Interview 1138 – New World Next Week with James Evan Pilato

02/12/20164 Comments

Welcome to New World Next Week — the video series from Corbett Report and Media Monarchy that covers some of the most important developments in open source intelligence news. In this week’s episode:

Story #1: The End Is Nigh For Europe As Officials Mull 2 Year Schengen “Suspension”
http://bit.ly/1muCoCv
Wikipedia: Schengen Area
http://bit.ly/1UeMeoe
The EU’s new Coast Guard / Border proposal
https://www.corbettreport.com/?p=17238
NWNW Flashback: Schengen Ending – The Disintegration Of The European Project (Nov 2015)
https://youtu.be/7_ZAeM2oFbM?t=10m20s

Story #2: Feds Admit They’ll Use “Internet Of Things” For Spying
http://bit.ly/20Xx8Hl
FBI Still Can’t Crack Encrypted Phone From San Bernardino Shootings
http://bit.ly/1KHIjQj
Shodan: The Search Engine for The Internet Of Things
https://www.shodan.io/
In Australia, Even Learning About Encryption Will Be Illegal Soon
http://bit.ly/1muD0rP

Story #3: Whitehat Hacker Replaces Malware with Antivirus
http://bit.ly/1PF98l0

#GoodNewsNextWeek – Parmesan Cheese Is As Good As Gold
https://youtu.be/UtbqyZQyicQ

#NewWorldNextWeek Headlines: Fed May Lack Legal Authority for Negative Rates
http://bit.ly/1o6uPUl
Microsoft Drops a Cloud Data Center Under the Ocean
http://bit.ly/1QtQOLx
Obama Quietly Unveils 4.1 Trillion Dollar Budget with More for Pharma, Military and Cyberwar
http://bit.ly/23YVVNt
While Americans Prepared for the Stupor Bowl…The-Powers-That-Shouldn’t-Be Signed The TPP And the TTIP is Next
http://bit.ly/1TexpE9

Join the Newsbud email list
bit.ly/1NbeEtd

Previous Episode: Zika Hype Spreading Panic Pandemic
https://www.corbettreport.com/?p=17724

Facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Filed in: Interviews
Tagged with:

Comments (4)

Trackback URL | Comments RSS Feed

  1. candideschmyles says:

    So glad to see you laugh over any shill accusations. Perhaps when you go to the Anarchists Annual Convention down there at the Langley Riviera in Mexico you can compare notes and come up with an effective strategy to counter those pesky shill hunters. It becomes tedious when everybody is calling everybody a shill. Or a gatekeeper.
    The Internet of things concerns were all being discussed on the tech pages of www more than a dozen years ago but nobody like you was around to pick up on it. Your analyses, C, that personal data collection would be used to identify perfect patsy’s is a good one. But the blackmailed coercion aspect extends far beyond that. They want something on everyone, its almost a motto. Certainly if you are a notable individual in any sphere you can count on being reviewed regularly.
    I was a little surprised at your acceptance that malware still requires an email attachment to be opened. Such a thought is moot when the hardware that is in your device is manufactured with inbuilt compromise freely available to anyone with the key. Entropy will hopefully counter this and some kid somewhere will make it all useless. The decryption of hidden source codes is inevitable and once in public domain it has to be rendered useless.
    And loved the cheesy story at the end, its a tad like mainstream news format but using Parmesan as currency is almost original. I did chuckle.

  2. silverpalomino says:

    They always want to talk about Shengen dying but the EU’s own Frontex agency has a report showing that over 60 % of those coming into EU do not have a right to asylum. Since they know this but Merkel and Co. cannot admit it publicly or Soros will be after her, they are actually trying to compel Greece (which has just admitted to being in recession) to solve the whole problem for the rest of EU countries. Simple solution like not creating wars on other nations are never an option.

  3. VoltaicDude says:

    1) Internet of all things – targeting for recruitment?

    First blackmail or entrapment, then perhaps patsy.

    Nice and neat – the pharaohs entombed the pyramid workers at the end too.

    2) The FBI can’t break the San Bernardino phone encryptions?

    Hmmm, perhaps they’re not fully utilizing their fusion center links to the CIA for this job?

    Or maybe these “safe” phones are just decoys, if that’s the right word – maybe Trojan Horse is indeed more accurate term?

    “Wow, now you can use these ‘safe’ phone encryptions – really! It’s like a whole news story and stuff, didn’t you hear about it?…[snap!]…Ha, gotcha!”

    • tomas says:

      Agree totally , trojan horse for sure . And many people will love apple for standing up for privacy , more sales for them . And the ones that don’t , more support for government control and intrusion . Either way they win , unless you stop buying and using an apple .
      Like James said , 3-D chess , where they set up both sides and give them the illusion they have a chance of winning , while they play the 3D version and laugh .

Leave a Reply

You must be logged in to post a comment.

Back to Top