How to Break Up with the Financial System

By DAISY LUTHER | ORGANIC PREPPER | MARCH 26, 2013

Breaking up is hard to do, especially when it is with a tracking service like a financial institution.

Sometimes you can make a clean break and other times you have to remain “just friends”.

The US government actually has a name for people who have no bank accounts – they call these folks “the unbanked”.  The FDIC defines the unbanked as “those without an account at a bank or other financial institution and are considered to be outside the mainstream for one reason or another.”  Another term is “the underbanked” – “people or businesses that have poor access to mainstream financial services normally offered by retail banks. The underbanked can be characterized by a strong reliance on non-traditional forms of finance and micro-finance often associated with disadvantaged and the poor, such as check cashers, loan sharks and pawnbrokers.

According to the government, the above scenarios are crisis situations which must be rectified for “your own good”.  There is legislation on the table in many states to set up banking facilities for the unbanked and underbanked.  The assumption is that most folks who do not deal with a bank are too poor to do so.  This could be true in many cases: high minimum balances, bad credit history, NSFs, and account fees can all preclude having a bank account for those in difficult financial straits.

However, the government has a couple more reasons to insist that everyone should have a bank account:

1.)   Ease of confiscation

We need only to look at the horrible situation in Cyprus to see how bank accounts are like all-you-can-steal-buffets for the powers that be.  A suggested theft TAX of up to 20% of the money in Cypriot bank accounts may be levied in order for the country to meet it’s staggering debts in the terms of the proposed EU bailout.  The banks of Cyprus are loaded with the money of residents and businesses of other countries that have used them as a tax haven.  The banks have been closed for several days and frantic customers are left to withdraw the maximum daily balances from ATM machines in an attempt to salvage what they can.  Many people fear the banks will never reopen their doors.

Think it can’t happen here?  I wonder if the people of Iceland, Greece, Ireland, Hungary, Argentina, Spain, and Portugal thought that too.

2.)  Surveillance

The second reason that “everyone should have access to banking services” is the digital trail that it leaves.  Every dime you receive and spend out of these accounts is part of an intricate system of surveillance.  When your money goes into a bank – any bank – Big Brother knows about it.  It’s a simple matter of compiling information via your social security number (or other federally- assigned number) to find out how much you make, how much you have, and where it comes from.  This can be used to prosecute you for tax purposes, to locate you through where your pay comes from, and to follow your personal money trail for a variety of different reasons.

It can also be used to track your spending – Big Brother can find out that you spent $2000 at a gun store, that you purchased online from a prepper supply website or that you bought some books with “questionable” content in order to paint you as a threat.

Unbanking

So, in this day and age, is it possible to get by completely without a bank account?

It’s tough.  Most work places prefer to pay through direct deposit.  Many landlords, mortgage companies and finance companies do business through direct debit.  You’re going to pay some steep fees if this is the route that you choose to go.  For some, it might be worth it, particularly if you only have a few transactions in a month.

Here are some places you can cash checks for a fee:

  • Check cashing depots
  • Some retailers like Walmart, 7-11, and some grocery stores (the number of these is dropping rapidly)
  • Pawn shops
  • The issuing bank will sometimes cash a check drawn from one of their accounts for a non-account holder
  • Some prepaid credit card accounts will accept a direct deposit (in my opinion, this is nearly as unsafe as having your money in a bank account)
  • Through a friend or family member’s account (also risky – for both you and the account holder)

Here are some ways you can pay bills without a bank account:

  • In person, with cash, cashier’s checks, or money orders
  • Through the mail, with cashier’s checks or money orders
  • Online, with prepaid credit cards
  • Through a kiosk using a prepaid credit card
  • At a check-cashing depot or retailer

Underbanking

Your next option is underbanking.  For some people this may be the most realistic way to break up with their bank – it’s the “just friends” version.  If you have a lot of transactions that go through your account every month, it isn’t necessarily practical to get rid of your account.  Keep in mind that all of the above methods of unbanking still have a component of financial tracking.  The checks and bills still have your personal information tied to them in most cases.

When you underbank, you still have an account.  Set this up with the lowest possible fee and the lowest possible required balance.  Shop around to find the best deal.  Consider a credit union or community bank instead of one of the big mega-banks.  They are slightly safer, emphasis on slightly.

Your paychecks from work can be directly deposited, which will make your employer happy.  Employers rarely want to do something outside the norm, and if everyone else gets their pay directly deposited, writing a check for you will make you stand out – the opposite of what you want to do.  As well, any other checks you receive, like refunds, tax returns, etc., can be processed through this account.

The goal here is to keep as little money as possible in this account.  Banks are no longer the safest place to keep your money, and the .00001% of interest you will accrue is just not worthwhile.

Immediately upon payday:

  • Pay all your bills online or through a kiosk out of this account – rent, utilities, credit card payments (hopefully you don’t have those)
  • Buy necessities like groceries if you need to reduce the amount in the account for withdrawal purposes
  • Calculate the amount of payments that will be coming out of your account between now and your next pay (rent/mortgage, car payment, insurance)
  • Remove all money except that required for impending debits and your minimum balance.  Get it in cash.

Avoid Financial Surveillance

The government wants everyone to have a bank account for another reason besides quick accessibility for the purpose of thievery.  Big Brother wants to know what you earn, what you spend, and where you spend it.  Every penny you spend could one day be used against you, as more and more things become illegal in the police state that is taking over the western world.

Use your bank account as little as possible if you’ve chosen to underbank:

  • Buy stuff with cash
  • Skip registering your belongings by serial number for warranty purposes
  • For heaven’s sakes, don’t get one of those “customer loyalty” cards that track every purchase you make and provide you with “rewards” or “points”
  • Buy from places that don’t track you, like yard sales, Craigslist, farmer’s markets, roadside stands, your brother’s friend’s sister’s boyfriend
  • Work for cash: this is another suggestion that won’t work for everybody, but if you can do some odd jobs for cash, even if you make slightly less money doing so, this is money that can’t be tracked.

Think about how your purchases tell a story about you that you might rather keep to yourself.  Are you buying lots of farm equipment, soil amendments and seeds?  Are you buying ammo every week?  Are you stocking away large quantities of food or medical supplies?  Have you recently purchased 2,347 books on different guerrilla warfare tactics?  OPSEC is more than just keeping your mouth shut about your prepperly ways.

Ditch the Dollar

Although you require some fiat currency to function in today’s society, as well as some in an emergency fund,  consider using other forms of currency whenever possible.  The following suggestions won’t work for everyone, but some folks may be able to ditch the dollar in the following ways:

  • Engage in the barter system: trade goods and services with like-minded people.
  • Keep precious metals like gold and silver in a fireproof safe for your “savings account”
  • Immediately convert  fiat currency into tangible goods: food, ammo, home defense items, tools, etc.
  • Work towards self-sufficiency – if you buy less, you can earn less: grow your food, repair your own home or vehicle, do things manually instead of using expensive equipment, lessen your dependency on the grid
  • Simplify – this goes hand in hand with self sufficiency: find your entertainment from library books and online resources, skip eating out, take a walk instead of joining a gym – the less you feel you need, the less money you will have to earn.

The decision to unbank or underbank is unique to every individual.  The further away you can get from “the system” the more privacy and security you will have.  The suggestions above are not meant to be comprehensive – they’re meant to get you thinking about how you can disengage.  As always, your suggestions in the comments can greatly benefit others!

U.S. Supreme Court backs Government Spying of Citizens

AP | FEBRUARY 26, 2013

A sharply-divided Supreme Court on Tuesday threw out an attempt by U.S. citizens to challenge the expansion of a surveillance law used to monitor conversations of foreign spies and terrorist suspects.

With a 5-4 vote, the high court ruled that a group of American lawyers, journalists and organizations can’t sue to challenge the 2008 expansion of the Foreign Intelligence Surveillance Act (FISA) because they can’t prove that the government will monitor their conversations along with those of potential foreign terrorist and intelligence targets.

The outcome was the first in the current Supreme Court term to divide along ideological lines, with the conservative justices prevailing.

Justices “have been reluctant to endorse standing theories that require guesswork,” said Justice Samuel Alito, who wrote for the court’s majority.

The Foreign Intelligence Surveillance Act, or FISA, was enacted in 1978. It allows the government to monitor conversations of foreign spies and terrorist suspects abroad for intelligence purposes. The 2008 FISA amendments allow the government to obtain from a secret court broad, yearlong intercept orders, raising the prospect that phone calls and emails between those foreign targets and innocent Americans in this country would be swept under the umbrella of surveillance.

Without proof that the law would directly affect them, Americans can’t sue, Alito said in the ruling.

Despite their documented fears and the expense of activities that some Americans have taken to be sure they don’t get caught up in government monitoring, they “have set forth no specific facts demonstrating that the communications of their foreign contacts will be targeted,” he added.

Alito also said the FISA expansion merely authorizes, but does not mandate or direct, the government monitoring. Because of that, he said, “respondents’ allegations are necessarily conjectural. Simply put, respondents can only speculate as to how the attorney general and the Director of National Intelligence will exercise their discretion in determining which communications to target.”

Alito was joined in his decision by Chief Justice John Roberts and Justices Anthony Kennedy, Antonin Scalia and Clarence Thomas.

Justice Stephen Breyer, writing in dissent, said that he would have allowed the lawsuit to move forward because he thinks “the government has a strong motive to listen to conversations of the kind described.”

“We need only assume that the government is doing its job (to find out about, and combat terrorism) in order to conclude that there is a high probability that the government will intercept at least some electronic communication to which at least some of the plaintiffs are party,” Breyer said. “The majority is wrong when it describes the harm threatened plaintiffs as “speculative,” Breyer said.

He was joined in his dissent by Justices Ruth Bader Ginsburg, Sonia Sotomayor and Elena Kagan.

Jonathan Hafetz, an expert on national security and privacy issues who teaches at Seton Hall University’s law school, said, “The decision effectively insulates the government’s increasingly broad surveillance powers from meaningful court review, threatening constitutional liberties in the name of secrecy and security.” Hafetz used to work for the American Civil Liberties Union, which represented the plaintiffs in the lawsuit.

A federal judge originally threw out the lawsuit, saying the plaintiffs lacked standing to sue. But the 2nd U.S. Circuit Court of Appeals reinstated the lawsuit. The Supreme Court was not considering the constitutionality of the expansion, only whether lawyers could file a lawsuit to challenge it in federal court.

Alito re-emphasized that point, saying the decision did not insulate the FISA expansion from judicial review, and he suggested a couple of ways a challenge could be brought to court, including a scenario in which an American lawyer actually did get swept up in FISA monitoring.

“It is possible that the monitoring of the target’s conversations with his or her attorney would provide grounds for a claim of standing on the part of the attorney,” Alito said. “Such an attorney would certainly have a stronger evidentiary basis for establishing standing than do respondents in the present case.”

 

U.S. Congress requests ban on Chinese Tech Companies

Despite the warning from Congress, the United States allows Chinese companies to manufacture military and computer technologies which are equipped with back doors for spying purposes.

By LUIS MIRANDA | THE REAL AGENDA | OCTOBER 8, 2012

Chinese telecom firms Huawei and ZTE are a threat to American security. That’s the conclusion of a report completed by the Intelligence Committee of the U.S. Congress after a year of research.

According to the commission, it is impossible to ensure that the two groups are independent of the Chinese government and therefore can be used to undermine U.S. security. “On the basis of classified and unclassified information, Huawei and ZTE can not guarantee their independence from the influence of a foreign state, so it poses a threat to U.S. security,” says the report.

The commission believes that the Chinese government could use these two groups for the rapid growth of economic and military espionage, or cyber attacks. Huawei has answered that 70% of its business is in China. The company works in 150 countries and in none of those it has had any problems. Of course, the United States is not any country and the behind the stage war between these two foes has not stopped.

According to U.S. research commission, the two groups did not provide satisfactory answers to parliamentary questions on their relations with the Chinese government. “China has the means, the opportunity and the motivation to use telecommunications companies for malicious purposes,” according to the report to be released Monday.

In conclusion, the commission said that the U.S. “should block acquisitions and mergers involving Huawei and ZTE because they would pose a threat to the national security interests of the United States. “U.S. government systems of communication,” the commission concludes , “especially in sensitive areas should not include equipment or components from Huawei and ZTE.”

But the Backdoor is left Open

Whether the commission’s concern is legitimate or not, the truth is that the report comes too late and too short about the way the Chinese have been able to infiltrate the U.S. Huawei and ZTE are not the only two companies manufacturing equipment for the U.S. government and its military. According to current and former intelligence sources in the United States, the Chinese have now have the capacity to access much of the equipment produced in China and that is being used on American territory.

The Chinese do so by utilizing previously installed components that allow them to remotely access the equipment from abroad. This revelation was first presented by Lignet, an intelligence company that detailed how communications equipment can potentially be disabled by the Chinese. The devices installed in the machines are popularly knows as backdoors because they provide hidden access to anyone who knows how to use them.

Mundane technologies fabricated in China and other Asian countries have already been demonstrated to have secret access points which can be used by technology companies, at the request of government agencies to spy on users. The same situation occurs with military grade equipment, for example, which is manufactured abroad for the United States government. Both hardware and software can be set up to enable outsiders to get into communication and weapons systems just as government agencies use the cameras built in computers and cellphones or GPS technology to monitor people’s every move.

Backdoors installed in communication devices for consumers or government use can be exploited for spying purposes to gain control of information, movement and habits, for example. Both Huawei and ZTE have been informally accused of installing microchips and stealth circuitry to enable remote control of devices manufactured in their factories. Huawei is a Chinese corporation that occupies its resources to offer networking and communication equipment and services. This company is only second to technology giant Ericsson as a provider of mobile telecommunications equipment and software.

But Huawei’s reach goes beyond American territory. It is a key provider of equipment and services that have to do with almost everything to other developed nations. It is similar to what USAID represents for the United States. The organization is an American funded front to infiltrate other countries under the auspices of humanitarian aid. Suspicion about USAID’s activities in several countries had gotten it kicked out of several countries. The most recent one is Russia.

Well known technology companies such as Symantec held partnerships with Huawei in the past, but the security software enterprise apparently ended that relationship due to the security concerns posed by the U.S. government. Another notable client of the Chinese company is the government of Iran, which has prompted some people to think that the Iranians themselves could use the backdoors to infiltrate American infrastructure. So far, however, it’s been the Americans and Israelis who have attacked Iran in several occasions with computer bugs known as Trapwire, Stuxnet and others.

Given this scenario, it sounds logical to hear the American government talking about strengthening internet security for the sake of protecting its infrastructure. The part that is not so logical is that the U.S. government allows the same technology companies to continue manufacturing sensible portions of that infrastructure, which is what opens the door to internet insecurity. Another issue is that the Americans also intend to clamp down on internet freedom by using cyber threats as a justification to ban certain portions of the world wide web.

The Real Agenda encourages the sharing of its original content ONLY through the use of the tools provided at the bottom of every article. Please DON’T copy articles from The Real Agenda and redistribute by email or post to the web.

NSA Whistleblower: “We are headed towards a Police State”

By LUIS MIRANDA | THE REAL AGENDA | SEPTEMBER 24, 2012

According to former National Security Agency employee, Kirk Wiebe, the agency had the capability to grab everyone’s data even before 9/11. He said that the terrorist events of 2001 were a trigger for the NSA to act with complete disregard for the US Constitution and mainly the Forth Amendment.

Wiebe and his fellow whistleblower Thomas Drake, explain that the terrorist attacks gave the NSA and the US government an excuse to get military contractors involved in the creation of a broader surveillance state that provides no limits whatsoever to what government agencies such as the NSA can do with any piece of information from US citizens or even people who reside abroad.

As it stands today, the power of the NSA is simply unchecked. Drake says that inside the agency there is a widely held belief that it is necessary to trade anonymity for security, which is the opposite of what the United States founding fathers advised people to do. When asked about whether the United States could unwind the powers afforded to the NSA and other government agencies, he referred viewers to the secretive ways in which the NSA misbehaved in 1960s and 70s to conclude that it is not possible to simply trust the agency or anything it does today.

The questions back in the 60s and 70s was whether or not the availability of a technical capacity to spy on everyone, as it is done today, could be manageable to avoid abuse, or even further, if it could be rolled back. According to Drake, the question is why would people trust the NSA anymore than it did in the 60s and 70s, when it was well-known that the agency was operating above the law?

When questioned about whether the United States was moving towards becoming a tyrannical state, just as other nations like North Korea or China, Kirk Wiebe was clear and succinct: “In my estimation we are. We are headed towards a Police State.” Wiebe candidly recounted how the current intelligence operations led by the NSA look a lot like Gestapo or like Stasi in Germany. “We are moving in that direction. People are trashing the Constitution. They’ve lost their respect for it.

He also told viewers how he had written congressman Rosco Bartlet about his concerns and how the answer he got back from Mr. Bartlet was as astonishing as the concerns he posed on the letter regarding privacy and legislation. Congressman Bartlet responded that the thing that gave him confidence about the creation and approval of spectacular powers given to the NSA and other government agencies was that “everything was being done in good faith.”

 

The Real Agenda encourages the sharing of its original content ONLY through the use of the tools provided at the bottom of every article. Please DON’T copy articles from The Real Agenda and redistribute by email or post to the web, unless you request and receive written permission to do so. If permission is granted, you must publish the article EXACTLY as it appears on The Real Agenda.

U.S. Drone Military Bases all over the World and Amerika

RT | JUNE 14, 2012

The US is planning to expand secret intelligence bases throughout Africa with a view to combating terrorism in the region, says a new report by the Washington Post. It is the latest in a US push to militarize its presence on the continent.

The plans include the deployment of spy planes equipped with high-tech surveillance technology.

The US is set to extend its influence, opening a number of intelligence air bases “from the fringes of the Sahara to jungle terrain along the equator,” said the Washington Post.

The initiative dates back to 2007 and is indicative of the rapid expansion of US Special Forces operations in the region as part of the decade-long war against Al-Qaeda.

The US will use the strategically-placed bases to launch spy planes disguised as private aircraft kitted-out with a range of sensors able to record video, track infrared heat trails and tap into radio and mobile phone signals.

The reasoning behind the ratcheting-up of surveillance on the African continent by the US is the increasing presence of terrorist cells that could potentially destabilize the region.

The Washington Post said that the US government currently has a number of intelligence facilities across Africa, including Uganda, Ethiopia, Kenya, the Seychelles, Burkina Faso and Mauritania.

The bases in Burkina Faso and Mauritania are used to spy on Al-Qaeda.

The US military has expressed concerns over the growing influence of the Nigerian terrorist sect Boko Haram, blamed for a wave of bombings in the country in December and Al-Qaeda affiliate Al-Shabab in Somalia.

In addition, 100 special troops are currently in action in Uganda to hunt for Joseph Kony, the leader of a brutal guerrilla group known as the Lord’s Resistance Army.

Some state department officials have questioned the necessity to step-up a US presence in Africa given that many of the terrorist groups active on the continent represent no direct threat to the US.

In spite of doubts the US continues to rack up its presence in Africa. Last month the Army Times confirmed US military plans to deploy over 3,000 troops across the continent as part of a “regionally aligned force concept.”

US to maintain ‘Light Footprint’ in Africa?

Officially the US is painting an altogether different picture of its operations in Africa. Army General Carter F. Ham top US Africa command officer said that the US is not seeking permanent military bases in the region.

“In Africa, I would say a light footprint is consistent with what we need and consistent with the defense guidance,”
said General Carter.

The general said he recognized that some African nations were concerned over increased US military presence across Africa, but stressed that this did not necessarily mean the US would be establishing more bases there.

However, in a testimony to US Congress in March he said that he wanted to increase US surveillance and reconnaissance in Africa.

“Without operating locations on the continent, ISR [intelligence, surveillance and reconnaissance] capabilities would be curtailed, potentially endangering US security,” he said.

From WIRED Magazine: 64 Drone Bases on American Soil

We like to think of the drone war as something far away, fought in the deserts of Yemen or the mountains of Afghanistan. But we now know it’s closer than we thought. There are 64 drone bases on American soil. That includes 12 locations housing Predator and Reaper unmanned aerial vehicles, which can be armed.

Public Intelligence, a non-profit that advocates for free access to information released a map of military UAV activities in the United States on Tuesday. Assembled from military sources — especially this little-known June 2011 Air Force presentation (.pdf)  – it is arguably the most comprehensive map so far of the spread of the Pentagon’s unmanned fleet.  What exact missions are performed at those locations, however, is not clear. Some bases might be used as remote cockpits to control the robotic aircraft overseas, some for drone pilot training. Others may also serve as imagery analysis depots.

The medium-size Shadow is used in 22 bases, the smaller Raven in 20 and the miniature Wasp in 11. California and Texas lead the pack, with 10 and six sites respectively and there are also 22 planned locations for future bases. ”It is very likely that there are more domestic drone activities not included in the map, but it is designed to provide an approximate overview of the widespread nature of Department of Defense activities throughout the U.S.,” Michael Haynes from Public Intelligence tells Danger Room.

The possibility of military drones (as well as those controlled by police departments and universities) flying over American skies have raised concerns among privacy activists. As the American Civil Liberties Union explained in its December 2011 report, the machines potentially could be used to spy on American citizens. The drones’ presence in our skies “threatens to eradicate existing practical limits on aerial monitoring and allow for pervasive surveillance, police fishing expeditions, and abusive use of these tools in a way that could eventually eliminate the privacy Americans have traditionally enjoyed in their movements and activities.”

As Danger Room reported last month, even military drones, which are prohibited from spying on Americans, may “accidentally” conduct such surveillance — and keep the data for months afterwards while they figure out what to do with it. The material they collect without a warrant, as scholar Steven Aftergood revealed, could then be used to open an investigation.

The Posse Comitatus Act prohibits the U.S. military from operating on American Soil, and there’s no evidence that drones have violated it so far.

This new map comes almost two months after the Electronic Frontier Foundation (EFF) revealed another one, this time of public agencies – including Police Departments and Universities – that have a permit issued by the Federal Aviation Agency to use UAVs in American airspace.

“It goes to show you how entrenched drones already are,” said Trevor Timm, an EFF activist, when asked about the new map. “It’s clear that the drone industry is expanding rapidly and this map is just another example of that. And if people are worried about military technology coming back and being sold in the U.S., this is just another example how drone technology is probably going to proliferate in the U.S. very soon.”

Domestic proliferation isn’t the same as domestic spying, however. Most — if not all — of these military bases would make poor surveillance centers. Many of the locations are isolated, far from civilian populations. Almost half of the bases on the map work only with the relatively-small Raven and Shadow drones; their limited range and endurance make them imperfect spying tools, at best. It’s safe to assume that most of the bases are just used for military training.

Privacy concerns aside, the biggest issue might be safety, as we’ve been reminded on Monday when a giant army drone crashed in Maryland.