Google Maps Has Been Tracking Your Every Move, and There’s a Website to Prove It

Thanks to Ed Komarek at Extraterrestrial Cultural Center on Facebook.

This is slick, isn’t it? Try it!

Was there any doubt? Big Brother is EVERYWHERE. 

It’s a cool place to get a snapshot of your life, but that little anomaly the writer shares… curious indeed.

When I go to the website it shows my gmail address at the top right, but tells me I have no location history. I am EVER SO GLAD I don’t have a smart phone, and ignored all those not-so-subtle little pushes by Google to get me to provide my cell number.

The rest of you—have at ‘er! ~ BP

map2

August 15, 2014

Remember that scene in Minority Report, where Tom Cruise is on the run from the law, but is unable to avoid detection because everywhere he goes there are constant retina scans feeding his location back to a central database? That’s tomorrow. Today, Google is tracking wherever your smartphone goes, and putting a neat red dot on a map to mark the occasion.

You can find that map here. All you need to do is log in with the same account you use on your phone, and the record of everywhere you’ve been for the last day to month will erupt across your screen like chicken pox.

googlemap

We all know that no matter what ‘privacy’ settings you may try and implement, our information is all being collected and stored somewhere. That knowledge sits in the back of our minds, and is easy to drown out by shoving in some headphones and watching Adventure Time on repeat until everything stops being 1984.  But it’s a sharp jolt back to reality when you see a two dimensional image marking your daily commute with occasional detours to the cinema or a friend’s house.

Looking at mine, I realised that a) I live my life in a very small radius, and b) there are places on my map that I don’t remember going. One of them I’ve apparently visited three times on different days. Once whilst “Biking” and twice while “Stationary”. All at times I wouldn’t usually be awake. I’m not sure what’s happening on Wood Street in North Melbourne, or why my phone apparently travels there without me, but I’m not going to rule out secret alien conspiracies.

This never happened. UNLESS IT DID.

This never happened. UNLESS IT DID.

Apparently this record only happens if you have ‘location services’ switched on in your phone; if you do and you’re finding you have no data, then it means that either you don’t exist or you’ve beaten the system. If it’s the latter, please teach me your ways; I know for a fact that I switched my phone’s location detection off, but apparently it somehow got switched back on.

Oh well. Perhaps this month I’ll take some inspiration from the runner who used Nike+ draw dicks – except this time when the dots are joined, they’ll just form a huge, unblinking eye. With occasional side trips to Wood Street.

Source

Michael Tellinger Reveals the Anunnaki in S. Africa: Must Watch Video

Thanks to Extraterrestrials.ning.com for sharing.

Tellinger’s brilliant work is not to be missed. This is a condensed version of a greater presentation, chock full of truths and revelations “they” don’t want us to know. He takes it from the beginning of time to the present, sharing more pieces of the historical puzzle. Don’t miss a minute of it.  ~ BP

Published on 9 Jul 2013

Michael did a presentation at the Global Breakthrough Energy Movement (BEM) conference in 2012. In this session, he describes free energy system from ancient civilisations, and finishes off with his model for a society based on contributionism, or UBUNTU.

See more at http://www.ubuntuparty.org.za/p/docum… and http://www.zuluplanet.com

Rant Alert!

I have already blown a gasket and sent a 2-page letter to Apple corporate, but am still seething…

On Saturday my dearly beloved (who came close to being my dearly departed) downloaded iOS7 on my iPad without consulting me.

Now I’m stuck with their $#*&)(*$  new operating system and can’t do a damn thing about it.

Sure, I got their clever little notice a few months ago that iOS7 was ready to download, but I’m not a sheep and I wanted to do some research before I changed what was already working fine for me.

Besides, I’ve just got comfortable with iOS6 and still have a lot to learn.

I saw a LOT of negative feedback from Apple users online regarding the iPhone, iPad, and other devices that were upgraded (I consider it a downgrade)  and decided NOT to change until I’m forced to.

Sure, they say you can turn off the NSA GPS tracking, but do you believe that? I don’t. Just because you flip a switch doesn’t mean they will honour the request. I don’t trust the NSA OR Apple.

May I go on?

As if it wasn’t difficult enough to read the small print with aging eyes, now they’ve changed the browser tabs in Safari to “grey on grey” which is even harder to read, and that friggin’ little X you use to close the tab—the one that half the time I missed and got the keyboard popping up? Now it’s so small I can hardly see it.

The icons on the desktop are gaudy colours and look like someone in kindergarten designed them.  They make the iPad look like a toy—a very expensive toy.

And in Gmail, the message subject is black, but the preview is grey. Grey on white! Have they lost their ever lovin’ minds?

This is what I have discovered in just the last day or so in the few hours I was using the iPad. No doubt there are other equally infuriating things, like when I try to read outside in the bright Arizona light.

Worst of all, my mother—two thousand miles away—is on iOS6 and just got comfortable with email and browsing, and now it’s going to be even more frustrating trying to help her by phone because my iPad is no longer the same as hers. I doubt very much if she wants to switch now.

What really gets my goat, though, is the fact that you cannot revert to iOS6. The only way I might have been able to do that was if I had synced my iTunes, but I’ve never plugged the iPad into my PC because I don’t use the iPad for music. So I’m stuck. And I’m pissed. And I’m not alone.

Here’s a web site I found when looking for a work-around to restore my previous version. Check out all the happy customers’ comments at the bottom. I tried to download a signed iOS6 file but there isn’t one for my iPad with the coveted green checkmark next to it.

http://www.slashgear.com/ios-7-downgrades-remain-available-as-ios-6-is-ushered-out-20298663/

If Apple knows what’s good for them they will stop telling their customers what they can and can’t do and try harder to make them happy.

Now that COBRA’s financial reset/Event issues have come up, I fully understand my meltdown is nothing in comparison to the huge things at stake now, but I feel better having vented AGAIN. Thank you for listening.

Rather than sell my iPad, I will put it to good use. Our bedroom windows are not working well and it will come in very handy.

Facebook photo: Mac now supports windows.

 

NY Times Releases Latest on NSA Spying re Social Connections in Print Edition [video]

I’m not liking what I’m hearing at all. They have created profiles of everyone, everything we do, everywhere, with whom, and when. And I mean ‘US’—not criminals or terrorism suspects. Everyday, average, honest citizens of the USA. Completely unconstitutional—but of course all in the name of ‘national security’. It sounds like much of the data is compliments of the beloved cell phone and smart phone. Too smart for our own good.

N.S.A. Gathers Data on Social Connections of U.S. Citizens

WASHINGTON — Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials.

Carolyn Kaster/Associated Press
Gen. Keith Alexander, the director of the National Security Agency
testified on Thursday before the Senate Intelligence Committee.

Documents on N.S.A. Efforts to Diagram Social Networks of U.S. Citizens

This slide from an N.S.A. PowerPoint presentation shows one of the ways the agency uses e-mail and phone data to analyze the relationships of foreign intelligence targets.

The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor.

The policy shift was intended to help the agency “discover and track” connections between intelligence targets overseas and people in the United States, according to an N.S.A. memorandum from January 2011. The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. Because of concerns about infringing on the privacy of American citizens, the computer analysis of such data had previously been permitted only for foreigners.

The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners.

N.S.A. officials declined to say how many Americans have been caught up in the effort, including people involved in no wrongdoing. The documents do not describe what has resulted from the scrutiny, which links phone numbers and e-mails in a “contact chain” tied directly or indirectly to a person or organization overseas that is of foreign intelligence interest.

The new disclosures add to the growing body of knowledge in recent months about the N.S.A.’s access to and use of private information concerning Americans, prompting lawmakers in Washington to call for reining in the agency and President Obama to order an examination of its surveillance policies. Almost everything about the agency’s operations is hidden, and the decision to revise the limits concerning Americans was made in secret, without review by the nation’s intelligence court or any public debate. As far back as 2006, a Justice Department memo warned of the potential for the “misuse” of such information without adequate safeguards.

An agency spokeswoman, asked about the analyses of Americans’ data, said, “All data queries must include a foreign intelligence justification, period.”

“All of N.S.A.’s work has a foreign intelligence purpose,” the spokeswoman added. “Our activities are centered on counterterrorism, counterproliferation and cybersecurity.”

The legal underpinning of the policy change, she said, was a 1979 Supreme Court ruling that Americans could have no expectation of privacy about what numbers they had called. Based on that ruling, the Justice Department and the Pentagon decided that it was permissible to create contact chains using Americans’ “metadata,” which includes the timing, location and other details of calls and e-mails, but not their content. The agency is not required to seek warrants for the analyses from the Foreign Intelligence Surveillance Court.

N.S.A. officials declined to identify which phone and e-mail databases are used to create the social network diagrams, and the documents provided by Mr. Snowden do not specify them. The agency did say that the large database of Americans’ domestic phone call records, which was revealed by Mr. Snowden in June and caused bipartisan alarm in Washington, was excluded. (N.S.A. officials have previously acknowledged that the agency has done limited analysis in that database, collected under provisions of the Patriot Act, exclusively for people who might be linked to terrorism suspects.)

But the agency has multiple collection programs and databases, the former officials said, adding that the social networking analyses relied on both domestic and international metadata. They spoke only on the condition of anonymity because the information was classified.

Source

Undersea Pyramid Discovered in the Azores

Thanks, Richard.

They keep popping up, don’t they? Just as predicted.

An Undersea Pyramid has Just Been Discovered in the Azores

An Undersea Pyramid has just been discovered in the Azores archipelago! Heavy Synchronicity with AM47!!

pyramid
Image collected by discoverer Diocleciano Silva using GPS technology.

On 19 SEP 2013, a Subaquatic Pyramidal Structure was identified at a depth of 40 meters off the coast of Terceira Island, Azores. The perfectly squared structure was sighted by a private yacht owner, Diocleciano Silva, during a recreational trip.

Mt. Pico, the tallest point in the Atlantic Ocean

The pyramid is estimated to be approximately 60 meters high, the enigmatic structure was recorded through CPS digital technology. “The pyramid is perfectly shaped and apparently oriented by the cardinal directions,” Silva told Diário Insular, the local newspaper.

Within the past 2 years, archeologists from the Portuguese Association of Archeological Research (APIA) have identified archeological evidence on the Azorean archipelago that supports their belief that human occupation of the Azores predates the arrival of the Portuguese by many thousands of years, possibly even of a Carthaginian or even Atlantean civilization!

Project AM47 has been writing to this effect since 2007, with the Azores being the Point of Alchemical EARTH in a globally psycho-cosmic structure of sacred geometry… and now it’s a reality!!

Source

Don’t be taken in by fakes circulating on the Internet… from Graham Hancock:

Azores submerged “Pyramid” – Warning not to be duped by irresponsible photoshopped image currently doing the rounds on the internet. At least 10 well meaning folk every day send me links like this:

http://www.educateinspirechange.org/2014/02/huge-underwater-pyramid-discovered-near-portugal-navy-investigating.html

Or this:

http://themindunleashed.org/2014/01/huge-underwater-pyramid-discovered-near-portugal-navy-investigating.html

Or this:

http://wearechange.org/huge-underwater-pyramid-discovered-near-portugal-navy-investigating/

In the hope of making things clear to as many as possible I thought I would send my comments out to the full list:

I have been following the Azores pyramid story for some time and reported it here last year. The picture in the reports linked above is, of course, a photoshopped artefact using the Giza pyramids and overlaid with an underwater scene. It is, in my humble opinion, highly irresponsible of any website to use this image without making it clear that it is a photoshopped fantasy, and not anything real. That being said, however, there IS an anomalous structure underwater off the Azores, so far only identified by sonar. The Portuguese navy have dismissed it as a ‘seamount’ on the basis of some old sonar readings of their own in the area, but they have not gone to the site to investigate exactly what was identified there in 2013. As far as I’m concerned the case is still open and I hope to take a look later this year.

Thank you, Graham, for that caution.

If this sort of revelation intrigues you, I encourage you to have a look at a website that outlines submerged ruins, cities, forests, pyramids, roads, walls and other signs of early civilizations at Drowned Cities. I found it riveting and had no idea there had been so many discoveries in so many areas of the planet.

Don’t Think Your Car Can Be Hacked? Watch This [video]

If the military can remote control drones, of course someone can hack our cars.

If OnStar can be right there with us in our truck, having a conversation, tracking our location and unlocking our doors from thousands of miles away, of course the capability is there for someone other than us to gain control of our vehicles, but rather than simply TELL people that the feds can do this, a couple of researchers with a grant from the Pentagon did some experiments on just what can be done remotely to a newer model. See the results for yourself in the video below.

This technology is no accident and begs the question: Who, other than the military, would ever want or need to take control of a vehicle that doesn’t belong to them and kill or maim the occupants? It’s always the same answer. The llluminati—and it’s part of their long-range plan.

Did they share this information with us openly? No, it was leaked out gradually by other parties, and they’ve used this technology many times. The U.S. military industrial complex is decades ahead technologically speaking than they have allowed us to know, as many whistleblowers have warned us.

Big Brother is like Visa: they’re everywhere we want to be. This cyber hacking is the ideal way to deal with pesky journalists, whistleblowers and dissidents where no proof of the perpetrators can be found. This technology is, quite literally, child’s play for those who wish to control us.

Be sure to watch the 5-minute video for a demonstration. ~ BP 

If you’re at all the slightest bit skeptical of the emerging capability of hackers to take control of your electronic devices, then don’t watch this video. Why? Because you may never drive your car again after you see how a couple of government-funded tech guys were able to hack into, and take control of, one reporter’s vehicle — while he was driving it.

The experiment was the product of Forbes reporter Andy Greenberg, who wanted to see just how vulnerable cars are to hacking by Charlie Miller and Chris Valasek, two researchers who received an $80,000 grant from the Pentagon’s research wing, DARPA, to study such vulnerabilities. The scary answer — shown in a video report — to how vulnerable is “very.”

Take for example that Miller, while plugged into the car’s computer system in the back seat — could do things like change how much fuel the car appears to have, alter the speedometer reading, actually turn the steering wheel, honk the horn, and even mess with the brakes:

Forbes shows how a car can be hacked

Forbes shows how a car can be hacked

Forbes shows how a car can be hacked

Forbes shows how a car can be hacked

Forbes shows how a car can be hacked

Greenberg describes the capabilities of the hackers this way [emphasis added]:

As I drove their vehicles for more than an hour, Miller and Valasek showed that they’ve reverse-engineered enough of the software of the Escape and the Toyota Prius (both the 2010 model) to demonstrate a range of nasty surprises: everything from annoyances like uncontrollably blasting the horn to serious hazards like slamming on the Prius’ brakes at high speeds. They sent commands from their laptops that killed power steering, spoofed the GPS and made pathological liars out of speedometers and odometers. Finally they directed me out to a country road, where Valasek showed that he could violently jerk the Prius’ steering at any speed, threatening to send us into a cornfield or a head-on collision.

“It’s quite terrifying when you don’t have brakes, right?” Miller jokes at one point. He then proceeds to turn them off, sending the car into the weeds.

“That’s the attack that crashed me into my garage,” Valasek admits.

“When you lose faith that a car will do what you tell it to do, it really changes your whole view of how the thing works,” Miller tells Greenberg. Here’s the video:

Miller is a 40-year-old security engineer at Twitter and Valasek is the 31-year-old director of security intelligence at IOActive, a consulting firm in Seattle. The duo plans on releasing their findings at the Defcon hacker conference in Las Vegas, August 1-4.

And don’t think that just because the duo hacked the controls while physically in the car that you should feel safe. Prior research has shown wireless access is as easy as using a car’s CD player [emphasis added]:

But Miller and Valasek’s work assumed physical access to the cars’ computers for a reason: Gaining wireless access to a car’s network is old news. A team of researchers at the University of Washington and the University of California, San Diego, experimenting on a sedan from an unnamed company in 2010, found that they could wirelessly penetrate the same critical systems Miller and Valasek targeted using the car’s OnStar-like cellular connection, Bluetooth bugs, a rogue Android app that synched with the car’s network from the driver’s smartphone or even a malicious audio file on a CD in the car’s stereo system.

“Academics have shown you can get remote code execution,” Valasek, told Greenberg. “We showed you can do a lot of crazy things once you’re inside.”

Forbes sums up just what that consists of in a graphic:

Forbes shows how a car can be hacked

The capability comes at a time when some are theorizing the car-accident death of journalist Michael Hastings is suspicious. Hastings is the former Rolling Stone reporter who died in a fiery car wreck this summer after apparently sending an email that he was working on a big story. He is also the journalist whose reporting led to the resignation of Gen. Stanley McChrystal.

To be clear, neither Forbes nor the researchers insinuated their work could explain the crash. But many will certainly find it interesting.

“Imagine you’re driving down a highway at 80 ,” Valasek tells Greenberg in his report. “You’re going into the car next to you or into oncoming traffic. That’s going to be bad times.”

Read the fascinating report from Forbes.

Source