Interview 1394 – “Smart” Tech and The End of Privacy

by | Oct 5, 2018 | Interviews | 37 comments

James Corbett joins Dr. Joanne Conaway on The Power Hour to discuss how technology is spying on you in the digital age.

Watch this video on BitChute / DTube / YouTube or Download the mp4

SHOW NOTES:
Power Hour Radio with Dr. Joanne Conaway

Episode 333 – 5 Privacies You Didn’t Know You Lost

MSM reports on the Chinese social credit surveillance state

Tim Clemente (accidentally?) reveals NSA capturing all phone calls on CNN

Don’t Be An Idiot! Get Rid of Alexa!

CIA Chief: We’ll Spy on You Through Your Dishwasher

Court Upholds Google-NSA Relationship Secrecy

37 Comments

  1. I will spam this again as I have no other way to get it out. And I think youtube would pull it down even if I did manage to upload it.

    This video is about the Parkland shooting.

    It has the video of the student who claimed 1 shooter was coming in from 1 entrance, and that when they ran to the other entrance another shooter came through that entrance. This proves that there was more than 1 shooter.

    It also has large screenshots of the David Hogg mugshots, and the audio of the closet interview where Hogg says that it is 9:32 which shows the video was recorded 5 hours before the event and many other interesting things.

    Mass shooting: questions, curiosities, statements and solution

    https://www.bitchute.com/video/XmMoxsDhV5xU/

    Here it is on minds.com if the above link doesn’t work. Some have complained that only the audio plays in the bitchute link.

    part 1
    https://www.minds.com/newsfeed/875263159189942272

    part2
    https://www.minds.com/newsfeed/875266535273312256

    part 3
    https://www.minds.com/newsfeed/875269992244809728

    • ‘It has the video of the student who claimed 1 shooter was coming in from 1 entrance, ‘

      Im not suggesting you go on a spamming campaign again to look at content most of us will have already analyzed (along with the teacher saying the shooter was wearing some kind of helmet, in one interview I saw) but if you want people to check out a short bit from a 40 min video better than sending them on a hunting expedition, give a time-stamp for where it begins. On players where the time is counting downward by default just give the remaining time.

      The most effective way to use the internet is to break the echo-chamber. Join a flower-arranging, Bonsai, yoga, or model-building, etc. whatever youre interested in, groups, forums etc. Those are the boards and groups to target. Not with over-the-top complicated rants that make your points, but by asking a question someone will then wish to answer on their own. And it has to be done in a smart and selective way, when any kind of natural sounding segue can be found. Politics, trust issue, these things pop-up all the time on boards. The Parkland shooting is a rough one. Stronger would be “What do we make of the witness accounts to the San Bernadino shooting?” or “How do we explain Building 7?” Ive found over the years, people generally respond better if you speak from a position of ignorance, or submission, rather as an authority on the matter. The people who care will pick it up..those who dont would not have anyway. Otherwise the internet is pockets of echo-chambers, which its so bad at effecting any kind of actual grassroots change.

  2. I will spam this again as I have no other way to get it out. And I think youtube would pull it down even if I did manage to upload it.

    This video is about the Parkland shooting.

    It has the video of the student who claimed 1 shooter was coming in from 1 entrance, and that when they ran to the other entrance another shooter came through that entrance. This proves that there was more than 1 shooter.

    It also has large screenshots of the David Hogg mugshots, and the audio of the closet interview where Hogg says that it is 9:32 which shows the video was recorded 5 hours before the event and many other interesting things.

    Mass shooting: questions, curiosities, statements and solution

    https://www.bitchute.com/video/XmMoxsDhV5xU/

    Here it is on minds.com if the above link doesn’t work. Some have complained that only the audio plays in the bitchute link.

  3. This is a tech request… James, could you please provide a download link for your videos as you do with your audios? This one is on Bitchute and I cannot find a way to download it. If there is a way, please advise.
    If you post on Youtube I can get it with a download addon… but I prefer not to have to go there 😉

    • You can get an add on called “Video Download Helper” which can pull videos off of BItChute. I’m not sure if they respect the privacy of your data though, so use at your own risk.

        • As with all software, some add-ons are trustworthy and some aren’t.
          There are things you can do to help determine if a piece of software is likely trustworthy such as researching the developers, researching how popular the software is and how long it’s been around, researching what others have said about the software, checking if the source code is available and if anyone trustworthy & capable has actually evaluated it; checking who built the binaries and whether or not that person is trustworthy, checking the source code yourself if you have the know-how, monitoring the software while it’s in a sandbox or virtual machine (or on a second computer) to see what files it tries to access, install or execute; what registry entries it creates and what sort of internet communication attempts it makes.

          If you don’t want to get into that kind of research & testing for every piece of software you run, go with smart practices instead.
          Keep all personal files on a separate computer that isn’t connect to an Internet cable, or keep them on an external drive that is only connected to your computer while your Internet cable is disconnected.
          If you’re not willing to do that, at least run the software in a sandbox (like Sandboxie) or in a virtual machine.

          In the case of browsers specifically, you should have two separate browsers (or at least two separate browser profiles) – one with add-ons installed and one without, and you shouldn’t run a browser outside of a sandbox or virtual machine unless, as mentioned above, the computer is a dedicated Internet computer that has no personal files on it and is never connected to a device that has personal files on it.

          Regarding VideoDownloadHelper specifically: It’s widely trusted by many people and is one of the most popular add-ons in existence. That’s not a recommendation though. There are very few add-ons I would recommend trusting.
          Personally, I have VideoDownloadHelper installed in a second (sandboxed) browser that I switch over to for downloading videos.

  4. False flag hacking?
    propaganda watch?
    In the Netherlands there is a lot of fuzz about Russian Hackers.
    It was front-page news and with a lot of background articles.
    Which seems to me that they are trying to push some narrative..

    The first clear error was, that they newspapers were claiming
    that the US election was hacked. And that Syria had done chemical
    attacks. Both are clear lies.

    And this story was weird too:
    Hackers are not usually caught, but these people were acting so
    obviously that they were spotted easily.

    Why?
    Usually if you spot a trained spy, they want you to spot them.
    If you spot a hacker, he will have social engineering ready to
    get out of trouble quickly.
    Hacking into a wifi is easy and can just be done with a phone,
    or from 100 meter away with a good antenna.
    You really won’t spot them, unless they want you to.

    The target is also strange, if you know the real news.
    Did they want to find out who was accusing them of chemical
    weapons use?

    But if they acted so obviously, were they working for Russia
    at all? It would be easy for the CIA to pay some “hackers”,
    even to get Passports and everything.
    There are lots of opponents of Putin.

    They might have tried to kill them too when they downed the wrong plane MH17. Something that the Dutch only blame the Russians for.

    Many other possibilities, but the story stinks.

  5. When she asked how the surveillance organizations use all that data to identify who to keep tabs on, it’s a question I’ve gotten multiple times whenever I explain this to someone (usually). They ask “how can someone listen to all this?” I tell them it isn’t that people are sitting there looking and listening to someone’s info. It’s AI algorithms, virtual AI robots that are far in advance of anything we see being created, that have compiled scores on everyone based on the data collected. Compiled into lists and threat ratings that place levels of surveillance on everyone depending on what the bots are programmed to watch for or evaluate. It sounds quite science fiction, and many just can’t believe such things are possible. But they are and eventually it will be proven, just like 9/11 or the globalist plot to control the world through politics, laws and trade. 5G is the surveillance states wet dream and unless the people do something, it’s coming quickly.

  6. The battlefield can not be a physical one. Of course we cannot beat them at their own game that they are 1,000,000X better than us at. The battlefield is in the mind. It’s about having people shift the way they think about the world and the way they think about interaction with their fellow humans. Right now, for the average person it’s all about what can the State do for me. How can I get the State to use violence in a way that benefits me? There needs to be a shift toward a mindset of Voluntaryism, and the illegitimacy of the State.

    • And the more impoverished and un-free people become, the more their minds will change. The state will likely be the source of its own undoing. It’s funny. It’s so worried about controlling what people see (whether through the mainstream of fake alternative media) and say that it doesn’t seem to realize that the attempt to control things in such a way as to prevent real solutions from occurring is precisely what will cause people to become frustrated to the point of abandoning their tolerance for the state.

      What was that song… if you hang on too tightly you lose control?

  7. Oh, I just thought of something. Everyone talks about how China has this social credit system and how evil it is for restricting movement.

    What is funny is that the US has basically had this for many decades now, it’s just not called that. It’s based on how much money you make. If you earn enough, you can freely go anywhere. If you can’t afford a car then you don’t have enough social credit (as measured in the ability to make money) to have such freedom.

    I wonder why no one seems to noticed that, especially given how stupidly expensive cars are these days.

  8. Just a reminder to everyone:
    Intel puts a backdoor in their CPU’s that provides direct access to your hardware, rendering all of your installed security software useless when it comes to combating deep-state actors looking to access your computer.
    Judging by the wording and body language in recent AMD statements, I think it’s safe to say AMD is also providing a similar backdoor.
    It may be that they are legally required to at this point.

    You can still block them, or at least catch them in the act, by using a router with custom firmware to watch for unusual/unexpected traffic to/from your computer.

    • Thanks for compensating for my laziness.
      I’ll just quickly add that there are people working on ways to disable the Intel backdoor (IME) and there’s been some good progress.
      Personally I’m still using a 2007 CPU while I wait for them to come up with a solid disabling method. There are some really nice CPU’s & motherboards from that time period that you can get for quite cheap. I’m still able to do most common things, including video editing in Adobe Premiere and playing many of the newer games.
      I should also mention that I’m not 100% convinced that the older CPU’s didn’t also have some kind of backdoor that was never found, but, anecdotal as it may be, I monitor my Internet connection closely and haven’t yet detected any traffic I couldn’t account for.

  9. Many channels (not just videos) on YouTube are being taken down, it seems. There’s a ‘strike’ system. 3 strikes and you’re out. I’ve been aware of this for some time. It seems now that this is being extended to BitChute.

    I was watching this

    https://www.youtube.com/watch?v=EVoAii6LxcM&frags=pl%2Cwn

    on Adam Green’s YouTube channel, ‘Know More News’, where he’s talking to Marty Leeds, another YouTuber, who says that one of his videos,

    https://martyleeds33.com/portfolio/we-need-to-talk-about-the-jews-11656/

    which is about the nature of anti-semitism, was taken down, first from YouTube, and then from Bitchute.

    Bitchute, which I’d somehow thought was well behind YouTube in the censorship race.

    Seems to me the most controversial point in this piece is a caption at 32m46s underneath Bebe Netanyahu which reads ‘Founder of the War on Terror’.

    I’m struck that the censorship is really kicking in now, big time. Free speech is really for the chop, my friends.

    • “Truthers” like James Corbett, Adam Green, Reallygraceful, Titus Frost, Jan Irvin, and the rest really need to have the conversation on what would really get their funding cut and REALLY get them censored. I just want to hear what truth they DARE NOT SAY on one of their broadcasts lest they get some real resistance. Now that (if it exists) is the very thing we should all be focusing on. No?

  10. You know, it’s only a matter of time before you won’t be able to turn “alexa” (or her alternates) off. That is, you won’t be able to “unplug” the surveillance device.

Submit a Comment


BOOK

Buy REPORTAGE, the new book by James Corbett

RECENT POSTS


RECENT COMMENTS


ARCHIVES