Forcing You Back Onto the Grid.


Image

In the United States, we do not own the property we live on, even if it is already paid off.  In essence, we are just renting it from the government.

The government has had, for some time now “Nuisance Abatement Teams”, or law enforcement officers which check to see if building code, fire code, etc are up to date.  They enforce city ordinances like vehicle forfeiture, graffiti protection…

But recently, with the all of the people that wish to live self sustaining life styles, the government has broadened their search for offenders of ordinances.  With several million people living “off the grid” or growing their own food, producing their own electricity, and not having to rely on the government or other companies for all their needs, the law enforcement officers have been ordered to bring these people back to the system.   Most of these people abide by the laws.  The government is citing these people for ridiculous reasons such as “bothering the neighbors” or “code violations”, such as growing food within the city limits… but some of these people live far from the city!   For instance if you grow a food garden, they can cut your garden down or make you get a food safety permit and inspectors from the government come to your property and make sure everything is done “right”.  The definition of right is open to interpretation.  If you are growing organically they could shut you down.  At the best, they have a record of what you grow and how much you grow.  In some areas they are forcing people off their land entirely!!!  There are anti hoarding laws as well. In a time of “emergency” either real or fabricated, the government can take away your food and supplies if you have more than 30 days for each person in a household. The government will then “redistribute” them to ?????   Federal Agents already want lists of Mormon‘s that store food.

The government can also have you detained and sent to a psychiatric facility if they think you are mentally ill..crazy for wanting to grow food that is not processed, laden with sugar and salt, genetically modified or sprayed with who knows what.

FEMA recommends keeping only 3 days worth of essential supplies per person on hand at any time.  According to the Department of Homeland Security, you might be a terrorist if you have 7+ days of food storage per person in your home.  Seven days is not very much.

Ways of monitoring you: Facial recognition software, food “discount” cards, memberships to wholesale stores (sams club, costco, etc.), your mail (remember the government comes to your home 6 days a week), vehicle i.d. tags (rfid and other types), credit/debit cards, your smartphone, the internet, drones, satellites….

Here is one story that is very disturbing:

A Tulsa woman is suing the city’s code enforcement officers after she said they cut down her garden with no cause.

Denise Morrison said she has more than 100 plant varieties in her front and back yards and all of them are edible and have a purpose.

She knows which ones will treat arthritis, which will make your food spicy, which ones keep mosquitoes away and treat bug bites, but she said none of that matter to city inspectors.

Last August, Morrison’s front and back yards were filled with flowers in bloom, lemon, stevia, garlic chives, grapes, strawberries, apple mint, spearmint, peppermint, an apple tree, walnut tree, pecan trees and much more.

“I came back three days later, sat in my driveway, cried and left,” Morrison said.

If you are storing food for emergency or growing your own food garden don’t advertise it.

Independence is frowned upon America.  The want to monitor us all of the time…they made us nearly prisoners…and many didn’t or still don’t know it.  This isn’t freedom we have.  Don’t fool yourself.  Everything we do is guided.  Should you be able to walk to the store at 3 a.m.?  Absolutely!  It might not be the smartest thing in the world because you could be kidnapped, attacked,  hit by a car that didn’t see you or worse harassed and arrested…for ?????

http://survivalist.com/attention-preppers-get-back-on-the-grid.html

http://www.houstonpress.com/slideshow/preppers-life-off-the-grid-37095347/#1

http://endoftheamericandream.com/archives/all-over-america-government-control-freaks-are-forcing-preppers-back-on-to-the-grid

http://www.scribd.com/success5564/d/70502676-Federal-Anti-Hoarding-Law

Advertisements

Facebook Buys Facial Recognition Face.com


In a move to open up opportunities, the social network site, Facebook.com bought Face.com, an Israeli company, that specializes in facial recognition software.

Face.com has already released 2 facebook apps, the first, called photo finder, scans untagged pictures of themselves and friends and photo tagger,  which allows a user to tag pictures in bulk.

Although the apps may seem convenient to some, facial recognition software has raised flags with privacy groups and other people that don’t want their privacy invaded and potentially fall into the hands of those who could abuse it, like corporations or the state.  Matching a face to a name and then a person’s entire background could be used to achieve a society under complete surveillance every time they leave their home and a camera picks up their image, in a store, on the street, or in this instance, where they were and who they were with, when a photo was taken.   As this technology advances, expect to see more and more law enforcement agencies using it to track every citizen, associate you with other people and associate the people within a certain area of a crime that’s taken place.

This is especially troubling because Facebook recently bought the popular app called Instagram, which allows users to take photos with their phones, add filters to achieve certain effects, tag people, geotag the location of the photograph and then share the photograph with other Instagram users (which boasted 30 million accounts in April, before the Android app was available).

Face.com is backed by Yandex NV, Russia’s most-used search engine, and investing firm Rhodium.

Alas, Facebook is not the first to use facial recognition technology.  Google‘s Picasa, Apple’s iPhoto,  Sony’s Picture Motion Browser and Microsoft’s Windows Live Photo Gallery already use similar software.

Facebook’s stock rose 4.7 percent in trading today, but still falling 17 percent short of it’s projected value.

And don’t bother deleting your pictures from any of these services, they’ve already been crawled most likely and if not the FBI has been using this technology for awhile.

 

The image above represents a study done by Adam Harvey in which makeup is used to disguise ones face.  The faces with red square are ones that were identified by facial recognition software.  This may be out of date.  read more: http://gajitz.com/about-face-defeat-face-recognition-software-with-makeup/

 

Facebook Tool: Who Are You Looking At?


I came across an interesting little tool that tells you who you are searching for most on your facebook.  From the tests that I did the results seem pretty accurate.  I mean, you probably have an idea of who’s name you type in the search bar most, but still its a fun little trick.

Basically, you make sure https browsing is turned off. Then you take this little bookmarklet and drag it up to your toolbar.  It should say “facebook friends”.  Then you go to your facebook page and just click on the link you moved into your toolbar.  Your most searched for friends will be at the top.

http://thekeesh.com/2011/08/who-does-facebook-think-you-are-searching-for/

QR Codes, Why?


At first I thought QR codes were neat.  QR stands for quick response, but in my opinion, they are anything but quick.  They are a hassle. And you don’t know where it may take you.  Hello picture of a _______! (use your imagination)  QR codes were invented back in 1994  in Japan by the Toyota subsidiary Denso Wave to track vehicles during the manufacturing process.

You download a qr code reader program for your smartphone, then with your phone, you align the code, hold it steady, and it will capture the image and then it takes you to a link… sounds neat.  but however as time went on I realized they are a gigantic pain in the butt.

First of all you need a semi decent smart phone with a camera able to get close enough to the code to read it.

  • QR codes generally don’t work well or AT ALL if they are printed on glossy paper.  So fail.  I tried 3 different brands of smartphones, 2 programs, none worked.
  • QR codes sometimes come on the news or other programming, but only stay on the screen for about 5 seconds, clearly enough time for me to get out my phone, open up my code reading program, and align it with the camera.  Another fail.
  • QR codes in places they have no business.  On the inside label of an alcoholic drink.  As if doing anything requiring more than 2 steps was easy when you are drunk, think about the frustration this would cause.. you must get out your phone, open the program, align your camera and hold it steady to the code printed on the back of a label stuck on a clear bottle of booze.  I don’t think a phone would even be able to read through the glass distortion if you got that far. This could be dangerous or cause a bar room brawl.  I don’t advise trying this one intoxicated.

  • Why do they put QR codes on vehicles.  Unless you are parked, it’s pointless.
  • QR code tattoos.  I’m just going to stay away from that one.
  • On highway signs.  I thought it was illegal to text and drive at the same time.  I guess the passenger could do it, but wait, unless you are not moving this really freaking difficult.
  • On the roof of a building.  Facebook has one.  Seriously!

Risks include linking to dangerous websites with browser exploits, enabling the microphone/camera/GPS and then streaming those feeds to a remote server, analysis of sensitive data (passwords, files, contacts, transactions), and sending email/SMS/IM messages or DDOS packets as part of a botnet corrupting privacy settings, stealing identity, and even containing malicious logic themselves such as javascript or a virus.  These actions may occur in the background while the user only sees the reader opening a seemingly harmless webpage.

Here is an article if you feel like scanning, that is just disturbing:

make your own qr codes: http://qrcode.kaywa.com/

share your creative uses or where you’ve seen these codes too!  I love feedback.

Weight Loss Simulator So You Know How Long It Will Take You to Get Unfat.


This tool is for those that want to lose weight within a certain time frame.  You simply enter information about your body, diet, daily activity, goal weight and goal time.  It then calculates how many calories you need to eat daily to reach the goal weight and also the number of calories to eat to maintain the goal weight once it is reached. Pretty good tool if you are disciplined enough to stick to the routine every single day.

Consult your doctor before going on any kind of diet, you could have another underlying problem.

http://bwsimulator.niddk.nih.gov/

Random Password Generator Tool


I laugh when I hear about hacked accounts and their username/passwords.   It seems like a favorite of many network administrators is to use:

username: admin

password: admin or adminroot or password or administrator or roottoor

They also love to use terribly easy to find data such as their last name, graduation year, kids birthdays, pet’s name, last 4  digits of their social security number

why not just use 123456 as your password?  Why not just use the same password on all of your sites for that matter.

Even basic email services tell you to make a strong password, using a combination of upper and lowercase letters, numbers and symbols.  Don’t use words from the dictionary as those are indexed already in most  password crackers.  And of course use a different password for each site you visit, making sure you change the password according to your specific needs.    A person with a high security clearance or that is privy to sensitive data may want to change passwords every couple of weeks, but not on a strict schedule as that could draw attention to a routine.   For the average person using a low risk site, every 3-4 months should be sufficient. There are no guarantee’s of course.  If you are alive, your information could be stolen, used, changed, deleted….  We have to keep a close eye on our presence in the world today.

Love, sex, god, and secret are out since they don’t contain enough characters/symbols/numbers. Sorry Hackers via 1995.

http://strongpasswordgenerator.com/

The generator recommends 15 characters for a password.  I randomly generated this password (which I am not using):  ]2,%Pj4x(a”85]+

Another thing I do not like are password recovery questions.  They are often questions that one could find on public data sites, such as your mother’s maiden name, city of your birth, high school mascot, first car….  easy enough questions to find for the dedicated searcher.

I also disagree that adding your telephone number enables more protection.   The more information about yourself you give out, the more vulnerable you will be!  That’s just common sense.  Telephone numbers are extremely easy to find and if it is a current phone number, chances are it is linked directly to your home address.  Most sites that use telephone numbers as verification will not accept i.p. or sip based telephone numbers, such as Google Voice,  Skype, SendHub, etc.  Change your telephone number every once in awhile for good measure.

Or you could just buy a new identity on the black market.  I’m kidding.

Conspiracy Generator


These days you can’t turn on the t.v., browse the web, read the paper (do people still do that), leave the house or drink a glass of water without the word “conspiracy” finding its way to you.   I don’t  know how I found this generator, but you simply fill in the blanks and hit enter and you get a conspiracy.   It’s mildly entertaining.

http://www.alchemica.co.uk/conspire/discover.html

theory

“Why can’t anyone see that chuck norris is being watched by Costa Rica? It’s all so that NSA, hidden in a secret HQ near akron, ohio can poison the ocean. After that, Costa Rica will give everyone ebola when the disorder caused by NSA reaches a peak. The only thing we can do is let a stray dog put together a militia to stop them.”

 

Try it out, it’s fast and stupid.

  • Top Clicks

    • None
  • Categories

  • Visitors

    free counters