Connect with us

Department of Homeland Security

Major Defense Company Develops Software For Gov’t To Track ‘Trillions Of Entities’

A top government defense contractor revealed it created software that can sift through social media sites to collect information from “trillions of entities” in order to reasonably predict a person’s next move.

Published

on

ratheon-riot-1
SHARE NOW THE END BEGINS:

Rapid Information Overlay Technology

A top government defense contractor revealed it created software that can sift through social media sites to collect information from “trillions of entities” in order to reasonably predict a person’s next move.

The spokesperson for the Massachusetts-based company Raytheon, Jared Adams, told The Guardian in an email that it developed RIOT (Rapid Information Overlay Technology), which is “a big data analytics system design we are working on with industry, national labs and commercial partners to help turn massive amounts of data into usable information to help meet our nation’s rapidly changing security needs.”

The Guardian obtained a video showing Raytheon’s Brian Urch explaining the RIOT software and how it uses photographs that are embedded with location data (generally they’re taken by smartphones) to conduct analysis about where the person was and where they might be going next.

ratheon-riot-1

This image shows where a Raytheon employee had checked in with his smartphone. (Image: The Guardian video screenshot)

Urch explains in the video that the software uses Facebook, Twitter and Foursquare. He tracks one of Raytheon’s own employees as an example. He shows all the places the employee — Nick — checked in with his smartphone. Then Urch goes to look for photos.

ratheon-riot-2

Now they can see what Nick looks like. (Image: The Guardian video screenshot)

“One of the things we’ve noticed is that when people take pictures and post them on the Internet using their smartphones that the phone will actually embed the latitude and longitude using the exif header data,” Urch said. “Now we know where Nick’s going, what he looks like, now we want to predict where he may be in the future.”

By using a “very basic analytic” called “get top places,” Urch shows a pie chart that breaks down the top 10 places where Nick checks in. He is able to analyze check ins at a specific place by month and day. For example, Nick checks in the most at the gym. June was found to hold his highest gym attendance, and he seems to go more frequently on Mondays and Wednesdays. And the “most interesting” bit of info is that Urch is able to show the time when Nick most likely would be there — 6 a.m.

ratheon-riot-3

A look into the specifics of Nick’s daily schedule based on check-in trends. (Image: The Guardian video screenshot)

“If you ever did want to try to get a hold of Nick or maybe get a hold of his laptop, you might want to visit the gym at 6 a.m. on Monday,” Urch said. The software also shows the people with whom Nick has some sort of connection, whether they be tagged in checkins or shout outs on Twitter.

ratheon-riot-4

A web of Nick’s connections with other people. Some phone numbers were included too. (Image: The Guardian video screenshot)

The Guardian reports that this software has not been sold, but it was shared with the U.S. government as it was part of a join research effort that took place in 2010 to develop a system that could analyze “trillions of entities” on the Web.

The Guardian dubs the software  a “Google for spies” given that it has a similar look and search function. The company filed for a patent for RIOT in December and is expected to feature the program at an industry conference in April, according to The Guardian.

If you haven’t come up with your own concerns over the use of such technology, here is what The Guardian reported the Electronic Privacy Information Center’s attorney Ginger McCall saying:

“Social networking sites are often not transparent about what information is shared and how it is shared,” McCall said. “Users may be posting information that they believe will be viewed only by their friends, but instead, it is being viewed by government officials or pulled in by data collection services like the Riot search.”

While some have called it “stalking software,” ZDNet’s Steven Vaughan-Nichols pointed out it’s “business as usual”:

Here’s the simple truth: If you put your personal details on the Internet, especially on the social networks, it doesn’t require any fancy defense contractor software to track your every move. The social networks themselves can do it. Advertisers can do it. Anyone with a lick of computer sense can do it.

If you want to keep your private life private, you have to keep it off the Internet. It’s really that easy.

This also isn’t the first time that the government has had an interest in monitoring social media for national security measures. For several years the government has been monitoring Twitter and even has a media monitoring component that can tracks journalists who post publicly on traditional and social media. source – The Blaze

 

9/11 Explained

After 9/11 Attacks People Stopped Asking Whatever Happened To The Missing $2.3 Trillion Dollars At Pentagon

Sources from inside the Pentagon have confirmed to us that all those rooms where the Pentagon was hit were cleaned out 24 hours before the explosion.

Published

on

pentagon-hit-cruise-missile-911-2-trillion-dollars-missing-don-rumsfeld-cia-conspiracy-theory-nteb-the-company
SHARE NOW THE END BEGINS:

Sources from inside the Pentagon have confirmed to us that all those rooms where the Pentagon was hit were cleaned out 24 hours before the explosion.

One day before the Pentagon was hit by a cruise missile, Don Rumsfeld was on camera talking about the “waste and corruption” in the Pentagon. He also mentioned the little tidbit of $2.3 TRILLION DOLLARS that could somehow not be accounted for. The very next day, September 11, 2001, an event would take place that would forever stop people from asking what happened to that money.

The section of the Pentagon that was targeted was an area that contained large amounts of financial records, and had a large number of people working there who were accountants. The people who handle the flow of money in and out of the Pentagon. People naturally assume that all those records were burned up in the explosion, but that is not the case. Sources from inside the Pentagon have confirmed to us that all those rooms where the Pentagon was hit were cleaned out 24 hours before the explosion. The explosion was simply to cover those tracks to make it untraceable…or so they thought.

So where did the money go?

If you have not read our article on why an airplane never hit the Pentagon, please click on the link to read it now. But suffice to say, it was hit and there was an explosion. And in the aftermath of all that carnage, people no longer seemed to care about what happened to all that money. But it surely went somewhere.

We now know that all those funds, and billions more, were absorbed into the shadow government to finance blacks ops around the globe. It is outrageously expensive to fund and equip mercenary forces and send them out to conduct covert black operations 24 hours per day, 7 days a week. Anyone who is a fan of Prison Break knows exactly what I am talking about, The Company is real.

Sean Hannity silenced by ‘The Company’ from talking about Seth Rich:

This is what it looks like when people who get too close to the truth are silenced. Just as he was about to drop a bombshell, Hannity was silenced by the same powerful people who took the missing $2.3 trillion dollars. 

How much do you think it costs to seamlessly execute people like Seth Rich, Andrew Breitbart and Tom Clancy? Do you think that’s cheap? It’s not. Former “alphabet” agent Jim Garrow told me personally on my radio show back in 2013 that both Clancy and Breitbart were shadow government hits. Just last week, Fox News’ Sean Hannity was warned to stop talking about the killing of Seth Rich, and was successfully silenced.

But that $2.3 trillion didn’t last forever, and just a few years ago another $6 billion “went missing” to continue funding covert black ops. The shadow government is this country is how Lincoln and Kennedy were assassinated, how the Federal Reserve came into being, how 9/11 happened, how Osama Bin Laden could never be caught and when it was claimed he was finally caught, not one shred of proof has ever surfaced.

The shadow government is real, they read this article and stored it in the Utah Data Center before I even hit the “publish” tab on my computer. But don’t you worry about that, just go back to sleep and forget all about that $2.3 trillion.

Everyone else has.

 


 

Continue Reading

Barack Hussein Obama

Obama Orders Dep’t Of Homeland Security To No Longer Use The Words ‘Jihad’ And ‘Sharia’

A new Department of Homeland Security report urges rejecting use of Islamic terms such as “jihad” and “sharia” in programs aimed at countering terrorist radicalization among American youth.

Published

on

obama-orders-dhs-department-homeland-security-to-not-use-words-sharia-jihad-islamic-terrorism
SHARE NOW THE END BEGINS:

A new Department of Homeland Security report urges rejecting use of Islamic terms such as “jihad” and “sharia” in programs aimed at countering terrorist radicalization among American youth.

EDITOR’S NOTE: Obama calls it his ‘CVE Program’, which stands for ‘Countering Violent Extremism’ program. But his program also mandates that words like ‘jihad’, ‘sharia’, ‘takfir’, etc should not and will not ever be used to describe exactly the type of extremism it is. So basically, the CVE Program is a program that covers up and defends Islam while all the while pretending that it’s not Islamic terrorists who are perpetrating the ‘extremism’. Obama fights terrorism with the same intensity that OJ Simpson went looking for the ‘real killer’ of Nicole Brown. 

The Homeland Security Advisory Council report recommends that the department focus on American millennials by allocating up to $100 million in new funding. It also urges greater private sector cooperation, including with Muslim communities, to counter what is described as a “new generation of threats to the Homeland related to the threat of violent extremism.”

The funds would be used for hiring experts and new social media programs and technology to influence young people not to join terror groups. “The department’s CVE efforts are an attempt to protect our nation’s young people from extremists who prey upon the Millennial generation,” the report says.

“The department must reframe the conversation to reflect this reality and design a robust program around the protection of our youth, which must include predator awareness and an understanding of radicalization. In doing so, our citizens will be better equipped for this threat.”

Under the section on terminology, the report calls for rejecting use of an “us versus them” mentality by shunning Islamic language in “Countering Violent Extremism” programs, or CVE, the Obama administration’s euphemism that seeks to avoid references to Islam.

Under a section on recommended actions on terminology, the report says DHS should “reject religiously-charged terminology and problematic positioning by using plain meaning American English.”

Government agencies should employ “American English instead of religious, legal and cultural terms like ‘jihad,’ ‘sharia,’ ‘takfir’ or ‘umma,’” states the June 2016 report by the Council’s countering violent extremism subcommittee.

Donald Trump: Obama Is Afraid to Call Shooting An Act of Islamic Terrorism

Jihad is the Islamic concept of holy war that is the primary call to arms for Islamic terrorist groups around the world, including the Islamic State, al Qaeda, and the Muslim Brotherhood. Sharia law is the anti-democratic Islamic supremacist legal code that critics say has prevented U.S. Muslims from assimilating into American society. Takfir is the Arabic term for apostasy, and umma is the word used to describe the entire Muslim community.

The DHS report stated that to avoid a confrontational “us versus them” stance in public efforts to counter Islamic radicalization, government programs should use the term “American Muslim” instead of “Muslim American.”

The limits on counterterrorism terminology outlined in the report are the latest sign of verbal censorship within government imposed by President Obama. The president this week launched into an angry public denunciation of Republican critics of his policy of avoiding use of the expression “radical Islam.”

Obama sought to deny charges that political correctness was behind the policy of not linking Islamic terrorism to its religious roots, and dismissed those who favor highlighting the links as a Republican political ploy.

Obama Reminds Us Why He Won’t Say ‘Radical Islam’:

The comments prompted a backlash from counterterrorism experts who say that failing to publicly link Islamic terrorism to its religious tenets makes it more difficult to counter jihadist ideology.

The terrorist attack Sunday in Orlando was carried out by a radical Muslim, Omar Mateen, who declared loyalty to ISIS during the rampage that killed 49 people at a gay nightclub on Sunday. The FBI said Mateen was “radicalized” through the Internet.

President Obama’s program to counter ISIS came under fire from CIA Director John Brennan during a Senate hearing Thursday.

Some gains are being made in taking back territory controlled by ISIS and limiting its finances, according to Brennan. “Unfortunately, despite all of our progress against ISIL on the battlefield and in the financial realm, our efforts have not reduced the group’s terrorism capability and global reach,” he said.

“The resources needed for terrorism are very modest, and the group would have to suffer even heavier losses on territory, manpower, and money for its terrorist capacity to decline significantly.”

The DHS report said the average age for foreign fighters joining ISIS is 26, with the Internet “playing a primary or contributing role” in radicalization. Rep. Mike Pompeo (R., Kansas) a member of the House Permanent Select Committee on Intelligence, criticized the DHS language restrictions.

“The Department of Homeland Security’s (DHS) Interim Report makes the dangerous recommendation that the Obama administration continue to deny the threat that radical Islamic terrorism poses,” Pompeo said.

“Jihadists are the ones who have made this fight ‘us vs. them’ with every violent terrorist attack—from bringing down the World Trade Center towers, killing American soldiers overseas, beheading journalists, or shooting Americans in Orlando,” he added. “DHS’s emphasis here on political correctness is absolutely dangerous and places America and our military at risk.”

In the Senate, Sen. Ted Cruz (R., Texas) said the administration’s failure to properly address radical Islam has made the country less safe.

“Over and over again, we have seen the Obama administration having ample information to stop a terrorist attack, and yet because of the political correctness, because of the ideology of this administration that won’t even say the word ’jihad,’ won’t even say the words ’radical Islamic terrorism,’ they look the other way and the attacks go forward,” Cruz said in a Senate floor speech Thursday.

Sebastian Gorka, a counterterrorism expert, said that banning the jihadist terminology is similar to “Newspeak,” the fictional language used for totalitarian control in George Orwell’s book 1984.

“This is simply outrageous from the perspective of national security,” said Gorka, the Horner chair of military theory at Marine Corps University.

“Banning words that our political elite don’t like is not only a contravention of the First Amendment, it directly endangers the lives of Americans,” he added.

“When the enemy that slaughters our citizens in Orlando, San Bernardino, and Boston calls themselves ‘jihadis’ no one, not even the president, has the right to censor that reality and give them another name.”

Michael Rubin, a former Pentagon official now with the American Enterprise Institute, said the report’s concerns about terminology are hindering counterterrorism efforts.

“If the Obama team and DHS used half the effort they expend debating vocabulary actually advancing strategies to stymie and defeat enemies, America would be safer,” he said.

The report also recommends using former terrorists in “programming and messaging” efforts, including “far right, anti-government, and other extremists groups.” The report also mentions white supremacist, sovereign citizen, and anarchist groups as posing a terror threat but makes no mention of left-wing extremist groups.

The report also calls for a focus on “gender diversity of youth through careful attention to the range of push and pull factors that attract individuals of differing gender.” The gender focus was not further explained.

On the use of social media, “the department must fully understand and leverage social media in its policy and programmatic activities,” the report said.

America’s children, the report says, will grow up in a world of expanding human ingenuity and knowledge. “As that process of human evolution, including the expansion of freedom and liberties across the globe proceeds, our government must remain vigilant, adapt, and evolve to protect them,” the report concludes, adding that “we must do so by demonstrating faith in the American people, in their government, and we must be confident in the power of America’s ideas.”

A DHS spokeswoman had no immediate comment.

Farah Pandith, a Council on Foreign Relations fellow, and chairman of the panel that produced the report, did not return emails seeking comment. source

Continue Reading

Barack Hussein Obama

Obama’s Pentagon Declares Journalists To Be ‘Unprivileged Belligerents’ With No Rights

In general, journalists are civilians. However, journalists may be members of the armed forces, persons authorized to accompany the armed forces, or unprivileged belligerents.

Published

on

department-defense-law-war-unprivileged-belligerents-journalists
SHARE NOW THE END BEGINS:

In general, journalists are civilians. However, journalists may be members of the armed forces, persons authorized to accompany the armed forces, or unprivileged belligerents.

WASHINGTON — New Defense Department guidelines allow commanders to punish journalists and treat them as “unprivileged belligerents” if they believe journalists are sympathizing or cooperating with the enemy.

The Law of War manual, updated to apply for the first time to all branches of the military, contains a vaguely worded provision that military commanders could interpret broadly, experts in military law and journalism say. Commanders could ask journalists to leave military bases or detain journalists for any number of perceived offenses.

“In general, journalists are civilians,” the 1,180 page manual says, but it adds that “journalists may be members of the armed forces, persons authorized to accompany the armed forces, or unprivileged belligerents.”

department-defense-law-war-unprivileged-belligerents-journalists

Click image to read full PDF of the new DoD Law of War Manual

A person deemed ‘unprivileged belligerent’ is not entitled to the rights afforded by the Geneva Convention so a commander could restrict from certain coverage areas or even hold indefinitely without charges any reporter considered an “unprivileged belligerent.”

The manual adds, “Reporting on military operations can be very similar to collecting intelligence or even spying. A journalist who acts as a spy may be subject to security measures and punished if captured.” It is not specific as to the punishment or under what circumstances a commander can decide to “punish” a journalist.

Defense Department officials said the reference to “unprivileged belligerents” was intended to point out that terrorists or spies could be masquerading as reporters, or warn against someone who works for jihadist websites or other publications, such as al-Qaida’s “Inspire” magazine, that can be used to encourage or recruit militants.

Another provision says that “relaying of information” could be construed as “taking a direct part in hostilities.” Officials said that is intended to refer to passing information about ongoing operations, locations of troops or other classified data to an enemy.

Army Lt. Col. Joe Sowers, a Pentagon spokesman, said it was not the Defense Department’s intent to allow an overzealous commander to block journalists or take action against those who write critical stories.

“The Department of Defense supports and respects the vital work that journalists perform,” Sowers said. “Their work in gathering and reporting news is essential to a free society and the rule of law.” His statement added that the manual is not policy and not “directive in nature.”

But Ken Lee, an ex-Marine and military lawyer who specializes in “law of war” issues and is now in private practice, said it was worrisome that the detention of a journalist could come down to a commander’s interpretation of the law.

If a reporter writes an unflattering story, “does this give a commander the impetus to say, now you’re an unprivileged belligerent? I would hope not,” Lee said.

“I’m troubled by the label ‘unprivileged belligerents,’ which seems particularly hostile,” said Kathleen Carroll, AP’s executive editor. “It sounds much too easy to slap that label on a journalist if you don’t like their work, a convenient tool for those who want to fight wars without any outside scrutiny.” source

Continue Reading

Trending