April 2, 2023

Those Truly Born Again Shouldn’t Fear “Good Will Hunting”

Yesterday, I shared with readers about how the Above Ground Serpent Race is already waging its war against the “Good Will” of men as they create data bases of everything everyone does for the purpose of being able to use that information against them…ultimately in death. Only evil would spy on people and record their every movement, thought, and action/reaction and then use it against them.

If you’ve been born again, i.e. converted (turned quite around) and you have confessed your guilt of sin to the Almighty EL, you have nothing to fear. A fleshly death is your victory. 1 Corinthians 15:55-57: “O death, where is thy sting? O grave, where is thy victory?

The sting of death is sin; and the strength of sin is the law.

But thanks be to God, which giveth us the victory through our Lord Jesus Christ.”

Losing the fear of dying can only be overcome through the power of God’s Holy Spirit. His wisdom and knowledge bestowed upon those who ask, gives us the peace to know death has no sting, but only victory.

What is more, Heavenly Father does not compile a database against us once we have become reborn. He truly forgives us of our confessed sins and they are forgotten.

Satan and his Serpent Race choose only to compile all they can about you to use against you. I have heard many say, “I don’t care if they do this. I have nothing to hide.” You might feel differently about that once you understand the ultimate purpose of their sinister acts.

There is nothing we can do to stop the evil that spies on us. But, there is something we can do to gain the ultimate victory. The Scriptures tell us that the ONLY way that we can see the Kingdom of God is that we must be born again.

It’s a free gift. You don’t have to earn it. All you need do is accept it. Once that is done, you can and will want to, turn your back on this world, now being run completely by the Serpent Race, and on Satan. Greater then becomes He that is in you than is in the world.

Your choice. Eternal life or eternal damnation.

Share

DHS Making List, Checking Twice. Are You One It? Do You Even Care?

While millions of insane Americans can’t get through one day without obsessing about whether or not it is a crime for the President or Congress for that matter, to “mislead” the Media or the Public the fascist bastards in Washington, including Donald Trump and HIS Department of Homeland Security (DHS), have decided that they “need,” in order “to protect and enhance the resilience of the nation’s physical and cyberinfrastructure,” to compile a list of “journalists, editors, correspondents, social media influencers, bloggers etc.” and to “monitor” it 24/7.

And there are only crickets to be heard!

As there were crickets in 2013 when Congress, in the National Defense Authorization Act repealed the prohibition on the president and Congress to intentionally lie and mislead anyone they so chose including the American people. And now some want death to Trump because he “misleads” the Media and the Public. If they only knew!

Necessary and Proper!

Not only does the administration, including Congress, of this private corporation, the United States, mislead, propagandize, and outright lie to the American servitude, but their henchmen, those lying bastard lawyers and advisors who know the laws and they know what Government can and can’t do, intentionally lie to all of us telling us something different…and we believe it because we know no better.

Recall, the Patriot Act was a “necessary” thing in order to enhance our national security. BULLSHIT! But millions of misled, lied-to, blinded, ignorant “CONservatives” took the bait, hook, line, and sinker, and did the bidding for the fascist government.

Here we are today, at a time when blinded, propagandized, ignorant millions of American’s who think Donald Trump is just the cat’s meow, along with his eager and cryptic chiseling away of what is left of any such thing as a Second Amendment right, now aims to completely violate our basic right to privacy under the false guise of the need to enhance and protect something wordsmiths have coined as “public and cyberinfrastructure.”

I’ll take a dozen, thank you.

For years I have heard comments from people whenever I mention that this fascist government and their enablers like Google, Facebook, Twitter, etc. has been and continues to archive and monitor everything we do, including Online and with our cell phones, GPS, in-car computers, appliances, electronics, laptops, tablets, “eye” pads, say, “I got nothing to hide.”

Is that reason enough to be complacent which in turns causes you to be an enabler? Do you love your servitude? Do you hate having rights and freedom? Evidently, but let’s impeach Trump because he’s a lying bastard…YEAH! Let’s enact some more of those “reasonable” restrictions on our basic, inalienable rights because it’s necessary. YEAH!

You may think you have nothing to hide, but that is completely your perspective. The Government’s perspective is always different…and you trust your Government? I don’t…in case you haven’t been paying attention.

Tyler Durden at ZeroHedge says this fact is “extremely creepy.” It is much more than that. Whether you THINK you have nothing to hide or not, this is a violation of one of life’s most basic rights. How much farther are we willing to allow this tyrannical government to destroy us? Evidently a lot further.

Hang on.

And while you continue to obsess on all the lies we are being told of what Trump has done that he promised and whether or not he should be impeached because he “misleads,”

DON’T GO LOOK!!

It’s just too difficult a thing to do to find the truth. Show me the money!

Share

Maine Police Nazi Eavesdrop on Citizens Within Social Media

People, the most of whom refuse to even think that THEIR governments would violate the trust and “listen in” on social media communication, will probably never get it, nor will they probably care.

Computer software, designed to “listen” for key words, such as “fight,” “gun” (wink, wink) etc. provide a red flag in which law enforcement, against the written word of the Bill of Rights, spy on you to see what you are up to….but that’s not an intrusion? Oh, yeah! That’s right! You are one of those who bought the lie, hook, line and sinker, that the Patriot Act was also a good and necessary thing.

And what? It should come as a surprise that local and state police in the Pine Tree State are spying on the people? The Federal Government has been doing it for some time now and evidently we like it a lot because we don’t do anything about it. We are told this computer software being used to intrude on citizens was funded by the CIA. GET A CLUE?

A spokesman for the city of South Portland said how their police uses the computer software isn’t prying into personal matters. Oh really? He follows this up by stating the obvious lie: “Most of the hits we get are someone going hunting and talking about their shotgun, so we get some nice pictures of a freshly killed deer.”

Evidently “someone going hunting and talking about their shotgun” being spied on by Police Nazis isn’t prying into their personal matters.

But you keep on using the most destructive tool in America today, Facebook, and above all……

DON’T GO LOOK!

Share

CLAIM: John Brennan Contractor Spied On Donald Trump’s Phone Calls

President Donald Trump’s phone calls during his time as a private citizen were routinely spied on by a complex surveillance system overseen by Obama administration CIA director John Brennan and Director of National Intelligence James Clapper, according to claims made by real estate mogul Timothy Blixseth in an audiotaped conversation released by a federal judge in Arizona.

Timothy Blixseth claims that he saw records from a government contractor proving that Obama CIA director John Brennan oversaw repeated spying on the phone calls of President Donald Trump and millions of other private American citizens.<<<Read More>>>

Share

Is This What You Want Your “HERO COPS” Doing?

“Last week, Taser, the stun gun company that has recently become an industry leader in body-mounted cameras, announced the creation of its own in-house artificial intelligence division. The new unit will utilize the company’s acquisition of two AI-focused firms: Dextro, a New York-based computer vision startup, and Misfit, another computer vision company previously owned by the watch manufacturer Fossil. Taser says the newly formed division will develop AI-powered tech specifically aimed at law enforcement, using automation and machine learning algorithms to let cops search for people and objects in video footage captured by on-body camera systems.”<<<Read More>>>

Share

Law Enforcement Use of Cell – Site Simulation Technologies: Privacy Concerns and Recommendations

*Editor’s Note* – Nothing to see here. Move along. Your Congress is at work doing all the stuff you think YOUR political party is going to fix. Bwahahahahahahaah

EXECUTIVE SUMMARY

Advances in emerging surveillance technologies like cell-site simulators – devices which transform a cell phone into a real-time tracking device–require careful evaluation to ensure their use is consistent with the protections afforded under the First and Fourth Amendments to the U.S. Constitution.

The United States’ military and intelligence agencies have developed robust and sophisticated surveillance technologies for deployment in defense against threats from foreign actors. These technologies are essential to keeping America safe.

Increasingly though, domestic law enforcement at the federal, state, and local levels are using surveillance technologies in their every-day crime-fighting activities. In the case of cell-site simulators, this technology is being used to investigate a wide range of criminal activity, from human trafficking to narcotics trafficking, as well as kidnapping, and to assist in the apprehension of dangerous and violent fugitives.

Law enforcement officers at all levels perform an incredibly difficult and important job and deserve our thanks and appreciation. While law enforcement agencies should be able to utilize technology as a tool to help officers be safe and accomplish their missions, absent proper oversight and safeguards, the domestic use of cell-site simulators may well infringe upon the constitutional rights of citizens to be free from unreasonable searches and seizures, as well as the right to free association. Transparency

and accountability are therefore critical to ensuring that when domestic law enforcement decide to use these devices on American citizens, the devices are used in a manner that meets the requirements and protections of the Constitution.<<<Read More>>>

.

Share

Human Rights; FBI Big Topics at Apple Shareholder Meeting

Press Release from the National Center for Public Policy Research:

Apple Inc. Asked to Adopt Human Rights Proposal

Apple Management Asked to Report to Shareholders on Its Operations in Countries With Brutal Human Rights Abuses

Apple, Inc. Urges Shareholders to Vote “No”

FBI-Apple Debate Repeatedly Mentioned

Jesse Jackson Addressed Shareholder Meeting, Saying FBI Could Use a ‘Back Door’ Into the iPhone to Spy on His Group and Black Lives Matter

 

Cupertino, CA / Washington, D.C.  – A proposal asking the management of Apple, Inc. to issue a report to shareholders on the company’s business operations in regions with systemic human rights violations was presented at Apple’s annual shareholder meeting today by the Free Enterprise Project of the National Center for Public Policy Research.

Speaking on behalf of the proposal, Free Enterprise Project Director Justin Danhofnoted that Apple CEO Tim Cook wrote an op-ed in the Washington Post calling on “many more” people to fight against discrimination.

Danhof added, in part:

Our proposal takes Mr. Cook up on this. Apple operates in 17 nations where homosexuality is outlawed. In four of those countries, homosexual acts are punishable by death. Women have almost no rights in numerous countries in which Apple does business. And try getting a fair trial in many of these nations.

Let us as shareholders of Apple “join this movement,” as Mr. Cook said, and question why Apple is operating in nations when doing so requires Apple to discriminate, and to acquiesce in discrimination. Could a woman even drive a shipment of iPhones to Apple’s sales location in Saudi Arabia? Or work in the store without the permission of a male relative?

Our proposal simply asks management to prepare a report identifying Apple’s criteria for operating in regions with significant and systemic human rights violations. As Mr. Cook himself wrote, “Opposing discrimination takes courage. With the lives and dignity of so many people at stake, it’s time for all of us to be courageous.”

The full text of Danhof’s remarks at the Apple meeting, as prepared for delivery, can be found here.

Following the meeting, Danhof said:

Today, we sent a clear message to Apple’s leadership that religious bigotry has no place in the corporate boardroom. Our shareholder proposal highlighted an issue of growing importance – corporate involvement in political and legal issues. Apple and its CEO, Tim Cook, are not Constitutional scholars when it comes to religious issues. This showed when Cook penned an op-ed in the Washington Post that was rife with falsehoods regarding religious freedom restoration laws.

I was encouraged by the support of the shareholders in attendance at today’s meeting. When I pointed out that the Cook had misled folks on this important issue, and that Apple’s own operations fail to live up to Cook’s haughty prose, and asked for support for our proposal, a significant portion of the shareholders applauded.

Breaking from the norm, Cook did not address the National Center’s proposal at the meeting. At prior Apple meetings, Cook has gone out of his way to attack National Center proposals, including one regarding green energy and another trying to get to the bottom of Apple’s mysterious ability to earn approval from a green ratings agency for its laptops. Today, however, Cook’s silence was deafening. And that’s part of the goal of the National Center’s Religious Freedom Defense Initiative. We are striving to remove corporate America from debates that are better left to legislatures and the courts – bodies which are accountable to the American people – or, at the very least, to encourage corporate America to take these debates seriously, speaking about them accurately and with the goal of improving our country, not maximizing their own profits at public expense.

Cook’s op-ed represented a new type of totalitarianism that is sweeping the nation. From college campuses with their ever-growing ‘safe spaces,’ to Congress and the court system, there is a left-wing effort to remove all thought and speech that doesn’t toe the liberal line. Whether the issue is on race, sexual orientation or police activity, there has rarely been a time where freedom of expression and association were under such an extreme assault. America is a nation that has always looked out for, and given special protection to – its discreet and insular minorities. Today, that is an Indiana pizza shop just trying to sell its products and a Christian baker in Oregon that is forced to go to a reeducation camp for not wanting to bake a cake for a gay wedding. Cook took the weight of the Apple – one of the most powerful corporations in the world – and stomped on their necks.

Danhof added:

Apple’s current spat with the FBI over encryption and privacy rights came up repeatedly, if vaguely. It was the most often discussed topic other than iPhone sales, probably. Jesse Jackson was even on hand for overly-long comments complaining, in his paranoid manner, that some future conservative president could use a backdoor into the iPhone to spy on his group, and groups such as Black Lives Matter.

I agree with Apple’s legal position regarding the Fourth Amendment’s privacy guarantees, but I believe the media are missing another important Constitutional issue – the First Amendment’s speech protections. The government cannot coerce or compel an individual to sign a petition or support a referendum or political candidate. In the same way, it should not be permitted to compel Apple to write a code that would cause the company and its employees to contravene their deeply-held views on privacy rights.

Apple asked shareholders to vote against the National Center’s proposal, saying “the requested report is unnecessary and would not provide meaningful information to shareholders.”

The full text of the National Center’s shareholder proposal can be found here on page 62; Apple’s statement of opposition is on page 63.

More information about the National Center’s proposal is available here and here.

Share

By Executive Order, President Ensures He Can Use Internet for Spying…For Our Protection.

Executive Order — Commission on Enhancing National Cybersecurity

EXECUTIVE ORDER

– – – – – – –

COMMISSION ON ENHANCING NATIONAL CYBERSECURITY

For businesses their security is the most important aspect, that is why they hire companies like this one https://www.sapphire.net/ that have more than 25 years of experience in cybersecurity to keep their business safe.

By the authority vested in me as President by the Constitution and the laws of the United States of America, and in order to enhance cybersecurity awareness and protections at all levels of Government, business, and society, to protect privacy, to ensure public safety and economic and national security, and to empower Americans to take better control of their digital security, it is hereby ordered as follows:

Section 1. Establishment. There is established within the Department of Commerce the Commission on Enhancing National Cybersecurity (Commission).

Sec. 2. Membership. (a) The Commission shall be composed of not more than 12 members appointed by the President. The members of the Commission may include those with knowledge about or experience in cybersecurity, the digital economy, national security and law enforcement, corporate governance, risk management, information technology (IT), privacy, identity management, Internet governance and standards, government administration, digital and social media, communications, or any other area determined by the President to be of value to the Commission. The Speaker of the House of Representatives, the Minority Leader of the House of Representatives, the Majority Leader of the Senate, and the Minority Leader of the Senate are each invited to recommend one individual for membership on the Commission. No federally registered lobbyist or person presently otherwise employed by the Federal Government may serve on the Commission.

(b) The President shall designate one member of the Commission to serve as the Chair and one member of the Commission to serve as the Vice Chair.

Sec. 3. Mission and Work. The Commission will make detailed recommendations to strengthen cybersecurity in both the public and private sectors while protecting privacy, ensuring public safety and economic and national security, fostering discovery and development of new technical solutions, and bolstering partnerships between Federal, State, and local government and the private sector in the development, promotion, and use of cybersecurity technologies, policies, and best practices. The Commission’s recommendations should address actions that can be taken over the next decade to accomplish these goals.

(a) In developing its recommendations, the Commission shall identify and study actions necessary to further improve cybersecurity awareness, risk management, and adoption of best practices throughout the private sector and at all levels of government. These areas of study may include methods to influence the way individuals and organizations perceive and use technology and approach cybersecurity as consumers and providers in the digital economy; demonstrate the nature and severity of cybersecurity threats, the importance of mitigation, and potential ways to manage and reduce the economic impacts of cyber risk; improve access to the knowledge needed to make informed cyber risk management decisions related to privacy, economic impact, and business continuity; and develop partnerships with industry, civil society, and international stakeholders. At a minimum, the Commission shall develop recommendations regarding:

(i) how best to bolster the protection of systems and data, including how to advance identity management, authentication, and cybersecurity of online identities, in light of technological developments and other trends;

(ii) ensuring that cybersecurity is a core element of the technologies associated with the Internet of Things and cloud computing, and that the policy and legal foundation for cybersecurity in the context of the Internet of Things is stable and adaptable;

(iii) further investments in research and development initiatives that can enhance cybersecurity;

(iv) increasing the quality, quantity, and level of expertise of the cybersecurity workforce in the Federal Government and private sector, including through education and training;

(v) improving broad-based education of commonsense cybersecurity practices for the general public; and

(vi) any other issues that the President, through the Secretary of Commerce (Secretary), requests the Commission to consider.

(b) In developing its recommendations, the Commission shall also identify and study advances in technology, management, and IT service delivery that should be developed, widely adopted, or further tested throughout the private sector and at all levels of government, and in particular in the Federal Government and by critical infrastructure owners and operators. These areas of study may include cybersecurity technologies and other advances that are responsive to the rapidly evolving digital economy, and approaches to accelerating the introduction and use of emerging methods designed to enhance early detection, mitigation, and management of cyber risk in the security and privacy, and business and governance sectors. At a minimum, the Commission shall develop recommendations regarding:

(i) governance, procurement, and management processes for Federal civilian IT systems, applications, services, and infrastructure, including the following:

(A) a framework for identifying which IT services should be developed internally or shared across agencies, and for specific investment priorities for all such IT services;

(B) a framework to ensure that as Federal civilian agencies procure, modernize, or upgrade their IT systems, cybersecurity is incorporated into the process;

(C) a governance model for managing cybersecurity risk, enhancing resilience, and ensuring appropriate incident response and recovery in the operations of, and delivery of goods and services by, the Federal Government; and

(D) strategies to overcome barriers that make it difficult for the Federal Government to adopt and keep pace with industry best practices;

(ii) effective private sector and government approaches to critical infrastructure protection in light of current and projected trends in cybersecurity threats and the connected nature of the United States economy;

(iii) steps State and local governments can take to enhance cybersecurity, and how the Federal Government can best support such steps; and

(iv) any other issues that the President, through the Secretary, requests the Commission to consider.

(c) To accomplish its mission, the Commission shall:

(i) reference and, as appropriate, build on successful existing cybersecurity policies, public-private partnerships, and other initiatives;

(ii) consult with cybersecurity, national security and law enforcement, privacy, management, technology, and digital economy experts in the public and private sectors;

(iii) seek input from those who have experienced significant cybersecurity incidents to understand lessons learned from these experiences, including identifying any barriers to awareness, risk management, and investment;

(iv) review reported information from the Office of Management and Budget regarding Federal information and information systems, including legacy systems, in order to assess critical Federal civilian IT infrastructures, governance, and management processes;

(v) review the impact of technological trends and market forces on existing cybersecurity policies and practices; and

(vi) examine other issues related to the Commission’s mission that the Chair and Vice Chair agree are necessary and appropriate to the Commission’s work.

(d) Where appropriate, the Commission may conduct original research, commission studies, and hold hearings to further examine particular issues.

(e) The Commission shall be advisory in nature and shall submit a final report to the President by December 1, 2016. This report shall be published on a public website along with any appropriate response from the President within 45 days after it is provided to the President.

Sec. 4. Administration. (a) The Commission shall hold periodic meetings in public forums in an open and transparent environment.

(b) In carrying out its mission, the Commission shall be informed by, and shall strive to avoid duplicating, the efforts of other governmental entities.

(c) The Commission shall have a staff, headed by an Executive Director, which shall provide support for the functions of the Commission. The Secretary shall appoint the Executive Director, who shall be a full-time Federal employee, and the Commission’s staff. The Executive Director may also serve as the Designated Federal Officer in accordance with the Federal Advisory Committee Act, as amended, 5 U.S.C. App. (FACA, the “Act”).

(d) The Executive Director, in consultation with the Chair and Vice Chair, shall have the authority to create subcommittees as necessary to support the Commission’s work and to examine particular areas of importance. These subcommittees must report their work to the Commission to inform its final recommendations.

(e) The Secretary will work with the heads of executive departments and agencies, to the extent permitted by law and consistent with their ongoing activities, to provide the Commission such information and cooperation as it may require for purposes of carrying out its mission.

Sec. 5. Termination. The Commission shall terminate within 15 days after it presents its final report to the President, unless extended by the President.

Sec. 6. General Provisions. (a) To the extent permitted by law, and subject to the availability of appropriations, the Secretary shall direct the Director of the National Institute of Standards and Technology to provide the Commission with such expertise, services, funds, facilities, staff, equipment, and other support services as may be necessary to carry out its mission.

(b) Insofar as FACA may apply to the Commission, any functions of the President under that Act, except for those in section 6 and section 14 of that Act, shall be performed by the Secretary.

(c) Members of the Commission shall serve without any compensation for their work on the Commission, but shall be allowed travel expenses, including per diem in lieu of subsistence, to the extent permitted by law for persons serving intermittently in the Government service (5 U.S.C. 5701-5707).

(d) Nothing in this order shall be construed to impair or otherwise affect:

(i) the authority granted by law to a department, agency, or the head thereof; or

(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.

(e) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

BARACK OBAMA

THE WHITE HOUSE,
February 9, 2016.

Share

» FBI Merges Criminal and Civil Fingerprint Database Alex Jones’ Infowars: There’s a war on for your mind!

wake up america

For years the FBI maintained it had no interest in scanning fingerprints collected by employers — teachers, lawyers, state and federal workers, even bike messengers now routinely submit fingerprints for employment — but that has now changed.“For the first time, fingerprints and biographical information sent to the FBI for a background check will be stored and searched right along with fingerprints taken for criminal purposes,” reports the Electronic Frontier Foundation, an organization dedicated to protecting rights online.

Source: » FBI Merges Criminal and Civil Fingerprint Database Alex Jones’ Infowars: There’s a war on for your mind!

Share

DHS Wants Boeing to Test a Brain Chip in Firm’s Self-Destructing ‘Black’ Spyphone

The Department of Homeland Security is funding a Boeing company to create a “brain chip” for its self-destructing Black smartphone that could be adapted for any device, DHS officials say.The technology powering the devices potentially could identify the user’s walking style, for example. Officials would be alerted if the gait does not match the authorized user’s walk – a red flag the phone might have fallen into the wrong hands, officials said.

BWAHAHAHAHA! BWAHAHAHAHA!

Source: DHS Wants Boeing to Test a Brain Chip in Firm’s Self-Destructing ‘Black’ Spyphone – Nextgov.com

Share