Wednesday, August 30, 2017

Mayweather V. McGregor: Showtime Got Injunctions On Pirate Stream Sites Which Didn't Work & Neither Did Their Own Stream

from the oops dept

As you will already know, a boxing match recently took place between Floyd Mayweather Jr. and Conor McGregor. The fight itself was far better than it should have been, but you may not know it if you couldn't manage to actually see it. Much as it did in the run up to the Mayweather v. Pacquiao fight of a couple of years ago, Showtime went out and got some rather questionable injunctions against 44 sites it believed would be offering up the fight via an illegitimate stream during the live pay-per-view broadcast. That effort resulted in, ahem, only three million viewers watching the fight via illegal live streams. Thousands more downloaded video of the fight illicitly after it occurred. So, Showtime got a court to agree to questionable pre-crime activities with the result being rather mixed.
But if the steady mantra from the content industries that "every infringement is a lost sale" were true, then perhaps Showtime should be thanking its lucky stars that illegal streams were available, because its own streaming service wasn't able to handle the viewership load it did have.
Showtime was hit with a federal class-action lawsuit amid reports that it delivered shoddy or non-existent $99 streams of the Floyd Mayweather-Conor McGregor fight Saturday. This is contrary to Showtime's promise of 1080p resolution at 60 frames per second.
"Instead of being a 'witness to history' as defendant had promised, the only thing plaintiff witnessed was grainy video, error screens, buffer events, and stalls," declared the lawsuit (PDF) filed in federal court on behalf of a Portland man named Zack Bartel. The suit seeks to represent "thousands of other consumers" unable to stream the Mayweather fight in HD as Showtime advertised.
By all accounts, it was bad. Really bad. The fight was delayed for paying streamers for over half an hour as Showtime's service was unable to handle all of those customers who paid for the fight. I don't want to spend any time on this class lawsuit, because these kinds of class lawsuits are generally pretty silly and the fact that Showtime failed to deliver on its own streaming product isn't in and of itself the point. The point is that if the company really wanted to go to war with streaming sites prior to the fight, it should have made sure that money and effort wouldn't have been better spent actually catering to its paying customers.
What if the content industries were right and the injunctions had worked? What if Showtime had to accommodate three million more customers with pirate streams unavailable? How bad would the streaming experience to all of those paying customers have been then? Likely it would have merely added 3 million more individuals to the class action lawsuit.
Meanwhile, of those that did pay for the fight and had their experience range from "delayed and sub-par" to "holy shit, I can't even watch this thing", how many might give this whole pirate stream thing a whirl the next time Showtime puts on a fight? All because Showtime would rather play whac-a-mole with streaming sites than make its own product function, never mind actually competitively good.             https://www.techdirt.com/articles/20170829/09403838103/mayweather-v-mcgregor-showtime-got-injunctions-pirate-stream-sites-which-didnt-work-neither-did-their-own-stream.shtml

The Hollies The Air That I Breathe


...if i could make  a wish ...i think i'd pass .. can't think of anything i need  :)r  

The Hollies The Air That I Breathe https://www.youtube.com/watch?v=_wACCgCCjRc


CCTV + Lip-Reading Software = Even Less Privacy, Even More SurveillanceImage result for funny pic of slipping on a bar of soap

from the HAL-would-be-proud dept

Techdirt has written a number of stories about facial recognition software being paired with CCTV cameras in public and private places. As the hardware gets cheaper and more powerful, and the algorithms underlying recognition become more reliable, it's likely that the technology will be deployed even more routinely. But if you think loss of public anonymity is the end of your troubles, you might like to think again:

Lip-reading CCTV software could soon be used to capture unsuspecting customer's private conversations about products and services as they browse in high street stores.
Security experts say the technology will offer companies the chance to collect more "honest" market research but privacy campaigners have described the proposals as "creepy" and "completely irresponsible".
That story from the Sunday Herald in Scotland focuses on the commercial "opportunities" this technology offers. It's easy to imagine the future scenarios as shop assistants are primed to descend upon people who speak favorably about goods on sale, or who express a wish for something that is not immediately visible to them. But even more troubling are the non-commercial uses, for example when applied to CCTV feeds supposedly for "security" purposes.
How companies and law enforcement use CCTV+lip-reading software will presumably be subject to legislation, either existing or introduced specially. But given the lax standards for digital surveillance, and the apparent presumption by many state agencies that they can listen to anything they are able to grab, it would be na&iumlve to think they won't deploy this technology as much as they can. In fact, they probably already have.                https://www.techdirt.com/articles/20170822/05364238054/cctv-lip-reading-software-even-less-privacy-even-more-surveillance.shtml

HURRICANE HARVEY HYPOTHESES           ~ hehe nut~in ta C here folks ...ALLLLL an act    "of god"

I had not intended to write anything about Hurricane Harvey in this week's blogs, but felt compelled to do so because of an odd "synchronicity" that occurred as I was writing and scheduling this week's blogs. Normally, when I am scheduling blogs, I tune in to some talk radio and listen as I write, either on the radio or on the internet, just to try to "stay abreast of things."  Normally, when such disasters happen, I am loathe to take them as opportunities to indulge in our trademark "high octane speculation"; people are suffering, losing their houses, assets, pets, and there is general upheaval and suffering.  It's not an appropriate time to indulge in "high octane speculations." Certainly, watching this disaster unfold, we all empathize and offer good thoughts and prayers for the people - at this juncture, all of Houston and most of the southern Texas Gulf coast.
However, in this case, hoping that people will excuse my high octane speculating while the disaster is in progress, I felt compelled to do so, for as I was listening to my radio, the host in question was reporting on the situation as it was occurring, and he said two things that really grabbed my attention. I am paraphrasing his remarks as closely as I can: (1) "Harvey seems simply to have stopped moving inland and has basically parked itself over the Texas coast," and he added to this that all of the roads in and out of Houston are simply impassible due to flooding; (2) that "most of southern Texas' coastal plain in and around Houston might be uninhabitable for weeks, if not months."  Yes, that will be the result if hurricanes decide to "park themselves" over an area and not move along.
But of course, hurricanes don't "decide" anything.
It's the strangeness of Harvey's behavior that caught my attention as the host made these remarks. It took me back to Hurricane Katrina which infamously moved in and struck New Orleans almost a decade ago. Again, that hurricane exhibited very unusual, very "un-hurricane-like" behavior, for if you'll recall, its path was almost due west through the Gulf of Mexico when, suddenly, reaching a point almost due south of New Orleans, it veered sharply in an almost perfect ninety degree turn, and made its way north, striking the city and surrounding environs and flooding thousands of people out of their homes and livelihoods. I recall seeing at that time - and other readers here may recall seeing this as well - the jet stream suddenly moved south in "response" to Katrina's sharp turn, as if "someone" was trying to steer the storm away from New Orleans, implying, of course, that someone was trying to steer it toward New Orleans.
In other words, my view of Katrina back then was - and still remains - that this storm was steered toward the city. It was, to be blunt, "weaponized weather."
And Harvey's stubborn refusal to move along inland, but rather to stay put, spawn tornadoes, and dump more water on Houston and the Texas Gulf coast, seems a little "odd." It seems, if I may be "country simple" once again, to be too contrived. Weaponizing weather to make an entire region of a state "uninhabitable for weeks or possibly months" behind an "act of God" like a storm is a convenient way to wage war behind the ultimate cloak of plausible deniability, for most people have difficulty believing the idea that such enormous systems, such as the weather, can actually be manipulated, steered, and engineered. More informed people will know, of course, that the ability to manipulate and weaponize weather was an objective of at least America's and Russia's militaries since the 1950s. Both countries have made round-about statements over the years that their efforts were successful. More recent statements of the US military made weather manipulation a crucial component of "force multipliers" and a component of its goal of "full spectrum dominance". Researchers such as Dr. Nick Begich and Jean Manning have also pointed out that the initial patents for ionospheric heaters taken out by Bernard Eastland for the HAARP array in Alaska also discussed weather systems steerage and manipulation as one possible application of the technology. Then there's the Globaloney crowd and their "weather derivatives," securities based on weather, a handy thing to have around; after all, if one can manipulate weather, why not make money off of it (and pick up ruined properties on the cheap besides)?
So now a hurricane is parked over southern Texas, one of the USA's few smoothly functioning state governments and economies.
Bottom line: I cannot help but think that Harvey's odd behavior is a little too odd, and that we're looking at weather warfare once again, or at the minimum, the possibility that we're looking at some sort of "blowback" from the technologies that can manipulate systems on a planetary scale, systems such as HAARP and EISCAT and other ionospheric heaters, possibly even the Large Hadron Collider with its strong, immensely powerful magnetic fields. There's an aspect of "unnaturality" here, if I may coin that word, that disturbs me.
But in the meantime, Texas suffers, and my heart is saddened for Houstonians and all the people along the coast from Galveston northward.                             https://gizadeathstar.com/2017/08/hurricane-harvey-hypotheses/

Total Individual Control Technology: Insider Exposes How You & Your DNA are Being Targeted       ~ hehe ...
Americans, in the millions, are having their DNA stolen from them, without their knowledge or consent, so they become unwitting targets of this insidious program! ...
Image result for evil nazi super science

Total Individual Control Technologyhttp://freedom-articles.toolsforfreedom.com/total-individual-control-technology/
Total Individual Control Technology is ultimate mind control weapon since it  targets your individual DNA.

Total Individual Control Technology

is a nefarious type of EM (Electromagnetic) and V2K (Voice to Skull) weaponized technology that is being experimented with and deployed against segments of the American population. Those attacked by this electronic stalking are known as TIs (Targeted Individuals). Recently another brave whistleblower has stepped forward to expose it. Bryan Kofron (who formerly used the alias of Justin Carter) is a security industry specialist who used to work for a private security company SIS (Security Industry Specialists) in Seattle, Washington. He quit in disgust after realizing that his former firm, and others just like it, were actively using this so-called total individual control technology to target people, then ultimately control and destroy their lives. Since he quit, he has himself become a victim of the technology via gangstalking.

What Total Individual Control Technology is Capable Of

According to Kofron, this technology is so advanced that it can be used to read your mind, program your mind with thoughts (that you would believe are your own) and induce emotional states in you (including pain, hate and fear). It can be used to tap into your optical nerve and auditory systems to see and hear what you are seeing and hearing. It can target particular people by engaging in individual-specific attacks (based on the target’s DNA resonance). Finally, it is being used in vast social engineering programs as a way to experiment upon poor, homeless and weak people who have little or no chance of fighting back.
In interviews or presentations such as this and this, Kofron explains that this technology is being used by psychopaths who have little scruples about the harm they are causing. They are targeting specific groups of people: those who are cognitively inclined, highly intelligent, knowledgeable about advanced technology or interested in alternative research (i.e. conspiracy research). In general, they are either targeting empowered individuals with free minds (to stop dissidents and revolutionaries) or those too poor and weak to fight back.
Using Kofron’s own words, here are some of the things Total Individual Control Technology is able to do:
“This technology manipulates the electrical signals in the brain, thus controlling thoughts and feelings and emotions and sensations throughout the body. It works by rewiring the brain by creating new neural pathways and destroying existing neural pathways, thus this literally changes the way a person thinks and thus behaves.”
“This technology can also be used to control the muscle movement of the target. It can take over one’s hands or feet while driving and make you press on the accelerator or press on the brake or turn. This can be used to cause accidents it can also be used to prevent accidents from happening.”
“This technology can also tap into the optical nerve of the target, and the auditory system of the target, so that those monitoring the target can see what the target is seeing and hear what target is hearing. This information is then downloaded and stored on a computer, in a highly secure classified site on servers that are guarded by some of the tightest security in the world. This results in the individual’s entire day, everything they see, everything they hear, everything they experiment, everything they experience, and everything they feel being recorded till the end of time.”
“This technology can also be used to manipulate the emotions of the target. It can induce fear, love, hate.”
“This technology can be used to beam images and even motion pictures into one’s brain. Images and motion pictures that are so realistic that you think you are actually watching a movie or seeing something in reality. It’s like a virtual reality 3D rendering that takes place within the target’s mind. The images and motion pictures manifest themselves in such a way that the target if they are not aware that this technology is being used on them will believe that they are natural thoughts and natural images.”
“This technology can also be used to induce and control dreams. It can be used to control dream cycles and sleep patterns. To cause one to sleep very deeply or to cause one to not sleep at all. REM cycles, alpha beta and delta brainwaves can be induced immediately by this technology. And this technology can also be used to mimic spiritual experiences. Joy, love, peace that passes understanding can all be induced artificially by this technology to make the target believe that they are having a genuine spiritual experience when they’re not.”
“This technology can also be used to sexually manipulate the target. Make them feel sexual arousal or turn off their sexuality altogether, it can stimulate them and it can shut them down at a moments notice. It can also be used to manipulate the hormones of the target, thus lowering and raising estrogen and testosterone levels in women and men respectively.”
“This technology can also be used to read the thoughts of the target in real time … they can read your thoughts verbatim as they occur within your own mind.”
“Anywhere from small groups of people 10-20 to 100, to medium size groups of people several thousand to tens of thousands. This is done by creating a field effect, where an entire field of electromagnetic energy is created in a geographical location and any human being within that geographical location within that electromagnetic field affecting that geographical location will be effected by the technology. This can be used to induce a general mood in a population or a crowd of people. It can be used to make them passive, it can be used to make them agitated. And this can be used to cause or stop, induce riots. Stop crime, start crime. Stop thoughts, start thoughts. Massive mind control on a citywide level.”
worldwide DNA database
The nationwide then worldwide DNA database … coming to a town near you.

Total Individual Control Technology Attacks Specific Individuals Based on DNA Resonance

As I have discussed in previous articles on mind control such as “They” Can’t Read Your Thoughts … Right?, the state of current mind control technology is beyond most’s people comprehension and idea of what is possible. Yet, we have had enough out-of-the-closet whistleblowers and leaked or declassified documents to give us a clear idea of the scary extent to which we can be psychically attacked. Whistleblowers such as Dr. Robert Duncan have lectured at length about the capabilities of V2K technology, which is defined as an EM frequency technology that utilizes RF (Radio Frequency) signals to induce sound within the cranial cavity of the target. V2K literally pipes thoughts directly into people’s heads without them knowing it.
Kofron bases his information on his own experience as an insider in this field, and also as recent victim of V2K himself. He was attacked once he went public. He claims he has been assaulted with a beta version which is especially nasty, piping thoughts into his head such as:
“Everyone’s against you”
“Please be quiet or we’re going to kill you”
“Don’t work again or we’re going to kill you” 
“You’re the lab rat now motherfucker”
Kofron claims the Total Individual Control Technology attacks are attempting to turn him against his former work colleagues, friends and family. However, since he was trained in this area, he knows that the voices are technological and can defend himself against the manipulations once he hears them.
Kofron echoes exactly what Duncan has warned about: individual-specific attacks. Duncan states that every person has a “unique resonance signature”, and in almost exactly the same words, Kofron states that:
“… the DNA of the individual is used to determine the resonant frequency of the DNA itself, the resonant frequency is then used to fine tune the technology … to tune it perfectly to the resonant frequency of the targeted individual’s DNA.”

The Drive to Create a Worldwide DNA Database

This leads into another aspect of the NWO agenda: the drive to create a worldwide DNA database. When seen in the light of Total Individual Control Technology, the acquisition of an entire population’s DNA takes on a very sinister meaning. It is no coincidence that Amazon and Google (who are ultimately controlled by the same force as David Icke suggests) are racing each other, along with Microsoft, IBM and other companies, to assemble a DNA database as quickly as they can. Those in power who gain access a completed worldwide DNA database and total individual control technology would have a horrifying weapon at their disposal to target literally anyone they wanted.
Kofron exposes how prospective employees are tricked out of their DNA. They apply for a job at SIS, get told they have to do a drug test, and when the urine sample is sent to a lab, part is siphoned off as DNA to go into Amazon’s burgeoning DNA database.
Americans, in the millions, are having their DNA stolen from them, without their knowledge or consent, so they become unwitting targets of this insidious program!

Social Engineering with Total Individual Control Technology

Kofron talks at length about how this technology is fully operational and is already being tested upon those in society who are struggling (such as those who are homeless, poor and who don’t have much family or many friends) since they make the easiest targets. On his website GangstalkerWars.com, he exposes the details of ongoing operations within Seattle (where he used to work for SIS). This social engineering is being done by the Federal Government, the Military Intelligence agencies, private security firms (more on this below), some of the largest US corporations (after all, we live in a corporatocracy), local and state police, and social programs within inner-city America.
In one such operation, the perpetrators would target certain geographical blocks of the city, and, for instance, cause everyone in that area to be in a bad mood. In another operation, SIS (employed by Amazon whose headquarters are in Seattle) would test upon Amazon employees. In another operation, SIS would experiment upon its own low level employees. In another operation, homeless people were brought in from all over the nation to special buildings that were then targeted. This is true gangstalking – the ganging up by sociopaths and psychopaths upon the innocent to electronically harass and stalk them.

The Rising Danger of the Private Security Firm Industry in America

Kofron warns about an alarming trend in American society: the rise of private security companies who mostly employ ex-military and ex-intelligence agents. As I covered in this 2-part series, the US Military Intelligence Complex is completely and utterly out of control. It runs the government and pulls the strings attached to all the puppet politicians, who don’t have the necessary “clearance” to access the truly top secret information. These security firms, like the MIC itself, appear to operate above and outside the law.
The culture inside of these companies is toxic. People rising up the ranks are conditioned to use this technology against innocent victims, and are told they will be rewarded with everything (money, power, women, sex, connection, access, status, belonging to the power club) if they go along with the program and become perpetrators. If they have a strong conscience and refuse, they will be sacked, shunned, cut off, threatened and even made into TIs themselves.
voice-to-skull V2K hearing voices
A madman hearing voices? Or Voice-to-Skull (V2K) technology?

The Human Rights Loophole: False Diagnoses

Another aspect of Total Individual Control Technology which the perpetrators use to shield themselves is the cruel use of false psychiatric diagnoses. Here’s how it works: they manipulate TI victims to see a psychiatrist, and then they bribe the psychiatrist to deliver a fake diagnosis that the victim is mentally unstable, deranged, delusional, crazy, incompetent, paranoid, schizophrenic, suffering from Multiple Personality Disorder – or they invent some similar legal-medical-psychobabble diagnosis. This has the unfortunate effect of stripping away the victim’s natural or human rights, which leaves him or her with no recourse to fight back against his attackers, since his claims and testimonies will be dismissed as the ravings of a madman.
This is a similar tactic to what is used with other victims of mind control. In my interview with Max Spiers, he touched on the use of the Big Pharma “false memory” foundation, which includes bogus therapists and psychiatrists who convince mind control victims that they’re having false memories (when they are actually recalling how they were tortured and programmed).

The Infrastructure Underlying Total Individual Control Technology

The infrastructure that is enabling the total individual control technology is composed mostly of antennae, radar and cell phone towers. Often, the antennae are camouflaged (hidden behind walls). Some or most of the radar used is from military bases. Kofron was not able to explain much of how the technology actually works, although an electrical engineer who called in on one of the radio interviews suggested that the perpetrators are setting up a standing wave of DNA, then doing slight variations in the phasing using pulse code modulation.

Final Thoughts: Total Individual Control Technology Perpetrated by the Cult of Power

In concluding, it’s important to realize how such cruel surveillance is being perpetuated. As Kofron explains, it’s all about creating an “in” club of perpetrators who get rewarded with money, sex, power and the intrinsic human need for belonging, get told they are on the “right” side and the TIs are on the “wrong” side – and get threatened that if they speak up or quit, they may end up on that wrong side. It’s the cult of power.
Hopefully this testimony can serve as a wakeup call for those on the fence who can’t quite bring themselves to believe or act. In many ways, time is running out and the net is being drawn tighter and tighter. The more technology advances, the more weapons the cult of power will have to enslave those who stand for truth and freedom. At a certain point, there will literally be nowhere to run or hide. The only option is to face it now before it’s too late.
*****

Sources:
*https://www.youtube.com/watch?v=qdqL64rHVB4
*https://www.youtube.com/watch?v=rLqhjU4jlec
*http://www.declassifieddocuments.com
*http://freedom-articles.toolsforfreedom.com/mind-control-technology-current-state/
*https://gangstalkerwars.com