DaniMartExtras, Too

ALTERNATIVE NEWS NETWORK

REAL NEWS April 13

Posted by Xaniel777 on April 13, 2012

TODAY’S NEWS : April 13, 2012

================================================================================================

MAKE THIS VIRAL! Freedom Reigns-Mass Arrests for the cabal

———————————————————————–

{ XANIEL’S NOTE : I know most of you have already seen the ‘ David Wilcock interview with Drake ‘ and may have seen this one as well.

However, on the off chance anyone missed it or would like to see again, here is the , ‘  Deatra interview with guest Drake ‘ !~~ Xaniel777

———————————————————————–

Published on Mar 18, 2012 by 

Deatra hosts with guest Drake. Drake explains that The People have given civilian authority to the services to make changes to bring us back to the true government for and by the people.

Drake also warns everyone to not miss read what is going on. They are NOT coming for the people the cabals time is up! Please prepare for the coming “good” change that is coming. Please make this VIRAL!

http://www.blogtalkradio.com/freedomizerradio/freedom-reigns

The foundation has been made. All that is needed is YOU!
Get active, get involved! Opened to all Americans. If you wish to get involved send me a message. Regular everyday people are needed to give their opinion and voice.

freedom reigns website: http://freedomreigns.us/

DISCLAIMER: This movement in NO way what so ever has anything to do with the Tim Turner group, RuSA (Republic for the united States) or any other group.

We are Americans without contracts or red thumb prints etc. We are free thinking people how have decided that we have had enough and acted accordingly. We have no leader and are not trying to create our own government. We just want to cleanup the present one.

END

 

 

 

Dragon Family

 

From Bejamin Fulford’s Blog

April 12, 2012

QUESTION :

I read your most recent blog. I am confused. I was under the impression that the Dragon Family stood for humanitarian purposes. However your blog equates them with the corrupt members of the Federal Reserve. So what does this do to the credibility of the trillion dollar lawsuit?

I read the whole article by David Wilcox. I also listened to your interview with Sean David Morton in which he asked about the jurisdiction of the Southern District Court of New York in a claim against international defendants.

I was thinking that the claim was filed more for the exposure as it is public information. So even if the court refuses to hear the case due to it’s limits on jurisdictional oversight, at least the information contained in the complaint is available to the public. Please inform me as to your opinion regarding this matter.

I greatly admire you as I have always fought for my rights. I have been wrongly and maliciously prosecuted both criminally and civilly. I had the charges/claims dropped against me in both cases.

I overcame immense corruption from attorneys, judges, the DA, and my insurer. I am intimately familiar with the corruption in the judicial system and how this relates to government control.

I recently saw a video from the show “Frontline” on “the Secret Government.” However I question everything I am shown as opposed to what I see. It did make some astonishing claims that were very discouraging and I was curious as to your feelings about this.

I do believe there is a very real government conspiracy against the civilian population to control the free will, exploit the needs, restrict the rights, and to crush the spirits of the public for the freedom of life, liberty, and the pursuit of happiness. Instead I believe the government wishes to create a society more like that of China.

I would like to contribute to your cause. I enjoy writing and can convey strong messages with words of great meaning. If you know of an opportunity for me to apply these skills, I would be very interested to learn more.

Thank you for all your efforts. I look forward to your response.

Sincerely,

David

———————————————-
ANSWER :

Dear David,

 
The best way you can help is to spread the truth. If you are in a position to take specific legal action against these people, please do so.

My understanding about the Dragon family in the lawsuit is that they are real but that the Feds have been muddying up the waters by also claiming that they are the “dragon family.”

It is a delaying and obfuscation tactic on their part but we have seen through it and are blocking it. One way or another, these criminals will have to go.

Benjamin Fulford

==================================================================================================

RE: Bill Gates at Stanford

QUESTION :

Hi Benjamin,

Would you be able to prove that Fox news covered this story? The video that has been circulating on the internet about Timothy Geithner’s arrest is from 2010. Look at the date under this video: http://www.youtube.com/watch?v=7E6XH9R6fiI

When you say we checked are you referring to Kerry Cassidy from Project Camelot? Apparently Bill Gates doesn’t work for Microsoft anymore: http://www.itworld.com/business/111782/bill-gates-doesnt-work-microsoft-anymore  So I’m not sure how Microsoft would be able to confirm or deny whether or not Bill Gates had been arrested.

I would appreciate if you could clarify this, because many people who have been following this are starting to question whether or not some of these arrests have actually occurred. If we cannot confirm that these arrests have occurred how can we be confident that mass arrests will take place soon?

Best wishes,

J
———————————————–

ANSWER :

Hello  J,

My understanding about Timothy Geithner and Bill Gates and others being arrested was that they were detained for questioning and then released. This has happened with Tony Blair, George Bush Senior and others.

However, until we see these people actually removed from power skepticism is the best policy. They try to plant disinformation with me all the time and sometimes they get through my fact checking.

However, I am confident these people were detained and questioned and released because they cooperated with the people doing the questioning. 

Benjamin Fulford. 

END

 

 

 

With Earthshaking Developments

 

From URBAN SURVIVAL 

If you’ve read this column for any length of time, you’ll maybe have spotted by writing technique:  I often write about things which are slightly greater than zero possibilities as though they are far out, and thus, our initial brush with the concept behind them is light, air, and highly speculative.

 And then in comes data and the mood changes from once light to deadly-serious-as-a-heart-attack and we’re seeing a number of such developments this morning which – in their totality – may be taken as earthshaking.

Over the past few years, since the earthquakes started up at the top of the Baja Peninsula, I have made repeated remarks about the suitability of El Centro be become a key saltwater recreation Mecca. 

Parts of El Centro are 50-feet below sea level, and that’s something which runs all the way up into the valley south of Palm Springs, something I didn’t know until my buddy Vince (the cell tower mogul) pointed me at the terrain maps he’s got his company using to pick up 4G tower sites.

 We’re on the verge of making the transition from semi-humorous (sardonic, maybe) to “Oh-oh, hope that doesn’t really happen…” for a number of reasons.

 Reason #1:  6-minutes after midnight local time there was 6.2 quake in the region:

143 km (89 miles) NE (48 degrees) of Guerrero Negro, Baja California Sur, Mexico

155 km (96 miles) W (270 degrees) of La Doce, Sonora, Mexico

183 km (114 miles) NNW (337 degrees) of Santa Rosalia, Baja Calif. Sur, Mexico

206 km (128 miles) W (263 degrees) of Hermosillo, Sonora, Mexico

557 km (346 miles) SE (136 degrees) of Tijuana, Baja California, Mexico

Reason #2: Then, run the clock forward 11-minutes and along comes a 6.9 earthquake located:

134 km (84 miles) NE (48 degrees) of Guerrero Negro, Baja California Sur, Mexico

162 km (101 miles) W (268 degrees) of La Doce, Sonora, Mexico

180 km (112 miles) NNW (334 degrees) of Santa Rosalia, Baja Calif. Sur, Mexico

214 km (133 miles) W (262 degrees) of Hermosillo, Sonora, Mexico

557 km (346 miles) SE (137 degrees) of Tijuana, Baja California, Mexico

This is about a half-dozen miles from the location of the first shaker.  There have been multiple shakers in the 4+ category since, and we would not be surprised to be alerted to an even bigger quake to come in the region.

 All of which wouldn’t be particularly interesting if the I-Ching Inbox (which sometimes seems to have a mind of its own), delivering timely hints about how the world-at-large properly fits together, delivered the suggestion that I watch this YouTube video about a young man named Joe Brandt who in 1937 at age 17 following an accident, had repeated visions of California sliding into the Pacific Ocean and it was a dream shown in sufficient detail that it has remained a keystone in religious prophesy for our time.

 Although there are some who would sneer at anything with a “religious” connection, I’m not one of those for the simple reason that whether religion is a kind of personal operating system that let’s a person access such info, or whether it’s the source code doesn’t matter.  The point is that there is a long – very long – and detailed history of concern about California “sliding off” that goes back decades.

 Did I mention the 4.3 shaker down south of Salt Lake City last night?

 A couple of hours on YouTube, and Google will find enough references to West Coast quake disaster make your hair stand on end.  Since we already know (in a somewhat provable way) that – as Clif writes often – changes in language precede changes in shared reality, we cannot ignore any data because of its source. 

My sense is that data from language shift, spirit-work (ayahuasca), prophetic dreams, religious revelation, remote viewing, and deep meditation, are all cuts from the same cloth, and the right role of armchair researchers (like us) is to pull as much of the data and look for technique and then see if we can get a personal grasp of the underlying fabric and then how we can take personal cuts and get them right.

 Another serving from the I-Ching Inbox along this like was the story that “Remote Viewers predict a catastrophic meteor impact before 2013.

 Which is pretty damn fascinating because at a pseudo-scientific level it “tears apart” nicely as a semi-fit as the Brandt vision and the RV results involve at the archetype level large pieces of rock going into the ocean and devastation. 

Brandt’s, being the more specific, places the time around 4 PM to 4:40 PM local time and on a spring afternoon with good weather, still air (not windy), a lack of birds, and freakily dressed people on Hollywood Blvd.  So, timing-wise, a “Brandt window” is open now through summer solstice.

 And more?  My Nostradamus expert-in-the-wings, G.A. (Age of Desolation)Stewart is wondering, too:

“I’m looking at that Nostradamus’ May 10 date for California after these quakes yesterday and today… no year attached to it, but it did coincide with war in the Middle East. Just a thought.”

And at the personal level, I had a compelling dream last night about people being herded onto a bus headed for the afterlife at 6:32.  The reason this struck me as so interesting as I contemplated the quake data?  The dream happened before I saw the Brandt video and that would be when such an event would become apparent two time zones later. Which is where we are…

Next item from the I-Ching Inbox was a reminder about the earthquake data for last month from our reader who so generously crunches the USGS database monthly, going back to 1973.  The red line is a fifth-order polynominal trend line and remember, this chart doesn’t include the major quakes this month which won’t be counted until the May numbers sweep:

And on a slightly bizarre note, out Indonesia Bureau reported this:

“It appears the quakes were retribution from Universe for people’s complaining

 So far, 26 major aftershocks, not to mention Oregon and Mexico popping off. I’m on pins and needles. Every time the floor bounces (which is a lot), I have to be pulled down off the ceiling. After 2009, I’ve decided I hate earthquakes. Give me a hurricane anytime.

 There was a tsunami of sorts. A wave about 60cm/24in hit Aceh. No reported problems. Singapore reported getting a minor shake out of the deal. All in all, considering there were two back-to-back major shakers and a whole swarm of after-shocks in the 5-6 range, things went remarkably well. Mostly panic-induced injuries and five heart-attacks reportedly caused by the temblors. Some minor structural damage. Hoping and praying things don’t start moving our way…”

Be careful what you wish for…

Although predictive linguistics had an outlook for life-changing release language to begin in early March, we’re still living just as before out here in the Outback  of East Texas; life hasn’t changed much except the bugs are back for summer. 

But linguistics might simply have been a month early – and a few more of these mega-quakes, whether along the edge of Southern California which various “seers” already think has an appointment with the Pacific, and yes, that would change the entire world.

END

 

 

 

Russia Is Massing Troops On Iran’s Northern Border And Waiting For A Western Attack

 

From Business Insider

Military & Defense Contributors

By F. Michael Maloof  – April 09, 2012

                             ( photo : AP )

WASHINGTON – The Russian military anticipates that an attack will occur on Iran by the summer and has developed an action plan to move Russian troops through neighboring Georgia to stage in Armenia, which borders on the Islamic republic, according to informed Russian sources.

Russian Security Council head Viktor Ozerov said that Russian General Military Headquarters has prepared an action plan in the event of an attack on Iran.

Dmitry Rogozin, who recently was the Russian ambassador to the North Atlantic Treaty Organization, or NATO, warned against an attack on Iran.

“Iran is our neighbor,” Rogozin said. “If Iran is involved in any military action, it’s a direct threat to our security.” Rogozin now is the deputy Russian prime minister and is regarded as anti-Western. He oversees Russia’s defense sector.

Russian Defense Ministry sources say that the Russian military doesn’t believe that Israel has sufficient military assets to defeat Iranian defenses and further believes that U.S. military action will be necessary.

The implication of preparing to move Russian troops not only is to protect its own vital regional interests but possibly to assist Iran in the event of such an attack. Sources add that a Russian military buildup in the region could result in the Russian military potentially engaging Israeli forces, U.S. forces, or both.

Informed sources say that the Russians have warned of “unpredictable consequences” in the event Iran is attacked, with some Russians saying that the Russian military will take part in the possible war because it would threaten its vital interests in the region.

The influential Russian Nezavisimaya Gazeta newspaper has quoted a Russian military source as saying that the situation forming around Syria and Iran “causes Russia to expedite the course of improvement of its military groups in the South Caucasus, the Caspian, Mediterranean and Black Sea regions.”

This latest information comes from a series of reports and leaks from official Russian spokesmen and government news agencies who say that an Israeli attack is all but certain by the summer.

Because of the impact on Russian vital interests in the region, sources say that Russian preparations for such an attack began two years ago when Russian Military Base 102 in Gyumri, Armenia, was modernized. It is said to occupy a major geopolitical position in the region.

Families of Russian servicemen from the Russian base at Gyumri in Armenia close to the borders of Georgia and Turkey already have been evacuated, Russian sources say.

“Military Base 102 is a key point, Russia’s outpost in the South Caucasus,” a Russian military source told the newspaper. “It occupies a very important geopolitical position, but the Kremlin fears lest it should lose this situation.”

With Vladimir Putin returning to the Russian presidency, the prospect that he again would order an attack on Georgia as he did in August 2008 also has become a possibility, these informed sources say.

The Russians believe that Georgia would cooperate with the United States in blocking any supplies from reaching Military Base 102, which now is supplied primarily by air. Right now, Georgia blocks the only land transportation route through which Russian military supplies could travel.

Fuel for the Russian base in Armenia comes from Iran. Russian officials believe this border crossing may be closed in the event of a war.

“Possibly, it will be necessary to use military means to breach the Georgian transport blockade and establish transport corridors leading into Armenia,” according to Yury Netkachev, former deputy commander of Russian forces in Transcaucasia. Geography of the region suggests that any such supply corridor would have to go through the middle of Georgia approaching Georgia’s capital of Tbilisi given the roads and topography of the country.

In September, the Russian military plans to hold its annual military exercises called Kavkaz 2012. However, informed Russian sources say that preparations and deployments of military equipment and personnel already have begun in anticipation of a possible war with Iran.

These sources report that new command and control equipment has been deployed in the region capable of using the Russian GPS system, GLONASS for targeting information.

“The air force in the South Military District is reported to have been rearmed almost 100 percent with new jets and helicopters,” according to regional expert Pavel Felgenhauer of the Washington-based Jamestown Foundation.

In 2008, Felgenhauer pointed out, Kavkaz 2008 maneuvers allowed the Russian military to covertly deploy forces that successfully invaded Georgia in August of that year.

Defense Minister Anatoly Serdyukov already has announced that new Spetznaz, or Special Forces units, will be deployed in Stavropol and Kislovodsk, which are located in the North Caucasian regions.

READ THE REST OF THIS STORY HERE…

END

 

 

TSA Admits $1B Nude Body Scanner Fleet Worthless!

 

From TSA Out of Our Pants!

Lawsuit against the TSA for 4th Amendment invasion of privacy

April 10, 2012

My last video demonstrated how easy it is to take a metal object through TSA nude body scanners undetected.

In this video, I interviewed an actual TSA screener to hear more about how these machines are an epic fail. “Jennifer,” who asked me not to use her real name or face, has been on the front lines of the TSA’s checkpoints for the last 4 years.

Please share this video with your family, friends, and most importantly, elected officials in federal government. Make sure they understand that your vote is contingent on them fixing the abuse that 200,000 passengers face from the TSA on a daily basis. If you are (or know) a TSA screener who has seen abuse in the TSA, please contact me (below)!

My legal battle against the TSA’s nude body scanner and pat-down molestation program continues in court, soon with a petition to the U.S. Supreme Court. If you’d like to donate to this effort, send PayPal to: jon [at] fourtentech.com

I’d like to thank:

Travel Underground – http://www.travelunderground.org/

Freedom to Travel USA – http://fttusa.org/

Legislators who have stood up to the TSA – especially Dr. Ron Paul & Sen. Rand Paul

…and all those who have both publicly and privately stood up to the TSA.

Add me on Twitter: @tsaoutourpants (no “of”)

Transcript:

In the video I released last month, I showed the world that it’s trivial to beat the TSA’s nude body scanners; all it takes is simply strapping a metal object to your side. I referred to the program as a “giant fraud,” and I chose those words carefully: it was not an oversight, but rather the TSA knowingly imposed these virtual strip searches on us despite the fact that they don’t work.

Now how can I be so sure that the TSA knew that the scanners were broken? Well, in the first video I referred to other countries who take aviation security more seriously than we do had rejected the scanners years ago. Over the last year, we’ve also seen almost the entirety of Europe has backtracked on the body scanners. And there have been dozens of research studies that have shown vulnerabilities in the technology, of which the TSA must surely be aware.

But most importantly, I know because TSA employees have told me so. In the last year and a half since I filed my lawsuit against the scanners and the groping, I’ve received hundreds of e-mails and thousands of comments on my blog, and some from actual TSA employees who have seen the scanners fail first-hand. One of them was nice enough to sit down for an interview with me last week. “Jennifer” has been working with the Transportation Security Administration for the last 4 years as a screener, and had this to tell me:

[Video Interview Segment]
Jon: Were there specific times where this machine didn’t work, for either someone testing it, or a passenger went through and it was determined that they went through with…
Jennifer: Absolutely. Yes, absolutely.
Jon: Metal objects?
Jennifer: Metal, non-metal.
Jon: Big, small?
Jennifer: Both.
Jon: Things like wallets I think you mentioned to me?
Jennifer: Wallets.
Jon: So you’d send someone through the scanner and you’d see a bulge in their pocket, but the scanner would show nothing?
Jennifer: Mmhmm.
Jon: Things during training?
Jennifer: Absolutely.
Jon: What would you test it with when you were testing the machines?
Jennifer: There were different props: guns, knives, bags of powder that were supposed to resemble explosive material.
Jon: Sometimes these would just go through completely undetected?
Jennifer: Absolutely.

Now if it wasn’t scary enough that the TSA deployed these machines knowing they could take simulated bombs through them, Jennifer tells me that they were forcing screeners to run these radiation machines who hadn’t, according to the TSA’s own policies, been properly trained:

[Video Interview Segment]
Jon: They tried to send you to the machines, and you said, ‘Hold on, I’m not certified.’
Jennifer: Right.
Jon: And then in December I guess you tried the same thing and they said, ‘Too bad?’
Jennifer: We were forced to work on these machines. So basically, there were so few of us trained to work on the machines, they basically forced us.
Jon: So they didn’t care if you were certified or not?
Jennifer: No, I actually went to my supervisor — or a supervisor — the first day. I and another officer had this concern, that, you know, ‘Look, we’ve never worked on this particular machine, we don’t know what to do’ and his answer was, ‘Sorry, we don’t have enough staffing, you’re going to have to work on it.’
Jon: Certified or not, just get on the machine and make the best of it?
Jennifer: Yep, ‘just have your co-workers help you.’

After Jennifer was repeatedly ignored when she brought these serious issues up with management, she contacted her representatives in Congress for assistance… after which the TSA promptly began the process of firing her! A process, by the way, which took the TSA three months, during which Jennifer was forced to sit around on the taxpayer’s dime and do absolutely nothing. Fortunately, Jennifer turns in her uniform today.

[Video Interview Segment]
Jon: You wrote to Congress about the problems you saw in the TSA.
Jennifer: I did.
Jon: What happened?
Jennifer: I sent my letter on Jan. 1, and I came back from sick leave about a week later, and I was immediately removed from screening duties.
Jon: So you sent a letter to a Congressman — or to several — saying ‘Hey, there’s a problem with the TSA,’ and the TSA’s response was… retaliatory would you say?
Jennifer: Yes.
Jon: Was that the end of your screening duties… have you been back to screening since?
Jennifer: No.

This is why the TSA sucks. Because good employees who point out when the public is being put at risk aren’t listened to, they aren’t promoted – they’re fired! …and what’s left are the pizza-box employees that strip-search grannies, steal from your bags, throw hot coffee on pilots, and shoot up my neighborhood.

And every time another TSA employee is arrested – we’re up to at least 60 in the last 12 months – the TSA spouts off on their blog about the professionalism of their employees, just as when they’re caught on video molesting children at airports, they defend their employees’ fondlings as “by the book” – that book being the “Screening Checkpoint Standard Operating Procedures” or “SOP.” The SOP is the TSA’s secret guide as to how TSA employees are supposed to do screening as airports. The only problem is, TSA employees never actually read that book!

[Video Interview Segment]
Jennifer: Supposedly there is an SOP manual at every checkpoint. I’ve never seen it.
Jon: So you wouldn’t know where to go to find this book?
Jennifer: No, no.
Jon: *laughs*
Jennifer: I know, you can’t make this stuff up, you really can’t.
Jon: Did you read the SOP at any point, during training, or…
Jennifer: You mean initially…
Jon: Did you ever read the SOP from cover-to-cover?
Jennifer: Oh no, no… I’ve never read… no.

Absolutely stunning. I’d like to thank Jennifer for exposing this, and if you’re an attorney that would like to contact Jennifer, send me a message. I’d also like to encourage any of the few good TSA employees left who have seen abuse in the TSA to contact me – see the notes on this video for how to do so, anonymously if you’d prefer.

But there you have it. The TSA was aware of the fatal flaws in the nude body scanner program, yet knowingly defrauded the American taxpayer into buying these machines, as well as travellers from across the globe into posing naked “for their safety.”

Well no more, guys — we’re done posing naked for the TSA. It’s time for the nude body scanner program to be immediately ended, for TSA Administrator John Pistole to be fired, and for the TSA to be dismantled as soon as possible.

I encourage you to make this an election year issue and demand from your candidates a strong commitment to restoring our civil rights – and our sanity at airports. I also encourage anyone who’s asked to go through a body scanner to simply say, “I opt out,” and refuse to participate in this security theatre.

Until next time.

END

The Lucrative Future Of CCTV: Remote Biometrics And Behavioral Suspect Detection

From Alexander Higgins Blog

 Posted by  – April 11, 2012

CCTV surveillance is projected to explode to a massive $3.2 billion industry and will soon incorporate biometric tracking and lead to behavior based detentions.

The Alexander Higgins Blog
Madison Ruppert, Contributor

Recently I reported on how the cloud video surveillance industry, which offers Video Surveillance as a Service (VSaaS), has been experiencing considerable growth with no end in sight. However, the growth in this industry is dwarfed by the potential of the technological revolution of Closed Circuit Television (CCTV) surveillance.

According to the Homeland Security Research Corp. (HSRC), this decade will see a fusion of several technologies including CCTV surveillance, so-called “standoff biometrics” (somewhat similar to the systems being developed by the military and the Department of Homeland Security) and human behavioral signatures or “behavioral recognition” systems.

According to HSRC, this market could reach up to $3.2 billion by just 2016, although that figure includes the sales of systems, upgrades, and post-warranty services and repairs.

These systems were created in order to break through some of the obstacles currently arising in the surveillance industry and the bottlenecks they experience in processing and responding to data.

As of now, there is a lack of ability to respond to information from cameras in real time, but that is being changed through behavioral recognition and almost unbelievably fast facial recognition software.

This kind of technology is also designed to cut down on the cost of keeping large numbers of personnel operating CCTV workstations around the clock.

HSRC says that bringing all of these technologies together will bring opportunities for growth not just to the CCTV industry but also biometrics and IT systems manufacturers, security systems integrators and others in the field of Big Brother technology.

In their report entitled “CCTV Based Remote Biometric & Behavioral Suspect Detection: Technologies & Global Markets – 2011-2016” HSRC lays out their case for the potential growth of the paranoid surveillance state in a whopping 161 pages featuring 104 figures and forecasts in 96 submarkets.

Personally, I was not even aware of many of these submarkets, but given the rise of surveillance in the West, especially in the United States, it is hardly surprising that people would carve out a niche for themselves in order to get their share of the huge amount of American taxpayer dollars spent on useless gadgets.

Some of the submarkets in the technology segment include systems for video content analysis (VCA), walk-by systems, remote biometric identification systems, passive remote behavior detection and tracking systems, stimuli-triggered remote behavioral surveillance and more, many of which sound a bit unsettling.

Other analysis and forecasting includes the end-user market like transportation security, border and perimeter security, critical infrastructure security, government funded projects and foreign markets including China, India, Saudi Arabia and the UK.

Unfortunately, actually getting a copy of the entire PDF costs $4,450 for a single user, which is far beyond our resources here at End the Lie. This leaves us unable to conduct as thorough of an analysis and breakdown as we’d like.

That being said, it is clear that the surveillance industry is not going anywhere anytime soon, and as much as I would like this not to be the case, it seems almost inevitable with the paranoid culture we live in today.

I’d love to hear your opinion, take a look at your story tips, and even your original writing if you would like to get it published. Please email me at Admin@EndtheLie.com 

Please support Alexander Higgins work to help him start to pay contributors by doing your shopping through Alex’s  Amazon Link.

This article first appeared at End the Lie.

Madison Ruppert is the Editor and Owner-Operator of the alternative news and analysis database End The Lie and has no affiliation with any NGO, political party, economic school, or other organization/cause. He is available for podcast and radio interviews. Madison also now has his own radio show on Orion Talk Radio from 8 pm — 10 pm Pacific, which you can find HERE.  If you have questions, comments, or corrections feel free to contact him at admin@EndtheLie.com

Related Posts :

END

This Creepy App Isn’t Just Stalking Women Without Their Knowledge, It’s A Wake-Up Call About

Facebook Privacy [Update]

From Cult of Mac

By John Brownlee

March 30, 2012

This Creepy App Isn’t Just Stalking Women Without Their Knowledge, It’s A Wake-Up Call About Facebook Privacy [Update]

This app is meant to all be in good fun, but it’s potentially a weapon in the hands of stalkers.

“Boy, you sure have a lot of apps on your phone.”

“Well, it’s my job.”

“What’s your favorite?”

“Oh, I couldn’t choose. But hey, want to see one to set your skin crawling?”

It was the flush end of a pleasurably hot day — 85 degrees in March — and we were all sipping bitter cocktails out in my friend’s backyard, which was both his smoking room, beer garden, viticetum, opossum parlor and barbecue pit. I was enjoying the warm dusk with a group of six of my best friends, all of whom seemed interested, except for my girlfriend… who immediately grimaced.

Girls Around Me? Again?” she scolded. “Don’t show them that.”

She turned to our friends, apologetically.

“He’s become obsessed with this app. It’s creepy.”

I sputtered, I nevered, and I denied it, but it was true. I had become obsessed with Girls Around Me, an app that perfectly distills many of the most worrying issues related to social networking, privacy and the rise of the smartphone into a perfect case study that anyone can understand.

It’s an app that can be interpreted many ways. It is as innocent as it is insidious; it is just as likely to be reacted to with laughter as it is with tears; it is as much of a novelty as it has the potential to be used a tool for rapists and stalkers.

And more than anything, it’s a wake-up call about privacy.

The only way to really explain Girls Around Me to people is to load it up and show them how it works, so I did. I placed my iPhone on the table in front of everyone, and opened the app.

The splash screen elicited laughter all around. It’s such a bitmap paean to the tackiest and most self-parodying of baller “culture”; it might as well be an app Tom Haverford slapped together in Parks And Recreation.

But it does, at a glance, sum up what Girls Around Me is all about: a radar overlaid on top of a Google Map, out of which throbs numerous holographic women posing like pole dancers in a perpetual state of undress.

“Okay, so here’s the way the app works,” I explained to my friends.

Girls Around Me is a standard geolocation based maps app, similar to any other app that attempts to alert you to things of interest in your immediate vicinity: whether it be parties, clubs, deals, or what have you.

When you load it up, the first thing Girls Around Me does is figure out where you are and load up a Google Map centered around your location.

The rest of the interface is very simple: in the top left corner, there’s a button that looks like a radar display, at the right corner, there’s a fuel meter (used to fund the app’s freemium model), and on the bottom left is a button that allows you to specify between whether you’re interested in women, men or both.

It’s when you push the radar button that Girls Around Me does what it says on the tin. I pressed the button for my friends.

Immediately, Girls Around Me went into radar mode, and after just a few seconds, the map around us was filled with pictures of girls who were in the neighborhood.

Since I was showing off the app on a Saturday night, there were dozens of girls out on the town in our local area.

This Creepy App Isn’t Just Stalking Women Without Their Knowledge, It’s A Wake-Up Call About Facebook Privacy [Update]

Girls Around Me’s splash screen (left) and geo-maps interface (right). Lots of girls around the MFA.

“Wait… what? Are these girls prostitutes?” one of my friends asked, which given the Matrix-like silhouettes posing on the splash screen was a pretty good question.

“Oh, no,” I replied. “These are just regular girls. See this girl? Her name’s Zoe. She lives on the same street as me and Brittany. She works at a coffee shop, and I’m pretty sure she doesn’t moonlight picking up tricks.”

“How does it know where these girls are? Do you know all these girls? Is it plucking data from your address book or something?” another friend asked.

“Not at all. These are all girls with publicly visible Facebook profiles who have checked into these locations recently using Foursquare. Girls Around Me then shows you a map where all the girls in your area trackable by Foursquare area. If there’s more than one girl at a location, you see the number of girls there in a red bubble. Click on that, and you can see pictures of all the girls who are at that location at any given time. The pictures you are seeing are their social network profile pictures.”

“Okay, so they know that their data can be used like this for anyone to see? They’re okay with it? ”

“Probably not, actually. The settings determining how visible your Facebook and Foursquare data is are complicated, and tend to be meaningless to people who don’t really understand issues about privacy,” I explained. “Most privacy settings on social networks default to share everything with everyone, and since most people never change those… well, they end up getting sucked up into apps like this.”

“But they know they’ve checked in, right?”

“Again, not necessarily. Foursquare lets you check other people into a location. If you get checked into Foursquare by a friend without your knowledge and have a publicly visible Facebook profile, you could end up in here.” (Update: Apparently, I wasn’t correct about this. Foursquare does NOT allow you to check other people in with you without their knowledge; I was confusing Foursquare for Facebook, which does offer this functionality. Thanks for the correction, unknown8bit! – JRB)

One of my less computer-affable friends actually went pale, and kept on shooting her boyfriend looks for assurance. A Linux aficionado who was the only person in our group without a Facebook account (and one of the few people I’d ever met who actually endorsed Diaspora), the look he returned was one of comical smugness.

“But wait! It gets worse!” I said, ramping things up.

“So let’s say I’m a bro, looking to go out for a night on the town and pick someone up. Let’s say I’m going to the Independent around the corner, and checking it out ahead of time, I really like the look of this girl Zoe — she looks like a girl I might want to try to get with tonight — so I tap her picture for more information, see what I can find out about here.”

I tapped on Zoe. Girls Around Me quickly loaded up a fullscreen render of her Facebook profile picture. The app then told me where Zoe had last been seen (The Independent) and when (15 minutes ago). A big green button at the bottom reading “Photos & Messaging” just begged to be tapped, and when I did, I was whisked away to Zoe’s Facebook profile.

“Okay, so here’s Zoe. Most of her information is visible, so I now know her full name. I can see at a glance that she’s single, that she is 24, that she went to Stoneham High School and Bunker Hill Community College, that she likes to travel, that her favorite book is Gone With The Wind and her favorite musician is Tori Amos, and that she’s a liberal. I can see the names of her family and friends. I can see her birthday.”

“All of that is visible on Facebook?” one of the other girls in our group asked.

“More, depending on how your privacy settings are configured! For example, I can also look at Zoe’s pictures.”

I tapped on the photo album, and a collection of hundreds of publicly visible photos loaded up. I quickly browsed them.

“Okay, so it looks like Zoe is my kind of girl. From her photo albums, I can see that she likes to party, and given the number of guys she takes photos with at bars and clubs at night, I can deduce that she’s frisky when she’s drunk, and her favorite drink is a frosty margarita. She appears to have recently been in Rome. Also, since her photo album contains pictures she took at the beach, I now know what Zoe looks like in a bikini… which, as it happens, is pretty damn good.”

My girlfriend scowled at me. I assured her Zoe in a bikini was no comparison, and moved on.

“So now I know everything to know about Zoe. I know where she is. I know what she looks like, both clothed and mostly disrobed. I know her full name, her parents’ full names, her brother’s full name. I know what she likes to drink. I know where she went to school. I know what she likes and dislikes. All I need to do now is go down to the Independent, ask her if she remembers me from Stoneham High, ask her how her brother Mike is doing, buy her a frosty margarita, and start waxing eloquently about that beautiful summer I spent in Roma.”

This Creepy App Isn’t Just Stalking Women Without Their Knowledge, It’s A Wake-Up Call About Facebook Privacy [Update]

The Girls of Girls Around Me. It’s doubtful any of these girls even know they are being tracked. Their names and locations have been obscured for privacy reasons.

Throughout this demonstration, my group of friends had been split pretty evenly along gender lines in their reactions. Across the board, the men either looked amused or (in the case of my beardo Diaspora friend) philosophically pleased with themselves about their existing opinions about social networking. The women, on the other hand, looked sick and horrified.

It was at this point, though, that the tendrils of the girls’ unease — their deeply empathic sense of someone being unsafe — seemed to creep through the entire group.

“And if that doesn’t work on Zoe,” I concluded, consulting the app one last time. “There are — let’s see — nine other girls at the Independent tonight.”

Often times, a writer uses tricks and exaggerations to convey to a reader the spirit — if not the precise truth — of what occurred. I just want to make clear that when I say that one of my friends was actually on the verge of tears, you understand that this is not such a trick. She was horrified to the point of crying.

“How can Apple let people download an app like this?” she asked. “And have you written about this?”

In answer to the first question, I replied that as sleazy as this app seemed, Girls Around Me wasn’t actually doing anything wrong. Sure, on the surface, it looks like a hook-up app like Grindr for potential stalkers and date rapists, but all that Girls Around Me is really doing is using public APIs from Google Maps, Facebook and Foursquare and mashing them all up together, so you could see who had checked-in at locations in your area, and learn more about them.

Moreover, the girls (and men!) shown in Girls Around Me all had the power to opt out of this information being visible to strangers, but whether out of ignorance, apathy or laziness, they had all neglected to do so. This was all public information. Nothing Girls Around Me does violates any of Apple’s policies.

In fact, Girls Around Me wasn’t even the real problem.

“It’s not, really, that we’re all horrified by what this app does, is it?” I asked, finishing my drink. “It’s that we’re all horrified by how exposed these girls are, and how exposed services like Facebook and Foursquare let them be without their knowledge.”

But I didn’t have an easy answer ready for my friend’s last question. I’d been playing with the app for almost two months. Why hadn’t I written about it? None of the answers made me look good.

Part of it was because, like many tech professionals, I had taken for granted that people understood that their Facebook profiles and Foursquare data were publicly visible unless they explicitly said otherwise… and like my beardo Diaspora friend, I secretly believed that people who were exposed this way on the Internet without their knowledge were foolish.

That made Girls Around Me a funny curio, a titillating novelty app, the kind of thing you pulled out with your buddies at the bar to laugh about… and maybe secretly wish had been around when you were younger and single and trying to pull some action. And if I’d written a post about it a month ago, it would have probably been from that angle. The headline might well have been: “No More Sausage Fests With Girls Around Me [Humor]”

It was in just this spirit that I’d shown off the app to my friends in the first place. It was getting late, we were all drunk or on the verge of getting there, and it had been a perfect day. It would have been so nice to finish things with a laugh.

But now, as six intelligent, sophisticated friends from a variety of backgrounds surrounded me — some looking sick, some looking angry, and some with genuine fear in their faces — I didn’t think Girls Around Me was so funny. It had cast a pall across a beautiful day, and it had made people I loved feel scared… not just for the people they loved, but for complete strangers.

So I’m writing about it now. Not because Girls Around Me is an evil app that should be pulled from the iOS App Store, or because the company that makes it — Moscow-based i-Free — is filled with villains.

I still don’t believe that there’s anything wrong with what this app is doing, and the guys at i-Free are super nice, and certainly don’t mean for this app to be anything beyond a diversion. So, the reason I’m writing about Girls Around Me is because I finally know what to say about it, and what it means in the greater picture.

Girls Around Me isn’t an app you should use to pick up girls, or guys for that matter. This is an app you should download to teach the people you care about that privacy issues are real, that social networks like Facebook and Foursquare expose you and the ones you love, and that if you do not know exactly how much you are sharing, you are as easily preyed upon as if you were naked.

I can think of no better way to get a person to realize that they should understand their Facebook privacy settings then pulling out this app.

That’s why I hope you’ll go download Girls Around Me on your iPhone or iPad. It’s free to download. Show it to someone. Give them the same demo I gave to my friends. Then, when they ask how it’s done and how they can prevent an app like Girls Around Me from tracking them, educate them about privacy.

Here’s a good place to start.

Update: In response to this story, Foursquare has killed Girls Around Me’s API access to their data, effectively knocking the app out of commission. For more details and a statement from Foursquare, read here.

Update 2: As of Saturday evening, Girls Around Me has been yanked from the iOS App Store.

Update 3: Girls Around Me developer i-Free has released a full statement on the app, in which they say they’ve done nothing wrong and been made a scapegoat for privacy issues. You can read their response — and ours — here.

Update 4: Think this issue’s dead now that Girls Around Me has been killed? It’s not at all. In fact, it’s very possible Girls Around Me could come back with its core functionality intact.

Update 5: We’ve written a guide on cutting apps like Foursquare and Facebook off from tracking your data. Read it here.

Update 6: Girls Around Me’s developer gave Cult of Mac an interview, in which they said that the app wasn’t for stalking girls without their knowledge, but for avoiding women who are ugly.

END

Fair Use Notice ):

This web site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance the understanding of humanity’s problems and hopefully to help find solutions for those problems. We believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. A click on a hyperlink is a request for information. Consistent with this notice you are welcome to make ‘fair use’ of anything you find on this web site. However, if you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner. You can read more about ‘fair use’ and US Copyright Law at the Legal Information Institute of Cornell Law School. This notice was modified from a similar notice at Information Clearing House.} ~~ Xaniel777

©2009/2010/2011/2012Danimartextras

Sorry, the comment form is closed at this time.

 
%d bloggers like this: