Track Phone First, Ask Questions Later

For quite some time it has been apparent that secrets are everywhere. By quite some time, I mean since ages past. From Masons, to Illuminati, to the famous Knights Templar. Many organizations even today keep their secrets: CIA, NSA, etc., etc., etc. The NSA is an organization that takes our information and claims to use it for our safety but in recent news it has been criticized as a cell phone infiltrator. That’s right, though most of you have already heard about this and likely lost interest in it, the fact remains that all of your data are belong to US(A).  It is no lie that:

The National Security Agency has provided timely information to U.S. decision makers and military leaders for more than half a century.

and that:

NSA/CSS exists to protect the Nation.

but where do we draw the line? Is it really in our liberty to discuss anything at all without being overlooked or guided? Is there any safe place for our information?

Related Article: Gossip Through the Prism

Apparently nowhere it seems, as a federal appeals court recently ruled that warrants are not needed for tracking cell phones. Yes, this is very serious. Serious because now all of my talks about kittens and dogs will be recorded and every conversation about “how life is going” with my mother will be documented. Joking aside, a lot of people feel threatened by the means of a government, and the display of power that one such government sometimes abuses. What will all this hacking of civilians information yield? Maybe it will help with criminals at large and terrorists that are on the loose. To think, a world where the NSA finds them and the police get them.

Related Article: The Drones Are Coming

In lighter news, NSA chief will soon be at a conference for hackers in Vegas where he will likely speak out about the data mining and collecting that the NSA does. Let him speak, but surely everything he says will be watched and scrutinized. In fact, all we can do is scrutinize and wait to see what the Supreme Court will do and how it will weigh in on the warrant-less tracking. Cheers! But don’t forget, Big Brother is always watching. Or reading, err tracking?

Related Article: Not Another 9-11 Article

 

Sources:

Time: NSA Chief Speaks

Freemasons

Gawker: Illuminati

Knights Templar

Central Intelligence Agency

National Security Agency

Youtube: All Your Base Are Belong To US

Warrantless Cellphone Tracking is Upheld

Wondergressive: Gossip Through the Prism

Wondergressive: Not Another 9-11 Article

Wondergressive: The Drones Are Coming

The Art of Cyber Warfare: United States vs. China

cyber warfare image

Cyber warfare may be how all battles of the future are fought. http://www.occupycorporatism.com/

Cyber warfare is becoming about as common as an oil lobbyist’s smug grin, and in cyber warfare, hacking is the weapon of choice. Hacking has become the norm as our world continues to move forward technologically. Now, in 2013, we are already seeing big names like AppleFacebook, and Sony admitting to being hacked. A recent survey conducted in 2011 on the security of companies shed lights on some shocking truths:

Ninety percent of organizations in our study have had at least one breach. When asked to consider cash outlays, internal labor, overhead, revenue losses and other expenses related to the security breach, 41 percent of respondents report that it was 500,000 or more.

If security breaches due to hacking is happening regularly to companies, what happens if the attacks are on a larger scale? We turn now to nations hacking other nations, and the waging of cyber warfare between super powers.

USA’s Bald Eagle and the Chinese Red Dragon find themselves pitted against each other. The brawl is not physical but rather fought along the porn riddled strands of the world wide web. China is and has been a superpower not only in sheer population numbers but also in political power, technological advancements, business ventures, and military standing. Billions of dollars could have potentially been stolen through this exchange of superpowers waging cyber warfare on each other.

cyber warfare chica usa

When it comes to cyber warfare only one things matters: which hacker has the highest GWAM?http://www.theguardian.com/

Apart from billions of dollars being at stake, different depictions in various texts about China’s influence paired with our growing debt to China all point toward a potential future where most of the world is speaking Mandarin Chinese. Maybe being under Chinese rule wouldn’t be such a bad thing. Or maybe this public knowledge of our nations engaged in cyber warfare will strengthen ties between the Bald Eagle and the Dragon and they will give birth to the first super powered scaly griffon. Maybe it is a good thing that the hacking is occurring. It may be helping to improve security and prepare for even more dangerous hack attempts. Unfortunately, all this talk of potential crippling cyber warfare is only maybes in the end.

On a brighter note we are moving closer to a cyber infused world where technology and nature are becoming entwined. Even with all these hack attempts the internet isn’t all that bad! It is almost an all-in-one source of the totality of human knowledge. It aids in the creation of useful and beneficial things for people. And soon, hopefully, it’ll be free for all! Until then, lets hope that this disturbing news of cyber warfare will evnetually lead to a world of free information rather than a nuclear outbreak!

 

Sources:

https://wondergressive.com/category/technology/

http://www.juniper.net/us/en/local/pdf/additional-resources/ponemon-perceptions-network-security.pdf

http://edition.cnn.com/2013/02/19/tech/web/apple-hacked/index.html

http://www.cbsnews.com/8301-205_162-57569713/facebook-says-it-was-hacked-last-month/

http://news.cnet.com/8301-17938_105-57539756-1/sonys-playstation-3-experiences-its-biggest-hack-yet/

http://world.time.com/2013/02/19/china-calls-u-s-hacking-allegations-groundless/

http://nation.time.com/2013/02/19/u-s-ready-to-strike-back-against-china-cyberattacks/

http://www.time.com/time/magazine/article/0,9171,1576831-9,00.html

http://www.zdnet.com/china-hits-back-at-hacking-claims-us-is-our-top-cyber-attacker-7000011543/

http://www.amazon.com/exec/obidos/ASIN/1893554082/qid=970215310/sr=2-1/104-0533761-1644734

http://usgovinfo.about.com/od/moneymatters/ss/How-Much-US-Debt-Does-China-Own.htm

http://www.time.com/time/magazine/article/0,9171,1978756,00.html

http://en.wikipedia.org/wiki/Griffin

http://motherboard.vice.com/blog/reassessing-the-hack

https://wondergressive.com/2013/02/11/the-singularity-is-nigh-upon-us-2/

https://wondergressive.com/2013/02/18/open-access-journals/

https://wondergressive.com/2012/09/01/15-year-old-invents-a-3-cent-cancer-test-using-google/

https://wondergressive.com/2013/02/04/free-internet-help-yourself/

http://world.time.com/2013/02/12/north-korea-confirms-successful-nuclear-test/