The draft text for the TPP Intellectual Property Rights Chapter spells out provisions for implementing a transnational “enforcement regime” designed to supplant national laws and sovereignty with a globalist construct. The TPP is by far the largest and most oppressive economic treaty devised thus far. It will have an impact on a staggering 40 percent of worldwide GDP. The TPP is the forerunner to the equally secret US-EU Transatlantic Trade and Investment Partnership (TPP). Both treaties combined will cover 60 percent of world GDP and exclude China. » Infowars...
NSA Can Track Your Location Even When Your Phone is Turned Off Alex Jones' Infowars: There's a war on for your mind!
The U.S. Secret State and the Internet: “Dirty Secrets” and “Crypto Wars” from “Clipper Chip” and ECHELON to PRISM | Global ResearchDid you know that the NSA can track the location of your phone even when it is turned off and the batteries have been removed?This admission went largely unnoticed in a Washington Post report entitled NSA growth fueled by need to target terrorists.In the article, writer Dana Priest details how teams of NSA employees stationed around the globe are dedicated to tracking phones in real time.
Documents published by The Guardian and The New York Times revealed that the National Security Agency “actively engages the US and IT industries” and has “broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.”
“Those methods include covert measures to ensure NSA control over setting of international encryption standards,” The Guardian disclosed, along with “the use of supercomputers to break encryption with ‘brute force’, and–the most closely guarded secret of all–collaboration with technology companies and internet service providers themselves.”According to The New York Times, NSA “had found ways inside some of the encryption chips that scramble information for businesses and governments, either by working with chipmakers to insert back doors or by surreptitiously exploiting existing security flaws, according to the documents.”