SEX, DRUGS, DEAD DOCTORS & INTERNET FRAUD :

THE SECRET LIVES OF ERIN ELIZABETH FINN AND DR. JOSEPH MERCOLA A REVIEW OF FACTS, ANALYSIS, CONSUMER ALERT, AND EDUCATED OPINION by Investigative Journalist SHERRI KANE INTRODUCTION On April 13, 2016, the Federal Trade Commission (FTC) charged Dr. Joseph Mercola, America’s wealthiest online natural health products saleman, on five counts of unfair and deceptive trade through Mercola.com. The very next day, according to the FTC Press Release, Mercola agreed to pay out as much as $5,334,067 to more than a thousand defrauded customers who paid between $1,200 and $4,000 each for a falsely advertised “tanning bed.” The government did not mention fining Mercola, nor adding fees and costs to cover taxpayers’ losses. Barely any media reported on the instant settlement; and business at Mercola.com continued as usual. (1-3) Now, a year later, new evidence has emerged of Mercola’s enterprise in unfair competition and deceptive trade that outdoes the best […] Read More

Your Tax Dollars At Work: FBI Took Over Child Porn Website, Increased Traffic

The government is notorious for wasting taxpayer money and for spending it on war, corporate welfare, bank bailouts, and all manner of awful things. (You can experience the same sticker shock I did in this book.) But nothing says “your tax dollars at work” like government-distributed child pornography. I couldn’t make this up. Here’s what happened. In February 2015, the FBI took over a child pornography site called The Playpen. At the time, it was the largest known site of its kind. After arresting the North Carolina administrator of the site, a “dark web”child-pornography internet bulletin board, agents seized the site’s server and moved it to an FBI warehouse in Virginia. You’d think that the FBI, upon taking over the site, would immediately shut it down. You’d be wrong. **** Not only did the FBI keep the site running, it IMPROVED it’s functioning. That’s right: while attempting to bust users […] Read More

2014: Your TV Is Watching YOU!

Is your TV spying on YOU? It sounds like science fiction but many new TVs can watch you – telling advertisers your favorite shows or even filming you on the sofa. And there’s no off switch! By Guy Adams, 26 November 2013 You are sitting in bed in your pajamas, drinking a cup of cocoa. A loved one lies next to you, watching late-night television. Pillow talk is exchanged. An alarm clock is set. Eventually the lights are turned out. Earlier, you sat on the living-room sofa eating supper, before loading the dishwasher and heading upstairs. You have, in other words, just enjoyed a perfectly normal night, in a perfectly normal home. The curtains are drawn, the central heating turned up. It’s cozy, relaxing and, above all, completely private. Or so you thought. The truth turns out to be quite the opposite. For on the other side of the world, people you […] Read More

Why the NSA's attacks on the internet must be made public | Bruce Schneier

By reporting on the agency’s actions, the vulnerabilities in our computer systems can be fixed. It’s the only way to force change Today, the Guardian is reporting on how the NSA targets Tor users, along with details of how it uses centrally placed servers on the internet to attack individual computers. This builds on a Brazilian news story from last week that, in part, shows that the NSA is impersonating Google servers to users; a German story on how the NSA is hacking into smartphones; and a Guardian story from two weeks ago on how the NSA is deliberately weakening common security algorithms, protocols, and products. The common thread among these stories is that the NSA is subverting the internet and turning it into a massive surveillance tool. The NSA’s actions are making us all less safe, because its eavesdropping mission is degrading its ability to protect the US. […] Read More

Silent Weapons for Quiet Wars

The following document, dated May 1979, was found on July 7, 1986, in an IBM copier that had been purchased at a surplus sale. TOP SECRET Silent Weapons for Quiet Wars Operations Research Technical Manual TM-SW7905.1 Welcome Aboard This publication marks the 25th anniversary of the Third World War, called the “Quiet War”, being conducted using subjective biological warfare, fought with “silent weapons.” This book contains an introductory description of this war, its strategies, and its weaponry. May 1979 #74-1120 Security It is patently impossible to discuss social engineering or the automation of a society, i.e., the engineering of social automation systems (silent weapons) on a national or worldwide scale without implying extensive objectives of social control and destruction of human life, i.e., slavery and genocide. This manual is in itself an analog declaration of intent. Such a writing must be secured from public scrutiny. Otherwise, it might be […] Read More

2012: New Big Brother Cyber Weapon Can Control Your Computer

Mac Slavo May 29th, 2012 SHTFplan.com To the disbelief of many of our readers, in a 2011 report titled Everything You Do Is Monitored, we noted that microphones and cameras on cell phones and computers allow interested parties (translated to mean your respective government) to hear and see everything going on in the direct vicinity of the device without the knowledge of its owner. That these monitoring features are available on cell phones was a known fact, as FBI surveillance networks already have the ability to turn on any cell phone microphone or camera remotely without tipping off the user. It’s believed that this surveillance technique can work even when the cell phone user has shut down their phone, with the only surefire way to prevent such surveillance being removal of the unit’s battery. Computers, however, were believed to be secure from these kinds of backdoors, and the majority […] Read More

2012: New Big Brother Cyber Weapon Can Turn on Your Computer’s Microphone, Take Screen Shots, Copy Data, Record Communications

Mac Slavo May 29th, 2012 SHTFplan.com To the disbelief of many of our readers, in a 2011 report titled Everything You Do Is Monitored, we noted that microphones and cameras on cell phones and computers allow interested parties (translated to mean your respective government) to hear and see everything going on in the direct vicinity of the device without the knowledge of its owner. That these monitoring features are available on cell phones was a known fact, as FBI surveillance networks already have the ability to turn on any cell phone microphone or camera remotely without tipping off the user. It’s believed that this surveillance technique can work even when the cell phone user has shut down their phone, with the only surefire way to prevent such surveillance being removal of the unit’s battery. Computers, however, were believed to be secure from these kinds of backdoors, and the majority […] Read More