Sponsored: Prepare For The Storm With MyPatriotSupply's Emergency Food Kits Today - Get The Best Deal Here

old eternal affairs truth media header banner

Ramifications of DNA Data Breach is a Huge Wake Up Call


Did You Trust YOUR DNA With 23andMe? … Expose’

The Broad View: a Body of Evidence Justifies Fear

by H. Michael Sweeney | Staff Writer | Eternal Affairs Media

IMAGE VIA fullmeasure.news

The more technology you use, the less safe and secure you are, in every way imaginable. Your financial and physical world’s integrity risk factor increases in compounding fashion with every new online account or smart device you acquire. EVERY ONE of them, because NO ONE can guarantee the security of their data once it is created, stored, transmitted, or employed within a cyber construct, be it one’s personal computer, phone, or other digital toys, a social media platform, online game, or involves an online transaction or access to business accounts, email, text messaging, etc. If it is or can be connected to the WWW or a telephone, it is vulnerable.

IMAGE VIA blog.navitas.co.uk

earn free bitcoin

It is good to test my wisdom against your own, and hopefully, your mind is made more sound by the advice of the Holy Spirit, in Jesus Christ. But I do write as a retired privacy/security consultant who has been involved in a number of very interesting and unusual situations working with stalking victims, and I can tell you with all sincerity that if there is one common problem stalking victims face, it is a total lack of privacy and security of their digital footprint and technology-based devices. As it is for them, so it is for us all; once a crack in one’s data security wall is achieved, the entire wall can be brought down to reveal all. And, all-too-often, it is extremely difficult to raise it back up.

In the information age, information is currency, which is why it is said that when you partake of a free online service like Facebook, it is your use of that service which renders you and your information which form the payment; your personal information is sold freely to marketeers and others, and it is all by your having clicked ‘I AGREE.’ Do you, really know what you agreed to? You just joined the Information Economy, as a commodity to be traded on a kind of stock exchange we might call a Cyber a’la Cart.

Hand writing Privacy Policy with black marker on transparent wipe board.
IMAGE VIA ipc.nsw.gov.au

Have you bothered to carefully read your User Agreements and Privacy Policies? Can you wade through the several thousands of words of legalese and come away confidently knowing exactly where you stand? The two are quite interrelated, for the User Agreement can reveal that you agree and are bound to such policies in irrevocable ways, with minimal ability to opt out. As soon as they mention third parties, that means portions of your information is shared, and replicated across multiple systems, each of which has its own policies and may in turn replicate with others, without any way to know about it, at all, much less know of and agree to or oppose their policies.

The saving grace is, ideally, such sharing will be limited to things which at worst put you at risk of receiving SPAM marketing offers, but hackers have multiple ways of taking additional advantage and leveraging the smallest of things into a crack in your data wall. This is why they focus on corporate data, and firms likely to have large numbers of user/clients… and where it might not even matter if the client is themselves online, or not. Look at the statistics, and you will quickly see that the problem is indeed growing exponentially with the advent of the Internet of Things, 5G, the Cloud, social platforms, and Smart Devices, like health watches and TVs.

IMAGE VIA iotforall.com

Statista reports that in 2005 there were 157 data breaches by various hacking efforts, accessing about 75 million records. The growth and popularity… tied to the profitability of it, has been continually on the increase. In 2022, over 1.8 billion breaches were reported, and since 2019, methods have made it difficult to accurately know how many records are impacted, as many as 471 million records in 2018, impacting 2.2 billion users.

It is that relationship of records to users which is the most frightening, because it is saying that the average compromised record gathers the information of many people simultaneously. In 2016, the ratio was 69 victims for every record accessed; 2.5 billion people. And information is not limited to readable information… it can even be audio and video, or the very least, still pictures. Do you have a wireless security camera, or any digital device attached to the Internet by any means, such as a phone or computer, with a camera or speaker/microphone as part of its design?

[fyrebox oid=”pNvEGJVD0″ gid=”GQ8ZLVVBE”]

IMAGE VIA activistpost.com

Almost all wifi security cameras rely on the Cloud, the bulk of them made by Red China and working only with their Cloud. Much of the global Cloud is increasingly coming under control of China, and perhaps three other major players, such as Microsoft, Google, and Amazon – all ‘woke’ businesses pushing political ideologies which are Far Left and reflect draconian authoritarian viewpoints not far from those of Communist China. You will definitely want to read your wifi camera user agreements, because most subject you to Red Chinese law and gives the Red Chinese Army and intelligence assets access to your video, should they deem it useful.

You can even end up agreeing to be bound by what certainly sounds like their Social Credit Score system, though there is currently no means to enforce it, here. Politicians are already talking about doing so. This topic also ties to censorship, all part of your clicking ‘I AGREE.’ And something even scarier is on the horizon, tied to the general Orwellian label heading, the New World Order. Read about The Coming of ORACLE, a threat both Worldly and Spiritual in its potential for negative impact, in the name of Technocracy.

READ THIS  Critical Race Theory? Dumbing Down in the Name of Equity and Flawed Ideology

And if all this were not enough, now something new and unexpected comes along, revealed by the recent hack of a DNA records at 23andMe Web site…

IMAGE VIA messagetoeagle.com

The Greater Fears Can Originate at the Cellular Level: Our DNA

Most data breaches seldom make the news in any big way, anymore, because they are so common. It has to be something particularly disturbing to make the news, and usually, it does so slowly, as more is learned about the breach. A perfect example took place on the 6th of this last October (2023), when a relatively new kind of DNA tracking service called 23andMe was hacked. It was unusual in two ways, the first of which was the nature of the data involved, but that was hardly known at large, until this last week.

Human Genomics is the most personal of all information, because it is literally what defines us. The firm’s name relates to the 23 pairs of chromosomes which form our DNA blueprint. It is the kind of thing that can be used against you in ways one might not guess, so we will be reviewing that, here. The company offers a wide range of services including the analysis of biosamples for DNA content and analysis, and a range of genealogy tracking services for family tree and related applications, including evaluating health risks revealed by DNA.

IMAGE VIA labmanager.com

The second unusual thing was how the attack worked. Rather than accessing information through a hack of the firm’s sever, directly, they instead gained access through individual user account compromises. That’s nothing new, as a concept, but it seldom leads to broader access of other people’s data in the doing. The inverse was true for 23andMe, because individual accounts directly tie to the records of other persons sharing common DNA ancestry, or in DNA traits of common interest, such as being prone to select diseases. This forms the basis of our darkest fears…

As a result, some 14,000 accounts were compromised, but that led to access of information on 14 million people, including people with no accounts there, at all. This is an example of how information about you can come to exist and be at risk of revelation without any effort or involvement on your own part, directly. And it is this, more than anything else, which has prompted MSM to make this a bigger news story.

And well they should, but they seldom dare tell you what the real threat is: what might be done with this particular data. This again brings us face to face with the threats referenced in my ORACLE article on Eternal Affairs Media. I urge you to read it, at some point, because it ties to numerous aspects of this article, and shares many of the same threat concerns. DNA information turns out to be highly marketable, and 23’s data has already been found for sale on the Dark Web, and customers are many.

The Intelligence Community (all nations) have an interest in DNA as a tracking tool, and in like manner, Law Enforcement Agencies can employ it in criminal investigations. And while you would think it highly unlikely that government would stoop to buying stolen DNA records, think again. There were in the 90s two CIA fronts operating as marketing firms, one in Florida, and one in Europe, claiming to offer marketing information on 98% of all Americans. Both were associated with other fronts offering bioimplant tracking devices of the sort we associate with James Bondian nightmares, and also in the 90s, the Roy Bullock/ADL/CIA and LA and Portland Police Criminal Investigation Departments were all caught trading spy records on American Citizens (I was one such victim).

In that case, the records sought were all for political purposes. In one example, records being sought were strictly based on what newspaper they subscribed to, a matter tied to if they supported Israeli or the Jewish faith, or were inclined towards the inverse. Now we have an American government acting in the Fascist model of weaponizing the intelligence community to target political opponents, and major financial organs such as the Soros Empire willing to fund BLM and ANTIFA as de facto Brown Shirts to do much the same in the streets as did Hitler’s Brown Shirts.

The 23andMe database breach is additionally dangerous because the data is not only a risk for individuals, but whole groups which share common genetic traits or ancestry.

As result of the current Israel war against Hamas which has creating a heated climate of bloodlust hatred for Jews and like views towards Islamics being expressed globally, with the worst of it calling for the destruction of Israel or of Moslems, DNA records able to identify either has great value to anyone who might like to ‘dox’ them or worse. And there is another way to hurt them based on DNA, as well, one which applies to everyone who has DNA on file, somewhere. In research for my books, I was told by hospital staff that it was common to send all blood samples to a DNA mapping service for unknown reasons, it being thought they were being paid well for them.

If your DNA reveals you are genetically prone to a given disease or health issue, and that information were available to insurance companies, you might be denied access to health care policies or end up paying considerably more for one, even though there is no guarantee you would come down with the ailment. And then comes the biggie.. bioweapons.

IMAGE VIA Daniel Schludi / unsplash.com
IMAGE VIA yahoo.com

COVID 19, I remind you, was developed in a lab based on genetics research to render an animal virus into a human virus. Perhaps you have heard the conspiracy theories about plots to alter the human genome (transhumanism — another component of ORACLE) by a combination of DNA modifiers in the vaccines and augmentation through 5G radiographic bombardment? Some of those arguments can at least seem to hold water, but I’m not going to get into that, here; I’m not qualified… just suspiciously nervous, and glad I just said ‘NO!’ to vaccines.

IMAGE VIA themoviedb.org

But there is the nagging line from The Bourne Legacy, which is based in Science, where the methodology of virology and genetic manipulation employed in the greater Bourne film franchise is correctly explained in the simplest of scientifically factual terms, parens added: “Well, if youre going to reprogram human genetic material, you need a delivery system, and nothing works better than a virus (and vaccine). Its like a suitcase. You pack in genetic mutation, infect the body and the vector unloads into the target cells.”

READ THIS  The Significance of Israel in End Times Prophecy & The Return of Jesus

The dialog continues to talk about needing a DNA map, and since 2005, genetics research technology known as CRISPR had provided such a Map. In the fictional Bourne world, and the real World, you use a vaccine to target the DNA Map at just the right chromosomes. Interestingly, then, is that in all the history of mankind, there has only really been two animal virus transmittals to humans, before the advent of genetic research seeking to build that Map; the Plague (rats), and the Spanish Flue (bovine). But since Crisper, we’ve seen an explosion of them, and they tend to be race (genome) specific. Avian flue (birds — Oriental), Hantavirus (rodents — Native American, Hispanic), AIDS (ape — blacks, originally, later modified to target any race) are a few examples. COVID targeted everyone, of course, but vaccines developed around the World varied widely, yet all continue to have horrendous side effects which are commonly been laid at the feet of genome modification sponsored by the vaccines, Bourne-like.

Your Fears Need Not Define You: Control and Limit Them

The 23andMe breach has revealed a new kind of threat both in terms of the type of information at risk, as well as the means of compromise, and overall, we can learn from it, and take actions. The company themselves has been more than forthright and helpful in the matter, and they have fully revealed the extent of damage with useful detail. Forearmed is forewarned, and enables proactive steps to prevention. Their breach was primarily not their own doing, but based on the carelessness of select clients, resulting in password breaches, which are easy enough to prevent, as fully and thoughtfully explored here.

We would be remiss if we did not fully explore the greater topic of cyber security, as well, a matter impossible to squeeze into this article. Here are 12 things you can do to be more secure online. To these I would add the following: do everything you can to censure Smart Devices. My Smart TV is not allowed connection to the Web; such is superfluous, because my computer uses it as my monitor, and has much better protection against cyber assaults (Macintosh). My Smart Meter (power company) is shielded to block signals, and I have a power filter between it and my home to erase embedded signals between smart appliances and the Meter. They can’t read my thermostat, or override it.

I don’t use Web app of any kind on my phone, I use my phone as a phone, camera, and flashlight, and not much more. Phone apps are notoriously insecure. I might go online in an emergency if I’m lost or have dire need for random information, but I also keep my phone off unless expecting an important call, or checking for messages. And yes, I employ a foil pouch for that, as well as my credit cards. These kinds of data devices are addictive and imminently hackable or can be used to render you trackable, and I’m not willing to trade bells and whistle ‘convenience’ or ‘fun’ for an increased chance at being hacked, tracked, marketed, or targeted. But that’s just me, The Professional Paranoid (title of my first book, a how-to on personal privacy/security matters).


  • H. Michael Sweeney

    H. Michael Sweeney is a retired privacy/security consultant who specialized in and has worked with some 12,000 stalking victims over several years. He is author of 9 books, 3 relating to privacy/security how-to helps, and 5 relating to crimes of the New World Order and America’s dark bumps in the night. Currently, he continues to offer help to the 12,000,000 stalking victims out there by operating the Free Will Society, through which he can be reached directly by email or phone: freewillsociety.wordpress.com.  Because at least three of his books have been book vanished by CIA and others in Europe, they are currently only available as ebooks, direct. 100% of sales of his books (pay what you think it is worth) go directly to fund the Society, where he draws no salary, and offers a FREE Helps Kit to victims on request.

Truth Premium
CLICK HERE -->I Want Truth Premium

5 1 vote
Article Rating
Notify of
Inline Feedbacks
View all comments

Please use the buttons to TWEET & SHARE this valuable content ... then leave your thoughts & feelings in the COMMENT SECTION ... finally If you haven't joined TRUTH PREMIUM, what are you waiting for?