Are your Lucky Charms less than magically delicious? Are your Cheerios less than cheery? Perhaps you broke off a tooth when there was something extra crunchy in your Cinnamon Toast Crunch or became totally ill from something totally disgusting in your bowl of Total. If so, I hope you didn’t “like” them on Facebook.
General Mills has taken “CYA” (Cover Your A**) to an entirely new level.
ANY DISPUTE OR CLAIM MADE BY YOU AGAINST GENERAL MILLS ARISING OUT OF OR RELATING TO THIS AGREEMENT OR YOUR PURCHASE OR USE OF ANY GENERAL MILLS SERVICE OR PRODUCT (INCLUDING GENERAL MILLS PRODUCTS PURCHASED AT ONLINE OR PHYSICAL STORES FOR PERSONAL OR HOUSEHOLD USE) REGARDLESS OF WHETHER SUCH DISPUTE OR CLAIM IS BASED IN CONTRACT, TORT, STATUTE, FRAUD, MISREPRESENTATION, OR ANY OTHER LEGAL THEORY (TOGETHER, A “DISPUTE”) WILL BE RESOLVED BY INFORMAL NEGOTIATIONS OR THROUGH BINDING ARBITRATION, AS DESCRIBED BELOW.
To expedite resolution and control the cost of a Dispute, you and General Mills agree to first attempt to resolve a Dispute informally for at least thirty (30) days before initiating any arbitration. Such informal negotiations will commence upon written notice from one party to the other. You must send your notice email@example.com. Please include in the subject line of the email “Request to Negotiate.”
If you and General Mills are unable to resolve a Dispute through informal negotiations, either you or General Mills may elect to have a Dispute resolved by binding arbitration by notifying the other party of such election. Either party also may choose to seek relief in a small claims court for a Dispute within the scope of its jurisdiction, instead of arbitration. To make this election, the small claims court action must be commenced before either party notifies the other of an election to arbitrate the Dispute, but after the conclusion of the informal negotiation period described above. If neither party has validly commenced a small claims court action for a Dispute, any election to arbitrate the Dispute by one party will immediately become final and binding on the other.
You and General Mills agree to waive the right to litigate any Dispute in court (except in small claims court in the limited circumstances described above) and before a jury and agree that this arbitration provision will be governed by the Federal Arbitration Act to the maximum extent permitted by law. (source)
General Mills is a huge purveyor of artificial food-like substances. The clause above covers not only Cheerios, but gastronomical delights from the likes of Betty Crocker, Pillsbury, Green Giant, Yoplait, Nature Valley, Old El Paso, Progresso, Hamburger Helper, Toaster Strudel Gold Medal, Bisquick, Totino’s, Cheerios, Cinnamon Toast Crunch, Lucky Charms, Kix, Trix, Cocoa Puffs, Total, Wheaties, Fiber One, and Chex, to name a few. You can find the complete list of newly untouchable brands right HERE.
So what does this mean?
If you get sick from eating any of these products, they are fully protected in the courts. If you find someone’s severed finger in your box of Cinnamon Toast Crunch, you can’t sue them, even if you already ate half the box. If you find that your box of Lucky Charms is extra lucky and contains a dead bug, you aren’t so lucky because you can’t take them to court. If you eat their cereals every day for five years and get a dreaded disease directly traceable to them, they get to say, “Hey, you ‘liked’ us on Facebook . Sorry about your luck.”
What Will You Do When You Can No Longer Buy Or Sell Without Submitting To Biometric Identification?
In some areas of the world, payment systems that require palm scanning or face scanning are already being tested. We have entered an era where biometric security is being hailed as the “solution” to the antiquated security methods of the past. We are being promised that the constant problems that hackers are causing with our credit cards, bank accounts, ATM machines and Internet passwords will all go away once we switch over to biometric identification. And without a doubt, we have some massive security problems that need to be addressed. But do you really want a machine to read your face or your hand before you are able to buy anything, sell anything or log on to the Internet? Do you really want “the system” to be able to know where you are, what you are buying and what you are doing at virtually all times? Biometric security systems are being promoted as “cool” and “cutting edge”, but there is also potentially a very dark side to them that should not be ignored.
In this day and age, identity theft has become a giant problem. Being able to confirm that you are who you say that you are is a very big deal. To many, biometric security presents a very attractive solution to this problem. For example, the following is a brief excerpt from a recent Fox News article entitled “Biometric security can’t come soon enough for some people“…
In a world where nearly every ATM now uses an operating system without any technical support, where a bug can force every user of the Internet to change the password to every account they’ve ever owned overnight, where cyber-attacks and identity theft grow more menacing every day, the ability to use your voice, your finger, your face or some combination of the three to log into your e-mail, your social media feed or your checking account allows you to ensure it’s very difficult for someone else to pretend they’re you.
Almost everyone would like to make their identities more secure. Nobody actually wants their bank accounts compromised or their Internet passwords stolen. But there is a price to be paid for adopting biometric identification. Your face or your hand will be used to continually monitor and track everything that you do and everywhere that you go. Here is some more from that Fox News article…
Friday, we made Ryan King the most verified man in Brooklyn.
“Verified,” a fingerprint-recognition device chirped back at Ryan after he placed his finger on the reader.
“Verified,” a facial-recognition device said to Ryan after scanning his face.
Ryan works at the American headquarters for FingerTec, a Malaysian company replacing PINs, usernames, and typed passwords with fingers and faces we don’t need to memorize.
“You can’t copy someone’s fingerprint unless you chop it off,” Ryan said, “which wouldn’t work because it has to be attached to a hand.”
For now, biometric security is not being forced on people. If you want to avoid it, you can.
But eventually, once it has been adopted on a widespread basis, banks and government agencies will start requiring it.
And it is easy to imagine a day when none of us will any longer be able to buy or sell anything without submitting to biometric identification. In fact, an “alternative payment method” involving hand scanning is already being tested in southern Sweden…
Hand scanning has become an alternative payment method for people in a city in southern Sweden, researchers at Lund University said Monday.
Vein scanning terminals have been installed in 15 shops and restaurants in Lund thanks to an engineering student who came up with the idea two years ago while waiting in line to pay.
Some 1,600 people have signed up already for the system, which its creator says is not only faster but also safer than traditional payment methods.
“Every individual’s vein pattern is completely unique, so there really is no way of committing fraud with this system,” researcher Fredrik Leifland said in a statement.
“You always need your hand scanned for a payment to go through.”
But before biometric identification is widely used for payment systems, we will probably see it implemented in a whole bunch of other ways first. For instance, biometric scanners are already being used in dining halls on college campuses all across America…
Hand geometry readers have been fairly common on campus for years but more recent deployments are leveraging fingerprint and even iris biometrics to link students with transactions. Physical access is the hallmark biometric application but the technology has been gaining popularity in food service and other sectors to expedite transactions.
The social stigma attached to biometrics is also being lifted, as students are becoming more comfortable with the technology, says Brian Adoff, executive vice president at NuVision. The inclusion of a fingerprint scanner on the latest iPhone is just one indication that the younger generation is comfortable with biometrics.
“Administrators have a greater fear of the technology than students,” says Bob Lemley, director of software development at the CBORD Group. “Students are growing up with the technology so they don’t think about it as much as the older generations.”
Georgia Southern University can attest to that fact. The school deployed iris biometrics at its dining hall and only two students out of 5,400 refused to enroll, says Richard Wynn, director of the university’s Eagle Card Program.
Young people tend to be less alarmed by this technology, and so that is where it is being pushed. If you can believe it, biometric scanners are even going to be used at Six Flags amusement park this summer…
A new scanning system at Six Flags sounds like it’s from the future, but the biometric scanner aims to make faster entrances for season pass holders.
When guests arrive at the front gate for the first time of the season, they will present their voucher and a scanner processes an image of their fingerprint, assigning a unique set of numbers that are used to validate the pass holder’s card each visit.
The first visit should take only about 20 seconds to set up the card, as opposed to the additional time of taking a photo and getting it printed on the card, according to spokeswoman Elizabeth Gotway.
This kind of reminds me of the new “MagicBands” at Disney parks that I have written about previously. You have probably seen the television commercials featuring them by now. Disney seems to think that parents and kids will have no problems wearing RFID tracking devices that allow them to buy stuff and monitor wherever they go. If you want to see what Disney has to say about these “MagicBands”, you can do so right here.
Our world is becoming stranger with each passing day.
Incredibly, biometric identification is even being used in Africa to keep track of who is being vaccinated…
In fact, some biometric solutions are helping solve vaccine delivery issues in Africa which has been hampered by ineffective tracking and reporting. Today, a biometric vaccination registry helps to ensure that millions of young children receive the vaccine that is needed to save their lives. And by knowing “who” has been vaccinated, these precious life-saving drugs are not wasted by over-vaccinating some and missing others entirely.
This technology is going to keep spreading, and it is going to become harder and harder to avoid it.
And it is easy to imagine what a tyrannical government could do with this kind of technology. If it wanted to, it could use it to literally track the movements and behavior of everyone.
We are already starting to see the establishment of massive biometric databases. One of these is the FBI’s facial recognition database that is a part of their “Next Generation Identification” program. It is being projected that the FBI will have compiled 52 million of our “face images” by the year 2015. Given enough time, eventually I am sure that they would have all of our faces in their computers.
And one day, this kind of technology will likely be so pervasive that you won’t be able to open a bank account, get a credit card or even buy anything without having either your hand or your face scanned first.
When that day arrives, what will you do?
That is something to think about.
According to a program launched yesterday by CTIA - The Wireless Association®, an international nonprofit that has represented the wireless communication industry since 1984, all phones manufactured in the U.S. after July 2015 will be required to contain a “kill switch” system that can remotely disable and wipe any cell phone’s data.
Although the “Smartphone Anti-Theft Voluntary Commitment” is a voluntary program, apparently all the major players have already happily jumped on board: “Apple, Google, Samsung and Microsoft, along with the five biggest cellular carriers in the United States, are among those that have signed on to a voluntary program announced Tuesday by the industry’s largest trade group,” reported CNN.
And the supposed reasoning — anti-theft — sounds super phony, but just like everything else, it’s all for your safety of course:
Advocates say the feature would deter thieves from taking mobile devices by rendering phones useless while allowing people to protect personal information if their phone is lost or stolen. Its proponents include law enforcement officials concerned about the rising problem of smartphone theft. (source)
Yeah, because law enforcement really cares quite a bit about whether or not your smartphone is stolen…unless it’s law enforcement stealing your phone from you in the first place because you’ve used the camera on it to protect yourself from police state activity by taking incriminating photos and videos of said law enforcement.
Well, now they won’t even have to physically take your phone from you, because apparently they’ll be able to just push a button and remotely wipe it clean of all data.
On an aside, someone tried to break into my house and it took a whole day for the cops to even bother to show up…like they really give a crap about whether or not your phone is stolen.
As with every other trendy new technology advertised as making consumer’s lives just Jetsons-level awesome, there’s an obvious flipside that can be used (abused) for quite the opposite.
By the way, the 2014 CTIA Board of Directors and Officers include the higher ups (Presidents, CEOs and VPs, etc.) from most of the major communications companies including Ericsson, Verizon Wireless, Blackberry, AT&T, Sprint, Qualcomm, LG Electronics, Samsung, T-Mobile, Motorola, U.S. Cellular, Nokia and Apple.
And remember, many of these companies are the same ones the NSA taps to track all your online communications and populate their databases with your data.
In this day and age of dwindling privacy ala 1984, you would think there would be a major market for a privacy-respecting telecom, but it takes a lot of money to set up the infrastructure for that kind of thing, and it’s no secret that the U.S. intelligence community via sources like In-Q-Tel (the CIA.’s official venture capital firm) are the ones incubating all the new technology these days:
Founded in 1999 as a way for the U.S. to keep up with the rapid innovation in science and technology, In-Q-Tel has been an early backer of start-ups later acquired by Google, Oracle, IBM and Lockheed Martin.
“If you want to keep up with Silicon Valley, you need to become part of Silicon Valley. The best way to do that is have a budget because when you have a checkbook, everyone comes to you,” said Jim Rickards, an adviser to the U.S. intelligence community who is familiar with the activities of Arlington, Va.-based IQT.
Given the increasing importance of cyber security and big data, it is a safe bet that the U.S. intelligence community will continue to lean on private-sector development in its behind-the-scenes fight against terrorism and other geopolitical threats. (source)
It was the U.S. military that invented the Internet in the first place, after all.
Melissa Melton is a writer, researcher, and analyst for The Daily Sheeple, where this first appeared, and a co-creator of Truthstream Media. Wake the flock up!