Over 82% of Americans own cell phones, with around half of
these being smart phones. In the near future, the majority of Americans will own smart phones that will have the
ability to track their location down to a few centimeters. ...NSA Admits It Tracks Americans Via Cell Phones -- Surveillance
has been going on for over a decade
Forget a chip in your
forehead – the ‘mark of the beast’ is the cell phone
Paul Joseph Watson Infowars.com Tuesday, April 10, 2012
of a new microchip for cell phones that knows the user’s location to within a few centimeters confirms the fact
that contrary to biblical fears about mandatory implantable microchips, people have willingly exchanged their
privacy for convenience and that the cell phone itself is the de facto “mark of the beast”.
“Broadcom has just rolled out a chip for smart
phones that promises to indicate location ultra-precisely, possibly within a few centimeters, vertically
and horizontally, indoors and out,”reports MIT
“In theory, the new chip can even determine what floor of a building
you’re on, thanks to its ability to integrate information from the atmospheric pressure sensor on many models of
Android phones. The company calls abilities like this “ubiquitous navigation,” and the idea is that it will enable
a new kind of e-commerce predicated on the fact that shopkeepers will know the moment you walk by their front door,
or when you are looking at a particular product, and can offer you coupons at that instant.”
Over 82% of Americans own cell phones, with around half of these
being smart phones. In the near future, the majority of Americans will own smart phones that will have the ability
to track their location down to a few centimeters.
With the effort to
legally establish surveillance drones as a legitimate tool in
domestic law enforcement, authorities could save a lot of time and money by simply requesting cell phone companies
provide real-time tracking of suspects via their smart phones.
Biblical fears about the ‘mark of the beast’ being an implantable
microchip forcibly injected into our foreheads have proven to be off base. Coercion was not necessary because
people have been enticed into willingly giving up their privacy for convenience.
Indeed, paranoia about not being able to buy or sell without the
‘mark’ is now coming full circle with the increasing use of cell phones as payment gateways linked to credit
Peer pressure and cultural brainwashing has also played a role –
someone who doesn’t own a cell phone will find it almost impossible to operate in the modern world unless they live
like a recluse or make a living by running a farm in the middle of nowhere.
The ‘Internet of things’ – where every appliance is connected to the
world wide web –has been hailed by spooks as a green light for
ubiquitous panopticon-style surveillance of the individual.
Broadcom’s new microchip will also make it easier for industry to
accelerate plans to useMinority Report-style targeted advertising against consumers.
“The use case [for Bluetooth beacons] might be malls,” says Scott
Pomerantz, vice president of the GPS division at Broadcom,. “It would be a good investment for a mall to put up a
deployment—perhaps put them up every 100 yards, and then unlock the ability for people walking around mall to get
very precise couponing information.”
The only way that technology can advance without destroying basic
human rights in the process is if strong new legislation is passed increasing the penalties against both industry
and government for using such technology to spy on users. However, the opposite is happening, with each new
technological leap being dovetailed by aggressive efforts on behalf of the state to eviscerate what little privacy
rights we have left.
Cellphone takes private
pictures without your consent
Paul Joseph Watson Infowars.com October 15, 2012
Did you know
that many of the apps you download to your smartphone now use your microphone to listen to you and your camera to
take pictures of you without your confirmation?
New terms of agreement contracts now being attached to app downloads
require users to accept that their cellphones become literal monitoring devices that record conversations and
surreptitiously take pictures without the user ever giving permission.
It’s been common knowledge for years that app companies and service
providers use GPS technology to pinpoint the location of smartphone users.
However, after purchasing a new Samsung Galaxy Note II and proceeding
to download a couple of Android apps, one a social networking app and the other a simple calendar, I was shocked to
discover that users are mandated to relinquish every aspect of privacy imaginable in order to download the
As you can see from the image above, app companies now demand the
- “Record Audio” – “Allows the app to record audio with the
microphone. This permission allows the app to record audio at any time without your confirmation.”
- “Take pictures and videos” – “Allows the app to take pictures and
videos with the camera. This permission allows the app to use the camera at any time without your
App companies are also requiring you to allow them to approximate
your location, send SMS messages from your phone that cost you money, read your contacts, read your phone status
and identity, get “full network access” to your communications (in other words listen to your phone calls), modify
or delete the contents of your USB storage, and disable your screen lock (the 4 digit code that password-protects
Since the vast majority of people simply consent to terms of
agreement without bothering to read them, this means that potentially millions of smartphone users all over the
world have given app companies and by extension service providers permission to record their conversations and take
pictures of their private life.
This has been allowed to pass virtually unnoticed with barely any
press attention or privacy debate whatsoever.
Since smartphones are dependent on apps, users are being given the
option to either not use them and render their expensive device largely redundant, or submit to have their private
conversations and personal life catalogued as if they were trapped inside The Truman Show.
“There are certain circumstances where that authority may exist,” said Matthew
Olsen the current nominee to head up the National Counterterrorism Center.
Olsen made the comments to the Senate Select Committee on Intelligence as Sen. Ron
Wyden (D., Ore.) repeatedly asked if the government has the authority to “use cell site data to track the location
of Americans inside the country.”
Olsen added that the reason his answer was not definitive was that “it is a very
complicated question”, assuring the committee that the NSA would provide more information in a future
Sen. Wyden recently wrote (full letter below) to the Director of National
Intelligence demanding to know whether the CIA and the NSA “have the authority to collect the geolocation
information of American citizens for intelligence purposes.”
“If yes, please explain the specific statutory basis for this authority,” the
letter, co signed by Sen. Mark Udall (D., Colo.) states.
The Senators also requested information on how many Americans have been monitored
under authority granted by 2008 legislation amending the Foreign Intelligence Surveillance Act. “Have any
apparently law-abiding Americans had their communications collected by the government?” the letter asks.
Two months ago Wyden expressed concern that the law relating to surveillance is
unclear. “The law is being secretly interpreted by the executive branch” Wyden noted.
Along with Congressman Jason Chaffetz (R., Utah), Wyden has introduced a joint
bill that would force any government agency to secure a search warrant and show probable cause before tracking the
location of any American.
The issue of cell phone tracking blew up earlier this year when it was revealed
that computer researchers discovered a hidden file that allows Apple to track the location of iPhone and iPad
users. Google’s collection of location from cellphones has also been open to question.
As we have previously highlighted, however, since October 2001, the FCC has
mandated that all wireless carriers track the location of their users down to within 50 feet.
Under the 1996 Telecommunications Act, the FCC mandated that by October 1, 2001 a
quarter of all new cellphones be equipped with GPS functionality that would allow authorities to track the location
of users. By the end of 2002, this became a mandatory requirement of allnew cellphones.
Geek.com reported back in October 2001, “Because cellphone
calls to 911 (estimated at around 140,000 per year) do not give the 911 operator location information, the
FCC mandated that wireless companies “be able to locate 67 percent of callers to 911 within 50 meters that
elect the handset solution while those using network technology must be able to locate the caller within 100
meters.” Wireless companies must also have one-quarter of the new cellphones they offer equipped to provide
that location information by the end of the year, and all new cellphones so equipped by the end of next
a PC World article written in August 2001, two months
before the first phase of the new FCC rules were enacted, asked, “The FCC requires cell phone companies to
track you, in order to find you when you call 911–but what about your privacy?”
“Cell phone tracking was propelled by the Federal Communications Commission, which
adopted enhanced 911 rules to cover wireless services. For E911′s first phase, cellular carriers must be able to
pinpoint, to the nearest cell tower, the location of someone calling 911. For Phase II, carriers must be able to
pinpoint a 911 caller’s location to within 50 to 300 meters,” states the article.
Your cellphone has been tracking you in real time for the lion’s share of the last
decade, so why has it taken the media nearly 10 years to notice? Because in 2001, when such measures could have
been made illegal, there was no iPhone, there was no app store, and the smart phones being used were extremely
crude compared to today’s models, which are no less than mini-laptops.
In 2001, cellphones did little else than make calls and send text messages – these
services didn’t require GPS technology. People weren’t addicted to their cellphones like they are today, they
didn’t use them to catalogue, record and process every aspect of their existence.
The likes of Apple have worked hard over the last decade to make hundreds of
millions of people dependent on their gadgets, creating an army of addicts who couldn’t care less that their
cellphone is transmitting their every move directly to Steve Jobs. In their eyes, the choice between sacrificing
their privacy and sacrificing their precious “apps” is an easy one to make. Privacy can’t book a table at a
restaurant in a few taps of a finger, nor can it tell you the weather forecast or where the nearest ATM is
If the debate had been allowed to run its course in 2001, when cellphone tracking
was first being adopted, the outcome may have been different. But since cellphone companies have been tracking
their users for the best part of a decade, in line with government mandates, the recent controversy is merely part
of the acclimatization process to achieve calm subservience and acceptance of the fact that true privacy is
dead, and as Henry Blodget explains,
Apple’s omnipresent brainwashing campaign has helped keep the outrage to a minimum.
Sen. Ron Wyden’s letter inquiring over tracking of Americans by federal
July 14, 2011
The Honorable James R. Clapper, Jr. Director of National Intelligence
Washington, DC 20511
Dear Director Clapper:
In the coming months Congress is likely to consider various legislative
initiatives that would modify different aspects of domestic surveillance law. We believe that the debate over these
initiatives will be better informed if Congress and the public are provided with more unclassified information
about how these initiatives will affect current intelligence authorities and activities.
The FISA Amendments Act of 2008 significantly modified the US government’s
surveillance authorities with regard to individuals believed to be located outside the United States. These new
authorities are currently scheduled to expire in late 2012, and Congress could begin considering possible
extensions or revisions to these authorities later this year. Since any thorough consideration will require an
understanding of how the FISA Amendments Act has been interpreted and implemented, we ask that you provide
unclassified answers to the following questions:
• In a December 2007 Statement of Administration Policy on the FISA Amendments
Act, the Office of Management and Budget said that it would “likely be impossible” to count the number of people
located in the United States whose communications were reviewed by the government pursuant to the FISA Amendments
Act. Is this still the case? If so, is it possible to estimate this number with any accuracy?
• Official documents released in 2010 noted that there have been multiple
incidents in which intelligence agency personnel have failed to comply with the FISA Amendments Act, and that
“Certain types of compliance incidents continue[d] to occur.” Please elaborate on these compliance incidents to the
extent possible, and explain why you believe that they have continued to recur.
• Have any apparently law-abiding Americans had their communications collected
by the government pursuant to the FISA Amendments Act?
• Are any significant interpretations of the FISA Amendments Act currently
Turning to another area of surveillance law, recent advances in geolocation
technology have made it increasingly easy to secretly track the movements and whereabouts of individual Americans
on an ongoing, 24/7 basis. Law enforcement agencies have relied on a variety of different methods to conduct this
sort of electronic surveillance, including the acquisition of cell phone mobility data from communications
companies as well as the use of tracking devices covertly installed by the law enforcement agencies
Unfortunately, the law has not kept up with these advances in technology. As a
result, courts in different jurisdictions have issued diverse, conflicting rulings about the evidence and
procedures required for the government to surreptitiously track an individual’s movements using a mobile electronic
device. Congress is now considering multiple legislative proposals that would attempt to establish clear rules for
this sort of surveillance and will need to determine at some point whether it is necessary to update the laws that
apply to intelligence investigations as well as the laws that apply to law enforcement
While there is a substantial amount of public information available regarding
different interpretations of this area of the law (including the executive branch’s interpretation and the
interpretations of various courts) all of these interpretations apply to law enforcement authorities, not
intelligence authorities. Clearly Congress needs to also understand how intelligence authorities are being
interpreted as it begins to consider legislation on this issue. For this reason, we request that you also provide
unclassified answers to the following questions:
• Do government agencies have the authority to collect the geolocation
information of American citizens for intelligence purposes?
• If yes, please explain the specific statutory basis for this authority. And
to the extent that this statutory basis imposes any procedural requirements, such as judicial review or approval by
particular officials, please describe these requirements.
• If no, please explain the statutory basis for this
Thank you for your attention to this matter. We look forward to your prompt
Ron Wyden Mark Udall United States Senator United States
Privacy group warns “even if you have never been arrested
you could be implicated as a criminal suspect”
April 15, 2014
A leading privacy watchdog has warned that the FBI
plans to have up to a third of all Americans on a facial recognition database by next year.
The Electronic Frontier Foundation notes in a communique that some 52 million Americans
could be on the Next Generation Identification (NGI) biometric database by 2015, regardless of whether they have
ever committed a crime or been arrested.
The group managed to obtain information pertaining to the program via a freedom of information request.
The database will also hold fingerprints, of which the FBI has around 100 million records, as well as retina
scans and palm prints. Profiles on the system will contain other personal details such as name, address, age and
The system will be capable of searching through millions of facial records obtained not only via mugshots, but
also via so called “civil images”, the origin of which is vague at best.
“[T]he FBI does not define either the ‘Special Population Cognizant’ database or the ‘new repositories’
category.” The EFF writes. “This is a problem because we do not know what rules govern these categories, where the
data comes from, how the images are gathered, who has access to them, and whose privacy is impacted.”
A map within the EFF’s piece shows which states are
already complying with the program, and which ones are close to agreeing deals to do so.
The EFF notes that currently, the FBI has access to fingerprint records of non-criminals who have submitted them
for any kind of background check, by an employer or government agency. Going forward, however, all records, both
criminal and non-criminal will be stored on the same database.
“This means that even if you have never been arrested for a crime, if your employer requires you to submit a
photo as part of your background check, your face image could be searched – and you could be implicated as a
criminal suspect, just by virtue of having that image in the non-criminal file,” notes the EFF.
EFF points to a disturbing assertion from the FBI that it will not “make positive identifications,” via the
database, but will use it to produce “investigative leads.” The Feds claim that “Therefore, there is no false
positive [identification] rate.”
“[T]he FBI only ensures that “the candidate will be returned in the top 50 candidates” 85 percent of the time
“when the true candidate exists in the gallery.”” EFF states.
“It is unclear what happens when the “true candidate” does not exist in the gallery—does NGI still return
possible matches?” the feature asks, noting that those identified could potentially be subjected to criminal
investigation purely because a computer has decided that their face is similar to a suspect’s.
EFF continues: “This doesn’t seem to matter much to the FBI—the Bureau notes that because ‘this is an
investigative search and caveats will be prevalent on the return detailing that the [non-FBI] agency is responsible
for determining the identity of the subject, there should be NO legal issues.’”
“This is not how our system of justice was designed and should not be a system that Americans tacitly consent to
move towards,” the EFF piece concludes.
It is somewhat remarkable that when Google announced the release of its Glass product, it was forced to
ban applications with the capability for facial recognition due to a huge privacy
backlash. The Federal government, however, continues to use such technology unhindered to create biometric
profiles on anyone and everyone.
The Department of Homeland Security also has its own facial recognition program, which it routinely outsources to police departments. Meanwhile, new innovations in facial recognition
technology continue to be billed as potential tools for law enforcement, including the prediction of future crime.
Steve Watson is a London based writer and editor for Alex Jones’ Infowars.com, andPrisonplanet.com. He has a Masters Degree in International Relations from the School of
Politics at The University of Nottingham, and a Bachelor Of Arts Degree in Literature and Creative Writing from
Nottingham Trent University.
This article was posted: Tuesday, April 15, 2014 at 12:20 pm
“This is the future if nothing is done to stop it,” is the
The Atlantic describes the recent Big Brother tactics used by LA County Sheriffs to “police” areas such as
Compton. Residents were unaware (“A lot of people do have a problem with the eye in the sky, the Big
Brother, so to mitigate those kinds of complaints we basically kept it pretty hush hush“)that, as the
police stated, “we literally watched all of Compton during the times that we were flying, so we could zoom in
anywhere within the city of Compton and follow cars and see people,” as they trialled a new system which if
adopted, would mean Americans can be policed like Iraqis and Afghanis under occupation. As
The Atlantic concludes, the sheriff didn’t conclude that the “wide area surveillance” wouldn’t be like
Big Brother after all, just that Big Brother capabilities would help to solve more crimes… so why not
tryout mass surveillance?
In a secret test of mass surveillance technology, the Los Angeles
County Sheriff’s Department sent a civilian aircraft over Compton, California, capturing high-resolution video of
everything that happened inside that 10-square-mile municipality.
Compton residents weren’t told about the spying, which happened in 2012. “We literally watched all of
Compton during the times that we were flying, so we could zoom in anywhere within the city of Compton and follow
cars and see people,” Ross McNutt of Persistence Surveillance Systems told the Center for
Investigative Reporting, which unearthed and did the first reporting on this important story. The technology
he’s trying to sell to police departments all over America can stay aloft for up to six hours. Like Google Earth,
it enables police to zoom in on certain areas. And like TiVo, it permits them to rewind, so that they can look back
and see what happened anywhere they weren’t watching in real time.
If it’s adopted, Americans can be policed like Iraqis and Afghanis under occupation…
Sgt. Douglas Iketani acknowledges that
his agency hid the experiment to avoid public opposition. “This
system was kind of kept confidential from everybody in the public,”he said. “A lot of people do have a problem with
the eye in the sky, the Big Brother, so to mitigate those kinds of complaints we basically kept it pretty hush
hush.” That attitude ought to get a public employee summarily terminated.
“Our first initial thought was, oh, Big Brother, we’re going to have a camera flying over us. But with the
wide area surveillance you would have the ability to solve a lot of the unsolvable crimes with no witnesses, no
videotape surveillance, no fingerprints.”
Notice that he didn’t conclude that the “wide area surveillance” wouldn’t be like Big Brother after all,
just that Big Brother capabilities would help to solve more crimes.
So why not try them out?
He later explains that while the public may think its against this, we’ll get used to it:
I’m sure that once people find out this experiment went on they might be a little upset. But knowing that we
can’t see into their bedroom windows, we can’t see into their pools, we can’t see into their showers. You know,
I’m sure they’ll be okay with it. With the amount of technology out in today’s age, with cameras in ATMs, at
every 7/11, at every supermarket, pretty much every light poll, all the license plate cameras, the red light
cameras, people have just gotten used to being watched.
Many Americans elect their own sheriffs. This is the future if
nothing is done to stop them.
This article was posted: Monday, May 5, 2014 at 5:45 am
The US intelligence whistleblower
Edward Snowden has warned that entire populations, rather than just individuals, now live under constant
“It’s no longer based on the traditional practice of targeted taps based on some
individual suspicion of wrongdoing,” he said. “It covers phone calls, emails, texts, search history, what you
buy, who your friends are, where you go, who you love.”
Snowden made his comments in a short video that was played before a debate on the proposition
that surveillance today is a euphemism for mass surveillance, in Toronto, Canada. The former US National
Security Agency contractor is living in Russia, having been granted temporary asylum there in June 2013.
Secret 'Minority Report' Tech In All Post-2010
Apple installed secret 'Minority Report' tracking technology in all iPhones from 2010 and only
just told you about it.
Cell Phones Are
Tracking Devices That Governments, Police, Big Corporations And Stalkers Can Use To Easily Track Your
If you regularly carry a cell phone around with you, you might as well
say goodbye to your privacy. The truth is that any cell phone
you buy is going to track you wherever you go 24 hours a day.
Just as you leave "footprints" wherever you go on the Internet, so also your cell phone is constantly
recording wherever you go in the physical world. Most people do
not realize this, but the reality is that cell phones are tracking devices that governments, law
enforcement authorities, big corporations and even stalkers can use to easily track your
movements. If you do not know about this yet, then you are
going to be absolutely amazed by what you are about to read.
Not only do cell phones track you wherever you go, they can also be used to listen to your private
conversations even when they areturned
off. We live in a
brave new world, and there are a lot of control freaks out there that love to monitor where we go and what
we do. Unfortunately, it seems like every time technology
advances, we lose a little bit more privacy. Eventually, we may
wake up someday in a world where there is absolutely no privacy left.
On Black Friday, two U.S. shopping malls started
actively using the FootPath Technology tracking system to monitor their customers.
This system captures the unique identification
number that is assigned to each phone, and thus it enables the malls to constantly monitor what stores their
The malls are putting up signs that warn customers
about this system and that instruct them that they can "opt out" by turning off their cell phones.
But should we really have to "opt out" in order to
maintain our privacy?
A new article postedon CNN described the
"test" that will be running for the rest of the year at these malls....
Starting on Black Friday and running through New Year's Day, two U.S.
malls -- Promenade Temecula in southern California and Short Pump Town Center in Richmond, Va. -- will track
guests' movements by monitoring the signals from their cell phones.
While the data that's collected is anonymous, it can follow shoppers'
paths from store to store.
The goal is for stores to answer questions like: How many Nordstrom
shoppers also stop at Starbucks? How long do most customers linger in Victoria's Secret? Are there unpopular
spots in the mall that aren't being visited?
It is being argued that since our movements on the
Internet are tracked, we should not object when our movements in the physical world are tracked.
But if we say this is okay, where will it all
Will we eventually live in a world that makes the
movie "Minority Report" look tame by comparison?
So exactly how intrusive is the FootPath Technology
It works like this: A network of monitoring units are set up across a mall
to track shoppers’ cellphone signals, locating them within a couple of meters. The data is then fed to a
central processing center. Afterwards, management can gain insight into their customers’ shopping habits,
letting them know which stores complement each other or which pathways have the most foot traffic so they can
allocate their maintenance crews and ad posters accordingly.
It is not as intrusive as it could be. But the
thing is, once you give these control freaks an inch, eventually they will take a mile.
In fact, governments all over the world are already
using cell phones to track down "enemies of the state".
For example, a recentBloomberg article described how the government of Iran is aggressively using cell phones to crack down on
The Iranian officers who knocked out Saeid Pourheydar’s four front teeth
also enlightened the opposition journalist. Held in Evin Prison for weeks following his arrest early last year
for protesting, he says, he learned that he was not only fighting the regime, but also companies that armed
Tehran with technology to monitor dissidents like him.
Pourheydar, 30, says the power of this enemy became clear as intelligence
officers brandished transcripts of his mobile phone calls, e-mails and text messages during his detention.
About half the political prisoners he met in jail told him police had tracked their communications and
movements through their cell phones, he says.
Christians in Iran have learned that they must take
the batteries entirely out of their cell phones before they gather at their secret meeting places. Otherwise, the
secret police are likely to show up and drag them off to prison.
Eventually, most of the governments on earth will
be utilizing these kinds of capabilities.
In the United States, cell phone companies are
actually required by law to be able to pinpoint the locations of their customers to within 100 meters. Of course
most cell phone providers are able to track their customers much more accurately than that.
Law enforcement authorities all over the U.S. are
already using cell phones to track the locations of criminal suspects and to listen to their
Even if a cell phone is completely turned off, law
enforcement authorities can still listen in on the conversations that a suspect is having. All that is necessary is
for the battery to still be in the cell phone.
Accordingto CNET News, the FBI can
remotely activate the microphone on your cell phone and listen to whatever you are saying....
The FBI appears to have begun using a novel form of electronic
surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to
eavesdrop on nearby conversations.
The technique is called a "roving bug," and was approved by top U.S.
Department of Justice officials for use against members of a New York organized crime family who were wary of
conventional surveillance techniques such as tailing a suspect or wiretapping him.
When you make a telephone call, it is never
private. The reality is that the NSA has been monitoring all phone calls for years and years.
Accordingto USA Today, the NSA
intends "to create a database of every call ever made"....
The National Security Agency has been secretly collecting the phone call
records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth, people with
direct knowledge of the arrangement told USA TODAY.
Isn't that a bit sobering?
But it isn't just the federal government that is
using cell phone information for law enforcement purposes.
In some areas of the United States, law enforcement
authorities are pulling data out of cell phones for no apparent reason whatsoever.According to the ACLU,
state police in Michigan are now using "extraction devices" to download data from the cell phones of motorists
that they pull over. This is happening even if the motorists that are pulled over are not accused of doing
The following is how an
articleon CNET News described the capabilities of these "extraction devices"....
The devices, sold by a company called Cellebrite, can download text
messages, photos, video, and even GPS data from most brands of cell phones. The handheld machines have various
interfaces to work with different models and can even bypass security passwords and access some
Would you want the police doing that to
Sadly, it is even incredibly easy for hackers and
stalkers to tap into your cell phone these days.
Spyware marketers claim you can tap into someone's calls, read their text
messages and track their movements "anywhere, anytime." They say you can "catch a cheating spouse", protect
your children from an evil babysitter and "hear what your boss is saying about you." And while you're spying on
others, the Spyware companies say "no one will ever know" because it's supposed to be "completely invisible"
with "absolutely no trace."
Security experts say it's no internet hoax.
"It's real, and it is pretty creepy," said Rick Mislan, a former military
intelligence officer who now teaches cyber forensics at Purdue University's Department of Computer and
Mislan has examined thousands of cell phones inside Purdue's Cyber
Forensics Lab, and he says spy software can now make even the most high-tech cell phone
For even more on what hackers and stalkers can do
to your cell phone, just check outthis amazing video.
This is just another sign that we are rapidly
becoming a "Big
Brother" society where virtually everything that we do is watched,
listened to, tracked or monitored.
But even with the advanced capabilities that they
now have, the control freaks that run things are going to want to push things even further in the
For example, not all of us carry a cell phone with
us wherever we go.
So how will they track the rest of us?
Implanting a microchip in all of us would make
identification and tracking of the population so much easier.
How soon will it be before that idea starts getting
pushed to the forefront?
We can all see where all of this is
When George Orwell wrote "1984", a lot of people
believed that it was impossible for our world to end up like that.
Well, the technology for a world that is far more
repressive than "1984" is being put into place. Every single day, we lose a little bit more privacy. We are
constantly being told that we need to sacrifice just a "little bit" of liberty and freedom for the good of national
The world is changing. All of us better wake
For most of human history, the vast majority of
people have lived under repressive governments.
Today, liberty and freedom are being pushed back in
every corner of the globe.
Unless this trend is reversed, most of humanity
will once again end up living under deep tyranny. Only this time, the "authorities" will be equipped with "Big
Brother technology" unlike anything that the world has ever seen before.
Do not take liberty and freedom for
Once they are gone, they will be incredibly
difficult to get back.
Mastering The Human
Who You Are – Collected information includes names, addresses, biometrics,
social media accounts .
What You Do – Travel history, communications, financial transactions and
movement of physical assets.
Who You Know – Relational information including family, friends, associates
Context – Contextual data such as demographics, politics, cultural norms
Acloser look at the
upcoming Jade Helm military exercise, specifically its “master the human domain” motto, reveals a larger agenda in
regards to domestic policy.
...“They’re building an infrastructure of tyranny,” stated Infowars David Knight.
“There’s a legal infrastructure with things like the NDAA, there’s a technical
infrastructure with things like the capability to do dragnet surveillance, and then of course there is going to be
a military and law enforcement infrastructure, and those are merging.”
Created by cell phones, power lines, computers and microwaves, as well as other
electronic and magnetic devices, EMFs [Electromagnetic Fields] wreck havoc on the body. These fields induce brain
fog, forgetfulness, anxiety, depression and chronic fatigue in those who are sensitive...Linked with cancer,
Alzheimer's, multiple sclerosis, chronic fatigue, miscarriage and a host of other devastating diseases,
electromagnetic fields (EMFs) are a serious modern concern. And exposure is almost impossible to avoid. But with
diet and a measure of awareness, the dangers of EMFs can be reduced.
The Truthseeker: 'Casualty
Cell Phones And Child Brains
Insurers stop covering for cell phone use, called the next 'casualty catastrophe' after tobacco
and asbestos; phone manufacturers hit with a class action and personal lawsuits; and the warning deep inside your
mobile. Seek truth from facts with Ellie Marks, whose husband Alan is suing the industry for his brain tumor, 'cell
phone survivor' Bret Bocook, leading radiation biologist Prof. Dariusz Leszczynski, Microwave News editor Dr. Louis
Slesin, Storyleak editor Anthony Gucciardi, and former senior White House adviser Dr. Devra Davis. Read the full
transcript here http://on.rt.com/jnaahv
"It's essentially cooking the
Keith L. Black American neurosurgeon specializing in the treatment of brain
tumors and a prolific campaigner for funding of cancer treatment
The National Security Agency and its UK counterpart GCHQ have been
developing capabilities to take advantage of “leaky” smartphone apps, such as the wildly popular Angry Birds
game, that transmit users’ private information across the internet, according to top secret documents.
The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from
phone model and screen size to personal details such as age, gender and location. Some apps, the documents state,
can share users’ most sensitive information such as sexual orientation – and one app recorded in the material even
sends specific sexual preferences such as whether or not the user may be a swinger.
Many smartphone owners will be unaware of the full extent this information is being shared across the internet,
and even the most sophisticated would be unlikely to realise that all of it is available for the spy agencies to
If you own a cell phone, you
might as well kiss your privacy goodbye. Cell phone companies know more about us than most of us would
ever dare to imagine. Your cell phone company is tracking everywhere that you go and it is making a
record of everything that you do with your phone. Much worse,
there is a good chance that your cell phone company has been selling this information to anyone that is
willing to pay the price – including local law enforcement. In addition, it is an open secret that the
federal government monitors and records all cell phone calls. The “private conversation” that you are
having with a friend today will be kept in federal government databanks for many years to come. The
truth is that by using a cell phone, you willingly make yourself a prisoner of a digital world where every
move that you make and every conversation that you have is permanently recorded. But it is not just cell
phone companies and government agencies that you have to worry about. As you will see at the end of this
article, it is incredibly easy for any would-be stalker to hack you and track your every movement using your
cell phone. In fact, many spyware programs allow hackers to listen to you through your cell phone even
when your cell phone is turned off. Sadly, most cell phone users have absolutely no idea about any of
The next time that you get a notice from your cell phone company about “changes”
off your most personal information to anyone that is willing to write a big enough check. The following is
from a recent CNN article….
Your phone company knows where you live, what websites you visit, what apps you
download, what videos you like to watch, and even where you are. Now, some have begun selling that valuable
information to the highest bidder.
to record customers’ location data and Web browsing history, combine it with other personal information like age
and gender, aggregate it with millions of other customers’ data, and sell it on an anonymous basis.
So who is buying this information?
We just don’t know.
But we do know that local law enforcement agencies all over the country are
increasingly using cell phone data to nail suspects, and often it is the cell phone companies that are the ones
selling them the cell phone data that they need.
According to a recent New York Times article,
many local police departments are doing this without getting a warrant first….
“Law enforcement tracking of cellphones, once the province mainly of federal
agents, has become a powerful and widely used surveillance tool for local police officials, with hundreds of
departments, large and small, often using it aggressively with little or no court oversight.”
That same article says that cell phone companies have standard prices that they
charge to local law enforcement officials for information that they request….
“Cell carriers, staffed with special law enforcement liaison teams, charge police
departments from a few hundred dollars for locating a phone to more than $2,200 for a full-scale wiretap of a
So if you are breaking the law, your cell phone may be used to gather evidence and
to track you down. In the United States, cell phone companies are required by law to be able to pinpoint the
locations of their customers to within 100 meters. So if you are a
criminal, your cell phone could be leading the police right to you even as you are reading this article.
Sometimes the police don’t even use the cell phone companies.
Recently, the Wall Street Journal ran an article that discussed the capabilities of the “stingray devices” that many local
law enforcement agencies are using now.
A “stingray device” acts like a cell phone tower and it can gather any information
that a normal cell phone tower can. The following is how a recent Wired article described these “stingrays”….
You make a call on your cellphone thinking the only thing standing between you and
the recipient of your call is your carrier’s cellphone tower. In fact, that tower your phone is connecting to just
might be a boobytrap set up by law enforcement to ensnare your phone signals and maybe even the content of your
So-called stingrays are one of the new high-tech tools that authorities are using
to track and identify you. The devices, about the size of a suitcase, spoof a legitimate cellphone tower in order
to trick nearby cellphones and other wireless communication devices into connecting to the tower, as they would to
a real cellphone tower.
The government maintains that the stingrays don’t violate Fourth Amendment rights,
since Americans don’t have a legitimate expectation of privacy for data sent from their mobile phones and other
wireless devices to a cell tower.
Isn’t that just great?
The attitude that law enforcement agencies seem to have is that once we use a cell
phone we are essentially willingly throwing our Fourth Amendment rights out the window.
In some areas of the United States, police are physically extracting data from
cell phones any time they want as well. According to the ACLU,
state police in Michigan have been using “extraction devices” to download data from the cell phones of motorists
that they pull over. This is taking place even if the motorists that are pulled over are not accused of
doing anything wrong. The following is how an article posted on CNET News describes the capabilities of these “extraction devices”….
The devices, sold by a company called Cellebrite, can download text messages,
photos, video, and even GPS data from most brands of cell phones. The handheld machines have various interfaces to
work with different models and can even bypass security passwords and access some information.
Fortunately these “extraction devices” are being challenged in court. Let us
hope that they will be banned.
But what local law enforcement officials are doing pales in comparison to what
federal agencies are doing.
Not only that, the FBI has also been remotely activating the microphones on the cell phones of suspects that they want to listen to. This
can be done even when the cell phone is turned off….
The FBI appears to have begun using a novel form of electronic surveillance in
criminal investigations: remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby
The technique is called a “roving bug,” and was approved by top U.S. Department of
Justice officials for use against members of a New York organized crime family who were wary of conventional
surveillance techniques such as tailing a suspect or wiretapping him.
Could the FBI be listening to you right now?
If there is a cell phone in the room they could be.
But some other federal agencies listen to a lot more cell phone calls than the FBI
It has been an open secret for a long time that the federal government monitors
and records all cell phone calls that are made for national security reasons.
In fact, the federal government is even trying to collect records for calls that
have been made in the distant past. Accordingto USA Today, the goal is
“to create a database of every call ever made”….
The National Security Agency has been secretly collecting the phone call records
of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth, people with direct
knowledge of the arrangement told USA TODAY.
In addition, the federal government has been constructing the largest data center
in the history of the world out in the Utah desert. This data center will be used to house an almost
unimaginable amount of digital data (including your cell phone calls). The following is
how a recent Wired article described this new facility….
Under construction by contractors with top-secret clearances, the blandly named
Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final
piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store
vast swaths of the world’s communications as they zap down from satellites and zip through the underground and
undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be
up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases
will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google
searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases,
and other digital “pocket litter.”
But isn’t it illegal for the federal government to intercept our phone
Well, the cold, hard reality of the matter is that they use all kinds of loopholes
and legal technicalities to get around that.
For example, if a call is “intercepted” outside of the United States and then
routed to a government building inside the United States that is considered to be okay.
Of course that is a bunch of nonsense, but that is how they think.
And it is very frightening thing for governments around the world to be able to
monitor and track us like this.
Increasingly, governments around the world are using cell phones to hunt down
people that they do not like and haul them off to prison. For example, a recent Bloomberg article detailed how the Iranian government is aggressively using cell phones to crack down on
The Iranian officers who knocked out Saeid Pourheydar’s four front teeth also
enlightened the opposition journalist. Held in Evin Prison for weeks following his arrest early last year for
protesting, he says, he learned that he was not only fighting the regime, but also companies that armed Tehran with
technology to monitor dissidents like him.
Pourheydar, 30, says the power of this enemy became clear as intelligence officers
brandished transcripts of his mobile phone calls, e-mails and text messages during his detention. About half the
political prisoners he met in jail told him police had tracked their communications and movements through their
cell phones, he says.
Christians in Iran have learned that they must take the batteries entirely out of
their cell phones before they gather for home church meetings. If they don’t take the batteries out of their
cell phones, there is a good chance that the secret police will show up and drag them off to prison.
Most Americans don’t need to worry about getting hauled off to prison for
political or religious reasons at this point, but there is another aspect of cell phone security that could
potentially affect all of us.
Most Americans are completely unaware of what stalkers can potentially do if they
are able to hack into a cell phone. For example, did you know that spyware can make it possible for a stalker
to monitor where you are 24 hours a day and listen to everything that you say even when your cell phone is turned
off? The following is from an article posted by WTHR….
Spyware marketers claim you can tap into someone’s calls, read their text messages
and track their movements “anywhere, anytime.” They say you can “catch a cheating spouse”, protect your children
from an evil babysitter and “hear what your boss is saying about you.” And while you’re spying on others, the
Spyware companies say “no one will ever know” because it’s supposed to be “completely invisible” with “absolutely
Security experts say it’s no internet hoax.
“It’s real, and it is pretty creepy,” said Rick Mislan, a former military
intelligence officer who now teaches cyber forensics at Purdue University’s Department of Computer and Information
Mislan has examined thousands of cell phones inside Purdue’s Cyber Forensics Lab,
and he says spy software can now make even the most high-tech cell phone vulnerable.
For much more from WTHR about what stalkers can do to your cell phone, just check
out this amazing video.
It is one of the best news reports that I have ever seen.
Are you starting to see how your cell phone makes you a prisoner of a digital
The police can listen to you and track you any time that they want to.
The federal government can listen to you and track you any time that they want
Big corporations can buy all of the personal information that cell phones gather
any time that they want to from certain cell phone companies.
Stalkers can listen to you and track you 24 hours a day if they are able to hack
in to your cell phone somehow.
If you own a cell phone and you still want to have some privacy, then you need to
take the battery completely out of the cell phone when you are not using it.
Unfortunately, as our world becomes even more interconnected and even more
dependent on technology, the amount of privacy we all have is likely to continue to decrease. A digital Big
Brother control grid is being constructed all around us, and in the future that control grid could potentially be
used for very malevolent purposes.
So let us be as wise as serpents and innocent as doves. Our world is
changing, and not for the better.
NSA Records ALL Phone Calls Using
CONFIRMED: NSA Records ALL Phone Calls in Project MYSTIC
TECHNOCRACY - A form of government in
which scientists and technical experts are in control "technocracy was described as that society in which those
who govern justify themselves by appeal to technical experts who justify themselves by appeal to scientific
forms of knowledge"
The Roots of Technocracy with Expert Patrick M.
Glenn Greenwald "The Goal Of The U.S.
Government Is To Eliminate ALL Privacy Globally!"
-- Harriet Tubman --
"I freed a thousand slaves; I
could have freed a thousand more, if only they knew they were slaves."
Only the vigilant can maintain their liberties, and only those who
are constantly and intelligently on the spot can hope to govern themselves effectively by democratic
"A society, most of whose members spend a great part of their time,
not on the spot, not here and now and in their calculable future, but somewhere else, in the irrelevant other
worlds of sport and soap opera, of mythology and metaphysical fantasy, will find it hard to resist the
encroachments of those who would manipulate and control it.”