Category Archives: Hi Tech

Smart Spying, Children, 5G and Health Effects

This is a real issue, particularly in the hands of industry and members of the public. There is a range of information provided below and videos. The one that concerns me is the 8 year old child who a hacker spoke to in her bedroom. What if this person is a paedophile?

The article below provides solutions on how to avoid surveillance and what to be aware of.

In the public interest, definitely.

Is Your Cell Phone Spying On You?

Author: Guest, Last updated: January 30, 2020

Is your cell phone spying on you? Even if it is, does it really matter? You’re no criminal, right? Should you protect yourself in any case? In this guest post, Lois Cadwallader answers all these questions and more and shares 15 ways you can protect yourself from this personal intrusion:

Have you ever had the feeling that “someone is listening?” Well, they are. And it’s more than just your cell phone. Most newer electronic devices are seeded with sensors.

What’s interesting, is the smartphone has probably become the most important personal identifier and locator.
Think about it. What do most people have with them always? Their phones.

How do smartphones provide surveillance? They:

  • Listen
  • Locate
  • Log personal data

They Listen

I recently had my own experience with this. I carry my phone on airplane mode with Bluetooth and WiFi off to safeguard against exposure to electromagnetic radiation. (Find more information on Bluetooth radiation dangers here.)

I had turned my phone back on to check for messages and saw a friend zipping along on a bike path. “Diane Day! Diane Day,” I called out loudly. Well, she was riding so fast that she didn’t hear me. But someone else did.

Within a few hours, I had a personal message from her on Facebook … but it was suspicious. It didn’t sound like her. Sure enough, it was a hacker. Coincidental? Maybe. But the timing is just too close. I can’t help but wonder if my phone picked up her name, associated her with my Facebook friend, and someone went phishing.

I’d be interested in hearing your stories, please share in the comment section below.

It’s not just our smartphones.

Let’s take home managers, or smart speakers. Apple and Google admit that Alexa and Siri spy on you. Employees listen in on conversations, but only to monitor and improve the system, so they say. Industry claims the sampling is very small, and that they have in place strict anti-abuse regulations. [1,2,3]

And even more disturbing, the very systems we use to protect our homes may be the instruments of surveillance and invasive contact. An alarming report just surfaced about a hacker speaking to a young girl through the smart speaker in her bedroom. This video is downright creepy.

They Locate

Even when the GPS is turned off, your location can still be established using cell tower triangulation. Although this is not exactly “pin-pointing” it can get pretty close. This could be used for good or bad, depending on who wants to know your whereabouts. [4]

man holding phone to connect

They Log Personal Data

Your smartphone and other smart devices collect, analyze, and record thousands of interactions every day. It is no secret that this information is available to 3rd party advertisers. But it’s for “your benefit” – It’s like having a “personal shopper” hunt out the best deals for you.

Google says they don’t “sell” your personal information. They just place advertisements in your purview, based on your trends and search history. [5]

And Apple boasts, “What happens on your iPhone stays on your iPhone.” However, a NY Post investigator begs to differ.

He discovered that he was being “tracked,” by 3rd parties and that personal information had been shared, contrary to the published privacy policy. [6]

Are You OK With Massive Data Collection And Retention?

What About Hackers?

In the article, “Smart Homes Might be Getting too Smart. Start Worrying,” the author makes the stunning point that the danger is not just that hackers could know when you are on vacation and hack your smart lock and break into your home. That’s bad enough. But also there is the broader danger that hackers could commandeer hundreds of thousands of smartphones and smart devices to request access to a bank, social media platform, or government agency, thus forcing a DDoS (Distributed Denial of Service) attack. [7]

This is actually what happened in the 2016 Mirai botnet that crashed the web. [8]

Isn’t Being Connected A Good Thing?

In the book, Owned: Property, Privacy and the New Digital Serfdom, by Joshua A. T. Fairfield, 2017, the author discusses what it means that our environment is seeded with more sensors than ever before. [9]

Our dishwashers, smart televisions, internet-enabled home thermostats, smart meters, Fitbits and smartphones constantly gather information about us and our environment.

Objects of the Internet Of Things

Who owns that information? You might be surprised at the answer.

When you purchase a smartphone or any smart device you relinquish ownership of your personal information. Industry owns your personal information. It is buried in hard-to-read, small-font terms-of-service agreements.

5G will only make it worse, as the sensors and transmitters are brought closer and closer, right into our neighborhoods, connecting all of the smart gadgets in the smart homes. This is not just “real time” listening. There is huge data collection, analysis, and retention by government and industry. [10,11]

Why? You guessed it. There is nothing new under the sun.

Money and power, money and power, money and power.

Money, Money, Money

Technology is a trillion dollar business. Industry and government are riding high on the enormous profits. Smartphone ownership is fast becoming a “right” and a “necessity” for life. Ask any person under 50 years old, “What’s the one thing you cannot and will not go without?” The answer is usually, “My phone.”

man riding on money

So, we now have a product with almost 100% dependence for both business and personal use. And the consumer is more than happy to pay for the latest smartphone upgrade.

American companies alone are estimated to have spent over $19 billion in 2018 acquiring and analyzing consumer data, according to the Interactive Advertising Bureau. [12,13]

And Then There’s Power.

person looking at the money at the center of the world

They would need an Infra-structure in place for surveillance and compliance assurance.

  • They would need to control technology in order to control information.
  • They would need to control financial transactions.
  • They would need to control the military.
  • Food, prescriptions, electricity, fuel, etc., all controlled by technology.
  • They would want to keep the population dependent (if not addicted) to the services under their control.

In short, they would need surveillance, surveillance, surveillance.

Where could this possibly be going? Dr. Jeremy Naydler, author and philosopher writes about the disturbing scenario of the global electronic intelligence in, “5G – The Big Picture.” [14]

And check out this edgy film, 5G APOCALYPSE – THE EXTINCTION EVENT. It is a full-length documentary by Sacha Stone exposing the 5G existential threat to humanity. OK, it might be a little hyperbolic. But if even half of this is true, yikes!

The power of artificial intelligence and other advanced technologies will be enormous. Vladimir Putin said, those in possession of artificial intelligence will rule the world. The processing speed and knowledge base of artificial intelligence will be so great, it will seem all-knowing to most. [15]

And President Trump states in the National Security Report, “We will improve America’s digital infrastructure by deploying a secure 5G Internet capability nationwide. These improvements will increase national competitiveness, benefit the environment and improve our quality of life.” [16]

Linked to a global network of cameras and audio devices, made of non-biological materials, artificial intelligence will appear to be omnipresent, omnipotent, and immortal. Those acquainted with biblical prophecy speculate that AI will be the platform for the one-world dictator. [17]

There’s a race for technological domination because that equals power. And surveillance is a necessary part of it.

But I’m Not A Criminal

The thinking goes something like this, “If I’m not engaged in any criminal behaviors, I shouldn’t mind if I’m monitored. Surveillance keeps us all safer from crime and terrorism.”

To be fair, there are some benefits to this “tracking” involving safety, identifying medical emergencies, solving crimes, finding missing persons, etc.

So, why should you care? One word. China.

Spy coming out our phones

China is using smart phones and other smart devices to massively spy on its citizens. They assign a “Social Credit Score” to base reward and punishment. [18,19,20,21]

It could never happen here.” Famous last words.

Silicon Valley is already building a Chinese-style social credit system. [22]
And one could argue that in the US there is already an un-written social credit system solidly in place, just waiting for the right people to implement its rewards and punishments.

It all sounds a little far-fetched; conspiratorial. But still, it should give reason for pause and reflection. How much of our privacy are we willing to relinquish for the sake of convenience? What are we exchanging for ultra-connectivity? And is it worth it?

Is There Anything We Can Do?

Thankfully, yes.

Here are 15 steps you can take to reduce the spy-factor in your life.

1 – Unplug

Unplug, turn off, disconnect as much as possible.

A human pulling a plug connected to a brain

2 – Be Aware Of Your Appliances

Seek out older models of appliances that do not have a WiFi feature or dis-arm the WiFi component of new appliances. This is difficult, but possible with a little bit of research. (Still confused about the dangers of WiFi? Read this article on why WiFi is not safe.)

3 – Keep Airplane Mode On And WiFi And Bluetooth Off

If you are “EMF savvy,” you know that other than completely powering off, the only safe way to carry a cell phone on your body is to:

  • Turn Airplane mode ON
  • Turn Bluetooth and WiFi OFF

This shuts down all electromagnetic energy. And of course, shuts down all transmission and reception. Thus, you are un-connected. So, you must check for messages periodically.

You can still use other features, like calendar and camera. And you can still access downloaded items.

But beware! Some of the newer phones (and tablets) have an automatic re-connect feature. So, you must double check to ensure that Airplane mode is ON and Bluetooth and WiFi remain OFF when your phone or tablet is close to you. These devices “want” to be connected and are programmed to do so. Learn about cell phone radiation protection here.

A “Faraday Bag” is another option for carrying your phone.

4 – Get A Meter

What about the sneaky factor? Since most phones have a sealed battery that can no longer be removed, one cannot really know if it is truly “off.” The only way to be assured that there is no beacon signal emitting from your phone or appliances is to meter.

You can do that yourself quite easily with the right kind of meter.

And as we progress deeper and deeper into the mesh of electronic surveillance, now might be a good time to acquire a meter.

5 – Use A Land-line

Many of my friends no longer have a wired telephone line. We still keep ours. I don’t know how much longer they will even be available. But, I recommend if you have a land-line, keep it. If you do not have one, inquire as to whether or not you can install one.
Important – This should be completely wired with no additional wireless hand set.

You might be Interested in Lloyd’s extensive article on Cordless phone dangers.

6 – Resist The Home Manager / Smart Speakers

They are fun…convenient. They are all the “new rage” in technology. But come on’ – do we reeeeeally need them? And do we really want them listening, locating, logging?
I say, no!

7 – Be Mindful

Smart devices, appliances, electronic key fobs, and even toys are always listening. And sometimes even recording.

8 – Use Technology Against Technology

There are a few products that claim to block techno-spies. I have not checked them out yet. Worth a look.
Use webcam and microphone blockers and anti-malware software. When browsing the internet, go “incognito.”

9 – Check Privacy Options If You Use Social Media

Use social media with caution. Be sure you are aware of and use privacy options. You need to check these periodically, as they do change.

You can take it a step further and have your social media presence scrubbed. While you can delete your Facebook account relatively easily, getting these firms to remove your information is time-consuming, complicated, and sometimes impossible. In fact, the process is so burdensome that you may want to consider paying a service to do it on your behalf.

10 – Hardwire As Much As Possible

Hardwire your computer, mouse, printer, etc.
Wired is more secure than wireless as there is less chance of someone intercepting.

11 – Install Anti-Virus Systems On All Wireless Devices

Although not 100% fail-proof, they do make it difficult for hackers to intrude into your technology devices.

12 – Go To Advanced Security And Privacy Solutions

There are ways to disable the “listening” function of your smartphone and smart devices. There are also ways to delete your recorded information. Takes some research. I have not done this yet. I hear that it is difficult, but doable. My next project.

13 – Simplify

While cutting-edge technology can be exhilarating, there is something attractive about slow and simple living. Spend more time in the wilderness where there are no sensors. There is something restorative about the natural world and a small footprint.

14 – Take A detailed Audit Of Every Possible Source Of Surveillance In Your Home.

For a detailed list of “smart” devices that could possibly be used for surveillance, see:
Cadwallader, Bill, “EXPOSED: The Electronic Sickening of America and How to Protect Yourself—Includes the Dangers of 5G and Smart Devices,” Stop Dirty Electricity, Las Vegas, NV 2018

Bill shares over 30 pages of up-to-date information from his annual visit to the Consumer Electronics Show in Las Vegas. You may be surprised how many things in your environment have turned “smart” and could be used as a surveillance tool, even when turned off.

15 – Some Would Say Completely Eliminate Technology

This is difficult. And I admire the purists. I really do. But to run a business in the modern world, I have to use a pc and smart phone. If you are completely retired and don’t need electronics, it might be doable. You also might be able to move to a rural area. That would be ideal.

We may not be able to avoid surveillance entirely. But we can reduce the spy factor by taking some simple steps. Do what you can do today.

Many thanks to Lois Cadwallader for this guest post.

Lois Cadwallader EMF writer

Author bio: Lois Cadwallader, MA, has been a professional educator all her life. She lives in Las Vegas, Nevada and enjoys volunteering in after-school clubs, hiking and cycling. She is the co-author of Exposed: The Electronic Sickening of America and How to Protect Yourself.

Sources and Bibliography

1. Amazon Admits Employees Listen to Alexa Conversations. www.independent.co.uk/life-style/gadgets-and-tech/news/amazon-alexa-echo-listening-spy-security-a8865056.html
2. Google and Amazon really DO want to spy on you: Patent reveals future versions of their voice assistants will record your conversations to sell you products By Tim Collins, Dec. 15, 2017. www.consumerwatchdog.org/privacy-technology/google-and-amazon-really-do-want-spy-you-patent-reveals-future-versions-their
3. No secrets at home anymore now Amazon’s Alexa is spying on us, Geoffrey A Fowler, May 07 2019 www.stuff.co.nz/business/world/112528222/no-secrets-at-home-anymore-now-amazons-alexa-is-spying-on-us
4. Accurate Location Accurate Location Detection by Minh Tran, DMD transition.fcc.gov/pshs/911/Apps%20Wrkshp%202015/911_Help_SMS_WhitePaper0515.pdf
5. Does Google sell your personal data? JERRY HILDENBRAND, Jan 12, 2018 www.androidcentral.com/does-google-sell-your-data
6. It’s the middle of the night. Do you know who your iPhone is talking to? By Geoffrey A. Fowler, Technology Columnist, May 28, 2019 www.washingtonpost.com/technology/2019/05/28/its-middle-night-do-you-know-who-your-iphone-is-talking/
7. Smart homes might be getting too smart. Start worrying. Commentary: When better features mean worse ethics, should we change what we buy? By David Priest, October 31, 2019 www.cnet.com/news/smart-homes-might-be-getting-too-smart-start-worrying/
8. The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet by Josh Fruhlinger March 9, 2018 www.csoonline.com/article/3258748/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html
9. Owned: Property, Privacy and the New Digital Serfdom, by Joshua A. T. Fairfield, 2017 New York, NY: Cambridge University Press, 2017.
10. Who Owns Americans’ Personal Information and What Is It Worth? Robert Shapiro and Siddhartha Aneja, March 8, 2019 assets.futuremajority.org/uploads/report-for-future-majority-on-the-value-of-people-s-personal-data-shapiro-aneja-march-8-2019.pdf
11. When smart devices watch you, what do they do with the data? By Kim Komando USA TODAY, June 20, 2019 www.usatoday.com/story/tech/columnist/2019/06/20/what-do-smart-devices-do-data-they-collect-you/1483051001/
12. U.S. Firms to Spend Nearly $19.2 Billion on Third-Party Audience Data & Data-Use Solutions in 2018, Up 17.5% From 2017 Dec. 05, 2018, IBA (Interactive Advertising Bureau) Retrieved from www.businesswire.com/news/home/20181205005139/en/U.S.-Firms-Spend-19.2-Billion-Third-Party-Audience
13. Tech spending will near $4 trillion this year. Here’s where all the money is going and why by Eric Rosenbaum April 8, 2019 www.cnbc.com/2019/04/08/4-trillion-in-tech-spending-in-2019-heres-where-the-money-is-going.html
14. “5G – The Big Picture.” By Dr. Jeremy Naydler, April, 2019 Retrieved from takebackyourpower.net/5g-the-big-picture/
15. Vladimir Putin Says Whoever Leads in Artificial Intelligence Will Rule the World, By David Meyer, September 4, 2017 fortune.com/2017/09/04/ai-artificial-intelligence-putin-rule-world/
16. Ultra-fast 5G wireless service declared national security priority by White House by Danny Crichton, December 19, 2017 techcrunch.com/2017/12/19/ultra-fast-5g-wireless-service-declared-national-security-priority-by-white-house/
17. Will Artificial Intelligence Create Pathway To The Antichrist? By Britt Gillette, November 19, 2019 www.prophecynewswatch.com/article.cfm?recent_news_id=3610#QUFHUABS0Vj1W5pv.99
18. China has started ranking citizens with a creepy ‘social credit’ system — here’s what you can do wrong, and the embarrassing, demeaning ways they can punish you, by Alexandra Ma Oct 29, 2018 www.businessinsider.com/china-social-credit-system-punishments-and-rewards-explained-2018-4
19. How China Is Using “Social Credit Scores” to Reward and Punish Its Citizens, By Charlie Campbell / Chengdu, 2019 time.com/collection/davos-2019/5502592/china-social-credit-score/
20. Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids? By Bernard Marr, Jan 21, 2019 www.forbes.com/sites/bernardmarr/2019/01/21/chinese-social-credit-score-utopian-big-data-bliss-or-black-mirror-on-steroids/#325c8bc848b8
21. ‘Social credit score’: China set to roll out ‘Orwellian’ mass surveillance tool By Bill Gertz – The Washington Times – December 9, 2019 www.washingtontimes.com/news/2019/dec/9/social-credit-system-china-mass-surveillance-tool-/
22. Uh-oh: Silicon Valley is building a Chinese-style social credit system, By Mike Elgan, August 2019 www.fastcompany.com/90394048/uh-oh-silicon-valley-is-building-a-chinese-style-social-credit-system

Snowden Cell Phones Spying and ID

In the public interest.

I give no consent to my location, ID and my data being gathered (bulk connections). I have nothing to hide but I like my privacy as a woman. I realise the company’s believe they own my data and believe they can sell it. I do not give consent.

Susan Carew

NOTES: Snowden’s comments –

Central problem is you do not know what the phone is doing!

According to Snowden you can turn off your phone but how do you know it is off he says. Old phones mean you can take the battery out that stops signals. The phones now are sealed. Airplane mode doesn’t turn off wifi. We don’t know what the phone is doing or what it is connected to? Apps talk want it to stop after using e.g. messenger, weather app. People need to be able to make intelligent decisions not just app by app on a connection by connection basis. You may use Facebook – want to connect to Facebook content servers, want to be able message a friend but you don’t want it to talk to an ad server or analytics server or third party (monitoring your behaviour). Facebook crams them (third party) into every app you download, you don’t know as you can see it, problem with data collection today. Industry built on keeping this invisible. Need to make activities of our devices (iPhone, computer) more visible and understandable to the average person and give them control. Say there is a little green icon spokes coming off, every app your phone is talking to, all hosts talking to. Once every 3 seconds phone is checking in with Facebook. No-one wants spying. If people could press a button to turn off apps ie. Facebook etc. People would want no spying. Google and Apple do not allow the button to exist. If the companies think it is not understood, too complex then it needs to be simplified. It is a problem.

Stories data breached, companies spying here or there, manipulating purchases, search results, hiding things on your timeline – influence and manipulate in different ways. Happens as a result of single problem – which is inequality of available information. They can see everything about you , what you device is doing, they can do anything with your device. You paid for the device, increasingly governments and corporations own it. we do all the work, pay taxes, costs… People work hard but they are owning less. The young people do not know what they are losing.

Data became a commodity, valuable to Google an social media platform, making billions of dollars earned, people are accustomed, difficult to turn that horse around. Snowden says money becomes power and influence. Information becomes influence.

Surveilance states they won’t relinquish as they embed this reality. The permanent record is the story of our lives.

Permanent record is the subject of the book.

You life how intentionally BY DESIGN both government and corporate realised it was in their mutual interest to conceal data collection activities to increase the breadth and depth of their sensor networks spread out throughout society. Back in the day Intelligence collection in US (sigin) was sending FBI agent to put alligator clips in a building, or disguised as a workman bug in a building or built satellite listening, in desert, parabolic collector listening to satellite emissions. Satellite links were owned by military and exclusive to government not affecting everyone broadly, all surveillance was targeted. What changed with technology was surveillance becomes indiscriminately, dragnet, ‘bulk collection’ should become dirties phrases in the language if we have decency. This this was intentionally concealed from us, government did it used classification, companies did it, denied it, they say you agreed to this. You didn’t agree to anything. They say they put Terms of Service page up, you clicked. You clicked a button said I Agree when you are trying to open an account to talk to friends, email etc. You were not agreeing to 600 page legal form, even if read you wouldn’t understand. Even if did, the first para says this agreement can be changed anytime by the company.

NOTE: They built a legal paradigm that presumes RECORDS collected about us DO NOT BELONG TO US. This is one of the core principles on which mass surveillance from the government perspective in US is legal. Government says it is legal, it is fine. Our perspective as a public, says that is the problem this isn’t okay, the scandal is not in their breaking the law, it is in that they DON’T HAVE TO BREAK THE LAW. It is called a third party doctrine, legal principle Smith vs Maryland. Established a precedent that the record don’t belong to the guy they belong to the company. The company has ownership over records, back in 1970s. Still relying on this precedent. No-one has a privacy right over their lives (data collection). Not data being manipulated but PEOPLE being MANIPULATED.

MY COMMENTS:

Everyone jumps on the bandwagon to make money without a backward glance to the social cost to democracy.I personally do not feel safe and I do not want people I do not know where I am and gathering my data about what I do, where I go, who I speak to, who my friends are. I don’t want people accessing my blog if they are monitoring me rather than reading my blog out of interest. It is a form of surveillance. This feels to me like stalking. I am alarmed by the facts raised above that my data is not mine, YES IT IS. What I am doing now is my thoughts on a page they do not belong to WordPress, the IP company or those surveilling me. I revoke other rights that state I have agreed, I haven’t. This provides insights into FOI requests and why no data is forthcoming. I am not fully informed.

In addition:

I have real concerns about the medical effects cancer and EMF with iPhones. This is a real problem.

The apps are companies they are not just little icons (analytics) and it is too much for the average person to understand and make clear decisions.

The homeless guy living in the bush I met recently is probably right to be there. He is free. He is not accessing digital. He has let go of this society. I can understand why that is a good thing.

Link to Snowden’s paper (Introspection Engine [iPhone 6]: https://boingboing.net/2017/09/08/impaired-judgment-phones.html

Former Victorian Premier Brumby Quits Huawei Board and Joins La Trobe University

My first feeling in this is of the IT trade war between China and the United States.  My next feeling is those in prominent positions joining industry and the revolving door that exists between government and industry.  The original intent of government was that these entities were separate as government ensured neutrality so that it could represent the people.  Unfortunately in the ruling class they all know each other, they discuss the Boards the are on and they have their own agendas.   Business is business.

The video I produced today is on greed.  I see the blindness of economic objectives outside of human wellbeing.  The disconnect is furthered as industry profits become the goal and the impact on civil society a minor issue.  This becomes increasingly evident when one investigates the range of views about 5G and the race between the US and China with IT industry lobbyists taking up positions in Communications as the regulator of the industry.  Clearly it is not possible to regulate an industry in the public interest if a person has come from the very industry that is to be regulated. That means they know the people, and often, if not always, have an agenda to promote that industry. This is where the public interest is neglected.  We have seen this in the United States and the health implications for civil society are sending out alarm around the world.

The article below informs that the former Victorian Premier John Brumby was on the board of Huawei.  There is discussion about Chinese criminality and the potential for the Communist party to spy and gather data.  I would assert all the IT companies are spying and data gathering and are contracted to share data with intelligence agencies, notably the 5 Eyes spy network.  When you investigate the Boards of IT companies you see the vested interests sitting there which include multinational companies, big data, IT companies, military, intelligence, Accounting firms, universities, former government ministers or public servants and the list goes on.  In the country they operate in, the people believe the company is owned by the nation or they have no idea that their data is traded without real consent and used to sell products and services.  The greed is what moves this disregard for privacy.

Clearly Huawei would be influenced, if not directed, by the Chinese Communist Party, they are the largest telecommunications company in China note $8.7 billion in profits.  Refer https://en.wikipedia.org/wiki/Huawei

The issues for Australia are to what extent can the Chinese government penetrate Australia through high level appointments and economic power?  Refer foreign ownership of homes (real estate):  https://www.news.com.au/finance/real-estate/buying/fears-one-million-aussie-homes-could-soon-be-owned-by-foreign-buyers/news-story/c50a4112bab4f3ed8fae27277f313f54

Australian land sales https://www.smh.com.au/politics/federal/china-increases-its-stake-in-australian-land-20181220-p50ng0.html

I recall Alexander Downer some years ago attempting to ban protests of Falun Gong outside the Chinese Embassy in Canberra. The government went to court with Falun Gong and the latter won.   Refer http://www.abc.net.au/pm/content/2005/s1389732.htm

I interviewed on radio a Chinese woman whose husband had been murdered in China as they practiced Falun Gong.  Just last week I noticed they were protesting in Melbourne about organ harvesting of practitioners.  This is the very core of the argument about recoupling human rights to trade.  Clinton was the one who decoupled human rights.   This link refers to Hiliary Clinton favouring economics over human rights when it serves US interests refer https://www.telegraph.co.uk/news/worldnews/asia/china/4735087/Hillary-Clinton-Chinese-human-rights-secondary-to-economic-survival.html

The issue of Guantanamo Bay, 911, the Middle East wars, rendition and its own human rights violations inclusive of leaving the UN Human Rights Council are largely ignored internationally.  One rule for one another rule for others. It is all about the money but the argument will frame it as benefiting the people.

The core issue is the economic war that seeks to use issues to weaken the competitor. This is where the nation state serves economic interests and is not representing the people. Refer https://www.cnbc.com/2019/10/10/sanctions-over-china-human-rights-may-strengthen-us-position-in-trade-talks.html

Therefore, where do executives and high profiled people draw the line or is there no line?  If the focus is strongly on career, profits, political and business interests at the expense of the public interest then where do we end up?  We are walking in the shadow of the United States and the ideological economic rationalism of privatisation of public assets. This utilises government taxation to take on the risk in projects to enable the private sector to lower risk and project high profits and in some cases the public asset is transferred to them.  This dominates the discussion as equity financing replaces government taxation attracting high interest rates (exponential) and demands profits through users pay e.g. toll ways. The original purpose of government provision of public services quietly transforms into private provision of government services in million and billion dollar public/private partnership deals.

The contraction of global markets with a mentality of cut and move on (acquisitions, arbitrage, futures markets, speculation in profit maximisation) diminishes the public purse which typically had longer horizons with cross subsidisation built into government funding planning to ensure egalitarianism as advancing Australia Fair and public order.

Ultimately under the new rules of private engagement the public pay more (in taxation, GST, direct fees, fines, taxes) out of ever more diminishing incomes.  The multiple propensity to consume (MPC) shrinks which impacts economic growth but is hidden by activity from both foreign and domestic companies.  The chairs rearrange.

This most favoured status given to the megolithic multi-nationals (changing names, subsidiaries, rebranding) gives the impression of wealth but the reality is equity finance is expensive, the risk is carried by the firm and attracts high costs and interest rates. It deepens indebtedness which is the lever that can be used to influence domestic policy that would have funded social programs. This is the opportunity cost in favour of business. Thus the left/right propaganda is used to weaken calls for public expenditure as unrealistic and economically unviable. This is how the middle class becomes pauparised as the extremes start to polarise between those with extreme wealth and those living in extreme poverty.  This is how policy creates social unrest and blames the public through repressive techniques.  The shape changer of democracy takes on a totalitarian profile with increasing calls for surveillance, funding a security apparatus with intrusive technologies (purchased from these IT companies) removing human rights and privacy to ensure control rather than squarely facing the reality of an economic mismanagement and greed as the driver of market concentration and serving of specific foreign interests.  Egalitarianism and social democracy transforms into a compliance framework that favours the few over the rights of the many and is ultimately de-stabilising globally as we are all connected.  The public believes the propaganda that budgets are balanced when the debt is off the balance sheet as the risk was transferred.

So powerful companies like Huawei and Google for example, both titans in the IT industry have disproportionate concentration of power and hence, political influence and penetration into markets to serve interests and agendas that may provide token jobs (benefits) but ultimately are the old paradigm of profit maximisation. The profits move off shore and we see the economic cake unravel to be replaced by AI and automation.  At the same time ‘greed’ as dis-ease is not in balance with ecological limits (silent spring) takes more than it needs and is non responsive to natural rhythms that rebalance planetary systems. This is why the titanic is sinking and the planet is groaning under the strain of humans who have no real connection to themselves, each other or the natural sytems.  The nature of ‘greed’ is to follow selfish interests not respond to expanded best interest that includes resources (natural bounty).  This disconnect renders many of the capitalist/communist (whatever) business interests blind to the dangerous situation they have set up.  Some may smile and decide to fly to the moon or mars, but ultimately karma follows as the real problem was never solved at its inception. The real insecurity, fear and greed fuelling imbalance. When this is investigated inequality disappears, natural imbalances recalibrate and we begin to see ourselves in each other. This is the shift in consciousness I refer to in my video.  I felt the video permeate this blog as I feel inspired to integrate it into an example given by the article.

So a few questions for society to consider:

  • Is it in the national interest for political or influential figures to join with foreign multinational companies and share their knowledge, resources and networks?
  • Given the US trade war any persons or entities involved in Huawei becomes a ‘threat’ as US penetration in Australia evokes its influence in networks, government, policy, security and regulatory environments.  Is this in the Australian public interest?

Thus the wicked webs we weave that continues on a trajectory spiralling to the bottom until we awaken.  Only the truth sets us free.

https://www.smh.com.au/business/companies/brumby-quits-huawei-board-days-after-us-criminal-charges-outlined-20190201-p50v10.html

Brumby quits Huawei board days after US criminal charges outlined

Former Victorian premier John Brumby has resigned from the board of Huawei’s Australian operations in a damaging blow to the Chinese technology giant just days after the US government outlined a criminal case against it.

Mr Brumby’s decision to quit comes two days after The Age and the Sydney Morning Herald revealed that Meng Wanzhou, the Huawei executive at the centre of the alleged global criminal conspiracy, established and oversaw the company’s activities in Australia between 2005 and 2011.

Former Victorian premier John Brumby.
Former Victorian premier John Brumby.CREDIT:PAUL JEFFERS

The former Labor politician’s future at Huawei Technologies (Australia) has been under a cloud since June, after he announced he was reviewing all his directorships upon assuming the role of Chancellor of Melbourne’s La Trobe University.

This week’s release of an indictment against Huawei and key executives by the US Justice Department has increased interest in Mr Brumby’s position on the company’s board.

RELATED ARTICLE

Mr Brumby said on Friday that the timing of his resignation, which will be effective from next month, was unrelated to the scandal enveloping the company.

He said he had informed the board a year ago of his intention to resign and was proud of the firm’s local growth.

‘‘We have had some challenging times … Huawei Australia has continued to go from strength to strength.’’

Ms Wanzhou is alleged by the US to have been a key player in a conspiracy to defraud international banks and US officials about the company’s Iran operations. The criminal case against Huawei also involves allegations it stole trade secrets from rival T-Mobile.

Though there is no suggestion that Ms Wanzhou was engaged in any criminal activity in Australia, the US Department of Justice case against her and the company includes the period of time she was overseeing Huawei’s corporate governance and strategy in Australia.

The December arrest of Ms Wanzhou in Canada at the request of the US government triggered a strong response from Beijing, with two Canadian citizens and Chinese-born Australian writer Yang Hengjun detained in China.

Mr Brumby will become Chancellor of La Trobe University in March.
Mr Brumby will become Chancellor of La Trobe University in March.

Ms Wanzhou is the daughter of Huawei founder Ren Zhengfei, a former engineer in the Chinese military.

Mr Brumby joined the Huawei board in Australia in 2011 shortly before the departure of Ms Wanzhou. Former foreign minister Alexander Downer and former Navy rear-admiral John Lord were also appointed to the Huawei board in an effort by the company to build political and defence credibility.

The high-profile Australian trio have been outspoken in defending Huawei against criticism from Australia and the US, whose respective intelligence agencies fear the company could be vulnerable to pressure from the Chinese Communist Party to spy on or sabotage data and phone networks.

Mr Brumby, Mr Lord and, until his 2014 appointment as Australia’s high commissioner to the UK, Mr Downer, have all previously pointed out that there has been no hard evidence produced anywhere to show Huawei was involved in espionage activities on behalf of the Chinese government.

The company has made a priority of ensuring its Australian directors have been looked after well at home and abroad. It is understood some Australian-based directors have been paid as much as $250,000 a year, though Huawei has declined to confirm this.

Despite its high-powered Australian board, Huawei has been prevented by successive Australian governments from participating in the NBN rollout and the 5G mobile network, with security agencies warning against the involvement of the Chinese firm.

Australia’s hard line position on Huawei has emboldened other western allies to restrict the Chinese company’s involvement in sensitive infrastructure.

Advertisement

In a statement released in the wake of the US charges, Huawei said it was disappointed to learn of the charges and believed the US courts would find no evidence Ms Meng or the company breached US laws.

Epstein Financial Backer of Israeli IT Start-up Carbyne, is this Intelligence?

This article is in the public interest.  I am very concerned about the potential and future targeting of dissents, non violent activists or those opposing in anyway a Orwellian future.

I will trust life and my heart.  What happens in the future happens. For this moment I am calling forth a world where whistle blowers and truth arises in the public interest so they can awaken and change the future. As I see it so it will be.

Disillusionment is a step on the pathway home to a renewable earth where we learn to live in harmony.  The break down of ethics and the allowance of corruption at the highest levels is what is breaking down the public’s belief in government. However, we do not want an Orwellian future where a totalitarian dictatorship steps into the void.  We must reclaim democracy, I feel people will.

I often speak in my blogs about ‘what you put out comes back’, it is a universal law.  What you think about you bring about, whether it be positive or negative.  We create our reality.  If you spend your life engaged in corruption eventually it catches up, fate unfolds and destiny is realised. It is beyond us at times, as life has its own interesting way of bringing forth truth. I observe when I discover stories how they just come to me.

The link between Microsoft and Israeli intelligence doesn’t surprise me.  I note with the Smart Meter and NBN that Microsoft updated on my computer without wireless.  I used to always stop updates as I don’t know what they are downloading.  Today I don’t trust it at all.  If I could stop it I would.  When I go into  Event Viewer I can see the activity that has gone on.  I don’t consent to it, but it does it anyway.  No respect, the public are just a commodity to exploit. The public pay for the NBN and then the multinationals and as we are going to learn in this article, intelligence agencies, access our information.  It is picked up through telecommunications, routed through intelligence agencies profited by business with no regard to privacy of the public.  It means you can’t write anything private, you can’t speak on the phone and probably it will mean we will get out of all technology no matter the cost.  I personally think it is used for targeting. I’ve had the experience of a beam hit my computer on the right hand side of myself when at a university.  I felt it was directed via a satellite.  I’ve had surveillance cameras by police turn on as I passed, I’ve had US intelligence on my website, my blog, my emails which is response to their fear and their labelling of anyone that claims democracy (which I have) as a threat.  This is untrue, it is life happening and it is meant to be.  I see the world in a different way today.  There are no mistakes, therefore what can I control, when I never was in control. That is the secret here.  Yet others will play out their fears, their part believing they are controlling the spectrum, they are not. We live in a abundant universe and we are a tiny aspect believing we are at the centre.  On a higher level that inner spark is the centre but in our day to day life we are inconsequential in the greater scheme of life itself.  Yet we are part of life, we are created by life and we return to it. So what is to fear.  The truth comes up. Why is that concerning.  Fear of vulnerability is the mask behind threats, aggression and anger yet even that is an illusion.  Only the ego fears vulnerability, if we see ourselves as beyond our body, when we leave this life, the dynamic changes.  So life is unfolding, you are at choice how you choose to see and the actions you take.  Everyone is responsible and natural or universal law cannot be undone, it is a dynamic regardless of totalitarianism, bullying, wars and profit making.  Always life brings back to you what you are here to learn, all ways.

This is a notable quote from below:

As will be noted later in this report, Israel’s Prime Minister Benjamin Netanyahu — to whom all of Israel’s intelligence agencies answer by virtue of his position — has stated on more than one occasion that the acquisition of Israeli intelligence-linked start-ups by foreign tech giants, especially in Silicon Valley, is a current and “deliberate policy” of the state of Israel…”

This is in the public interest.

Confirmed by VT: The CIA, Mossad and “Epstein Network” are Exploiting Mass Shootings

Confirmed by VT: The CIA, Mossad and “Epstein Network” are Exploiting Mass Shootings

By Whitney Webb at MintPress

Introduction:

VT, among others, has investigated the rash of shootings, not just in the US but France, Italy and elsewhere.  Outside the US we have cooperation from counter-terrorist organizations (governmental) because of our standing.  In the US, we remain pariahs because of our unwillingness to blame others.

Our general position is this:  We believe that 9/11 was an operation intended to overthrow the Gore administration, one cheated out of a presidency, and install a fake military dictatorship under the control of the RKM/KN crime ring run out of Israel and Russia, one that encompasses the full gambit of fake groups, Bilderberg, the “hunting clubs,” evangelical zionism, most of DC “stink tanks…”

From here, an all encompassing mob controlled bureaucracy would be created, the DHS, which would engineer, aided by the media, a divided population, pushed into accepting “benevolent dictatorship,” giving up all rights, all privacy but armed to the teeth…until that last moment when the hammer falls and the roundups begin.  Whitney Webb outlines how technology will bring about that day.  We have official briefing material telling us it is coming and confirming everything written here:

Following the arrest and subsequent death in prison of alleged child sex trafficker Jeffrey Epstein, a little-known Israeli tech company began to receive increased publicity, but for all the wrong reasons. Not long after Epstein’s arrest, and his relationships and finances came under scrutiny, it was revealed that the Israeli company Carbyne911 had received substantial funding from Jeffrey Epstein as well as Epstein’s close associate and former Prime Minister of Israel Ehud Barak, and Silicon Valley venture capitalist and prominent Trump backer Peter Thiel.

Carbyne911, or simply Carbyne, develops call-handling and identification capabilities for emergency response services in countries around the world, including the United States, where it has already been implemented in several U.S. counties and has partnered with major U.S. tech companies like Google. It specifically markets its product as a way of mitigating mass shootings in the United States without having to change existing U.S. gun laws.

Yet, Carbyne is no ordinary tech company, as it is deeply connected to the elite Israeli military intelligence division, Unit 8200, whose “alumni” often go on to create tech companies — Carbyne among them — that frequently maintain their ties to Israeli intelligence and, according to Israeli media reports and former employees, often “blur the line” between their service to Israel’s defense/intelligence apparatus and their commercial activity. As this report will reveal, Carbyne is but one of several Israeli tech companies marketing themselves as a technological solution to mass shootings that has direct ties to Israeli intelligence agencies.

In each case, these companies’ products are built in such a way that they can easily be used to illegally surveil the governments, institutions and civilians that use them, a troubling fact given Unit 8200’s documented prowess in surveillance as a means of obtaining blackmail and Israel’s history of using tech companies to aggressively spy on the U.S. government. This is further compounded by the fact that Unit 8200-linked tech companies have previously received U.S. government contracts to place “backdoors” into the U.S.’ entire telecommunications system as well as into the popular products of major American tech companies including Google, Microsoft and Facebook, many of whose key managers and executives are now former Unit 8200 officers.

Israeli Prime Minister Benjamin Netanyahu has made it no secret that placing Unit 8200 members in top positions in multinational tech companies is a “deliberate policy” meant to ensure Israel’s role as the dominant global “cyber power”, while also combating non-violent boycott movements targeting Israel’s violations of international law and stifling the United Nations’ criticisms of Israeli government policy and military operations abroad.

As Jeffrey Epstein’s links to intelligence in both the United States and Israel — the subject of a recent four-part series exclusive to MintPress — began to be revealed in full, his financing of Carbyne came under scrutiny, particularly for the company’s deep ties to Israeli intelligence as well as to certain Americans with known connections to U.S. intelligence. Ehud Barak’s own role as both financier and chairman of Carbyne has also added to that concern, given his long history of involvement in covert intelligence operations for Israel and his long-standing ties to Israeli military intelligence.

Another funder of Carbyne, Peter Thiel, has his own company that, like Carbyne, is set to profit from the Trump administration’s proposed hi-tech solutions to mass shootings. Indeed, after the recent shooting in El Paso, Texas, President Trump — who received political donations from and has been advised by Thiel following his election — asked tech companies to “detect mass shooters before they strike,” a service already perfected by Thiel’s company Palantir, which has developed “pre-crime software” already in use throughout the country. Palantir is also a contractor for the U.S. intelligence community and also has a branch based in Israel.

Perhaps most disturbing of all, whatever technological solution is adopted by the Trump administration, it is set to use a controversial database first developed as part of a secretive U.S. government program that involved notorious Iran-Contra figures like Oliver North as a means of tracking and flagging potential American dissidents for increased surveillance and detention in the event of a vaguely defined “national emergency.”

As this report will reveal, this database — often referred to as “Main Core” — was created with the involvement of Israeli intelligence and Israel remained involved years after it was developed, and potentially to the present. It was also used by at least one former CIA official on President Reagan’s National Security Council to blackmail members of Congress, Congressional staffers and journalists, among others.

Given recent reports on the Trump administration’s plan to create a new government agency to use “advanced technology” to identify “neurobehavioral signs” of “someone headed toward a violent explosive act” using data collected by consumer electronic devices, the picture painted by the technology currently being promoted and implemented under the guise of “keeping Americans safe” is deeply Orwellian.

In fact, it points directly to the genesis of a far-reaching surveillance state far more extensive than anything yet seen in American history and it is being jointly developed by individuals connected to both American and Israeli intelligence.

Demystifying Carbyne

Carbyne911, which will be referred to simply as Carbyne in this report, is an Israeli tech-startup that promises to revolutionize how calls are handled by emergency service providers, as well as by governments, corporations and educational institutions.

Not long after it was founded in 2014 by veterans of Israeli military intelligence, Carbyne began to be specifically marketed as a solution to mass shootings in the United States that goes “beyond the gun debate” and improves the “intelligence that armed emergency responders receive before entering an armed shooter situation” by providing video-streaming and acoustic input from civilian smartphones and other devices connected to the Carbyne network.

Prior to Jeffrey Epstein’s arrest in July, Carbyne had been receiving high praise from U.S. and Israeli media, with Fox News hailing the company’s services as the answer to the U.S.’ “aging 911 systems” and the Jerusalem Post writing that the company’s platform offers “hi-tech protection to social workers and school principals.” Other reports claimed that Carbyne’s services result in “a 65% reduction in time-to-dispatch.”

Carbyne’s call-handling/crisis management platform has already been implemented in several U.S. counties and the company has offices not only in the U.S. but also in Mexico, Ukraine and Israel. Carbyne’s expansion to more emergency service provider networks in the U.S. is likely, given that federal legislation seeks to offer grants to upgrade 911 call centers throughout the country with the very technology of which Carbyne is the leading provider.

One of the main lobby groups promoting this legislation, the National Emergency Number Association (NENA), has a “strong relationship” with Carbyne, according to Carbyne’s website. In addition, Carbyne has also begun marketing its platform for non-emergency calls to governments, educational institutions and corporations.

Yet, what seemed like the inevitability of Carbyne’s widespread adoption in the U.S. hit a snag following the recent arrest and subsequent death of sex trafficker and pedophile Jeffrey Epstein, who exploited underage girls for the purpose of obtaining “blackmail” on the rich and powerful, an operation that had clear ties to intelligence.

Epstein, after his first arrest and light sentence for soliciting sex from a minor in 2007, was tapped by former Israeli Prime Minister and former head of Israeli military intelligence Ehud Barak, to become a key financial backer of Carbyne.

As a result of increased scrutiny of Epstein’s business activities and his ties to Israel, particularly to Barak, Epstein’s connection to Carbyne was revealed and extensively reported on by the independent media outlet Narativ, whose exposé on Carbyne revealed not only some of the key intelligence connections of the start-up company but also how the architecture of Carbyne’s product itself raises “serious privacy concerns.”

MintPress detailed many of Carbyne’s main intelligence connections in Part III of the investigative series “Inside the Jeffrey Epstein Scandal: Too Big to Fail.” In addition to Barak — former Israeli prime minister and former head of Israeli military intelligence — serving as Carbyne’s chairman and a key financer, the company’s executive team are all former members of Israeli intelligence, including the elite military intelligence unit, Unit 8200, which is often compared to the U.S. National Security Agency (NSA).

Carbyne’s current CEO, Amir Elichai, served in Unit 8200 and tapped former Unit 8200 commander and current board member of AIPAC Pinchas Buchris to serve as the company’s director and on its board. In addition to Elichai, another Carbyne co-founder, Lital Leshem, also served in Unit 8200 and later worked for Israeli private spy company Black Cube. The only Carbyne co-founder that didn’t serve in Unit 8200 is Alex Dizengof, who previously worked for Israel’s Prime Minister’s office.

As MintPress noted in a past report detailing Israeli military intelligence’s deep ties to American tech giant Microsoft, Unit 8200 is an elite unit of the Israeli Intelligence corps that is part of the IDF’s Directorate of Military Intelligence and is involved mainly in signal intelligence (i.e., surveillance), cyberwarfare and code decryption.

It is frequently described as the Israeli equivalent of the NSA and Peter Roberts, senior research fellow at Britain’s Royal United Services Institute, characterized the unit in an interview with the Financial Times as “probably the foremost technical intelligence agency in the world and stand[ing] on a par with the NSA in everything except scale.”

Notably, the NSA and Unit 8200 have collaborated on numerous projects, most infamously on the Stuxnet virus as well as the Duqu malware. In addition, the NSA is known to work with veterans of Unit 8200 in the private sector, such as when the NSA hired two Israeli companies, to create backdoors into all the major U.S. telecommunications systems and major tech companies, including Facebook, Microsoft and Google.

Both of those companies, Verint and Narus, have top executives with ties to Israeli intelligence and one of those companies, Verint (formerly Comverse Infosys), has a history of aggressively spying on U.S. government facilities. Unit 8200 is also known for spying on civilians in the occupied Palestinian territories for “coercion purposes” — i.e., gathering info for blackmail — and also for spying on Palestinian-Americans via an intelligence-sharing agreement with the NSA.

Unlike many other Unit 8200-linked start-ups, Carbyne also boasts several tie-ins to the Trump administration, including Palantir founder and Trump ally Peter Thiel — another investor in Carbyne.

In addition, Carbyne’s board of advisers includes former Palantir employee Trae Stephens, who was a member of the Trump transition team, as well as former Secretary of Homeland Security Michael Chertoff. Trump donor and New York real-estate developer Eliot Tawill is also on Carbyne’s board, alongside Ehud Barak and Pinchas Buchris.

Yet, privacy concerns with Carbyne go beyond the company’s ties to Israeli intelligence and U.S. intelligence contractors like Peter Thiel. For instance, Carbyne’s smartphone app extracts the following information from the phones on which it is installed:

Device location, video live-streamed from the smartphone to the call center, text messages in a two-way chat window, any data from a user’s phone if they have the Carbyne app and ESInet, and any information that comes over a data link, which Carbyne opens in case the caller’s voice link drops out.” (emphasis added)

According to Carbyne’s website, this same information can also be obtained from any smartphone, even if it does not have Carbyne’s app installed, if that phone calls a 911 call center that uses Carbyne or merely any other number connected to Carbyne’s network.

Carbyne data collection

Carbyne gathers data points from users’ phones as well as a myriad of other web-connected devices.

Carbyne is a Next-Generation 9-11 (NG911) platform and the explicit goal of NG911 is for all 911 systems nationwide to become interconnected. Thus, even if Carbyne is not used by all 911 call centers using an NG911 platform, Carbyne will ostensibly have access to the data used by all emergency service providers and devices connected to those networks. This guiding principle of NG911 also makes it likely that one platform will be favored at the federal level to foster such interconnectivity and, given that it has already been adopted by several counties and has ties to the Trump administration, Carbyne is the logical choice.

Another cause for concern is how other countries have used platforms like Carbyne, which were first marketed as emergency response tools, for the purpose of mass surveillance. Narativ noted the following in its investigation of Carbyne:

In May, Human Rights Watch revealed Chinese authorities use a platform not unlike Carbyne to illegally surveil Uyghurs. China’s Integrated Joint Operations Platform brings in a much bigger data-set and sources of video, which includes an app on people’s phones. Like Carbyne, the platform was designed to report emergencies. Chinese authorities have turned it into a tool of mass surveillance.

Human Rights Watch reverse-engineered the app. The group discovered the app automatically profiles a user under 36 “person types” including “followers of Six Lines” which is the term used to identify Uyghurs. Another term refers to “Hajj,” the annual Islamic pilgrimage to Mecca. The app monitors every aspect of a user’s life, including personal conversations [and] power usage, and tracks a user’s movement.”

Such technology is currently used by Israeli military intelligence and Israel’s domestic intelligence agency Shin Bet to justify “pre-crime” detentions of Palestinians in the occupied West Bank. As will be noted in greater detail later in this report, Palestinians’ comments on social media are tracked by artificial intelligence algorithms that flag them for indefinite detention if they write social media posts that contain “tripwire” phrases such as “the sword of Allah.”

Carbyne’s platform has its own “pre-crime” elements, such as it’s c-Records component, which stores and analyzes information on past calls and events that pass through its network. This information “enables decision makers to accurately analyze the past and present behavior of their callers, react accordingly, and in time predict future patterns.” (emphasis added)

Concerns have recently been raised that “pre-crime” technology may soon become more widely adopted in the U.S., after President Trump stated that one of his planned solutions to mass shootings in the wake of the recent tragedy in El Paso was for big tech companies to detect potential shooters before they strike.

Israeli intelligence, Blackmail and Silicon Valley

Though many of the individuals involved in funding or managing Carbyne have proven ties to intelligence, a closer look into several of these players reveals even deeper connections to both Israeli and U.S. intelligence.

One of Carbyne’s clearest connections to Israeli intelligence is through its chairman and one of its funders, Ehud Barak. Though Barak is best known for being a former prime minister of Israel, he is also a former minister of defense and the former head of Israeli military intelligence. He oversaw Unit 8200’s operations, as well as other units of Israeli military intelligence, in all three of those positions. For most of his military and later political career, Barak has been closely associated with covert operations.

Prior to the public scrutiny of Barak’s relationship to Jeffrey Epstein, following the latter’s arrest this past July and subsequent death, Barak had come under fire for his ties to disgraced film mogul Harvey Weinstein. Indeed, it was Ehud Barak who put Weinstein in contact with the Israeli private intelligence outfit Black Cube, which employs former Mossad agents and Israeli military intelligence operatives, as Weinstein sought to intimidate the women who had accused him of sexual assault and sexual harassment. Former Mossad director Meir Dagan led Black Cube’s board until his death in 2016 and Carbyne co-founder Lital Leshem is Black Cube’s former director of marketing.

After Barak put him in contact with Black Cube’s leadership, Weinstein, according to The New Yorker, used the private spy firm to “‘target,’ or collect information on, dozens of individuals, and compile psychological profiles that sometimes focused on their personal or sexual histories.” In addition, The New Yorker noted that “Weinstein monitored the progress of the investigations personally” and “also enlisted former employees from his film enterprises to join in the effort, collecting names and placing calls that, according to some sources who received them, felt intimidating.”

Yet, more recently, it has been Barak’s close relationship to Epstein that has raised eyebrows and opened him up to political attacks from his rivals. Epstein and Barak were first introduced by former Israeli Prime Minister Shimon Peres in 2002, a time when Epstein’s pedophile blackmail and sex trafficking operation was in full swing.

Barak was a frequent visitor to Epstein’s residences in New York, so often that The Daily Beast reported that numerous residents of an apartment building linked to Epstein “had seen Barak in the building multiple times over the last few years, and nearly half a dozen more described running into his security detail,” adding that “the building is majority-owned by Epstein’s younger brother, Mark, and has been tied to the financier’s alleged New York trafficking ring.” Specifically, several apartments in the building were “being used to house underage girls from South America, Europe and the former Soviet Union,” according to a former bookkeeper employed by one of Epstein’s main procurers of underage girls, Jean Luc Brunel.

Barak is also known to have spent the night at one of Epstein’s residences at least once, was photographed leaving Epstein’s residence as recently as 2016, and has admitted to visiting Epstein’s island, which has sported nicknames including “Pedo Island,” “Lolita Island” and “Orgy Island.” In 2004, Barak received $2.5 million from Leslie Wexner’s Wexner Foundation, where Epstein was a trustee as well as one of the foundation’s top donors, officially for unspecified “consulting services” and “research” on the foundation’s behalf.

In 2015, Barak formed a limited partnership company in Israel for the explicit purpose of investing in Carbyne (then known as Reporty) and invested millions of dollars in the company, quickly becoming a major shareholder and subsequently the company’s public face and the chairman of its board. At least $1 million of the money invested in this Barak-created company that was later used to invest in Carbyne came from the Southern Trust Company, which was owned by Jeffrey Epstein.

In July, Bloomberg reported that Epstein’s Southern Trust Company is identified in U.S. Virgin Islands filings as “a DNA database and data mining” company. Given Carbyne’s clear potential for data-mining and civilian profiling, Epstein’s investment in Carbyne using this specific company suggests that Carbyne’s investors have long been aware of this little advertised aspect of Carbyne’s product.

In a statement to the Israeli newspaper Haaretz, Barak asserted:

I SAW THE BUSINESS OPPORTUNITY AND REGISTERED A PARTNERSHIP IN MY CONTROL IN ISRAEL. A SMALL NUMBER OF PEOPLE I KNOW INVEST IN IT…SINCE THESE ARE PRIVATE INVESTMENTS, IT WOULDN’T BE PROPER OR RIGHT FOR ME TO EXPOSE THE INVESTORS’ DETAILS.”

However, Barak later admitted that Epstein had been one of the investors.

MintPress’ recent series on the Jeffrey Epstein scandal noted in detail Epstein’s ties to CIA/Mossad intelligence assets, such as Adnan Khashoggi; CIA front companies, such as Southern Air Transport; and organized crime, through his close association with Leslie Wexner. In addition, Epstein’s long-time “girlfriend” and alleged madam, Ghislaine Maxwell, has family links to Israeli intelligence through her father, Robert Maxwell. While it appears that Epstein may have been working for more than one intelligence agency, Zev Shalev, former executive producer for CBS News and journalist at Narativrecently stated that he had independently confirmed with two unconnected sources “closely connected to the Epstein story and in a position to know” that Epstein had “worked for Israeli military intelligence.”

Zev Shalev@ZevShalev

EXCLUSIVE: WE HAVE TWO INDEPENDENT SOURCES CONFIRMING JEFFREY EPSTEIN WORKED FOR ISRAELI MILITARY INTELLIGENCE. IN EACH CASE THE SOURCE IS CLOSELY CONNECTED TO THE EPSTEIN STORY AND IN A POSITION TO KNOW. YOU CAN TAKE IT TO THE BANK. @NARATIVLIVEHTTP://NARATIV.ORG/2019/07/27/BUILDING-BIG-BROTHER/ 

Jeffrey Epstein: Building Big Brother

EXCLUSIVE: JEFFREY EPSTEIN’S INVESTMENT IN AN ISRAELI START-UP REVEALS A MYRIAD OF LINKS TO DONALD TRUMP AND ISRAELI SPIES.

NARATIV.ORG

Notably, Epstein, who was known for his interest in obtaining blackmail through the sexual abuse of the underaged girls he exploited, also claimed to have “damaging information” on prominent figures in Silicon Valley.

In a conversation last year with New York Times reporter James Stewart, Epstein claimed to have “potentially damaging or embarrassing” information on Silicon Valley’s elite and told Stewart that these top figures in the American tech industry “were hedonistic and regular users of recreational drugs.” Epstein also told Stewart that he had “witnessed prominent tech figures taking drugs and arranging for sex” and claimed to know “details about their supposed sexual proclivities.”

In the lead-up to his recent arrest, Jeffrey Epstein appeared to have been attempting to rebrand as a “tech investor,” as he had done interviews with several journalists including Stewart about technology investing in the months before he was hit with federal sex trafficking charges.

Jessica Lessin, editor-in-chief of The Informationtold Business Insider that a journalist working for The Information had interviewed Epstein a month before his recent arrest because “he was believed to be an investor in venture capital funds.” However, Lessin claimed that the interview was not “newsworthy” and said the site had no plans to publish its contents. Business Insider claimed that the way the interviews with Epstein had been arranged “suggests that someone in Silicon Valley may have been trying to help Epstein connect with reporters.”

Though it is unknown exactly which Silicon Valley figures were most connected to Epstein and which tech executives were potentially being blackmailed by Epstein, it is known that Epstein associated with several prominent tech executives, including Google co-founder Sergey Brin, Facebook co-founder Mark Zuckerberg, Tesla CEO Elon Musk, Microsoft co-founder Bill Gates, and LinkedIn co-founder Reid Hoffman.

Last year, Epstein claimed to be advising Tesla and Elon Musk, who had been previously photographed with Epstein’s alleged madam Ghislaine Maxwell. A few years ago, Epstein also attended a dinner hosted by LinkedIn’s Reid Hoffman, where Musk had allegedly introduced Epstein to Mark Zuckerberg. Google’s Sergey Brin is known to have attended a dinner hosted by Epstein at his New York residence where Donald Trump was also in attendance.

Elon Musk with Epstein’s alleged madam Ghislaine Maxwell at an Oscars after-party on March 2, 2014. Kevin Mazur | VF14

These associations suggest that the person in Silicon Valley who was trying to boost Epstein’s image as a tech investor before his arrest may have been Peter Thiel, whose Founders Fund had also invested in Carbyne. Thiel was an early investor in Facebook and is still on its board, connecting him to Zuckerberg; he is also a funder of Elon Musk’s SpaceX and a former colleague of Musk’s through PayPal. In addition, Thiel has ties to Reid Hoffman and both Thiel and Hoffman are prominent backers of Facebook.

It is unknown whether Epstein’s “damaging information” and apparent blackmail on notable individuals in the American technology industry were used to advance the objectives of Carbyne, which recently partnered with tech giants Google and Cisco Systems — and, more broadly, the expansion of Israeli intelligence-linked tech companies into the American tech sector, particularly through the acquisition of Israeli tech start-ups linked to Unit 8200 by major U.S. tech companies.

The latter seems increasingly likely given that the father of Ghislaine Maxwell — one of Epstein’s chief co-conspirators in his intelligence-linked sexual blackmail operation involving minors — was a Mossad operative who helped sell software that had been bugged by Israeli intelligence to government agencies and sensitive facilities around the world, including in the United States.

As will be noted later in this report, Israel’s Prime Minister Benjamin Netanyahu — to whom all of Israel’s intelligence agencies answer by virtue of his position — has stated on more than one occasion that the acquisition of Israeli intelligence-linked start-ups by foreign tech giants, especially in Silicon Valley, is a current and “deliberate policy” of the state of Israel.

Carbyne’s ties to U.S. intelligence

While Epstein and Barak are the two financiers of Carbyne whose ties to intelligence are clearest, another funder of Carbyne, Peter Thiel, has ties to U.S. intelligence and a history of investing in other companies founded by former members of Unit 8200. Thiel co-founded and still owns a controlling stake in the company Palantir, which was initially funded with a $2 million investment from the CIA’s venture capital fund In-Q-Tel and quickly thereafter became a contractor for the CIA.

After the success of its contract with the CIA, Palantir became a contractor for a variety of federal agencies, including the FBI, the Defense Intelligence Agency (DIA), the National Security Agency (NSA), the Department of Homeland Security(DHS) and the military’s Special Operations Command, among others.

Last year, it won a contract to create a new battlefield intelligence system for the U.S. Army. Palantir is also in demand for its “pre-crime technology,” which has been used by several U.S. police departments. According to the Guardian, “Palantir tracks everyone from potential terrorist suspects to corporate fraudsters, child traffickers and what they refer to as ‘subversives’… it is all done using prediction.”

Thiel has gained attention in recent years for his support of President Trump and for becoming an adviser to Trump following the 2016 election, when he was “a major force in the transition,” according to Politico, and “helped fill positions in the Trump administration with former staff.”

One of those former staffers was Trae Stephens, who is also on Carbyne’s board of advisers. Thiel also has business ties to Trump’s son-in-law and influential adviser, Jared Kushner, as well as to Kushner’s brother Josh. A senior Trump campaign aide told Politico in 2017 that “Thiel is immensely powerful within the administration through his connection to Jared.”

Thiel has also backed some prominent Israeli tech start-ups connected to Unit 8200, such as BillGuard, which Thiel funded along with former Google CEO Eric Schmidt and other investors. BillGuard was founded by Raphael Ouzan, a former officer in Unit 8200, who serves on the board of directors of Start-Up Nation Central (SUNC) alongside neoconservative American hedge fund manager Paul Singer, neoconservative political operative and adviser Dan Senor, and Terry Kassel, who works for Singer at his hedge fund, Elliott Management.

Peter Thiel Netanyahu

Peter Thiel greets Netanyahu during a 2017 meeting in Israel. Photo | Israel PM

SUNC is an organization founded by Paul Singer, who has donated heavily to both President Trump and Israeli Prime Minister Netanyahu. Since it was founded in 2012, SUNC has sought to integrate Unit 8200-connected Israeli tech start-ups into foreign companies, primarily American companies, and has helped oversee the shift of thousands of high-paying tech jobs from the U.S. to Israel.

Another Carbyne-connected individual worth noting is the former head of the Department of Homeland Security, Michael Chertoff, who serves on Carbyne’s board of advisers. In addition to Chertoff’s ties to DHS, Chertoff’s company, The Chertoff Group, employees several prominent former members of the U.S. intelligence community as principals, including Michael Hayden, former director of the CIA and former director of the NSA; and Charles Allen, former assistant director of Central Intelligence for Collection at the CIA, who worked at the agency for over 40 years.

The Chertoff Group has a long-standing and lucrative contract with the company OSI Systems, which produces full-body scanners and markets itself as a solution to mass shootings and crisis events, not unlike Carbyne. While Chertoff’s company was advising OSI Systems, Chertoff went on a media blitz to promote the widespread use of the machines produced by OSI Systems and even called on Congress to “fund a large-scale deployment of next-generation systems.” Chertoff did not disclose his conflict of interest while publicly promoting OSI’s full-body scanners.

Some have also alleged that Chertoff’s mother, Livia Eisen, had links to Israeli intelligence. According to her 1998 obituary, cited by both researcher/author Christopher Bollyn and journalist Jonathan Cook, Eisen participated in the Mossad operation code-named “Magic Carpet” while working for Israel’s El Al Airlines. Both Bollyn and Cook have suggested that Eisen’s participation in this covert Israeli intelligence operation strongly indicates that she had ties to the Mossad.

Melding into Silicon Valley

Beyond its troubling connections to Silicon Valley oligarchs, Israeli military intelligence and the U.S.-military industrial complex, Carbyne’s recent partnerships with two specific technology companies — Google and Cisco Systems — raise even more red flags.

Carbyne announced its partnership with Cisco Systems this past April, with the latter announcing that it would begin “aligning its unified call manager with Carbyne’s call-handling platform, allowing emergency call centers to collect data from both 911 callers and nearby government-owned IoT [Internet of Things] devices.” A report on the partnership published by Government Technology magazine stated that “Carbyne’s platform will be integrated into Cisco Kinetic for Cities, an IoT data platform that shares data across community infrastructure, smart city solutions, applications and connected devices.” The report also noted that “Carbyne will also be the only 911 solution in the Cisco Marketplace.”

As part of the partnership, Carbyne’s President of North American Operations Paul Tatro told Government Technology that the Carbyne platform would combine the data it obtains from smartphones and other Carbyne-connected devices with “what’s available through nearby Cisco-connected road cameras, roadside sensors, smart streetlamps, smart parking meters or other devices.”

Tatro further asserted that “Carbyne can also analyze data that’s being collected by Cisco IoT devices … and alert 911 automatically, without any person making a phone call, if there appears to be a worthy problem,” and expressed his view that soon most emergency calls will not be made by human beings but “by smart cars, telematics or other smart city devices.”

A few months after partnering with Cisco Systems, Carbyne announced its partnership with Google on July 10, just three days after Carbyne funder Jeffrey Epstein was arrested in New York on federal sex trafficking charges. Carbyne’s press release of the partnership described how the company and Google would be teaming up in Mexico “to offer advanced mobile location to emergency communications centers (ECCs) throughout Mexico” following the conclusion of a successful four-week pilot program between Carbyne and Google in the Central American nation.

Netanyahu Eric Schmidt

Google Executive Chairman Eric Schmidt meets Netanyahu at his Jerusalem office. Israel PM | YouTube

The press release also stated:

CARBYNE WILL PROVIDE GOOGLE’S ANDROID ELS (EMERGENCY LOCATION SERVICE) IN REAL TIME FROM EMERGENCY CALLS MADE ON ANDROIDTM DEVICES. DEPLOYMENT FOR ANY ECC IN THE COUNTRY WON’T REQUIRE ANY INTEGRATION, WITH CARBYNE PROVIDING NUMEROUS OPTIONS FOR CONNECTION TO THEIR SECURE ELS GATEWAY ONCE AN ECC IS APPROVED. THE CARBYNE AUTOMATED PLATFORM, REQUIRING NO HUMAN INTERACTION, HAS THE POTENTIAL TO SAVE THOUSANDS OF LIVES EACH YEAR THROUGHOUT MEXICO.”

The reason Carybne’s partnerships with Cisco Systems and Google are significant lies in the role that Cisco and former Google CEO Eric Schmidt have played in the creation of a controversial “incubator” for Israeli tech start-ups with deep ties to Israeli military intelligence, American neoconservative donor Paul Singer, and the U.S.’ National Security Agency (NSA).

This company, called Team8, is an Israeli company-creation platform whose CEO and co-founder is Nadav Zafrir, former commander of Unit 8200. Two of the company’s other three co-founders are also “alumni” of Unit 8200. Among Team8’s top investors is Schmidt, the former CEO of Google, who also joined Peter Thiel in funding the Unit 8200-linked BillGuard, as well as major tech companies including Cisco Systems and Microsoft.

Last year, Team8 controversially hired the former head of the NSA and U.S. Cyber Command, Retired Admiral Mike Rogers, and Zafrir stated that his interest in hiring Rogers was that Rogers would be “instrumental in helping strategize” Team8’s expansion in the United States. Jake Williams, a veteran of NSA’s Tailored Access Operations (TAO) hacking unit, told CyberScoop:

ROGERS IS NOT BEING BROUGHT INTO THIS ROLE BECAUSE OF HIS TECHNICAL EXPERIENCE. …IT’S PURELY BECAUSE OF HIS KNOWLEDGE OF CLASSIFIED OPERATIONS AND HIS ABILITY TO INFLUENCE MANY IN THE U.S. GOVERNMENT AND PRIVATE-SECTOR CONTRACTORS.”

Team8 has also been heavily promoted by Start-Up Nation Central (SUNC). SUNC prominently features Team8 and Zafrir on the cybersecurity section of its website and also sponsored a talk by Zafrir and an Israeli government economist at the World Economic Forum, often referred to as “Davos,” that was attended personally by Paul Singer.

SUNC itself has deep ties to Israeli military intelligence, with former Unit 8200 officer Raphael Ouzan serving on its board of directors. Another example of SUNC-Unit 8200 ties can be seen with Inbal Arieli, who served as SUNC’s Vice President of Strategic Partnerships from 2014 to 2017 and continues to serve as a senior adviser to the organization. Arieli, a former lieutenant in Unit 8200, is the founder and head of the 8200 Entrepreneurship and Innovation Support Program (EISP), which was the first start-up accelerator in Israel aimed at harnessing “the vast network and entrepreneurial DNA of [Unit] 8200 alumni” and is currently one of the top company accelerators in Israel, alongside Team8. Arieli was the top executive at 8200 EISP while working at SUNC and several other top SUNC staffers are also connected to Israeli military intelligence.

Thus, Google and Cisco’s connections to Team8 suggests that their partnerships with another Israeli military intelligence-connected firm like Carbyne is a deepening of those two companies’ links to the growing bi-national security state that is uniting key players in the U.S. military-industrial complex and Israeli intelligence.

Mossad-backed Panic Buttons, coming to a school near you

Carbyne is hardly the only Israeli intelligence-linked tech company marketing itself in the United States as a solution to mass shootings. Another Israeli start-up, known as Gabriel, was founded in 2016 in response to a shooting in Tel Aviv and the Pulse Nightclub shooting in the United States, which took place just days apart.

Created by Israeli-American Yoni Sherizen and Israeli citizen Asaf Adler, Gabriel is similar to Carbyne in the sense that elements of its crisis response platform require installation on civilian smartphones as well as devices used by crisis responders. The main difference is that Gabriel also installs one or a series of physical “panic buttons,” depending on the size of the building to be secured, that also double as video and audio communication devices connected to the Gabriel network.

As with Carbyne, the ties between Gabriel and Israeli intelligence are obvious. Indeed, Gabriel’s four-person advisory board includes Ram Ben-Barak, former deputy director of the Mossad and former director-general of Israel’s intelligence ministry; Yohanan Danino, former chief of police for the state of Israel; and Kobi Mor, former director of overseas missions for the Israeli intelligence agency Shin Bet. The only American on the advisory board is Ryan Petty, the father of a Parkland shooting victim and friend of former Florida Governor Rick Scott.

Gabriel’s only disclosed funder is U.S.-based MassChallenge, a start-up accelerator non-profit. Gabriel is funded by MassChallenge’s Israel branch, which was opened six months prior to Gabriel’s creation and is partnered with the Israeli government and the Kraft Group. The Kraft Group is managed by Robert Kraft, who is currently embroiled in a prostitution scandal and is also a close friend of President Trump.

Notably, one of MassChallenge Israel’s featured experts is Wendy Singer, the executive director of SUNC, the organization created and funded by neoconservative Trump backer Paul Singer with the explicit purpose of promoting Israel’s tech start-ups and their integration into foreign, chiefly American, businesses. As was noted in a recent MintPress report on SUNC, Wendy Singer is the sister of neoconservative political operative Dan Senor, who founded the now-defunct Foreign Policy Initiative with Robert Kagan and Bill Kristol, and was previously the director of AIPAC’s Israel office for 16 years.

Gabriel’s founders have been quite upfront about the fact that the uptick in shootings in the U.S. has greatly aided their company’s growth and success. Last November, Sherizen told The Jerusalem Post that new mass shootings in the U.S. not only increased U.S. demand for his company’s product but also were opportunities to show the effectiveness of Gabriel’s approach:

UNFORTUNATELY EVERY MONTH THERE SEEMS TO BE ANOTHER HIGH-PROFILE EVENT OF THIS NATURE. AFTER THE VEGAS SHOOTING, WE WERE ABLE TO SHOW [THAT] OUR SYSTEM WOULD HAVE MANAGED TO IDENTIFY THE LOCATION OF THE SHOOTER MUCH QUICKER.”

The Jerusalem Post noted that Gabriel is set to make considerable profits if concern over mass shootings continues to build in the U.S., writing:

WITH MORE THAN 475,000 SOFT TARGETS ACROSS THE US AND AMID INCREASING SECURITY FEARS, THE POTENTIAL MARKET FOR GABRIEL IS HUGE. THE COMPANY COULD GAIN REVENUES OF ALMOST $1 BILLION IF ONLY 10% OF SOFT TARGETS WERE TO INVEST AROUND $20,000 IN ITS ALERT SYSTEMS.”

Sherizen told the Jerusalem Post:

OUR STARTER KIT COSTS $10,000. DEPENDING ON THE SIZE AND MAKEUP OF THE COMMUNITY BUILDING, IT WOULD COST BETWEEN $20-30,000 TO FULLY OUTFIT THE LOCATION. WE HAVE MADE IT VERY AFFORDABLE. THIS IS A GAME-CHANGER FOR THE LOCK-DOWN AND ACTIVE SHOOTER DRILLS THAT ARE NOW A STANDARD PART OF ANY CHILD’S UPBRINGING IN THE STATES.”

Much more than just a start-up

While it is certainly possible that numerous former officials and commanders of elite Israeli intelligence agencies may have no ulterior motive in advising or founding technology start-up companies, it is worth pointing out that top figures in Israel’s military intelligence agencies and the Mossad don’t see it that way.

Last March, Israeli media outlet Calcalist Tech published a report entitled “Israel Blurs the Line Between Defense Apparatus and Local Cybersecurity Hub,” which noted that “since 2012, cyber-related and intelligence projects that were previously carried out in-house in the Israeli military and Israel’s main intelligence arms are transferred to companies that in some cases were built for this exact purpose.” (emphasis added)

The article notes that beginning in 2012, Israel’s intelligence and military intelligence agencies began to outsource “activities that were previously managed in-house, with a focus on software and cyber technologies.” (emphasis added)

It continues:

IN SOME CASES, MANAGERS OF DEVELOPMENT PROJECTS IN THE ISRAELI MILITARY AND INTELLIGENCE ARMS WERE ENCOURAGED TO FORM THEIR OWN COMPANIES, WHICH THEN TOOK OVER THE PROJECT,’ AN ISRAELI VENTURE CAPITALIST FAMILIAR WITH THE MATTER TOLD CALCALIST TECH.”

Notably, Calcalist Tech states that the controversial company Black Cube was created this way and that Black Cube had been contracted, and is likely still contracted, by Israel’s Ministry of Defense. The private security agency Black Cube is known to have two separate divisions for corporations and governments. The firm was recently caught attempting to undermine the Iran nuclear deal — then also a top political objective of Israeli Prime Minister Benjamin Netanyahu — by attempting to obtain information on the “financial or sexual impropriety” (i.e., blackmail) of top U.S. officials involved in drafting the accord. NBC News noted last year that “Black Cube’s political work frequently intersects with Israel’s foreign policy priorities.” As previously mentioned, one of Carbyne’s co-founders — Lital Leshem, also a veteran of Unit 8200 — worked for Black Cube prior to starting Carbyne.

Black Cube | Israel Hackers

The entrance to Black Cube’s offices on the 26th floor of a Tel Aviv high rise, Feb. 8, 2019. Raphael Satter | AP

One of the main companies profiled in the Calcalist Tech report appeared to be a front for Israeli intelligence, as its registered owner was found not to exist: even high-level employees at the company had never heard of him; his registered addresses were for nonexistent locations in Israel’s capital of Tel Aviv; and the three people with that name in Tel Aviv denied any association with the business.

This company — which Calcalist Tech was unable to name after the Israeli military censor determined that doing so could negatively impact Israeli “national security” — was deliberately created to service the Israeli military and Israeli intelligence. It is also “focused on cyber technologies with expertise in research and development of advanced products and applications suitable for defense and commercial entities.” (emphases added) In addition, the company’s management consists largely of “veterans of Israeli military technology units.”

Notably, a former employee of this company told Calcalist Tech that “crossing the lines between military service and employment at the commercial outfit was ‘commonplace’ while he was working at the company.”

It’s not exactly clear why Israel’s military intelligence and other intelligence agencies decided to begin outsourcing its operations in 2012, though Calcalist Tech suggests the reasoning was related to the difference in wages between the private sector and the public sector, with pay being much higher in the former. However, it is notable that 2012 was also the year that Paul Singer — together with Netanyahu’s long-time economic adviser and former chair of the Israeli National Economic Council, Eugene Kandel — decided to create Start-Up Nation Central.

As MintPress noted earlier this year, SUNC was founded as part of a deliberate Israeli government effort to counter the nonviolent Boycott, Divest and Sanctions (BDS) movement and to make Israel the dominant global “cyber power.” This policy is aimed at increasing Israel’s diplomatic power and specifically undermining BDS as well as the United Nations, which has repeatedly condemned Israel’s government for war crimes and violations of international law in relation to the Palestinians.

Last year, Netanyahu was asked by Fox News host Mark Levin whether the large growth seen in recent years in Israel’s technology sector, specifically tech start-ups, was part of Netanyahu’s plan. Netanyahu responded, “That’s very much my plan … It’s a very deliberate policy.” He later added that “Israel had technology because the military, especially military intelligence, produced a lot of capabilities. These incredibly gifted young men and women who come out of the military or the Mossad, they want to start their start-ups.”

Netanyahu again outlined this policy at the 2019 Cybertech Conference in Tel Aviv, where he stated that Israel’s emergence as one of the top five “cyber powers” had “required allowing this combination of military intelligence, academia and industry to converge in one place” and that this further required allowing “our graduates of our military and intelligence units to merge into companies with local partners and foreign partners.”

The direct tie-ins of SUNC to Israel’s government and the successful effort led by SUNC and other companies and organizations to place former military intelligence and intelligence operatives in strategic positions in major multinational technology companies reveal that this “deliberate policy” has had a major and undeniable impact on the global tech industry, especially in Silicon Valley.

Mossad gets its own In-Q-Tel

This “deliberate policy” of Netanyahu’s also recently resulted in the creation of a Mossad-run venture capital fund that is specifically focused on financing Israeli tech start-ups. The venture capital fund, called Libertad, was first announced by Israel’s Prime Minister’s Office and was created with the explicit purpose of “increasing the Israeli intelligence agency’s knowledge base and fostering collaboration with Israel’s vibrant startup scene” It was modeled after the CIA’s venture capital fund In-Q-Tel, which invested in several Silicon Valley companies turned government and intelligence contractors — including Google and Palantir — with a similar goal in mind.

Libertad declines to reveal the recipients of its funding, but announced last December that it had chosen five companies in the fields of robotics, energy, encryption, web intelligence, and natural language processing and text analysis. In regard to its interest in web intelligence, a Mossad employee told the Jerusalem Post that the intelligence agency was specifically interested in “innovative technologies for [the] automatic identification of personality characteristics – personality profiling – based on online behavior and activity, using methods based on statistics, machine learning, and other areas.” (emphasis added)

According to Libertad’s website, in return for its investment, now set at NIS 2 million (~$580,000) per year per company, “the Mossad will receive access to the IP [initial product] developed during R&D [Research and Development] while under contract, and a non-commercial, non-exclusive license to use it. Libertad’s contract with the company will not provide it with any additional rights.” In an interview with Calcalist Tech, Mossad Director Yossi Cohen told the paper that the Mossad’s partnership with civilian companies in Israel is “excellent” and that the agency will continue to strengthen those ties.

Israeli intelligence has a documented history in placing “backdoors” into technology products for the purpose of surveillance, with one well-known case being Israel’s repurposing of the PROMIS software, discussed in Part III of MintPress’ series on Jeffrey Epstein. Furthermore, given that U.S. intelligence, specifically the NSA, had “backdoors” placed into the products of major Silicon Valley companies (a service performed by Israeli intelligence-linked tech companies no less), Mossad may very well plan on doing the same with the technology products of companies it backs through Libertad.

Tim Shorrock, investigative journalist and author of Spies For Hire: The Secret World of Intelligence Outsourcing, told MintPress that the Mossad’s continuation of such practices through Libertad was definitely plausible, especially given what Shorrock described as the “unusual” choice of Libertad choosing not to release the identities of the companies in which it invests.

“The Mossad is trying to hide what they are investing in,” Shorrock stated, adding that Libertad’s secrecy “raises a lot of questions” particularly given that it was modeled after the CIA’s In-Q-Tel. Shorrock noted that In-Q-Tel and other venture capital funds with ties to U.S. intelligence or the U.S. military rarely, if ever, hide the identities of the companies they finance.

However, Libertad is merely the latest and most public expression of the Mossad’s interest in Israeli tech start-ups, the lion’s share of which are created by veterans of Unit 8200 or other Israeli intelligence agencies. Indeed, former Mossad Director Tamir Pardo stated in 2017 that “everyone” in the Israeli cybertechnology sector is an “alumni” of either Israeli intelligence, like the Mossad, or Israeli military intelligence, like Unit 8200. Pardo even went as far as to say that the Mossad itself is “like a start-up.”

Pardo himself, after leaving his post as Mossad director in 2016, dove straight into the world of Israeli tech start-ups, becoming chairman of Sepio Systems, whose two CEOs are former Unit 8200 officers. Sepio Systems’ advisory board includes the former chief information security officer of the CIA, Robert Bigman; former member of the U.S. Military’s Joint Special Operations Command (JSOC), Geoff Hancock; and former head of the Israel National Cyber Bureau and veteran of Israeli military intelligence, Rami Efrati. Sepio Systems’ cybersecurity software has been adopted by several banks, telecom and insurance companies, including in the U.S. and Brazil.

Pardo is not the only prominent figure in Israel’s intelligence community to compare Israeli intelligence agencies to tech start-ups. Shin Bet Director Nadav Argaman described Israel’s domestic spy agency in similar terms. “The Shin Bet is like an evolving start-up, with unmatched strength,” Argaman stated in a June 2017 speech, as he extolled the agency’s use of “pre-crime” technology to detain Palestinians based on their social media activity.

Argaman, at the time, claimed that more than 2,000 Palestinians, whom he described as “potential lone-wolf terrorists,” had been arrested as a result of these “breakthrough technological advances” that use artificial-intelligence algorithms to monitor the social media accounts of Palestinians, especially younger Palestinians, for the use of “tripwire” phrases that have been used by Palestinians who later committed acts of violence. In the case of those who use such terms, “their phones are tracked to see if they meet other suspects, or leave their districts to move towards potential Israeli targets. In such cases, security forces detain the suspect,” according to a 2017 report on the practice by The Economist.

The road to fascism, paved by a corrupted PROMIS

Though Israeli intelligence’s interest in tech companies goes back several years, there is a well-documented history of Israeli intelligence using bugged software to surveil and gain “backdoor” access to government databases around the world, particularly in the United States.

As was mentioned in Part III of MintPress’ Epstein series, a sinister yet cunning plan was executed to place a backdoor for Israeli intelligence into the Prosecutor’s Management Information System (PROMIS) software, which was then being used by the U.S. Department of Justice and was the envy of government agencies, particularly intelligence agencies, around the world. This bugged version of PROMIS — born out of the collusion between Earl Brian, Ronald Reagan’s then-envoy to Iran, and Rafi Eitan, then-director of the now-defunct Israeli intelligence agency Lekem — was seeded around the world by Brian’s company Hadron as well as by Mossad-linked media mogul Robert Maxwell, father of Jeffrey Epstein’s long-time girlfriend and alleged madam, Ghislaine Maxwell.

After this first PROMIS “backdoor” was discovered, Israel would again gain access to sensitive U.S. government communications, as well as civilian communications, thanks to the collusion between Israeli intelligence and Israeli telecom and tech companies, especially Amdocs and Comverse Infosys (now Verint), that were operating throughout the United States. Today, Unit 8200-linked start-ups appear to have taken up the torch.

While the PROMIS software is perhaps best known for offering Israeli intelligence a backdoor into as many as 80 intelligence agencies and other sensitive locations around the world for nearly a decade, it was also used for a very different purpose by prominent officials linked to Iran-Contra.

One key Iran-Contra figure — Lt. Col. Oliver North, then serving on the National Security Council — decided to use PROMIS neither for espionage nor for foreign policy. Instead, North turned PROMIS’ power against Americans, particularly perceived dissidents, a fact that remained unknown for years.

Beginning in 1982, as part of the highly classified Continuity of Government (COG) program, North used the PROMIS software at a 6,100-square-foot “command center” in the Department of Justice, as well as at a smaller operations room at the White House, to compile a list of American dissidents and “potential troublemakers” if the COG protocol was ever invoked.

According to a senior government official with a high-ranking security clearance and service in five presidential administrations who spoke to Radar in 2008, this was:

A DATABASE OF AMERICANS, WHO, OFTEN FOR THE SLIGHTEST AND MOST TRIVIAL REASON, ARE CONSIDERED UNFRIENDLY, AND WHO, IN A TIME OF PANIC MIGHT BE INCARCERATED. THE DATABASE CAN IDENTIFY AND LOCATE PERCEIVED ‘ENEMIES OF THE STATE’ ALMOST INSTANTANEOUSLY.”

In 1993, Wired described North’s use of PROMIS in compiling this database as follows:

USING PROMIS, SOURCES POINT OUT, NORTH COULD HAVE DRAWN UP LISTS OF ANYONE EVER ARRESTED FOR A POLITICAL PROTEST, FOR EXAMPLE, OR ANYONE WHO HAD EVER REFUSED TO PAY THEIR TAXES. COMPARED TO PROMIS, RICHARD NIXON’S ENEMIES LIST OR SEN. JOE MCCARTHY’S BLACKLIST LOOK DOWNRIGHT CRUDE.”

The COG program defined this “time of panic” as “a national crisis, such as nuclear war, violent and widespread internal dissent, or national opposition to a US military invasion abroad,” whereby the government would suspend the Constitution, declare martial law, and incarcerate perceived dissidents and other “unfriendlies” in order to prevent the government’s (or then-serving administration’s) overthrow.

This secretive database has often been referred to as “Main Core” by government insiders and, most troubling of all, it still exists today. Journalist Christ Ketcham, citing senior government officials, reported in 2008 that, at that time, Main Core was believed to contain the names of as many as 8 million Americans. Eleven years later, it is highly likely that the number of Americans included in the Main Core database has grown considerably.

Author and investigative journalist Tim Shorrock also covered other disturbing aspects of the evolution of Main Core back in 2008 for Salon. At the time, Shorrock reported that the George W. Bush administration was believed to have used Main Core to guide its domestic surveillance activities following the September 11 attacks.

Citing “several former U.S. government officials with extensive knowledge of intelligence operations,” Shorrock further noted that Main Core — as it was 11 years ago at the time his report was published — was said to contain “a vast amount of personal data on Americans, including NSA intercepts of bank and credit card transactions and the results of surveillance efforts by the FBI, the CIA and other agencies.”

Bill Hamilton, former NSA intelligence officer and the original creator of the PROMIS software, told Shorrock at the time that he believed that “U.S. intelligence uses PROMIS as the primary software for searching the Main Core database” and had been told as much by an intelligence official in 1992 and an NSA official in 1995. Dan Murphy, former deputy director at the CIA, had told Hamilton that the NSA’s use of PROMIS was “so seriously wrong that money alone cannot cure the problem.” “I believe in retrospect that Murphy was alluding to Main Core,” Hamilton had told Shorrock.

Though most reporting on Main Core, from the time its existence was first revealed to the present, has treated the database as something used by the U.S. government and U.S. intelligence for domestic purposes, MintPress has learned that Israeli intelligence was also involved with the creation of the Main Core database. According to a former U.S. intelligence official with direct knowledge of the U.S. intelligence community’s use of PROMIS and Main Core from the 1980s to 2000s, Israeli intelligence played a role in the U.S. government’s deployment of PROMIS as the software used for the Main Core domestic surveillance database system.

Israeli intelligence remained involved with Main Core at the time of the August 1991 death of journalist Danny Casolaro, who was investigating not only the government’s misuse of the stolen PROMIS software but also the Main Core database. This same official, who chose to remain anonymous, told MintPress that, shortly before his death, Casolaro had obtained copies of computer printouts from the PROMIS-based Main Core domestic surveillance database system from NSA whistleblower Alan Standorf, who was found murdered a few months before Casolaro’s lifeless body would be found in a West Virginia hotel room.

The source also stated that Main Core’s contents had been used for the political blackmail of members of Congress and their staff, journalists, and others by Walter Raymond, a senior CIA covert operator in psyops and disinformation who served on President Reagan’s National Security Council during and after Main Core’s creation. If used for this purpose by Raymond in the 1980s, Main Core has also likely been used by other individuals with access to the database for blackmailing purposes in the years since.

Given that Israeli intelligence was known to have placed a backdoor into the PROMIS software, before it was marketed and sold around the world by Earl Brian and Robert Maxwell, its role in the U.S. government’s decision to use PROMIS in the creation of Main Core suggests that Israeli intelligence likely advocated for the version of PROMIS containing this backdoor, thereby giving Israeli intelligence access to Main Core. Given that Reagan aides and officials colluded with Israeli “spymaster” Rafi Eitan in his efforts to create a backdoor into the software for Israeli military intelligence, the use of this version of PROMIS in the Main Core database is certainly plausible.

Furthermore, the fact that Israeli intelligence was known to be involved in Main Core nearly a decade after its creation suggests that Israeli intelligence may have played a role in certain aspects of the database, such as the criteria used to flag Americans as “unfriendly,” and — like Walter Raymond — may have used information in the database to blackmail Americans. In addition, the fact that the cooperation between U.S. and Israeli intelligence, particularly between Unit 8200 and the NSA, has only grown since 1991 further suggests that Israeli involvement in Main Core continues to the present.

While Main Core’s very existence is troubling for many reasons, the alleged involvement of a foreign intelligence service in the creation, expansion and maintenance of a database with personal details and potentially damaging information on millions of Americans targeted for detention or increased surveillance in times of crisis is chilling. It is especially so considering that the Trump administration’s latest proposals to prevent mass shootings before they occur are likely to use Main Core to flag certain Americans for increased surveillance or potentially detention, as was done by the George W. Bush administration following the September 11 attacks.

It appears that Main Core serves a dual purpose; first as a mass targeted surveillance system to crush dissent during times of “national crisis” — whether spontaneous or engineered — and, second, as a massive blackmail database used to keep every potential opponent in line during non-emergencies.

Peter Thiel’s Seeing Stone

As was mentioned earlier in this report, Palantir — the company co-founded by Peter Thiel — is set to profit handsomely from the Trump administration’s plans to use its “pre-crime” technology, which is already used by police departments throughout the country and also used to track Americans based on the company’s integrative data-mining approach. Palantir, named for the “seeing stones” in the Lord of the Rings novels, also markets software to foreign (and domestic) intelligence agencies that predicts the likelihood that an individual will commit an act of terrorism or violence.

Aside from its “pre-crime” products, Palantir has come under fire in recent years as a result of the company’s contracts with Immigration and Customs Enforcement (ICE), where it created an intelligence system known as Investigative Case Management (ICM). The IB Times described ICM as “a vast ‘ecosystem’ of data to help immigration officials in identifying targets and creating cases against them” and also “provides ICE agents with access to databases managed by other federal agencies.” ICM further gives ICE access to “targets’ personal and sensitive information, such as background on schooling, employment, family relationships, phone records, immigration history, biometrics data, criminal records as well as home and work addresses.” In other words, Palantir’s ICM is essentially a “Main Core” for immigrants.

Notably, part of Oliver North’s original intentions in “Main Core” was to track immigrants then coming from Central America as well as Americans who opposed Reagan era policy with respect to Central America. At that time, Main Core was believed to be controlled by the Federal Emergency Management Administration (FEMA), which is now part of the Department of Homeland Security (DHS).

VICE News reported in July that the Northern California Regional Intelligence Center, which is run by DHS, “serves around 300 communities in northern California and is what is known as a ‘fusion center,’ a Department of Homeland Security intelligence center that aggregates and investigates information from state, local, and federal agencies, as well as some private entities, into large databases that can be searched using software like Palantir. “ VICE further noted that this center alone used Palantir to surveil as many as 8 million Ameicans. There are many more such DHS “fusion centers” throughout the United States.

If the Trump administration moves forward with its proposal of employing technology to detect potential mass shooters before they strike, Palantir’s technology is set to be used, given that it has already been used by U.S. law enforcement and U.S. intelligence to determine which people run “the highest risk of being involved in gun violence,” according to an investigation of Palantir by The Verge. Furthermore, Palantir’s close ties to the Trump administration make the company’s role in a future nationwide “pre-crime” prevention system based on technology appear inevitable.

Peter Thiel founder of CIA-funded Palantir, listens as Donald Trump speaks during a meeting with tech leaders at Trump Tower in New York, Dec. 14, 2016. (AP/Evan Vucci)

Palantir founder Peter Thiel listens to Trump during a meeting at Trump Tower in New York, Dec. 14, 2016. Evan Vucci | AP

Worse still is the apparent overlap between Palantir and Main Core. Palantir — which has obvious similarities to PROMIS — is already known to use its software to track potential terror threats, including domestic terror threats, and a category of people it refers to as “subversives.” Palantir’s tracking of these individuals “is all done using prediction.” Palantir’s close ties to the U.S. intelligence community suggest that Palantir may already have access to the Main Core database. Tim Shorrock told MintPress that Palantir’s use of Main Core is “certainly possible,” particularly in light of the company’s use of the term “subversive” to describe a category of people that its software tracks.

Palantir also has alleged ties to Israeli intelligence, as there have long been suspicions that Israeli intelligence has used Palantir as part of its AI “pre-crime” algorithms targeting Palestinians after Palantir opened a research and development (R&D) center in Israel in 2013. The current head of Palantir Israel, Hamultal Meridor, previously founded a brain-machine interface organization and was senior director of web intelligence at Verint (formerly Comverse Infosys), which has deep connections to Unit 8200, a history of espionage in the United States and was one of the two companies contracted by the NSA to insert a “backdoor” into the U.S. telecommunications system and popular products of major American tech companies.

Given the above, Peter Thiel’s 2018 decision to fund Carbyne, the Unit 8200-linked start-up that markets itself as a technological solution to mass shootings in the U.S., strongly suggests that Thiel has been anticipating for some time the now-public efforts of the Trump administration to employ “pre-crime” technology to track and target Americans who show signs of “mental illness” and “violent tendencies.”

A nightmare even Orwell could not have predicted

In early August, in the wake of the shooting at an El Paso Walmart, President Trump called on big tech companies to collaborate with the Justice Department in the creation of software that “stops mass murders before they start” by detecting potential mass shooters before they cnm act. Though Trump’s ideas were short on specifics, there is now a new proposal that would create a new government agency that will use data gathered from civilian electronic devices to identify “neurobehavioral” warning signs, thereby flagging “potential shooters” for increased surveillance and potentially detention.

This new agency, as proposed by the foundation led by former NBC Universal president and vice chairman of General Electric Robert Wright, would be known as the Health Advanced Research Projects Agency (HARPA) and would be modeled after the Defense Advanced Research Projects Agency (DARPA). Per the proposal, recently detailed by the Washington Post, the flagship program of HARPA would be “Safe Home” (Stopping Aberrant Fatal Events by Helping Overcome Mental Extremes), which would use “breakthrough technologies with high specificity and sensitivity for early diagnosis of neuropsychiatric violence,” specifically “advanced analytical tools based on artificial intelligence and machine learning.”

The program would cost an estimated $60 million over four years and would use data from “Apple Watches, Fitbits, Amazon Echo and Google Home” and other consumer electronic devices, as well as information provided by health-care providers to identify who may be a threat.

The Washington Post reported that President Trump has reacted “very positively” to the proposal and that he was “sold on the concept.” The Post also noted that Wright sees the president’s daughter, Ivanka, as “the most effective champion of the proposal and has previously briefed her on HARPA himself.” Ivanka has previously been cited as a driving force behind some of her father’s policy decisions, including his decision to bomb Syria after an alleged chemical weapons attack in 2017.

Liz Fed — president of the Susan Wright Foundation, which is led by Robert Wright and created the proposal for HARPA and “Safe Home” — told The Post that the proposal emulated DARPA because “DARPA is a brilliant model that works. They have developed the most transformational capabilities in the world for national security…We’re not leveraging the tools and technologies available to us to improve and save lives.” Fed further asserted that DARPA’s technological approach had yet to be applied to the field of healthcare.

For anyone familiar with DARPA, such claims should immediately sound loud alarm bells, especially since DARPA is already developing its own solution to “mental health” issues in the form of a “brain-machine interface” as part of its N3 program. That program, according to reports, involves “noninvasive and ‘minutely’ invasive neural interfaces to both read and write into the brain,” help distance soldiers “from the emotional guilt of warfare” by “clouding their perception” and “to program artificial memories of fear, desire, and experiences directly into the brain.”

Though N3 is intended to improve the prowess of American soldiers, it is also set to be used as a means of pursuing DARPA’s Systems-Based Neurotechnology for Emerging Therapies (SUBNETS) project, which aims to “to develop a tiny, implanted chip in the skull to treat psychiatric disorders such as anxiety, PTSD and major depression.”

Given that HARPA’s lead scientific adviser is Dr. Geoffrey Ling, former director and founder of DARPA’s Biological Technologies Office (BTO), which “merges biology, engineering, and computer science to harness the power of natural systems for national security,” it seems likely that DARPA’s neurological-focused research programs, like SUBNETS and N3, would be folded into HARPA’s portfolio, making the proposed agency’s approach to mental health very questionable indeed.

Aside from the dystopian nature of both DARPA and potentially HARPA’s approach to mental health, there is grave cause for concern regarding the Trump administration’s moves to address U.S. mass shooting events by implementing pre-crime technology based on artificial intelligence, data-mining and mass surveillance, technologies already laying in wait thanks to companies like Palantir and numerous Israeli tech start-ups led by former Unit 8200 officers.

With companies like Carbyne — with its ties to both the Trump administration and to Israeli intelligence — and the Mossad-linked Gabriel also marketing themselves as “technological” solutions to mass shootings while also doubling as covert tools for mass data collection and extraction, the end result is a massive surveillance system so complete and so dystopian that even George Orwell himself could not have predicted it.

Following another catastrophic mass shooting or crisis event, aggressive efforts will likely follow to foist these “solutions” on a frightened American public by the very network connected, not only to Jeffrey Epstein, but to a litany of crimes and a frightening history of plans to crush internal dissent and would-be dissenters in the United States.

Feature photo | Graphic by Claudio Cabrera

Whitney Webb is a MintPress News journalist based in Chile. She has contributed to several independent media outlets including Global Research, EcoWatch, the Ron Paul Institute and 21st Century Wire, among others. She has made several radio and television appearances and is the 2019 winner of the Serena Shim Award for Uncompromised Integrity in Journalism.

Republish our stories! MintPress News is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 International License.
EDITORIAL DISCLOSURE
All content herein is owned by author exclusively.  Expressed opinions are NOT necessarily the views of VT, authors, affiliates, advertisers, sponsors, partners, technicians or Veterans Today Network (VT).  Some content may be satirical in nature.
All images within are full responsibility of author and NOT VT.
About VT – Read Full Policy Notice – Comment Policy

15 COMMENTS

  1. Creepy and worrying. I came across Mint Press and Whitney Webb’s first Epstein article on the Epstein saga in July and took in the following three. Positively educational!!
    I am not ‘New Age’ by any manner of means but I understand that there is a concept that for evil to succeed it has to advertise it’s wares ahead of time. So, H.G. wells, Aldous Huxley, George Orwell, Star Wars, and in focus the film Minority Report appears apt.

  2. embedded in the narrative are two assertions, both of which are dubious, particularly in an article with obvious good intelligence behind it.
    1) Epstein is dead. If he is, i don’t believe the prison was the scene of the event. I don’t think he’s dead yet.
    2) The direction of the flow of money was from Epstein to the quasi-military corporations. No, that’s the wrong way round.
    So, disinfo.

    • This theory of Epstein being alive was being mass shilled by very questionable persons and sites without any evidence. I don’t know the truth but the origin of the rumors is very suspicious. The “visible” portion of the funding came from Epstein’s non-profits but heavy black research projects were financed by tax money mostly from the military and criminal activities.

  3. The late distinguished physicist from Far Rockaway, NY Richard Feynman used to try to help students in other fields too. He was working with a graduate student in psychology who told him of some confusing aspects of an experiment. His recommendation was to repeat the full experiment no matter how long or difficult it might be. The student discussed this with the professor of psychology supervising the project. He ridiculed Feynman’s good advice. While even the science of physics has made great achievements, especially compared to backward subjects like psychology and their ignorant professors above, still it is very difficult if not impossible to predict future events where humans are concerned. This is called a many body problem. If Netanyahu
    read more …

  4. The Las Vegas mind bending shoot up to end all shoot ups, hasn’t been mentioned lately And for good reason. Whomever wrote that script had to be on LSD. Whatever it was planned to do, was thrown out the window. The actors were so bad, that after the fiasco ended, they should have been rounded up and executed for real. While God like shooter Paddock was blasting away, the street below him, had full traffic flow. The bump stocks must have made his shooting so accurate, that the folks in the street, were never in danger. I would like to see this mass shooting get an award, for the best commedy mass shooting with science proof action events.

    • If you’re suggesting the Las Vegas shooting was a fake and no-one was shot, then you’re absolutely wrong, many people were shot and killed, just not by the claimed patsy.

    • I know people who were there and there was nothing false about the dead and wounded. The only thing that was faked was Paddock’s sniper position which was way out of the effective range of an AR.

      Besides ARs can’t handle full auto even with a bump stock. So someone or more likely someones were using M 16s. Reports I’ve heard and read place the shooters in the crowd and firing from a helicopter.

  5. Yeah, Gall. If Israeli companies – or their affiliates, offer a solution to the danger of mass shootings it can only guarantee one thing – more mass shootings. They require mayhem to fight chaos. As the boy from Skunk Run in Possum Hollow says, “It gets worser and worser.” It has come to a stage now that you cannot go out for an evening constitutional without having to look over your shoulder. Nothing good will come out of it for the United States. Of that we can be sure. Israel, our overlord and mistress runs the show from behind the stage curtain. Only Israel gains. Only Israel grins … the grin of a jackal.

    • Gotta love the Israelis con though. Create Terrorism using a False Flag Attack i.e. WTC, OKC Bombing which got us the Anti-Terrorism and Death Penalty Act but that still didn’t support the Terrorist state enough so they hit us with 9/11 which also involved cyber-warfare thanks to their theft and exploitation of Promis which they used to create “security breaches” that now they offer to fix.

      Just another version of Jewish Lightning.

  6. Look at the surveillance apparatus being built into our transportation systems. Transportation is a Constitution free zone run by DHS DOT and all the rest of the alphabets. All thanks to the Patriot Act which was written prior to 911. “Let me see your papers!”

    • Yes, a lot of the research was destined to mind control and surveillance, if you search for it in a uncensored search engine you will find this kind of technology exists and can drive a person insane using gaslighting or pretending to be a religious experience.