House Speaker Releases Thousands of Hours of January 6 Surveillance Video to Tucker Carlson: Report

According to an exclusive posted on Axios today, House Speaker Kevin McCarthy (R-Calif.) has turned over the full trove of surveillance video captured by Capitol police security cameras on January 6 to Fox News host Tucker Carlson.

“Carlson TV producers were on Capitol Hill last week to begin digging through the trove, which includes multiple camera angles from all over Capitol grounds,” Mike Allen reported. “Excerpts will begin airing in the coming weeks.”

Read More

China Chreatens U.S. for Popping Balloon as American Military Begins Recovery Operation

China on Sunday threatened to respond after the United States shot down a suspected spy balloon that flew over sensitive military sites while U.S. armed forces are currently recovering the aircraft.

“China will resolutely safeguard the legitimate rights and interests of the company concerned, and reserves the right to make further responses if necessary,” China’s Ministry of Foreign Affairs, which has insisted the balloon was a civilian research airship that went off course, said.

Read More

Commentary: The Administrative State Can Put a Bug in Your Phone

n the age of cellphones and the internet, consumers often face a simple choice: convenience or privacy? Do we let Big Tech have access to our private communications and free email accounts because it’s so easy?

Once you’ve said yes — and who among us has not? — it’s not a stretch to think that Big Data already has almost all your information, so why get picky at the next juncture?

Read More

NSA Inspector General ‘Concerned’ About Surveillance of Americans’ Communication Devices

On Monday, the office of the Inspector General at the National Security Agency (NSA) released a report showing that the agency failed to follow basic internal guidelines and court-ordered procedures in its surveillance of American citizens’ communications.

According to CNN, the report showed that the agency abused a loophole in Section 702 of the Foreign Intelligence Surveillance Act (FISA). While Section 702 allows the government to collect such communications of foreign citizens on foreign soil without a warrant, it prohibits the government from doing so with American citizens. The loophole allows the NSA and the Central Intelligence Agency (CIA) to use this section to collect American communications without a warrant if they believe “a query is reasonably likely to return foreign intelligence information.”

The inspector general’s report “revealed a number of concerns involving [U.S. person] identifiers used as query terms against FISA Section 702 data.” Furthermore, some of these NSA queries “did not always follow NSA procedural and policy requirements.” Among other discrepancies, information gathered on “selectors,” or particular search terms in an investigation, were not properly documented; in addition, the NSA’s internal query tools designed to automatically prevent the processing of queries involving any Americans associated with the selectors ultimately failed to do so, thus allowing Americans to be investigated and monitored.

Read More

Commentary: The Everlasting COVID Crisis

In 1972, three black men, Melvin Cale, Louis Moore, and Henry D. Jackson, Jr., hijacked Southern Airways Flight 49, demanding $10 million and safe passage to Cuba. The hijacking lasted nearly 30 hours and involved multiple stops throughout the United States, Canada, and eventually, Cuba. In the process of negotiating with the FBI, the hijackers threatened to ram their aircraft, a Douglas DC-9, into the High Flux Isotope Reactor in Oak Ridge, Tennessee if their demands weren’t met.

Until that point, American airlines had resisted installing metal detectors in airports, worried that treating Americans like common criminals to board a plane would wreck their burgeoning industry. But that threat of nuclear attack, and the 130 other hijackings between 1968 and 1972, convinced the government to take a stand at last. In 1973, the FAA used its bureaucratic and administrative powers to make passenger screening mandatory. In 1974, Congress validated the requirement, ignoring passenger rights’ groups that protested the intrusive screening of luggage and persons in order to board aircraft. 

Read More

Commentary: $28 Per Day Triggers IRS Surveillance Program

The entire Democrat multi-trillion dollar socialist spending scam is bad for Americans, and bad for our economy. One particular provision that is especially terrible is their “IRS Surveillance” program, which would grant the government access to spy on nearly every Americans’ bank accounts. Their bill wants to use $80 billion of taxpayer funds to hire 85,000 more bureaucrats, nearly doubling the size of the IRS, to go through individuals’ personal banking information.

President Biden, and his colleagues in Congress, must have realized how unpopular this policy was with the American people, so they decided to make some “changes.” They created the impression they were raising the threshold in transactions individuals would need to hit before triggering the IRS to spy on their personal banking accounts.

Read More

Lawmakers’ and Media’s Impeachment Obsession Is Allowing Big Tech to Build a Surveillance State

Lawmakers are too busy wrestling with matters related to President Donald Trump’s impeachment to address issues related to the government’s deployment of facial recognition technology.

Read More

Your Flight’s Seat-Back Screen May Be Watching You

Now there is one more place where cameras could be watching you — from 30,000 feet. Newer seat-back entertainment systems on some airplanes operated by American Airlines and Singapore Airlines have cameras, and it’s likely they are also on planes used by other carriers. American and Singapore both said Friday…

Read More

New Documentary Shows Viewers the Power of Tech Giants

by Ryan McMaken   The Creepy Line, a new documentary by director M.A. Taylor, is now streaming at Amazon Prime. It provides an interesting and revealing look at how Google and Facebook influence their users’ view of the world, and how the users we often presume to be the customers…

Read More

JC Bowman Commentary: Exposed in a Technological Age

classroom

An old and wise saying challenges us to: “Believe nothing you hear, half of what you read, and some of what you see.”  It is critical to examine issues from all angles, rejecting gossip, mistruths, bias or information not supported or misinterpreted.  Put what you see or read into proper context to make sure what you think you are seeing is factual. 

Read More