Dawning of the Corona Age: Navigating the Pandemic by Johnny Freedom | Liberty International


Author’s Note: 
Five months of intensive research, collating 670 research and news sources, are compacted in this succinct, readable and entertaining 167-page compendium about the “pandemic”. It provides a comprehensive overview for those with an open mind, still willing to learn, to expand perspectives far beyond media tidbits. This is the Dawning of the Corona Age. 

May we remove our masks – and blindfolds – to take notice of what is actually rapidly happening around us to navigate how we can still “live free in an unfree world”.

This newly released book is dedicated to You. Thank you for educating yourself, “thinking twice before you think”, calmly sharing your insights, acting wisely and thereby reclaiming authority over your life! Enjoy the first chapter of thirty-two below. 

“A compelling exploration far beyond the immediate impacts of the “pandemic”, Dawning of the Corona Age imagines how our human world may be altered long into an uncertain future. “

$10 PDF ORDER LINK: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=H7ZVUNGC58QE2

$25 PRINT ORDER LINK: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=QCQQL3JUTVURE (includes PDF Version with 670 Live Links)

$25 AMAZON PRINT ORDER LINK: https://www.amazon.com/dp/B08FSR3NJG

THE PANDEMIC:
Season 1, Episode 1 

1. Preface & Introduction

Like a television series straight out of science fiction films, such as, V for Vendetta, Pandemic and The Matrix, the mainstream media narrative relentlessly broadcast at “We the People” seemed at first as surreal and as strange as an episode of The Twilight Zone. 

Now, suddenly, and apparently without warning, we are living in a strange hybrid between George Orwell’s novel 1984, Aldous Huxley’s Brave New World and The Matrix. Science fiction has now become real.

George Orwell wisely observed that, “The further a society drifts from the truth, the more it will hate those that speak it.” In 1958, Aldous Huxley warned that, “Pharmacology and propaganda will make the masses love their slavery. As the world is forced into accepting greater and greater levels of government control in all areas of life, remember that nothing in politics happens by chance. There is a science to creating empires.” 

As  the lead character Orpheus revealed in The Matrix film, “The Matrix is everywhere. It is all around us, even now in this very room. You can see it when you look out your window, or when you turn on your television. You can feel it when you go to work, when you go to church, when you pay your taxes. It is the world that has been pulled over your eyes to blind you from the truth.”

These perspectives reflect a deeper sense of what may be happening in our world today. For those open-minded enough to consider the truth as more important than convention and its lies, that sobriety is more essential than distorted states of consciousness, that the Earth and all of its natural wonders are more beautiful than any virtual reality, this book may just break open the possibility of a transformation of our understanding of this “pandemic”. 

In truth, this may be the “crowning” of a “new age” of consciousness emerging from the rubble of an old world dying around us. A “Corona” age may very well be on the horizon if we act from a higher understanding of our own existence as true human beings instead of from our limited perspectives of material existence.

For those with the courage to question authority, to question even our present sense of reality, this book is for you.

“Do not believe in what you have heard; do not blindly believe in traditions just because they have been handed down for many generations; do not believe in anything just because it is rumored and spoken by many; do not believe merely because a written statement of some old sage is produced; do not believe in conjectures; do not believe in that as truth to which you have become attached from habit; do not believe merely
the authority of your teachers and elders,
or news sources or books.

Question all authorities and truisms.

Decide for yourself what is the veracity of your perceptions.
Ponder what is not true. Even more so, ponder what is true, deeply and continuously.”
~ Buddha

$10 PDF ORDER LINK: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=H7ZVUNGC58QE2

$25 PRINT ORDER LINK: https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=QCQQL3JUTVURE (includes PDF Version with 670 Live Links)

$25 AMAZON PRINT ORDER LINK: https://www.amazon.com/dp/B08FSR3NJG

THE PANDEMIC: COVID-19, Season 1, Episode 1

  1. DumbedDownPreface and Introduction (PDF)
  2. Seven Known Strains of Coronavirus (PDF)
  3. COVID-19 Did Not Naturally Occur By Animal to Human Contact
  4. China’s COVID-19 Coverup
  5. Faulty Computer Simulations & Projections
  6. Skepticism of Mainstream Narratives & Projections
  7. Herd/Individual Immunity, Lockdowns & Quarantines
  8. The Immune System is Your Primary Defense
  9. How Contagious is COVID-19?
  10. “Exosomes” as a Natural Release of the Human Body
  11. Masks or No Masks?
  12. Invalid Testing & Inconclusive Diagnosis for COVID-19
  13. Inflated Death Rates & Asymptomatic Cases
  14. Hydroxychloroquine is an Effective Treatment
  15. Emerging & Effective Treatment Protocols
  16. Questioning the Need, Safety & Efficacy of a Vaccine for COVID-19
  17. Dangers of Vaccines Laced with Toxic Materials
  18. Germ Theory is the Wrong Approach, Look to the Biome

THE LOCKDOWN: Season 1, Episode 2

  1. CoronaWorldInternational, National & State Declarations of Emergency
  2. COVID-19 & The 5G Factor
  3. Total Surveillance State & The Right to Privacy
  4. Legal Authorities for U.S. Public Health Officials & State Governors
  5. Stimulus Bills Are Fast Tracks to Socialism & U.S. Bankruptcy
  6. Chinese Coverup & Propaganda
  7. Undeclared War Between China & United States
  8. Global Goals of the Pandemic
  9. The New World Order
  10. Big Pharma Funding Regulatory Agencies Providing Oversight & Developing Public Policy
  11. Internet Censorship & Medical Fascism
  12. The Global Health Protection Racket
  13. The Future Ain’t What it Used to Be

THE CORONA AGE: 2020 & BEYOND, Season 2

  1. BecomeEnlightenedDawning of the Corona Age

APPENDIX

Public Health Legal Authorities to Collect, Use, Share, and Protect Information | ASTHO

FlaginSunlightOverview

Public health agencies need to collect, use, and share information to prevent disease and injury and protect the public against natural, accidental, and intentional health threats. Various federal and state laws may impact public health activities regarding such information.

Public health agencies may collect and maintain information that identifies an individual or is sensitive in nature, such as information about communications systems or detailed emergency response plans. In these situations, freedom of information (FOI) laws establish parameters for information that must be shared, upon request, and that which may be exempted from public disclosure. In applying the laws, public health agencies may need to juggle competing interests and balance individual privacy against the need to protect or inform the public.

Public health agencies face additional challenges when sharing information with law enforcement, especially when conducting a joint investigation where a public health threat may involve criminal activity. (See ASTHO Public Health Collection, Use, Sharing and Protection of Information Issue Brief  and Authorities and Limitations in Sharing Information Between Public Health Agencies and Law Enforcement Issue Brieffor detailed analyses of issues and law.) (Download a printable PDF.)

Constitutional Considerations

Generally, state and local public health agencies have broad and flexible authority to protect the public health. However, the exercise of governmental power has limits. The United States Constitution contains a Bill of Rights1 that sets out individual liberties and protects individuals from the arbitrary use of governmental power. These rights may impact public health collection and sharing of information.

Right to Privacy
The Constitution provides a limited right to privacy, including “informational privacy.”2 State laws that require reporting of or public health agency access to identifiable information are permissible when they are reasonably directed to the preservation of health and properly respect a patient’s confidentiality and privacy.3

Right Against Unreasonable Search and Seizure
With the owner’s permission,4 public health agencies may enter or search the premises of an individual or business, take biological specimens or environmental samples for testing, copy records, and remove evidence that might be relevant to a public health concern. However, absent consent or the applicability of another exception, public health agencies must comply with requirements in the U.S. Constitution’s Fourth Amendment.

The Fourth Amendment requires that a warrant be obtained, based upon probable cause, to search someone’s premises or seize their property. The Fourth Amendment applies to both criminal investigations and health and safety inspections and investigations.5 In addition to consent, other exceptions to the warrant and probable cause requirement might apply to public health inspections and investigations, including searches of pervasively regulated businesses,6searches of premises or items open to the public,7 and searches based on exigent circumstances if delay is likely to lead to injury, public harm, or the destruction of evidence.8

Right Against Self-Incrimination
The Fifth Amendment right against self-incrimination prevents the government from forcing an individual to be a witness against himself or herself during trial or a custodial interrogation. If an individual is not informed of his or her right against self-incrimination, the individual’s statements and evidence obtained as a result of these statements may be suppressed in criminal proceedings. This right may arise when a public health incident involves criminal activity, especially when law enforcement and public health investigators are conducting joint interviews or public health agencies assist law enforcement to gather evidence.9


Practice Notes

  • Identify information to be obtained or shared.
  • Identify the purpose for which the information is needed.
  • Determine whether this is the minimum necessary for the purpose or whether de-identified information will serve the purpose.
  • Identify sources for the information, such as healthcare providers, schools, other businesses, and individuals.
  • Identify applicable federal or state laws.
  • Determine and meet conditions or requirements for obtaining or sharing information; in some situations, an individual’s consent may avoid legal issues when disclosing private information.
  • If privacy protections prevent disclosures necessary to protect the public, consult with counsel to identify relevant legal responsibilities, evaluate competing moral claims, and document determined course of action.

State Constitutions
State constitutions, along with court decisions that interpret state constitutions, must be reviewed to identify individual rights that exceed the U.S. Constitution. State constitutions may be sources of additional provisions that govern information sharing; for example, some constitutions define individual privacy rights or cover the public’s right to obtain governmental records.

State Statutes

Generally, state law governs state and local public health agencies’ authority and responsibilities regarding collection, use, disclosure, and protection of information. State laws vary in nature and scope. Authority may be based on general statutes, such as public health laws that grant public health agencies communicable disease control authority. Specific laws may also apply.

Case Reporting
These laws mandate that healthcare providers, laboratories, and others report specific communicable diseases and other illness of public health concern. Reporting requirements vary by state, and may also include poisonings, chemical or radiological exposures, suspected acts of terrorism, and other conditions.

Syndromic Surveillance
State laws may require or authorize reporting to electronic syndromic surveillance systems of information that is routinely gathered in emergency rooms or other places that may indicate an emerging disease or other public health threat before confirmed diagnoses are made.

Investigatory Authority
State laws may specifically grant public health agencies authority to conduct investigations and gather evidence, or such authority may arise from general statutory powers. State laws may also establish procedures for obtaining warrants to search the premises of an individual or business and seize evidence related to a public health threat.

Privacy Provisions
Public health or other laws may contain provisions to protect the confidentiality of information that identifies an individual and to limit its disclosure by public health agencies. Exceptions may be provided, for example, for disclosing information to other agencies, law enforcement, or the public when necessary to protect the public’s health.

Freedom of Information
All states have laws that require information held by governmental agencies to be provided upon request. FOI laws promote transparency and accountability of governments, facilitate consumers’ ability to make informed choices, and safeguard citizens against mismanagement and corruption. Public health agencies—like other governmental agencies—need to be sensitive to these important considerations in responding to FOI requests. At the same time, these laws may create challenges for public health agencies with regard to requests for private information about individuals or sensitive information, such as information that is preliminary, incomplete, or might present a national or state security risk. FOI laws include exemptions that may allow public health agencies to withhold private or sensitive information under certain circumstances. These exemptions vary among states in nature, scope, and prerequisites for denying disclosure.

Federal Statutes

Federal laws that impact collection, use, disclosure, and protection of information by public health agencies include, but are not limited to, the following.

HIPAA Privacy Rule
The Privacy Rule10 adopted under the Health Insurance Portability and Accountability Act (HIPAA)11 established national privacy protections for individually identifiable health information. The Privacy Rule may apply to healthcare providers or others that provide information to public health agencies. Depending on a public health agency’s organization, the Privacy Rule may apply to a public health agency when it discloses individually identifiable information. The Privacy Rule is not intended to interfere with public health functions and contains provisions that allow public health agencies to collect identifiable health information and disclose it, including to law enforcement, when authorized by law or when necessary to protect the public from an imminent threat.

FERPA
Privacy protections established by the Family Educational Rights and Privacy Act (FERPA)12 limit information that schools may provide to public health agencies about students. However, exceptions allow schools to provide certain directory information, such as student name and contact information, and necessary information to appropriate officials in cases of health and safety emergencies.13

Surveillance Data Systems
Various federal laws, such as the Public Health Security and Bioterrorism Preparedness Act of 2002,14 establish surveillance data systems that allow collection of information provided by state and local governmental agencies and integration of federal, state, and local data systems.

Critical Infrastructure
Confidentiality requirements apply to federal disclosure of certain information to state or local governmental agencies related to critical infrastructure and supplies and resources to protect the public’s health. For example, federal law protects the confidentiality of information voluntarily provided by the private sector to the federal government regarding vaccine tracking and distribution15 and information about critical infrastructure.16 Although the federal government may share this information with state and local government and agencies, those agencies must protect its confidentiality.


Practice Resource

The Reporters Committee for Freedom of the Press provides the Open Government Guide at http://www.rcfp.org/open-government-guide, which is a complete compendium of information on every state’s open records and open meetings laws. Each state’s section is arranged according to a standard outline, making it easy to compare laws in various states.


Sources

  1. U.S. Const., Amds 1-10.
  2. Whalen v. Roe, 429 U.S. 589 (1977).
  3. Whalen v. Roe, 429 U.S. 589 (1977); Planned Parenthood of Missouri v. Danforth, 428 U.S. 52 (1976).
  4. Florida v. Jimeno, 500 U.S. 248 (1991).
  5. Camara v. Municipal Court, 387 U.S. 523 (1967) (search of residences); See v. City of Seattle, 387 US 541 (1967) (search of commercial property).
  6. New York v. Burger, 482 US 691 (1987).
  7. Gostin LO. Public Health Law – Power, Duty, Restraint. (2008), p 468, 699-700. See endnotes 57-58.
  8. Michigan v. Tyler, 436 U.S. 499 (1978).
  9. Richards, EP. “Collaboration between Public Health and Law Enforcement: The Constitutional Challenge. Emerging Infectious Diseases.” Available at http://wwwnc.cdc.gov/eid/article/8/10/02-0465_article.htm. Accessed 11-15-2012. Goodman, R.A., Munson, JW, Dammer, K., Lazzarini, Z., and Barkely JP. “Forensic Epidemiology: Law at the Intersection of Public Health and Criminal Investigations.” Journal of the American Society of Law, Medicine & Ethics. Available at http://www.ncbi.nlm.nih.gov/pubmed/14968670. Accessed on 2-7-2013.
  10. 45 C.F.R. Parts 160 and 164.
  11. Pub. L. 104-191, 42 U.S.C. § 300gg et seq.
  12. Pub. L. 93-380, 20 U.S.C. § 1232g, implemented by 34 C.F.R. Part 99.
  13. 34 C.F.R. § 99.31.
  14. Pub. L. 107-188, 42 U.S.C. 300hh et seq.
  15. Public Health Service Act, 42 U.S.C. § 247d-1.
  16. Critical Infrastructure Information Act of 2002, Pub. L. 107-296, 6 U.S.C. 131 et seq., which is part of the Homeland Security Act of 2002.

Note: This document was compiled from April–November 2012 and reflects the laws and programs current then. It reflects only portions of the laws relevant to public health emergencies and is not intended to be exhaustive of all relevant legal authority. This resource is for informational purposes only and is not intended as a substitute for professional legal or other advice. The document was funded by CDC Award No. 1U38HM000454 to the Association of State and Territorial Health Officials; Subcontractor Subcontractor University of Michigan School of Public Health, Network for Public Health Law – Mid-States Region.

Source: ASTHO

Mass-Tracking COVI-PASS Immunity Passports Slated to Roll Out in 15 Countries | Mint Press News

Virus Outbreak UtahBy Raul Diego

Editor’s Note: COVI-PASS will determine whether you can go to a restaurant, if you need a medical test, or are due for a talking-to by authorities in a post-COVID world. Consent is voluntary, but enforcement will be compulsory.

Through the magic of Internet meme culture, most Millennials will be familiar with the famous opening scene of the 1942 film, “Casablanca,” where two policemen stop a civilian in the “old Moorish section” of Nazi-occupied French Morocco and ask him for his “papers.” The subject is taken away at once after failing to produce the required documents. The cinematic exchange has been used ever since as a popular reference to the ever-encroaching hand of the state, which is now on the verge of attaining a level of control over people’s movements that puts the crude Nazi methods to shame.

A British cybersecurity company, in partnership with several tech firms, is rolling out the COVI-PASS in 15 countries across the world; a “digital health passport” that will contain your COVID-19 test history and other “relevant health information.” According to the company website, the passport’s objective is “to safely return to work” and resume “social interactions” by providing authorities with “up-to-date and authenticated health information.”

These objectives mirror those that Bill Gates has been promoting since the start of the COVID-19 lockdown. In an essay written by Gates in April, the software geek-cum-philanthropist lays out his support for the draconian measures taken in response to the virus and, like an old-timey mob boss, suggests the solutions to this deliberately imposed problem. Ironically, Gates begins to make his case for the adoption of mass tracking and surveillance technology in the U.S. by saying that “For now, the United States can follow Germany’s example”; He then touts the advantages of the “voluntary adoption of digital tools” so we can “remember where [we] have been” and can “choose to share it with whoever comes to interview you about your contacts.”

COVI-Pass APP

Gates goes on to predict that the ability to attend public events in the near future will depend on the discovery of an effective treatment. But he remains pessimistic that any such cure will be good enough in the short term to make people “feel safe to go out again.” These warnings by the multi-billionaire dovetail perfectly with the stated purposes of the aforementioned COVI-PASS, whose development is also being carried out in partnership with Redstrike Group – a sports marketing consultancy firm that is working with England’s Premier League and their Project Restart to parse ticket sales and only make them available to people who have tested negative for the virus.

VST Enterprises goes viral

VST Enterprises Ltd (VSTE) is led by 31-year old entrepreneur, Louis-James Davis, who very recently stepped down from a “science & technology ambassadorship” in the African nation of Zimbabwe to focus on the company’s role in the UN’s SDG (Sustainable Development Goals) Collaboratory initiative, comprising a series of “cyber technology projects across all 193 member states of the United Nations.”

These will use the same proprietary VCode and VPlatform technologies underpinning the COVI-PASS that will reportedly tackle issues such as illegal mining and counterfeiting. This “third generation” barcode technology overcomes the limitations of older “second generation” versions like QR-codes, according to Davis. “Data and sensitive information scanned or stored in either a QR code and barcode can be hacked and are inherently insecure,” Davis claims, “leaving data and personal details to be compromised.” These, and other flaws of the prevailing “proximity apps” were exploited by VST Enterprises to position itself to land large government and private sector contracts.

By all measures, the strategy has proven wildly successful and VST now enjoys strong favor in the highest circles of the UK government as evidenced by the ringing endorsement of former Prime Minister Theresa May, prominently displayed on the COVI-PASS website. More practically, VST now has a direct partnership with the UK government and has secured contracts to deploy its technology in 15 countries, including Italy, Portugal, France, India, the US, Canada, Sweden, Spain, South Africa, Mexico, United Arab Emirates and the Netherlands.

In May, VST signed a deal with international digital health technology firm and owner of COVI-PASS, Circle Pass Enterprises (CPE) to integrate VST’s VCode into the biometric RFID-enabled “passports” which can be accessed via mobile phone or a key fob will flash colored lights to denote if an individual has tested negative, positive or is to be denied entry to public locations. Awarded the ‘Seal of Excellence’ by the EU, VCode® technology will ensure that all of our most sensitive personal and health information can be accessed by authorities at a distance, dispensing with messy and potentially dangerous face-to-face encounters with police or other enforcement personnel.

Infusing the narrative

So far, the concerns over the digital health passport’s threat to freedom and privacy have been lukewarm at best and it seems as if the world has already accepted that full-fledged population control methods such as these will simply be a fact of life. While the coronavirus pandemic has certainly done much to bring the public over to this way of thinking, the campaign to normalize this sort of Orwellian power-grab has been ongoing for many years and Bill Gates – who many media outlets have whitewashed out of stories related to these measures – has been at the forefront of its promotion.

The Innovation for Uptake, Scale and Equity in Immunisation (INFUSE) project was launched in Davos, Switzerland in 2016. The program was developed by an organization funded by the Bill & Melinda Gates Foundation called GAVI (The Vaccine Alliance), which has been calling for a digital health ID for children along with partners in the broader !D2020 initiative like the Rockefeller Foundation and Microsoft.

In a recent interview, the deputy director of the Bill & Melinda Gates Foundation, Hassan Damluji, derided the idea that the COVID-19 pandemic was in any way subsiding and even warned that, far from receding, the pandemic was “deep into wave three.” His remarks were specifically targeted to the very regions he oversees for the foundation, which include the Middle East and parts of Asia, which he stressed would be the focus of the next wave. Damluji was “most recently involved in a five-year fundraising cycle for GAVI,” an effort led by Saudi Arabia, whose investment he praised as a powerful “signal [that] others had an obligation to follow.”

Gates concludes his editorial with a comparison to World War II, stating that said conflict was a “defining moment of our parents’ generation” as the COVID-19 pandemic is to ours, implying that the changes taking place now are akin to the Allied forces’ defeat of the Third Reich. Except, of course, that immunity passports or digital health certificates sound exactly like what Hitler wished for the most. After all, wasn’t the idea of a superior race based on considerations of superior health and vitality over the ostensibly sick and unfit? Hard to argue against the idea that a universal health passport is nothing less than the ultimate fulfillment of that dystopian nightmare.

Feature photo | Salt Lake County Health Department public health nurse Lee Cherie Booth performs a coronavirus test outside the Salt Lake County Health Department in Salt Lake City, May 20, 2020. Rick Bowmer | AP

Raul Diego is a MintPress News Staff Writer, independent photojournalist, researcher, writer and documentary filmmaker.

Source: Mint Press News

US Begins To Implement WHO “Contact Tracing” To Forcibly Remove People From Their Homes? | Activist Post

By Spiro Skouras 

This report is a follow-up to one where I cover how Michael Ryan of the WHO stated in a press briefing how the WHO (which is of course in the pocket of Bill Gates) now believes it is time to start removing people from their homes.

I know many people, especially those of you who are in the US, think that could never happen here … well, those are probably the same people who thought just a couple months ago that it would be impossible to lockdown the entire country because people would never put up with it and because we have rights… right? This is being said even as we are ON lockdown.

For those of you who can’t wait for the government to lift the lockdowns, as many states are preparing to do, remember that we were told things will not go back to normal until there is a vaccine and the entire planet has largely received it… we have also been told about how we must embrace the new normal.

Part of that new normal is contact tracing. Hmm, sounds normal enough – or at least harmless – kind of like how the Patriot Act sounds harmless or Operation Iraqi Freedom may have sounded like a good thing to many, despite the fact that it was a war of aggression based on lies which resulted in the death of over a million people… but, hey, it has the word freedom in it.

So what exactly is contact tracing? Well, according to California Governor Newsom…

Contact tracing, combined with expanded testing, is a pillar of the state’s modified stay-at-home order and The goal is to track and trace every person in the state who may have been exposed, then quickly isolate and test them.

So, in other words, the state cannot open up without contact tracing; and only then it would be a modified stay-at-home order, and not actually removing the lockdown in its entirety.

And how are they going to accomplish this? In their own words… “California is building an army of 20k people who will be trained as disease detectives, serving six- to 12-month-long gigs that demand skills ranging from data entry and psychology to project management and crisis intervention.” Saying the state is providing a “customer service,” while others may see this customer service as the new secret police.

California will be the test pilot for this program which they have stated will serve as the template nationwide.

Welcome to COVID1984.

Source: Activist Post

Snowden: Governments Using Pandemic to Build “Architecture of Oppression” Surveillance | The Mind Unleashed

While each country’s contact tracing program has slight variations, all of them are essentially cell phone apps that keep a running record of the user’s heath and the health records of all the people they come into contact with.

If a cell phone comes in close contact with someone who might have the virus, the user receives a text message informing them and then instructing them to self-quarantine for 14 days.

However, the quarantine is not necessarily voluntary, depending on where you live. In some countries, phones have been used as a sort of house arrest ankle-bracelet that will notify authorities if the person being monitored leaves the house for any reason.

These apps are being touted as the way to end the shut down in both Italy and the UK and it appears that officials are going to be taking things in that direction.

At face value, it may appear that this could be a useful strategy in preventing the spread of disease, but privacy advocates and tech experts are concerned that this information could be misused and that the unprecedented surveillance capabilities could be kept and held by corrupt governments long after the pandemic is over.

In a recent interview with Vice, NSA whistleblower Edward Snowden expressed his concerns about the coming surveillance program, calling it the “architecture of oppression.”

“Do you truly believe that when the first wave, this second wave, the 16th wave of the coronavirus is a long-forgotten memory, that these capabilities will not be kept? That these datasets will not be kept? No matter how it is being used, what’ is being built is the architecture of oppression,” Snowden said.

Snowden recognized that the virus was a serious threat and said that the intelligence community was well aware that it was only a matter of time before a massive pandemic crippled the country, even back when he was working in the NSA.

“There is nothing more foreseeable as a public health crisis in a world where we are just living on top of each other in crowded and polluted cities, than a pandemic. And every academic, every researcher who’s looked at this knew this was coming. And in fact, even intelligence agencies, I can tell you firsthand, because they used to read the reports had been planning for pandemics,” he said.

Snowden questioned the positive numbers that have come out of China in recent weeks and pointed out that the Chinese government has been credited with reducing the spread of the illness because they took such draconian measures during the lockdown.

Perhaps their extreme strategy is not working as well as they say it is, but since the government maintained tight control of any information coming out of the country, it is impossible to say for sure.

“If you’re looking at countries like China, where cases seem to have leveled off, how much can we trust that those numbers are actually true? I don’t think we can. Particularly, we see the Chinese government recently working to expel Western journalists at precisely this moment where we need credible independent warnings in this region,” Snowden said.

In a statement published on Friday, Apple and Google announced that they were teaming up in a rare partnership to develop compatible contact tracing apps, which they claim will work on an “opt-in” basis.

However, according to Bloomberg, the companies are planning to eventually build the contact tracing into the device’s updates.

Apple and Google insist that you will still be able to opt-out of the program if you don’t want to participate, but it is possible that rankings on these apps could be used to gain entry into grocery stores or larger businesses and events once the economy opens up again.

“As authoritarianism spreads, as emergency laws proliferate, as we sacrifice our rights, we also sacrifice our capability to arrest the slide into a less liberal and less free world,” Snowden warned.

Source: The Mind Unleashed

The Coronavirus Conspiracy: How COVID-19 will Seize Your Rights & Destroy Our Economy | London Real

PlannedDemic

By Brian Rose & David Icke

As one of the world’s pre-eminent professional conspiracy theorists, David Icke has been a regular guest on London Real, discussing topics as diverse as 5G, 9/11 and censorship.

Often described as a maverick or a renegade, David is a unique voice in the space, propounding a number of predictions around his post-Orwellian vision of society and the future.

An introduction to David Icke

“Today’s mighty oak is just yesterday’s nut that held its ground.”

Since his spiritual awakening in 1990, David enjoys a sizable global following, regularly speaking for up to 10 hours at venues such as Wembley Arena to audiences of thousands of people.

As well as public speaking, David is an acclaimed author having written over 21 books including The Robots’ Rebellion (1994), And The Truth Shall Set You Free (1995), The Biggest Secret (1999) and Children of the Matrix (2001), in which he developed his worldview of New Age thinking.

With a mission to wake up society and free our minds from what governments and mainstream media are trying to make us do, his credentials make him one of the most influential thinkers and catalysts for change.

The episode they didn’t want you to see

We knew the world would be watching when David returned to the studio, but it seems some very powerful people indeed were also watching…

…and they didn’t like what they saw…

…and they didn’t want you to see it either!

In this interview which was reported heavily by the BBC and others and subsequently BANNED, David joined us to talk about the CORONAVIRUS PANDEMIC, the worldwide COVID-19 LOCKDOWN, how governments have manipulated their citizens and the wider agenda behind social control and a Surveillance Society.

We go deeper into the global crisis, the looming economic recession and the impact of 5G technology and the violation of our rights and freedom of speech.

While we don’t always agree with everything David says, London Real will defend his right to be able to say it. So with that in mind sit back and enjoy this incredible and informative episode with David Icke.

Join us as we discuss:

  • George Orwell, the U.S. First Amendment, and the RT-PCR test
  • Dr. Andrew Kaufman, 5G technology, and the COVID-19 hoax
  • The WHO, Eddie Large, and Lombardy air pollution
  • Wuhan reporting, Dr. Neil Ferguson, and Imperial College
  • Boris Johnson, the climate change scam, and Bill Gates
  • The Freemasons, global fascism and Trump
  • The Rockefeller family, Bill Gates and Elon Musk

Offering more than meets the eye on first glance, David Icke is a man with serious credentials and a challenging perspective on our species and planet.

See London Real host and founder Brian Rose’s interview with Alex Jones on Infowars discussing this controversially BANNED interview.

Source: London Real

Edward Snowden says COVID-19 could give governments invasive new data-collection powers that could last long after the pandemic | Business Insider

5e7de83b487c224a1c2a56b7Edward Snowden, the man who exposed the breadth of spying at the US’s National Security Agency, has warned that an uptick in surveillance amid the coronavirus crisis could lead to long-lasting effects on civil liberties.

During a video-conference interview for the Copenhagen Documentary Film Festival, Snowden said that, theoretically, new powers introduced by states to combat the coronavirus outbreak could remain in place after the crisis has subsided.

Fear of the virus and its spread could mean governments “send an order to every fitness tracker that can get something like pulse or heart rate” and demand access to that data, Snowden said.

“Five years later the coronavirus is gone, this data’s still available to them — they start looking for new things,” Snowden said. “They already know what you’re looking at on the internet, they already know where your phone is moving, now they know what your heart rate is. What happens when they start to intermix these and apply artificial intelligence to them?”

While no reports appear to have surfaced so far of states demanding access to health data from wearables like the Apple Watch, many countries are fast introducing new methods of surveillance to better understand and curb the spread of the coronavirus.

Numerous European countries, including Italy, the UK, and Germany, have struck deals with telecoms companies to use anonymous aggregated data to create virtual heat maps of people’s movements.

Israel granted its spy services emergency powers to hack citizens’ phones without a warrant. South Korea has been sending text alertsto warn people when they may have been in contact with a coronavirus patient, including personal details like age and gender. Singapore is using a smartphone app to monitor the spread of the coronavirus by tracking people who may have been exposed.

In Poland, citizens under quarantine have to download a government app that mandates they respond to periodic requests for selfies. Taiwan has introduced an “electronic fence” system that alerts the police if quarantined patients move outside their homes.

Source: Business Insider

The U.S. Wants Smartphone Location Data to Fight Coronavirus. Privacy advocates are worried | NBC News

200318-coronavirus-new-york-oculus-se-1039p_e7dd421e936d5d4b551425cf3f86fb44.fit-1240wJohnny Liberty, Editor’s Note: As Edward Snowden was correct to reveal to the international press (at the sacrifice of his own well-being and freedom) that the NSA had abused their power and broke the law in gathering metadata on every American citizen, giving more power to the government is not a wise move regardless of the reason. Once they have that power, they’ll always have it (and will eventually abuse it). For example, the USA Patriot Act continues to be in force today without a tangible terrorist threat. Your civil liberties and sovereign rights continue to be compromised daily.

By Dylan Byers

Federal health officials say they could use anonymous, aggregated user data collected by the tech companies to map the spread of the virus.

The White House and the Centers for Disease Control and Prevention are asking Facebook, Google and other tech giants to give them greater access to Americans’ smartphone location data in order to help them combat the spread of the coronavirus, according to four people at companies involved in the discussions who are not authorized to speak about them publicly.

Federal health officials say they could use anonymous, aggregated user data collected by the tech companies to map the spread of the virus — a practice known as “syndromic surveillance” — and prevent further infections. They could also use the data to see whether people were practicing “social distancing.”

Some sources stressed that the effort would be anonymized and that government would not have access to specific individuals’ locations. They noted that users would be required to opt-in to the effort.

The federal effort, first reported by The Washington Post, will force the tech giants to weigh their commitments to user privacy against their desire to help combat a disease that has cost thousands of human lives and upended the global economy.

Full coverage of the coronavirus outbreak

The government officials have held at least two calls in recent days with representatives from the companies, the sources said. Those officials are “very serious” about making this happen, a person at one of the tech companies said.

Similar and more aggressive surveillance practices have already been put to use in China, South Korea and Israel. The moves have set off alarm bells among privacy advocates who fear what the government may do with users’ data.

Facebook already provides health researchers and nongovernmental organizations in some countries with anonymized data to help disease prevention efforts. Laura McGorman, policy lead of Facebook’s “Data for Good” program, said a similar effort could be used “to understand and help combat the spread of the virus.”

But other sources warned that providing the government with greater access to anonymized location data now could lead to the erosion of individual privacy down the line, especially if the government starts to ask for non-anonymized data.

Representatives from Facebook, Google, Twitter, Apple, Amazon, Microsoft, IBM and Cisco all took part in the call with White House and federal health officials. Spokespeople for the companies declined to comment on the discussions.

Source: NBC News

With the latest WikiLeaks revelations about the CIA – is privacy really dead? | The Guardian

ComeyBy Olivia Solon

Comey, has said that Americans should not have expectations of “absolute privacy”.

“There is no such thing as absolute privacy in America: there is no place outside of judicial reach,” Comey said at a Boston College conference on cybersecurity. The remark came as he was discussing the rise of encryption since Edward Snowden’s 2013 revelations of the NSA’s mass surveillance tools, used on citizens around the world.

Both the Snowden revelations and the CIA leak highlight the variety of creative techniques intelligence agencies can use to spy on individuals, at a time when many of us are voluntarily giving up our personal data to private companies and installing so-called “smart” devices with microphones (smart TVs, Amazon Echo) in our homes.

So, where does this leave us? Is privacy really dead, as Silicon Valley luminaries such as Mark Zuckerberg have previously declared?

Not according to the Electronic Frontier Foundation’s executive director, Cindy Cohn.

“The freedom to have a private conversation – free from the worry that a hostile government, a rogue government agent or a competitor or a criminal are listening – is central to a free society,” she said.

While not as strict as privacy laws in Europe, the fourth amendment to the US constitution does guarantee the right to be free from unreasonable searches and seizures.

That doesn’t mean citizens have “absolute privacy”.

“I don’t think there’s been absolute privacy in the history of mankind,” said Albert Gidari, director of privacy at the Stanford Center for Internet and Society. “You walk out in public and it’s no longer private. You shout from one window to another and someone will hear you in conversation.”

“At the same time things are more intrusive, persistent, searchable, they never die. So our conception of what is or isn’t risk from a privacy perspective does change and evolve over time.”

The law hasn’t kept pace with digital technologies. For example, there is a legal theory called the “third-party doctrine” that holds that people who give up their information to third parties like banks, phone companies, social networks and ISPs have “no reasonable expectation of privacy”. This has allowed the US government to obtain information without legal warrants.

Unlike the NSA techniques revealed by Snowden, the CIA appears to favour a more targeted approach: less dragnet, more spearfishing.

The WikiLeaks files show that the CIA has assembled a formidable arsenal of cyberweapons designed to target individuals’ devices such as mobile phones, laptops and TVs by targeting the operating systems such as Android, iOS and Windows with malware.

It’s encouraging to note that the government has yet to crack the encryption of secure messaging apps such as WhatsApp, Signal and Confide. However, it does not need to if it can instal malware on people’s devices that can collect audio and message traffic before encryption is applied.

Gidari isn’t that surprised. “It confirms what everyone saw in last week’s episode of 24. People expect these tools to exist,” he said, adding that people were more surprised that the FBI was initially incapable of breaking into the San Bernardino killer’s iPhone.

“People expect the government to have these magic tools,” he said.

American citizens should not be lulled into a false sense of security that the CIA only targets foreign nationals. The “Vault 7” documents show a broad exchange of tools and information between the CIA, the National Security Agency, and other US federal agencies, as well as intelligence services of close allies Australia, Canada, New Zealand and the United Kingdom.

“We can’t spy on our own citizens but we can spy on anyone else’s,” explained Neil Richards, a law professor from Washington University. “If agencies are friends with each other, they have everybody else do their work for them and they just share the data.”

“Dividing the world into American citizens and non-American citizens is a false dichotomy,” Gidari added. “We don’t have a monopoly on spy tools.”

This leaves us with a terrifying new prospect: government spies essentially deploying viruses and trojans against their own citizens.

The onus is now on the companies that make the devices to plug any holes in their operating systems – something they do regularly through bug bounty programs, where security researchers disclose vulnerabilities in return for rewards.

It’s clear from the CIA files that the US government has flouted this custom in order to stockpile “zero days” – undisclosed exploits – for its own advantage. This is a practice the US government has previously publicly denied.

“If companies aren’t aware that a vulnerability exists they can’t patch it. If it exists it can be exploited by any malicious actor – whether that’s a hacker, foreign state or criminal enterprise,” said Neema Singh Guliani, legislative counsel with the American Civil Liberties Union.

“I have a big problem with the government leaving us vulnerable to the same tools in hand so other nation states and hackers could exploit them,” Gidari said. “That isn’t protecting American citizens.”

Gidari’s view echoes Apple’s stance when the FBI demanded the company build a backdoor to the iPhone so they could access data on the San Bernardino killer’s phone.

“Apple believes deeply that people in the United States and around the world deserve data protection, security and privacy. Sacrificing one for the other only puts people and countries at greater risk,” the company said at the time. The iPhone maker was more muted in its response to the Vault 7 dump, vowing to “rapidly address” any security holes.

“There is nearly universal consensus from technologists that it’s impossible to build weaknesses or access mechanisms into technology that can only be used by the good guys and not the bad,” Cohn said.

This week’s revelations are sure to increase the strain on relations between Silicon Valley and the US government. While some of the older telephony companies such as AT&T and Verizon, which rely heavily on government contracts, have a history of compliance with government requests, tech giants Google, Facebook, Microsoft and Apple have proved to be less compliant.

It’s not possible to meaningfully participate in modern life without relationships with some or all of these technology companies processing our data, Richards added. So it’s important to know where their loyalties lie – to their customers or to government.

Since Snowden’s revelations of mass surveillance, companies such as Apple, Google and Microsoft have been working hard to rebuild trust with consumers through strengthening security, fighting government data requests and releasing transparency reports highlighting when and how many requests are made.

“It’s a very encouraging development if we care about civil liberties and the right to privacy, but at the same time it’s unsatisfying if the discretion of a company is the only real protection for our data,” Richards said.

“We need to build the digital society we want rather than the one handed to us by default,” he added.

This will require a complete overhaul of the laws relating to when the government can collect location and content information, something civil liberty campaigners have been pushing for.

“These decisions need to be made by the public, not by law enforcement or tech executives sitting in private,” Richards said.

Source:  The Guardian