New post on Dutchsinse |
|
This is an Awareness Blog to consider the future of your world. Actions are being done now to restore our freedom. County, State, and National Assemblies are forming across our world nullifying the corrupt corporations. Watch and become AWARE! Participate and be a part of making history! 62 MILLION VIEWS PER MONTH Exclusive public outlet for documentation and notices from The Original Jurisdiction Republic 1861 circa 2010.
New post on Dutchsinse |
|
The NSA Stole the Keys to Your Phone.......
| |
Can You Believe This Video?! This shocking interview has already gone viral. But if you don’t act quickly, you might not get to see it at all. That’s because one analyst is making a bold prediction about a new movement that will ignite the greatest financial and political crisis America has ever seen. And some would like to see him silenced. To watch this shocking interview, click here. | |
By Ted Baumann, Offshore and Asset Protection EditorDo you accept it and move on? Continue your attempts at persuasion? Or ignore the answer and do what you want regardless? If you’re the governments of the U.S. and U.K., you make the third choice. You do what you want and congratulate yourself on a job well done. That’s the message the rest of the world will take away from the news that the National Security Agency (NSA) and its British counterpart, the Government Communications Headquarters (GCHQ), stole the master encryption keys for most of the world’s cellphones — including yours. They wanted them, so they just took them, violating numerous laws and treaties in the process. Washington and London now have some explaining to do, especially to the Netherlands, where the theft took place. But you have some work to do as well … to beat these privacy thieves at their own dirty game. Urgent Warning for Anyone Carrying a U.S. Passport Issued After 2007 Did you know that all U.S. passports issued after 2007 have a weakness that can electronically broadcast your private information to identity thieves, electronic pickpockets, and the biggest snoop of all — Uncle Sam?! Hidden, hair-thin computer chips implanted in the passports allow your ultra-private personal data to be read 35 feet away! But, there’s a way to opt-out of becoming a moving target. You can travel with a second passport. In the just released 11th edition of The Passport Book, Bob Bauman shows you step-by-step how to get a second passport in 30 days or less. Click here to get your copy. Stealing the Master KeyThe privacy of your mobile communications — voice calls, text messages and Internet access — depends on an encrypted connection between your cellphone and your wireless carrier’s network. This encryption uses keys stored on the SIM, a tiny chip inserted into your phone.In April 2011, the NSA and GCHQ created a Mobile Handset Exploitation Team (MHET) to steal the keys that would unlock this encryption. The MHET targeted a Dutch company called Gemalto that makes these chips. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. By hacking the email and Facebook accounts of employees at Gemalto and its clients, the MHET was able to steal Gemalto’s master encryption keys. They even created a program that would steal the keys automatically. With these stolen keys, the NSA and GCHQ can monitor mobile communications without warrants, wiretaps or approval from telecom companies and governments, leaving no trace of their actions. They can just vacuum up cellular signals out of the air and listen to any or all of the communications they intercept. Key Weakness: Single-Tier EncryptionThe reason this NSA/GCHQ hack works is because your cell communications are encrypted by your wireless carrier using keys that they possess. With the keys, anyone can listen in to your calls, texts or emails. You have no control over the matter — unless you take steps to protect yourself.As numerous observers have noted, the implications of wholesale compromise of master cell encryption keys go well beyond the NSA and GCHQ. After all, if they can steal these keys, so can other countries. Naturally, criminals and fraudsters would love to get their hands on them too: Imagine how much money you could make if you had access to cell calls made around Wall Street. But the Gemalto hack may be about much more than cellphones. The company is a global leader in digital security, producing banking cards, mobile payment systems, building security devices and identification cards. Among its clients are Visa, MasterCard, American Express, JP Morgan Chase and Barclays. It also provides chips for luxury cars, including those made by Audi and BMW. Oh, and one other client: the U.S. government, which uses Gemalto technology in its electronic passports. Assume the Worst and PrepareYou should assume that your cellphone is insecure and that someone is listening in on your communications. Time will tell whether the same is true of your credit cards, passport and car as well.But there is a simple way to beat this invasion of your cellular privacy. Rather than rely on your cellphone company’s SIM card-based security, use secure communications software that encrypts your calls, texts and emails with a private key that only you and your contacts know. You can encrypt your voice calls by using encrypted Voice over Internet Protocol (VoIP) apps such as Signal, RedPhone and Silent Phone. These work by turning your calls into encrypted Internet data, bypassing cell networks entirely. Apps such as TextSecure and Silent Text similarly encrypt your text messages. Email services such as Gmail are already encrypted, but you can double down by adopting a specialist service such as Proton Mail. If you use these encryption apps, governments may still be able to intercept your communications, but listening to them would be impossible without targeting you specifically with time-consuming high-tech codebreaking efforts. And even then they would probably fail. So what are you waiting for? Secure your cell communications quickly and simply. I have. Kind regards, Ted Baumann Offshore and Asset Protection Editor P.S. America is on the verge of meltdown. The loss of privacy in the U.S. is just one problem that is threatening to tear the country apart. Jeff Opdyke has identified a growing movement in the U.S. that could change the landscape of the U.S. forever and crush the dollar. To learn how you can financially protect yourself from this tidal wave of change, click here. |
The stop was routine police work, except for one fact: Youlen is not a Manassas officer. The citation came courtesy of the private force he created that, until recently, he called the “Manassas Junction Police Department.”
He is its chief and sole officer.
He is a force of one.
And he is not alone. Like more and more Virginians, Youlen gained his police powers using a little-known provision of state law that allows private citizens to petition the courts for the authority to carry a gun, display a badge and make arrests. The number of “special conservators of the peace” — or SCOPs, as they are known — has doubled in Virginia over the past decade to roughly 750, according to state records.
The very next sentence is where the deception occurs:
The growth is mirrored nationally in the ranks of private police, who increasingly patrol corporate campuses, neighborhoods and museums as the demand for private security has increased and police services have been cut in some places.
Most SCOPs patrol corporate campuses, work for neighborhood associations or perform code enforcement for counties or cities, but Youlen has pushed the model further by creating his own “department” and turning policing into an enterprise. He contracts his services to nine apartment and housing communities in the Manassas area. That’s up from one in 2012.