Is Anyone Watching Those Who Watch Us?
The ongoing tempest in a tea cup concerning Russian hacking and Trump collusion is merely “Why? Oh, why did Hillary lose?” etched out in Washington double speak through the media megaphone. To sum it all up, I’m reminded of a quote from the Wicked Witch of the West, “What a world…what a world.” (Not THAT Wicked Witch of the West, the one from the Wizard of Oz.)
Here we are in an America where the government can listen to and record every word or keystroke without a warrant and the person who tells us about it is a traitor. This is an America obsessed with a manufactured scandal about Russian collusion to elect Trump by people who love to say, “Hillary won the popular vote.” They never seem to connect the dots. If the Russians hacked our election and Hillary won the popular vote, whose side were they on?
Back in the old days when the Hermit of Chappaqua was celebrated as the smartest woman in the world by the ABCCBSNBCCNNMSNBCPBS Cartel, there was a joke that made the rounds:
Bill and Hillary pulled into a gas station in rural Arkansas and good old Bubba comes out to pump the gas. As he’s wiping the windshield, he looks through the glass and then says, “Hillary is that you?” It turns out that Hillary and Bubba used to date. As they pulled away, America’s most beloved sexual predator is laughing. Hillary asks, “Bill what’s so funny?” The Prince of Interns says, “Here you are, married to the President of the United States instead of married to some gas station attendant.” Where upon Hillary quips, “Bill, if I would’ve married him, he’d be the President of the United States.”
A sequel to this apocryphal story could be:
The two heads of New York’s Sixth Crime Family are sitting at the inauguration of Donald Trump. Hillary says to Bill, “If it hadn’t been for you and all your baggage, that would be me up there.” Bill leans over and whispers, “If you would have listened to me and campaigned instead of waiting to be crowned, that might have been you up there.”
Hillary ran an abysmal campaign. I haven’t seen anything like it since Bob Dole ran on the logic of, “It’s my turn.”
Although some of us saw the coming collapse of the PC America Last crowd in the growing disgust of hard working Americans, the central planners never did. They dismissed us as deplorable, Bible-clutching, flag-waving, knuckle-dragging, tax-paying bumpkins who lived in fly over country and could safely be ignored by our betters. They have come to rue the hubris of their assumption. They still don’t get it, but they rue it, and to them, ruing is a new experience.
So their chosen successor to the Great Apologizer fell flat on her pants suit and they don’t know what to do. It couldn’t have been that people actually rejected their plan to convert America into a third world hellhole: one vote among many in a UN-controlled New World Order. No, that couldn’t be it. There must have been a conspiracy. So today, we wander endlessly day and night through the twenty-four hour wall-to-wall fake news cycle of “the Russians did it,” while trumpeting that Hillary won the popular vote. Now we learn, when President Trump tweeted that he and his transition team were under surveillance by the Obama administration, that he was pointing to where the hacking may have all originated. Even a celebrated left winger like Oliver Stone on CNN, as reported by the Daily Beast, says the DNC hack was an inside job. Another left-leaning news source, Salon, reportsthat our own intelligence agencies can hack sites and make it look like the Russians did it. If possible, a shadowy tale gets darker.
Susan Rice, President Obama’s national-security adviser and confidant, called for American citizens, who happened to be involved in the Trump campaign and transition team to be unmasked. Then, we learn that Evelyn Farkas, deputy assistant secretary of defense under Obama, has acknowledged efforts by her colleagues to gather intelligence on Trump team ties to Russia before Donald Trump took office and to conceal the sources of that intelligence from the incoming administration. This isn’t a smoking gun. It’s two smoking guns. Both of these women need to testify under oath. Where is Trey Gowdy when you need him?
And yet, the beat goes on. It reminds me that the last person elected saying that he was going to drain the swamp was Richard Nixon in 1972. Before that, it was JFK. It is obvious the Progressives are plotting the Nixon treatment for Mr. Trump. Let us pray no one attempts the JFK solution to their problem.
I might have just certified my induction into the Conspiracy Theorists Secret Handshake Society as far as any supporters of the establishment are concerned; however, I believe that the permanent government, now called the Deep State, has its own agenda, and they are not above staging a silent coup to reign in any elected officials who get in the way.
Facts can be ignored:
Hillary won the popular vote
The Clintons have deep and long ties to Russian Oligarchs
The Clintons received millions from the Russians during the Uranium Deal
All those suspicious donations that we were assured weren’t bribes dried up ,and the Clinton foundation is blowing away after Hillary lost the election
Not only does the media cartel put everything through their progressive spin cycle, if anything is reported that disrupts their playbook, they go so far as to instruct their viewers to ignore the story. What is so sad about this is that so many we know and love, those who get their personal opinion from the Cartel, will do what they are instructed to do. They will ignore the facts and believe the lie.
Every conversation and keystroke recorded, cameras everywhere, investigations that have predetermined conclusions, and hearings that can only be seen as show trials and political theater that is America today. So if our government is watching everyone and editing the tapes, here’s my question: is anyone watching those who watch us? If you are, don’t tell anyone. It might be treason.
Millions of Android Phones Actively Spying On Their Users
The question of the recent decades has been how much of our liberty can we and should we give up in the name of security. And while that question continues to persist, the new question of the modern age is how much privacy can we and should we give up in the name of convenience?
We have apps that make life infinitely easier and more convenient, but with each app we use we give them some of our personal data. And while most of us think we can control what data each app gets, new research shows we might be gravely mistaken.
In the following video, Right Wing News looks at the latest research, which shows how some Android apps are bypassing user permissions by simply getting information from other apps. And while most of this is quite innocuous, what happens when malware apps get data from your other apps? And while this research may be new on the consumer front, you can rest assured that this is old news for the spy agencies.
Android apps are ‘secretly colluding’ to share information with one another without asking for permission, new research has found.
This data sharing could lead to security breaches with user location, contact details and other private information at risk.
Apps designed around the personalization of ringtones, widgets, and emojis are the most at risk, the researchers said.
In a study of more than 100,000 of Google Play’s most popular apps, the team found 23,495 colluding pairs of apps.
Once downloaded, apps can communicate with one another without user permission, and some take advantage of this feature to read personal data.
‘Apps that don’t have a good reason to ask for extra permissions sometimes don’t bother. Instead, they manage to get information through other apps,’ study co-author Professor Gang Wang, a computer scientist at Virginia Tech University, told New Scientist.
The types of threats arising from app data sharing fall into two major categories, the team said.
User data could be breached using a malware app that is specifically designed to launch a cyberattack, or using normal apps that simply allow for collusion.
In the latter category, it is not possible to know the intentions of the app developer, so collusion – while still a security breach – can in many cases be unintentional, the researchers said.
The analysis is the first ever large-scale and systematic study of how the apps on Android phones are able to talk to one another and trade information.
“Researchers were aware that apps may talk to one another in some way, shape, or form,” said Professor Wang.
What this study shows undeniably with real-world evidence over and over again is that app behavior, whether it is intentional or not, can pose a security breach depending on the kinds of apps you have on your phone.
To test different pairs of apps, the team developed a tool called ‘DIALDroid’ to perform a large inter-app security analysis that took 6,340 hours.
“Of the apps we studied, we found thousands of pairs of apps that could potentially leak sensitive phone or personal information and allow unauthorized apps to gain access to privileged data,” said co-author Professor Daphne Yao.
The team studied 110,150 apps over three years including 100,206 of Google Play’s most popular apps.
They also studied 9,994 malware apps from Virus Share, a private collection of malware app samples.
The set-up for cybersecurity leaks works when a sender app colludes with a receiver app to share key information.
This means that a seemingly innocuous app, such as the phone’s flashlight, can share contacts, geolocation, and other private information with malware apps.
The team found that the biggest security risks were some of the least useful apps – software designed for the personalization of ringtones, widgets, and emojis.
Professor Wang stated:
“App security is a little like the Wild West right now with few regulations.
We hope this paper will be a source for the industry to consider re-examining their software development practices and incorporate safeguards on the front end.
We can’t quantify what the intention is for app developers in the non-malware cases.
But we can at least raise awareness of this security problem with mobile apps for consumers who previously may not have thought much about what they were downloading onto their phones.”
With Pokémon Go currently enjoying, what I would call, a wee-bit-o-success, now seems like a good time to talk about a few things people may not know about the world’s favorite new smartphone game.
This is not an opinion piece. I am not going to tell you Pokémon Go is bad or that it invades your privacy. I’m merely presenting verifiable facts about the biggest, most talked about game out there. Let’s start with a little history.
Way back in 2001, Keyhole, Inc. was founded by John Hanke (who previously worked in a “foreign affairs” position within the U.S. government). The company was named after the old “eye-in-the-sky” military satellites. One of the key, early backers of Keyhole was a firm called In-Q-Tel.
In-Q-Tel is the venture capital firm of the CIA. Yes, the Central Intelligence Agency. Much of the funding purportedly came from the National Geospatial-Intelligence Agency (NGA). The NGA handles combat support for the U.S. Department of Defense and provides intelligence to the NSA and CIA, among others.
Keyhole’s noteworthy public product was “earth” Renamed to “Google Earth” after Google acquired Keyhole in 2004.
In the following video, tech journalist Bryan Lunduke joins one of my favorite radio hosts, Jimmy Church to talk about the crazy connections between the CIA, NSA, Google and Pokemon Go. This is one story for conspiracy theorists that can be officially confirmed…it is real. What is really going on? Well, this is the broadcast that tells the entire saga…from beginning to end…this is a true, not-to-miss show. The discussion about Pokeman and the intelligence community begins around the 52:00 mark…
In 2010, Niantic Labs was founded (inside Google) by Keyhole’s founder, John Hanke.
Over the next few years, Niantic created two location-based apps/games. The first was Field Trip, a smartphone application where users walk around and find things. The second was Ingress, a sci-fi-themed game where players walk around and between locations in the real world.
In 2015, Niantic was spun off from Google and became its own company. Then Pokémon Go was developed and launched by Niantic. It’s a game where you walk around in the real world (between locations suggested by the service) while holding your smartphone.
Data the game can access
Let’s move on to what information Pokémon Go has access to, bearing the history of the company in mind as we do.
When you install Pokémon Go on an Android phone, you grant it the following access (not including the ability to make in-app purchases):
Find accounts on the device
Find accounts on the device
Precise location (GPS and network-based)
Approximate location (network-based)
Modify or delete the contents of your USB storage
Read the contents of your USB storage
Modify or delete the contents of your USB storage
Read the contents of your USB storage
Take pictures and videos
Receive data from the internet
Pair with Bluetooth devices
Access Bluetooth settings
Full network access
Use accounts on the device
View network connections
Prevent the device from sleeping
Based on the access to your device (and your information), coupled with the design of Pokémon Go, the game should have no problem discerning and storing the following information (just for a start):
Where you are
Where you were
What route you took between those locations
When you were at each location
How long it took you to get between them
What you are looking at right now
What you were looking at in the past
What you look like
What files you have on your device and the entire contents of those files
I’m not going to tell people what they should think of all this. I’m merely presenting the information. I recommend looking over the list of what data the game has access to, then going back to the beginning of this article and re-reading the history of the company.
Article posted with permission from The Last Great Stand