Interview 1394 – “Smart” Tech and The End of Privacy

by | Oct 5, 2018 | Interviews | 37 comments

James Corbett joins Dr. Joanne Conaway on The Power Hour to discuss how technology is spying on you in the digital age.

Watch this video on BitChute / DTube / YouTube or Download the mp4

Power Hour Radio with Dr. Joanne Conaway

Episode 333 – 5 Privacies You Didn’t Know You Lost

MSM reports on the Chinese social credit surveillance state

Tim Clemente (accidentally?) reveals NSA capturing all phone calls on CNN

Don’t Be An Idiot! Get Rid of Alexa!

CIA Chief: We’ll Spy on You Through Your Dishwasher

Court Upholds Google-NSA Relationship Secrecy


  1. I will spam this again as I have no other way to get it out. And I think youtube would pull it down even if I did manage to upload it.

    This video is about the Parkland shooting.

    It has the video of the student who claimed 1 shooter was coming in from 1 entrance, and that when they ran to the other entrance another shooter came through that entrance. This proves that there was more than 1 shooter.

    It also has large screenshots of the David Hogg mugshots, and the audio of the closet interview where Hogg says that it is 9:32 which shows the video was recorded 5 hours before the event and many other interesting things.

    Mass shooting: questions, curiosities, statements and solution

    Here it is on if the above link doesn’t work. Some have complained that only the audio plays in the bitchute link.

    part 1


    part 3

    • ‘It has the video of the student who claimed 1 shooter was coming in from 1 entrance, ‘

      Im not suggesting you go on a spamming campaign again to look at content most of us will have already analyzed (along with the teacher saying the shooter was wearing some kind of helmet, in one interview I saw) but if you want people to check out a short bit from a 40 min video better than sending them on a hunting expedition, give a time-stamp for where it begins. On players where the time is counting downward by default just give the remaining time.

      The most effective way to use the internet is to break the echo-chamber. Join a flower-arranging, Bonsai, yoga, or model-building, etc. whatever youre interested in, groups, forums etc. Those are the boards and groups to target. Not with over-the-top complicated rants that make your points, but by asking a question someone will then wish to answer on their own. And it has to be done in a smart and selective way, when any kind of natural sounding segue can be found. Politics, trust issue, these things pop-up all the time on boards. The Parkland shooting is a rough one. Stronger would be “What do we make of the witness accounts to the San Bernadino shooting?” or “How do we explain Building 7?” Ive found over the years, people generally respond better if you speak from a position of ignorance, or submission, rather as an authority on the matter. The people who care will pick it up..those who dont would not have anyway. Otherwise the internet is pockets of echo-chambers, which its so bad at effecting any kind of actual grassroots change.

  2. I will spam this again as I have no other way to get it out. And I think youtube would pull it down even if I did manage to upload it.

    This video is about the Parkland shooting.

    It has the video of the student who claimed 1 shooter was coming in from 1 entrance, and that when they ran to the other entrance another shooter came through that entrance. This proves that there was more than 1 shooter.

    It also has large screenshots of the David Hogg mugshots, and the audio of the closet interview where Hogg says that it is 9:32 which shows the video was recorded 5 hours before the event and many other interesting things.

    Mass shooting: questions, curiosities, statements and solution

    Here it is on if the above link doesn’t work. Some have complained that only the audio plays in the bitchute link.

    • Wall, please stop spamming this site with the same stuff. I’ve seen all this on several different threads now over the last week or two, and it’s becoming annoying. It’s not in the spirit of this website.

      • wall,
        Perhaps, once in a blue moon would be more appropriate with repeating your message on this board.
        Also, there are other avenues where you can promote your links, not just here.

        • such as? I would really like to know.

          And do the vids works for you? Some say they don’t.

      • That I am not so sure of. The point in the website is supposedly to get out info.

        Right now, this is the only way I can think of to get this out there. If you know of better ways, I will try them instead.

  3. This is a tech request… James, could you please provide a download link for your videos as you do with your audios? This one is on Bitchute and I cannot find a way to download it. If there is a way, please advise.
    If you post on Youtube I can get it with a download addon… but I prefer not to have to go there 😉

    • You can get an add on called “Video Download Helper” which can pull videos off of BItChute. I’m not sure if they respect the privacy of your data though, so use at your own risk.

      • Yeah, I have wondered about the safety of addons. Does anyone know anything about that?

        • As with all software, some add-ons are trustworthy and some aren’t.
          There are things you can do to help determine if a piece of software is likely trustworthy such as researching the developers, researching how popular the software is and how long it’s been around, researching what others have said about the software, checking if the source code is available and if anyone trustworthy & capable has actually evaluated it; checking who built the binaries and whether or not that person is trustworthy, checking the source code yourself if you have the know-how, monitoring the software while it’s in a sandbox or virtual machine (or on a second computer) to see what files it tries to access, install or execute; what registry entries it creates and what sort of internet communication attempts it makes.

          If you don’t want to get into that kind of research & testing for every piece of software you run, go with smart practices instead.
          Keep all personal files on a separate computer that isn’t connect to an Internet cable, or keep them on an external drive that is only connected to your computer while your Internet cable is disconnected.
          If you’re not willing to do that, at least run the software in a sandbox (like Sandboxie) or in a virtual machine.

          In the case of browsers specifically, you should have two separate browsers (or at least two separate browser profiles) – one with add-ons installed and one without, and you shouldn’t run a browser outside of a sandbox or virtual machine unless, as mentioned above, the computer is a dedicated Internet computer that has no personal files on it and is never connected to a device that has personal files on it.

          Regarding VideoDownloadHelper specifically: It’s widely trusted by many people and is one of the most popular add-ons in existence. That’s not a recommendation though. There are very few add-ons I would recommend trusting.
          Personally, I have VideoDownloadHelper installed in a second (sandboxed) browser that I switch over to for downloading videos.

  4. False flag hacking?
    propaganda watch?
    In the Netherlands there is a lot of fuzz about Russian Hackers.
    It was front-page news and with a lot of background articles.
    Which seems to me that they are trying to push some narrative..

    The first clear error was, that they newspapers were claiming
    that the US election was hacked. And that Syria had done chemical
    attacks. Both are clear lies.

    And this story was weird too:
    Hackers are not usually caught, but these people were acting so
    obviously that they were spotted easily.

    Usually if you spot a trained spy, they want you to spot them.
    If you spot a hacker, he will have social engineering ready to
    get out of trouble quickly.
    Hacking into a wifi is easy and can just be done with a phone,
    or from 100 meter away with a good antenna.
    You really won’t spot them, unless they want you to.

    The target is also strange, if you know the real news.
    Did they want to find out who was accusing them of chemical
    weapons use?

    But if they acted so obviously, were they working for Russia
    at all? It would be easy for the CIA to pay some “hackers”,
    even to get Passports and everything.
    There are lots of opponents of Putin.

    They might have tried to kill them too when they downed the wrong plane MH17. Something that the Dutch only blame the Russians for.

    Many other possibilities, but the story stinks.

    • The Last American Vagabond has some more on the weirdness of this “hack”.
      He goes into:
      1. Evidence-Free Claims (“hacking” etc)
      2. US’ Secret Biowarfare Agenda,
      3. Geoengineering In Action,
      3. Political Revolution

      1. The “russians” were not even searched or questioned
      2. There is evidence (and deeths) showing that the US is doing bio-weapon experiments on humans in foreign countries.
      3. Volkswagen is using geo-engineering to prevent hail on their cars.
      4. Solution: A town bans all politicians 🙂

      More news:

      Artificial Sweeteners Turn Gut Bacteria Toxic, Says Joint Study

      German teenage girl called ‘Nazi’ for reading poem about migrant violence – Her house vandalised as well

      (more on eu-violence on that site, pls double check before publishing)

    • The Chinese “hacking chip” story is weird too.
      Likely propaganda to strengthen the trade-war.

      Article here:

      Only bloomberg is reporting it, while the manufacturers are denying it.
      For these hacking things it is unusual, as they want to stop the
      problems as soon as possible.
      Denial by Apple:
      Denial by Amazon:

      The “chip” looks very much like a resistor or transistor or
      something similar. For a chip to be functional it needs
      at least power and serial port.
      It needs at least some reverse engineering.
      (electro-microscope-scan of the circuit)

      What is more real is the implanting of microscopic processors in
      the edges of chips themselves.
      This is likely done by NSA/CIA and such for mobile phones.

      And Intel has implanted a remote control on most modern chips.
      (Intel AMT / 3G-radio)
      One that still works when the computer is switched off, but
      with the power still available.
      There are also special instructions that work on certain computers
      on ATMs and maybe also voting machines.

      This all promises a lot of fun for hackers.

      • Thanks zyxzevn.
        Interesting stuff.

    • This whole “nation vs nation” crap thing is just another part of what I call “the devil’s bullshit show”.

      Brandon Smith talks about it some time. But the whole nation vs nation thing is all just a show to keep people divided and conquered… enslaved for the dominance of a few.

      Even if this hacking crap is really going on, those who are doing it are acting under the influence of an illusion. The whole spy vs spy, and army vs army things are just matters of controlled idiots putting on a show for us all, whether they realize it or not.

      So, does it even matter if it’s “real”? “Real” to who? For them it may be real, to someone else above their station it may just be another part of the bullshit show.

    • Let’s follow intelligence logic

      1. We have “obvious bad spied”.
      2. We have the problem-reaction-solution propaganda.
      3. And the “dutch” intelligence is mostly NSA and CIA.

      So this gives us the logical solution that the institute
      will be taken over soon by the CIA.

      Let that sink in:
      watchdog against chemical weapons
      will soon be taken over by the CIA.

  5. When she asked how the surveillance organizations use all that data to identify who to keep tabs on, it’s a question I’ve gotten multiple times whenever I explain this to someone (usually). They ask “how can someone listen to all this?” I tell them it isn’t that people are sitting there looking and listening to someone’s info. It’s AI algorithms, virtual AI robots that are far in advance of anything we see being created, that have compiled scores on everyone based on the data collected. Compiled into lists and threat ratings that place levels of surveillance on everyone depending on what the bots are programmed to watch for or evaluate. It sounds quite science fiction, and many just can’t believe such things are possible. But they are and eventually it will be proven, just like 9/11 or the globalist plot to control the world through politics, laws and trade. 5G is the surveillance states wet dream and unless the people do something, it’s coming quickly.

  6. That was funny! And it fits the bill.

  7. The battlefield can not be a physical one. Of course we cannot beat them at their own game that they are 1,000,000X better than us at. The battlefield is in the mind. It’s about having people shift the way they think about the world and the way they think about interaction with their fellow humans. Right now, for the average person it’s all about what can the State do for me. How can I get the State to use violence in a way that benefits me? There needs to be a shift toward a mindset of Voluntaryism, and the illegitimacy of the State.

    • And the more impoverished and un-free people become, the more their minds will change. The state will likely be the source of its own undoing. It’s funny. It’s so worried about controlling what people see (whether through the mainstream of fake alternative media) and say that it doesn’t seem to realize that the attempt to control things in such a way as to prevent real solutions from occurring is precisely what will cause people to become frustrated to the point of abandoning their tolerance for the state.

      What was that song… if you hang on too tightly you lose control?

  8. This was a very interesting conversation. Dr. Conaway is a great host and asks relevant questions and follow-up questions.

  9. Oh, I just thought of something. Everyone talks about how China has this social credit system and how evil it is for restricting movement.

    What is funny is that the US has basically had this for many decades now, it’s just not called that. It’s based on how much money you make. If you earn enough, you can freely go anywhere. If you can’t afford a car then you don’t have enough social credit (as measured in the ability to make money) to have such freedom.

    I wonder why no one seems to noticed that, especially given how stupidly expensive cars are these days.

  10. Just a reminder to everyone:
    Intel puts a backdoor in their CPU’s that provides direct access to your hardware, rendering all of your installed security software useless when it comes to combating deep-state actors looking to access your computer.
    Judging by the wording and body language in recent AMD statements, I think it’s safe to say AMD is also providing a similar backdoor.
    It may be that they are legally required to at this point.

    You can still block them, or at least catch them in the act, by using a router with custom firmware to watch for unusual/unexpected traffic to/from your computer.

    • Thanks for compensating for my laziness.
      I’ll just quickly add that there are people working on ways to disable the Intel backdoor (IME) and there’s been some good progress.
      Personally I’m still using a 2007 CPU while I wait for them to come up with a solid disabling method. There are some really nice CPU’s & motherboards from that time period that you can get for quite cheap. I’m still able to do most common things, including video editing in Adobe Premiere and playing many of the newer games.
      I should also mention that I’m not 100% convinced that the older CPU’s didn’t also have some kind of backdoor that was never found, but, anecdotal as it may be, I monitor my Internet connection closely and haven’t yet detected any traffic I couldn’t account for.

  11. Many channels (not just videos) on YouTube are being taken down, it seems. There’s a ‘strike’ system. 3 strikes and you’re out. I’ve been aware of this for some time. It seems now that this is being extended to BitChute.

    I was watching this

    on Adam Green’s YouTube channel, ‘Know More News’, where he’s talking to Marty Leeds, another YouTuber, who says that one of his videos,

    which is about the nature of anti-semitism, was taken down, first from YouTube, and then from Bitchute.

    Bitchute, which I’d somehow thought was well behind YouTube in the censorship race.

    Seems to me the most controversial point in this piece is a caption at 32m46s underneath Bebe Netanyahu which reads ‘Founder of the War on Terror’.

    I’m struck that the censorship is really kicking in now, big time. Free speech is really for the chop, my friends.

    • “Truthers” like James Corbett, Adam Green, Reallygraceful, Titus Frost, Jan Irvin, and the rest really need to have the conversation on what would really get their funding cut and REALLY get them censored. I just want to hear what truth they DARE NOT SAY on one of their broadcasts lest they get some real resistance. Now that (if it exists) is the very thing we should all be focusing on. No?

  12. You know, it’s only a matter of time before you won’t be able to turn “alexa” (or her alternates) off. That is, you won’t be able to “unplug” the surveillance device.

    • Won Fat Fuk
      Looking at your name, I have to resist making the wong jokes in regards to Alexa.
      Someone could have a field day.

  13. wrap the phone in aluminum foil if you cant take the battery out and wanna stop it pinging.

Submit a Comment


Become a Corbett Report member