a privacy time bomb: With
200 million searches per day, most from outside the U.S., Google
amounts to a privacy disaster waiting to happen. Those
newly-commissioned data-mining bureaucrats in Washington can only dream
about the sort of slick efficiency that Google has already achieved
10.But Google Is The Best In Search Engines :
Last but not the least i say that google is the best seach engine on Earth if it does not do Spy on us.
..."I used to work for said company - I know how they operate and indeed -
they are spying on you and anyone who has ever used their search
engine... they follow you anywhere and everywhere you go - they are very
clever in how they hide their spyware, as after you run, find and
remove spyware - it comes back before you can refresh your page. Problem
is - it controls your search results - yet it's the best search engine.
When I changed to Bing - the URL contained "Google User ID # ____ " so
by changing my homepage - they decided to tag along."
is wrapped in a donut shaped magnetic field. Circular lines
of flux continuously descend into the North Pole and emerge
from the South Pole. The ionosphere, an electromagnetic-wave
conductor, 100 kms above the earth, consists of a layer of
electrically charged particles acting as a shield from solar
winds. Natural waves are related to the electrical activity
in the atmosphere and are thought to be caused by multiple
lightning storms. Collectively, these waves are called ‘The
Schumann Resonance´, the current strongest at 7.8 Hz.
These are quasi-standing extremely low frequency (ELF) waves
that naturally exist in the earth´s ‘electromagnetic´
cavity, the space between the ground and the ionosphere. These
‘earth brainwaves´ are identical to the spectrum
of our brainwaves.
(1 hertz = 1 cycle per second, 1 Khz = 1000, 1 Mhz =1 million.
A 1 Hertz wave is 186,000 miles long, 10 Hz is 18,600 miles.
Radio-waves move at the speed of light.)
The Creator designed living beings to resonate to this natural
frequency pulsation in order to evolve harmoniously. The ionosphere
is being manipulated by US govt. scientists using an Alaskan
transmitter called HAARP, (High-Frequency Active Auroral Research
Program) which sends focused radiated power to heat up sections
of the ionosphere, which bounces power down again. ELF waves
from HAARP when targeted on areas can weather-engineer and
create mood changes affecting millions. The intended wattage
is 1,700 billion watts of power. A former govt. insider deduced
they want to flip the world upside down. 64 elements in the
ground modulate, with variation, the geomagnetic waves naturally
coming from the ground.
The ‘earth´s natural brain rhythm´ above
is balanced with these. These are the same minerals as the
red blood corpuscles. There is a relation between the blood
and geomagnetic waves. An imbalance between Schumann and geomagnetic
waves disrupts biorhythms. These natural geomagnetic waves
are being replaced by artificially created very low frequency
(VLF) ground waves coming from GWEN Towers.
GWEN (Ground Wave Emergency Network) transmitters placed 200
miles apart across the USA allow specific frequencies to be
tailored to the geomagnetic-field strength in each area, allowing
the magnetic field to be altered. They operate in the VLF
range, with transmissions between VLF 150 and 175 KHz. They
also emit UHF waves of 225 - 400 MHz. The VLF signals travel
by waves that hug the ground rather than radiating into the
atmosphere. A GWEN station transmits circularly up to 300
miles, the signal dropping off sharply with distance. The
entire GWEN system consists of, (depending on source of data),
from 58 to an intended 300 transmitters spread across the
USA, each with a tower 299-500 ft high. 300 ft copper wires
in spoke like fashion fan out from the base of the system
underground, interacting with the earth like a thin shelled
conductor, radiating radio wave energy for very long distances
through the ground. USA bathes in this magnetic field which
rises to 500 ft, even going down to basements, so everyone
is mind-controlled. The whole artificial ground-wave spreads
out over USA like a web. It is easier to mind-control and
hypnotize people who are bathed in an artificial electromagnetic-wave.
(Covering the entire floor with aluminum and buying a CET
cylinder from Nordic Living Water Systems helps.) GWEN transmitters
have many different functions including controlling the weather,
mind, behavior and mood control.
These work in conjunction with HAARP and the Russian Woodpecker
transmitter, similar to HAARP. The Russians openly market
a small version of their weather-engineering system called
Elate, which can fine-tune weather patterns over a 200 mile
area and have the same range as the GWEN unit. One operates
at Moscow airport. The GWEN Towers shoot enormous bursts of
energy into the atmosphere in conjuction with HAARP. The website
www.cuttingedge.org wrote an expose of how the major floods
of the Mid-West USA occurred in 1993.
Invisible enormous rivers of water, consisting of vapors that
flow, move towards the poles in the lower atmosphere. They
rival the flow of the Amazon River and are 420 to 480 miles
wide and up to 4,800 miles long. They are 1.9 miles above
the earth and have volumes of 340 lbs of water per second.
There are 5 atmospheric rivers in each Hemisphere. A massive
flood can be created by damming up one of these massive vapor
rivers, causing huge amounts of rainfall to be dumped.
The GWEN Towers positioned along the areas north of the Missouri
and Mississippi Rivers were turned on for 40 days and 40 nights,
probably mocking the Flood of Genesis. (This was in conjunction
with HAARP, that creates a river of electricity flowing thousands
of miles through the sky and down to the polar ice-cap, manipulating
the jet-stream , like The Woodpecker.) These rivers flooded,
causing agricultural losses of $12-15 billion. HAARP produces
earthquakes by focusing on the fault lines. GWEN Towers are
on the fault lines and volcanic areas of the Pacific Northeast.
In 1963 Dr Robert Becker explored effects of external magnetic-fields
on brainwaves showing a relationship between psychiatric admissions
and solar magnetic storms. He exposed volunteers to pulsed
magnetic-fields similar to magnetic-storms, and found a similar
response. US 60 Hz electric power ELF waves vibrate at the
same frequency as the human brain. UK 50 Hz electricity emissions
depress the thyroid.
Dr Andrija Puharich in the 50´s/60´s, found clairvoyant´s
brainwaves became 8 Hz when their powers were operative. He
saw an Indian Yogi in 1956 controlling his brainwaves, deliberately
shifting his consciousness from one level to another. Puharich
trained people with bio-feedback to do this consciously, making
8 Hz waves. A healer made 8 Hz waves pass into a patient,
healing their heart trouble, her brain emitting 8 Hz . One
person emitting a certain frequency can make another also
resonate to the same frequency.
Our brains are extremely vulnerable to any technology which
sends out ELF waves, because they immediately start resonating
to the outside signal by a kind of tuning-fork effect. Puharich
experimented discovering 7.83 Hz (earth´s pulse rate)
made a person ‘feel good´ producing an altered-state.
10.80 Hz causes riotious behaviour and 6.6 Hz causes depression.
Puharich made ELF waves change RNA and DNA, breaking hydrogen
bonds to make a person have a higher vibratory rate. He wanted
to go beyond the psychic 8 Hz brainwave and attract psi phenomena.
James Hurtak, who once worked for Puharich, also wrote in
his book The Keys of Enoch that ultra-violet caused hydrogen
bonds to break and this raised the vibratory rate.
Puharich presented the mental effects of ELF waves to military
leaders but they would not believe him. He gave this information
to certain dignitaries of other Western nations. The US govt
burned down his home in New York to shut him up and he fled
to Mexico. However Russians discovered which ELF frequencies
did what to the human brain and began zapping the US Embassy
in Moscow on 4 July 1976 with electromagnetic-waves, varying
the signal, including focusing on 10 Hz. (10 Hz puts people
into a hypnotic state, Russians and North Koreans use this
in portable mind-control machines to extract confessions.
Found also in an American church to help the congregation
believe!) This Russian "Woodpecker" signal was traveling
across the world from a transmitter near Kiev. The US Air
Force identified 5 different frequencies in this compound
harmonic Woodpecker was sending through the earth and atmosphere.
Nikola Tesla revealed in 1901 power could be transmitted through
the ground using ELF waves. Nothing stops or weakens these
signals. The Russians retrieved Tesla´s papers when
they were returned to Yugoslavia after his death.
article is really sketchy.I'm posting it
despite my reservations because aspects of it are fascinating and
may encourage further investigation. Please trust your own
judgment and do more research.
question most everything in this article: the
Andrija Puharich, the "pendulum expert", the "extraterrestrials", and also
the "vaccine implants", nature of GWEN etc.
It's hard to
find answers about these things!
But, here are
a few things I have learned:
Andrija Puharich was a
brilliant but questionable (even sinister)
character. I include him in a
special category with other shadowy types such as
Steven Greer, Ingo Swann, Courtney Brown, Timothy Leary,
Thomas Bearden and many, many more. You really can't trust these
Some are probably aware that they spread
disinformation, while others naively let themselves be used as
"assets". Maybe they were just really
brilliant guys and going down the rabbit hole screwed
them up too much. Often they
are sort-of in-the-military, but also sort-of not-in-the-military.
They may dabble in drugs or the occult. They may be
interested in mind control. They may seem to work
for the government and also against the
are being duped and used by nonhuman entities.
Puharich was influenced by such entities. These
beings have had many names:
spirits, Etherians, Extraterrestrials, etc.
I prefer to identify them asJinn.
In modern times we
naively assume that these beings come from other planets, but
they've always visited us and they come from another "dimension" or
"space" that is a part of this world we call Earth.
may pretend that
they come from another planet. Or they may refer to themselves
as Space beings. "Space" doesn't necessarily mean the
"Outer Space" of NASA. "Space" is also defined as: "the
unlimited expanse in which everything is located", or "the
boundless regions of the infinite". Well, that pretty much
includes everything -- including those realms and dimensions which
modernized western society is amazingly ignorant about. Seems
like those jinn are having another big laugh at our expense.
They do that all the time.
The jinn are quite often
tricksters and liars. Some are demonic and like to frighten or
debase and corrupt. They have free will like humans, so they
can range from good to bad. However, the ones who confuse and
mess around with us aren't likely to be good. The best
approach is to avoid them. They love to pose as gods or masters-of-the-universe
and create followings. They often make
predictions (which don't come true). They are channeled by people who are willing to
go into a trance and let strange, unknown entities take over their
bodies and minds.
In the case of Andrija Puharich
the entities were called "The Nine".
extraterrestrials mentioned in this article were undoubtedly jinn.
There really is no
such thing as a "pendulum expert". Pendulums can't be trusted for consistent, truthful or
I'm posting this
article despite serious reservations. Please trust
your better judgment and do more research!! ~~Lydia
As the screenshot above illustrates (click for enlargement), users are made to accept an agreement that allows Facebook to “record audio with the microphone….at any time without your confirmation.”
The TOS also authorizes Facebook to
take videos and pictures using the phone’s camera at any time without
permission, as well as directly calling numbers, again without
permission, that could incur charges.
But wait, there’s more! Facebook can
also “read your phone’s call log” and “read data about contacts stored
on your phone, including the frequency with which you’ve called, emailed
or communicated in other ways with specific individuals.”
Although most apps on Android and Apple devices include similar terms
to those pictured above, this is easily the most privacy-busting set of
mandates we’ve seen so far.
Since the vast majority of people will agree to these terms without even reading them, cellphone users are agreeing to let Facebook monitor them 24/7, green lighting the kind of open ended wiretap that would make even the NSA jealous.
Other app companies are also requiring you to allow them to
approximate your location, send SMS messages from your phone that cost
you money, read your contacts, read your phone status and identity, get
“full network access” to your communications (in other words listen to
your phone calls), modify or delete the contents of your USB storage,
and disable your screen lock (the 4 digit code that password-protects
As we have previously highlighted,
embedded microphones in everything from Xbox Kinect consoles to
high-tech street lights that can record private conversations in real
time represent the final nail in the coffin of privacy as the ‘Internet
of things’ becomes a part of our daily lives.