Over 82% of Americans own cell phones, with around half of
these being smart phones. In the near future, the majority of Americans will own smart phones that will have the
ability to track their location down to a few centimeters. ...NSA Admits It Tracks Americans Via Cell Phones -- Surveillance
has been going on for over a decade
Even if you disable GPS, deactivate phone
location tracking, and turn off your phone, it’s still possible for Google and the NSA to monitor your every
move.
(TMU) — Over the last two decades, cell phone use has become an everyday part
of life for the vast majority of people around the planet. Nearly without question, consumers have chosen to
carry these increasingly smart devices with them everywhere they go. Despite surveillance revelations from
whistleblowers like Edward Snowden, the average
smart phone user continues to carry the devices with little to no security or protection from privacy
invasions.
Americans make up one of the largest smartphone markets in the world today, yet they rarely question how
intelligence agencies or private corporations might be using their smartphone data. A recent report from the
New York Times adds to the growing list of reasons why Americans should be asking these questions.
According to the Times, law enforcement have been using a secret technique to figure out the location of
Android users. The technique involves gathering detailed location data collected by Google from Android phones,
iPhones, and iPads that have Google Maps and other Google apps installed.
Forget a chip in your
forehead – the ‘mark of the beast’ is the cell phone
Paul Joseph Watson Infowars.com Tuesday, April 10, 2012
The development
of a new microchip for cell phones that knows the user’s location to within a few centimeters confirms the fact
that contrary to biblical fears about mandatory implantable microchips, people have willingly exchanged their
privacy for convenience and that the cell phone itself is the de facto “mark of the beast”.
“Broadcom has just rolled out a chip for smart
phones that promises to indicate location ultra-precisely, possibly within a few centimeters, vertically
and horizontally, indoors and out,”reports MIT
Technology Review.
“In theory, the new chip can even determine what floor of a building
you’re on, thanks to its ability to integrate information from the atmospheric pressure sensor on many models of
Android phones. The company calls abilities like this “ubiquitous navigation,” and the idea is that it will enable
a new kind of e-commerce predicated on the fact that shopkeepers will know the moment you walk by their front door,
or when you are looking at a particular product, and can offer you coupons at that instant.”
Over 82% of Americans own cell phones, with around half of these
being smart phones. In the near future, the majority of Americans will own smart phones that will have the ability
to track their location down to a few centimeters.
With the effort to
legally establish surveillance drones as a legitimate tool in
domestic law enforcement, authorities could save a lot of time and money by simply requesting cell phone companies
provide real-time tracking of suspects via their smart phones.
Biblical fears about the ‘mark of the beast’ being an implantable
microchip forcibly injected into our foreheads have proven to be off base. Coercion was not necessary because
people have been enticed into willingly giving up their privacy for convenience.
Indeed, paranoia about not being able to buy or sell without the
‘mark’ is now coming full circle with the increasing use of cell phones as payment gateways linked to credit
cards.
Peer pressure and cultural brainwashing has also played a role –
someone who doesn’t own a cell phone will find it almost impossible to operate in the modern world unless they live
like a recluse or make a living by running a farm in the middle of nowhere.
The ‘Internet of things’ – where every appliance is connected to the
world wide web –has been hailed by spooks as a green light for
ubiquitous panopticon-style surveillance of the individual.
Broadcom’s new microchip will also make it easier for industry to
accelerate plans to useMinority Report-style targeted advertising against consumers.
“The use case [for Bluetooth beacons] might be malls,” says Scott
Pomerantz, vice president of the GPS division at Broadcom,. “It would be a good investment for a mall to put up a
deployment—perhaps put them up every 100 yards, and then unlock the ability for people walking around mall to get
very precise couponing information.”
The only way that technology can advance without destroying basic
human rights in the process is if strong new legislation is passed increasing the penalties against both industry
and government for using such technology to spy on users. However, the opposite is happening, with each new
technological leap being dovetailed by aggressive efforts on behalf of the state to eviscerate what little privacy
rights we have left.
Smartphone Apps Now Use Microphone
to Record Your Conversations
Cellphone takes private
pictures without your consent
Paul Joseph Watson Infowars.com October 15, 2012
Did you know
that many of the apps you download to your smartphone now use your microphone to listen to you and your camera to
take pictures of you without your confirmation?
New terms of agreement contracts now being attached to app downloads
require users to accept that their cellphones become literal monitoring devices that record conversations and
surreptitiously take pictures without the user ever giving permission.
It’s been common knowledge for years that app companies and service
providers use GPS technology to pinpoint the location of smartphone users.
However, after purchasing a new Samsung Galaxy Note II and proceeding
to download a couple of Android apps, one a social networking app and the other a simple calendar, I was shocked to
discover that users are mandated to relinquish every aspect of privacy imaginable in order to download the
app.
As you can see from the image above, app companies now demand the
right to;
- “Record Audio” – “Allows the app to record audio with the
microphone. This permission allows the app to record audio at any time without your confirmation.”
- “Take pictures and videos” – “Allows the app to take pictures and
videos with the camera. This permission allows the app to use the camera at any time without your
confirmation.”
App companies are also requiring you to allow them to approximate
your location, send SMS messages from your phone that cost you money, read your contacts, read your phone status
and identity, get “full network access” to your communications (in other words listen to your phone calls), modify
or delete the contents of your USB storage, and disable your screen lock (the 4 digit code that password-protects
your phone).
Since the vast majority of people simply consent to terms of
agreement without bothering to read them, this means that potentially millions of smartphone users all over the
world have given app companies and by extension service providers permission to record their conversations and take
pictures of their private life.
This has been allowed to pass virtually unnoticed with barely any
press attention or privacy debate whatsoever.
Since smartphones are dependent on apps, users are being given the
option to either not use them and render their expensive device largely redundant, or submit to have their private
conversations and personal life catalogued as if they were trapped inside The Truman Show.
What's in a name? Everything. Find out about the latest attempt to package the
Orwellian total police state surveillance grid as something wonderful and wholesome—and why you
should never, ever say "contact tracing"—in this week's edition of #PropagandaWatch.
The Canadian government is currently ramping up their efforts to fight the spread of Covid-19 by
giving sweeping powers to police and by taking big brother into the digital realm. Contact tracing
apps are popping up on the provincial level and we may soon see a nationwide collective effort to
track trace and database every single thing everyone does. Meanwhile families are being forcefully
removed from their homes and taken to psychiatric facilities for peacefully protesting the
governments abuse of power. In this video Dan Dicks of Press For Truth covers the latest police
state news in Canada while also providing workable solutions on how to avoid being tracked by the
government in this post Covid-19(84) world.
As the people of the world grapple with a pandemic that is demonstrably less deadly
than originally reported, the public is being primed to accept an exponential increase in invasions of personal
liberty and privacy. Every day the public grows more weary of lock downs which seem to never end, and the
bankrupting of individuals and businesses around the world. Amidst the frustration and protest a solution is being
presented.
To return to normal, we are told, we must accept certain changes to how our world
operates. Of course, this is actually a push to a “new normal” which will mark the worldafterCOVID-19. Just like the attacks of September 11, 2001, there is the world
we knew before, and there is the post-9/11 era. We are currently in the middle of the COVID-19 era and a shift to
post-COVID19 life will not happen without the completion of local, state, national, and international programs
which identify potential infectees, test them, and, if positive, quarantine them in their homes or other government
facilities.
This is what is known as a contact tracing program. You have likely heard the term
in recent days and weeks because a number of local and state bodies within the United States are considering or
already launching contact tracing programs. Nations like China, Singapore, India, South Korea, and Israel have
implemented these programs but have also faced criticism from digital rights advocates for violations of privacy
protections.
So what exactly is contact tracing?
Contact tracing is a process of identifying individuals who may have come into
contact with an infected person, collecting information about their contacts, and then tracing the contacts of
infected individuals. All persons who may have come into contact with an infected individual are tested for
infection, treated for the infection, and their contacts traced as well.
Regarding the COVID-19 pandemic, we are seeing calls for digital contact tracing
using cell phones to notify individuals when they may have come into contact with an infected person or visited a
hot spot of infection. Digital contact tracing apps use Bluetooth to track encounters, a move which is supposed to
anonymize actual location data. Other forms of contact tracing apps involve the use of location data gathered from
cellular networks.
Additionally, tech giants Apple and Google have promised to help slow the spread of
the virus with new
tracking apps that the public can download to report themselves as infected. Using Bluetooth,
the phones will warn app users when they are near an infected person or a hot spot. The programs will use data
from Android and iPhone users who volunteer for the program later this month. Jennifer Granick, a surveillance
and cybersecurity attorney with the American Civil Liberties Union told Politico that the joint effort between
the tech companies “appears to mitigate the worst privacy and centralization risks.” However, “there
is still room for improvement.”
Microsoft is collaborating with the University of Washington on their own project
which the university promotes as a privacy based contact tracing app. Researchers with the University of Washington
and UW Medicine worked with volunteers from Microsoft to develop CovidSafe. The
researchers stated that the app will alert users about potential exposure to COVID-19, but will do so without
giving up anyone’s privacy.
“With CovidSafe, all information is stored locally on your phone unless you choose to share
that you’ve tested positive,”explained Justin Chan, a UW doctoral student in the Paul
G. Allen School of Computer Science & Engineering.“Only then is your data sent to a
secure server, and the app alerts anyone who has been nearby. After these notifications are sent, all the
information is deleted.”
CovidSafe is not the only attempt to build a privacy-based contact tracing program.
In April, a team of researchers launched Coalition, a free contact tracing app designed to protect users’ privacy and
protect communities during the COVID-19 crisis. Coalition claims to utilize secure Bluetooth Low Energy (BLE) and
cryptography to protect a user’s identity by generating random anonymous IDs. The app uses Coalition’s Whisper
Tracing, an open source privacy-first protocol that randomizes a user’s device identity and does not share
identifiable information with the cloud.
Building a Contact Tracing Army
New York Governor Andrew Cuomorecently announced efforts by NY state to hire thousands
of contact tracers. The state’s contact tracing program is being developed with $10 million from former New York
City Mayor Michael Bloomberg and support from Johns Hopkins University. Cuomo stated that applicants will need to
go through a training program and pass an online exam before being granted the authority of contact tracer. The
state’s program will involve identifying COVID-19 positive individuals, interviewing them about contacts in the
previous two weeks, and then those contacts must isolate for two weeks.
By late April, calls for contact tracing had grown so loud that Congressman John
Garamendi introduced a bill that would “expand volunteer opportunities within AmeriCorps and the
Federal Emergency Management Agency”. Garamendi is the Co-Chair of the AmeriCorps, a nationwide volunteer force
created by former President Bill Clinton in 1993. The Orwellian bill –“Undertaking
National Initiatives to Tackle Epidemic Act”or the UNITE Act – would allow AmeriCorps
and FEMA to create a national contact-tracing corps.
“The coronavirus pandemic has put an unprecedented strain on our society, and our
nation requires a significant scaling of testing and contact tracing in order to flatten the curve and lift
stay-at-home orders,”
Garamendi stated.
Coincidentally, the UNITE Act lines up with recent calls for a contact tracing
“army”. The South Carolina Department of Health and Environmental Control called for more contact tracers in the
state. Dr. Joan Duwve, the Director of Public Health for DHEC, said being able to test someone rapidly was
necessary.“We need an army of contact tracers to respond in
a short time to someone who has a positive diagnosis,”Duwve said.
On the opposite side of the country, California Governor Gavin Newsom has partnered
with the University of California, Los Angeles and the University of California, San Francisco to train more than
3,000 employees to become “coronavirus detectives“. During a live streamed press conference Newsom described the
efforts as a training academy designed to build an “army” of 20,000 people who can test, trace, and isolate people who may be infected.
Sonia Angell, California Department of Public Health director and State Health Officer, also stated that the new
contact tracing program will be connected to California’s existing digital disease surveillance platform. Angell
claims the database will be confidential.
The push for international contact tracing programs has also blossomed in nations
like South Korea and China, who are praised for their aggressive approaches to slowing the growth of the virus.
Forbes noted that South Korea has had a massive drop in COVID-19
diagnoses largely due to “mass rapid testing and comprehensive digitally-enabled contact tracing”. South Korea has
also used GPS phone tracking, CCTV cameras, credit card transaction monitoring, and automated text alerts as part
of a comprehensive universal contact tracing program.
The Chinese government approach is what you would expect from a totalitarian
communist state: an all encompassing app that pretty much “controls your
life.” Bloomberg describes China’s contact tracing app as a “public-private ‘health code’
system” which issues one of three risk assessments in the form of a colored QR code.“A green QR code, which denotes a low risk of having the virus, is the general default, while coming
into contact with an infected person can trigger a yellow code and a mandatory quarantine. Red is for a likely
or confirmed case,”Bloombergreported.It
does not take an extremely paranoid mind to see how this system could be easily abused.
The Indian government recently launched their contact tracing app
– Aarogya Setu – which quickly became the fastest downloaded
app on record, with more than 83 million users. Although India is not the first nation to implement a
nationwide contact tracing program, the nation lacks strong privacy and data protection laws for its more
than 1.3 billion citizens. The Guardian reported that the pandemic is being “used as a pretext to erode privacy and
freedom of speech in the name of ‘winning the war’ against coronavirus.” In April The Guardian revealed that a draft government memo explained how the data
gathered by the contact-tracing app could be “de-anonymized” by government officials.
Israel’s attempted grab for tyrannical health surveillance powers were recently
hampered by a decision from the Supreme Court which banned the intelligence community from
tracing the phone location of those infected with COVID-19. The Israeli Shin Bet service was
given emergency powers through the end of April before the court warned of a “slippery slope” where the
surveillance tool could be used against innocent individuals. Whitney Webb recently reported that at least three tech companies involved in the build out
of the “coronavirus surveillance system” have connections to Israel’s government and the usual Big Tech
players.
Following The Orders of the WHO
In early April, Dr. Michael Ryan, the head of the
World Health Organization’s team responsible for the international containment and treatment of
COVID-19, called for looking into families to find potentially sick individuals and isolate them from their
families.
“Due to lock down, most of the transmission that is actually happening in many
countries now is happening in the household at a family level,”Ryan
stated. “In some senses, the transmission has actually been taken off the streets
and pushed back into family units… Now we need to go and look into families, and find those people
who are sick and remove them and isolate them in a safe and dignified manner.”
Ryan was also involved in the now-infamous Event 201, a global
pandemic simulation, conducted on October 18, 2019, funded by the Bill and Melinda Gates Foundation, the World
Economic Forum, and John Hopkins University Center for Health Security.
Ryan’s bio states that “from November 2013 to October 2014 he worked with GPEI as Middle East
Polio Response Coordinator” and partnered with the Bill and Melinda Gates Foundation (among others) for a
vaccination program which reached 25 million children in eight target countries as part of 44 mass polio
vaccination campaigns.
Ironically enough, the WHO released a document in 2019 which states that under no
circumstances should contract tracing be used. The document, first
reported on by independent researcher Kenny Palurintano, details the WHO’s views on
Non-pharmaceutical intervention (NPI) in response to a pandemic. In section 6.1, “Contact Tracing,” under “quality
of evidence”, it states, “There is a very low overall quality of evidence that contact tracing has an unknown
effect on the transmission of influenza.” Additionally, under the “Executive Summary”, in Table 1, the WHO
lists contact tracing under the heading “Not Recommend In Any Circumstances”.
Despite the WHO’s own documents denying the validity of contact tracing, officials
in Ventura County are heeding the call of WHO official Dr. Michael Ryan. At a May 4 press conference, Ventura County
Public Health Director Dr. Robert Levin said those who live in homes where they could expose family members to
COVID-19 could be removed from their homes and moved into other health facilities.
“We also realize that as we find more contacts, some of the people we find are
going to have trouble being isolated. For instance, if they live in a home where there is only one bathroom and
there are three or four other people living there, and those people don’t have COVID infection, we’re not going to
be able to keep the person in that home,”Levin stated.“Every person who we’re isolating, for instance, needs to have their own bathroom.And so we’ll
be moving people like this into other kinds of housing that we have available.”
The Ventura County Public Health board did not elaborate on what other kinds of
housing might be made available to those unable to quarantine at home.
If there is a silver lining to the growing support for contact tracing, it might be
the public’s own hesitance to join. According to Forbes, nation-states need about 60 percent of their population to adopt
and regularly use the tool for it to be effective. Forbes reports that most cities are not likely to achieve 60% or
even 40% compliance. Unfortunately,Forbesreminds
us,“It’s a relentless fight. Andit takes an army of tracers.”
Forbes also notes that cities will need to “force changes of behavior” before reopening society.
“Contact-tracing apps are being seen as one of the conditions of ending
lockdowns—mandating and enforcing their use might become a logical next
step.“
How exactly the cities, states, and nations will enforce the use of contact tracing
apps remains to be seen, but we are already seeing a rise in reports of arrests of individuals who violate orders
to close businesses, stay home, and practice social distancing. What should we expect to see when an individual or
an entire community chooses to opt-out of contact tracing surveillance programs?
It is important to understand that contract tracing is only one part of an overall
strategy which poses a danger to liberty and privacy. In addition to creating mobile apps which snitch on you,
Apple, Facebook and Google are also sharing data
with the government to help determine if the public is following social distancing guidelines.
MIT Technology Review reported that at least one company is selling an app that uses machine
learning Artificial Intelligence to monitor social distancing. Meanwhile, Reuters reported that Amazon is using similar software to enforce social distancing
between their warehouse staff. There are also reports of “pandemic drones” flying above the skies of Connecticut
and Maryland to monitor social distancing and take temperatures.
Together these technologies represent the foundation of the Technocratic State,
built on top of the fears of a public which has been conditioned to accept any and all relief from the terrifying
round-the-clock coverage of the COVID-19 pandemic. If the public accepts the COVID1984 Technocracy in the name of
“getting back to normal” it’s likely the world we have known will be regarded as a relic of a past era, a quaint
idea of what life was like and what it could be, if only the public could defeat the new invisible enemy, COVID19.
However, it’s important to understand the institutions which are benefitting from the current pandemic. Only by
acknowledging the true power players – those who maneuver behind the scenes to profit and enslave – can the free
hearts and minds of the world defeat the true enemy: COVID-1984.
H.R.
6666: $100 Billion Dollar Contact Tracing Bill About
Controlling/Tracking Population Ben Swann | May 12, 2020
A House resolution from Illinois Democrat Rep. Bobby Rush that would put Big Government in charge
of tracking citizens’ movements as they relate to COVID-19 mitigation efforts — even sending health
bureaucrats to “individuals’ residences,” “as necessary,” as the legislation states
Steve Watson & Paul Joseph Watson Prisonplanet.com July 25, 2011
The general counsel of the
National Security Agencyt
estified to a Senate hearing yesterday that he believes
the agency has the authority to track Americans via cell phones.
“There are certain circumstances where that authority may exist,” said Matthew
Olsen the current nominee to head up the National Counterterrorism Center.
Olsen made the comments to the Senate Select Committee on Intelligence as Sen. Ron
Wyden (D., Ore.) repeatedly asked if the government has the authority to “use cell site data to track the location
of Americans inside the country.”
Olsen added that the reason his answer was not definitive was that “it is a very
complicated question”, assuring the committee that the NSA would provide more information in a future
memo.
Sen. Wyden recently wrote (full letter below) to the Director of National
Intelligence demanding to know whether the CIA and the NSA “have the authority to collect the geolocation
information of American citizens for intelligence purposes.”
“If yes, please explain the specific statutory basis for this authority,” the
letter, co signed by Sen. Mark Udall (D., Colo.) states.
The Senators also requested information on how many Americans have been monitored
under authority granted by 2008 legislation amending the Foreign Intelligence Surveillance Act. “Have any
apparently law-abiding Americans had their communications collected by the government?” the letter asks.
Two months ago Wyden expressed concern that the law relating to surveillance is
unclear. “The law is being secretly interpreted by the executive branch” Wyden noted.
Along with Congressman Jason Chaffetz (R., Utah), Wyden has introduced a joint
bill that would force any government agency to secure a search warrant and show probable cause before tracking the
location of any American.
The issue of cell phone tracking blew up earlier this year when it was revealed
that computer researchers discovered a hidden file that allows Apple to track the location of iPhone and iPad
users. Google’s collection of location from cellphones has also been open to question.
As we have previously highlighted, however, since October 2001, the FCC has
mandated that all wireless carriers track the location of their users down to within 50 feet.
Under the 1996 Telecommunications Act, the FCC mandated that by October 1, 2001 a
quarter of all new cellphones be equipped with GPS functionality that would allow authorities to track the location
of users. By the end of 2002, this became a mandatory requirement of allnew cellphones.
As
Geek.com reported back in October 2001, “Because cellphone
calls to 911 (estimated at around 140,000 per year) do not give the 911 operator location information, the
FCC mandated that wireless companies “be able to locate 67 percent of callers to 911 within 50 meters that
elect the handset solution while those using network technology must be able to locate the caller within 100
meters.” Wireless companies must also have one-quarter of the new cellphones they offer equipped to provide
that location information by the end of the year, and all new cellphones so equipped by the end of next
year.”
As
a PC World article written in August 2001, two months
before the first phase of the new FCC rules were enacted, asked, “The FCC requires cell phone companies to
track you, in order to find you when you call 911–but what about your privacy?”
“Cell phone tracking was propelled by the Federal Communications Commission, which
adopted enhanced 911 rules to cover wireless services. For E911′s first phase, cellular carriers must be able to
pinpoint, to the nearest cell tower, the location of someone calling 911. For Phase II, carriers must be able to
pinpoint a 911 caller’s location to within 50 to 300 meters,” states the article.
Your cellphone has been tracking you in real time for the lion’s share of the last
decade, so why has it taken the media nearly 10 years to notice? Because in 2001, when such measures could have
been made illegal, there was no iPhone, there was no app store, and the smart phones being used were extremely
crude compared to today’s models, which are no less than mini-laptops.
In 2001, cellphones did little else than make calls and send text messages – these
services didn’t require GPS technology. People weren’t addicted to their cellphones like they are today, they
didn’t use them to catalogue, record and process every aspect of their existence.
The likes of Apple have worked hard over the last decade to make hundreds of
millions of people dependent on their gadgets, creating an army of addicts who couldn’t care less that their
cellphone is transmitting their every move directly to Steve Jobs. In their eyes, the choice between sacrificing
their privacy and sacrificing their precious “apps” is an easy one to make. Privacy can’t book a table at a
restaurant in a few taps of a finger, nor can it tell you the weather forecast or where the nearest ATM is
located.
If the debate had been allowed to run its course in 2001, when cellphone tracking
was first being adopted, the outcome may have been different. But since cellphone companies have been tracking
their users for the best part of a decade, in line with government mandates, the recent controversy is merely part
of the acclimatization process to achieve calm subservience and acceptance of the fact that true privacy is
dead, and as Henry Blodget explains,
Apple’s omnipresent brainwashing campaign has helped keep the outrage to a minimum.
Sen. Ron Wyden’s letter inquiring over tracking of Americans by federal
intelligence agencies:
July 14, 2011
The Honorable James R. Clapper, Jr. Director of National Intelligence
Washington, DC 20511
Dear Director Clapper:
In the coming months Congress is likely to consider various legislative
initiatives that would modify different aspects of domestic surveillance law. We believe that the debate over these
initiatives will be better informed if Congress and the public are provided with more unclassified information
about how these initiatives will affect current intelligence authorities and activities.
The FISA Amendments Act of 2008 significantly modified the US government’s
surveillance authorities with regard to individuals believed to be located outside the United States. These new
authorities are currently scheduled to expire in late 2012, and Congress could begin considering possible
extensions or revisions to these authorities later this year. Since any thorough consideration will require an
understanding of how the FISA Amendments Act has been interpreted and implemented, we ask that you provide
unclassified answers to the following questions:
• In a December 2007 Statement of Administration Policy on the FISA Amendments
Act, the Office of Management and Budget said that it would “likely be impossible” to count the number of people
located in the United States whose communications were reviewed by the government pursuant to the FISA Amendments
Act. Is this still the case? If so, is it possible to estimate this number with any accuracy?
• Official documents released in 2010 noted that there have been multiple
incidents in which intelligence agency personnel have failed to comply with the FISA Amendments Act, and that
“Certain types of compliance incidents continue[d] to occur.” Please elaborate on these compliance incidents to the
extent possible, and explain why you believe that they have continued to recur.
• Have any apparently law-abiding Americans had their communications collected
by the government pursuant to the FISA Amendments Act?
• Are any significant interpretations of the FISA Amendments Act currently
classified?
Turning to another area of surveillance law, recent advances in geolocation
technology have made it increasingly easy to secretly track the movements and whereabouts of individual Americans
on an ongoing, 24/7 basis. Law enforcement agencies have relied on a variety of different methods to conduct this
sort of electronic surveillance, including the acquisition of cell phone mobility data from communications
companies as well as the use of tracking devices covertly installed by the law enforcement agencies
themselves.
Unfortunately, the law has not kept up with these advances in technology. As a
result, courts in different jurisdictions have issued diverse, conflicting rulings about the evidence and
procedures required for the government to surreptitiously track an individual’s movements using a mobile electronic
device. Congress is now considering multiple legislative proposals that would attempt to establish clear rules for
this sort of surveillance and will need to determine at some point whether it is necessary to update the laws that
apply to intelligence investigations as well as the laws that apply to law enforcement
investigations.
While there is a substantial amount of public information available regarding
different interpretations of this area of the law (including the executive branch’s interpretation and the
interpretations of various courts) all of these interpretations apply to law enforcement authorities, not
intelligence authorities. Clearly Congress needs to also understand how intelligence authorities are being
interpreted as it begins to consider legislation on this issue. For this reason, we request that you also provide
unclassified answers to the following questions:
• Do government agencies have the authority to collect the geolocation
information of American citizens for intelligence purposes?
• If yes, please explain the specific statutory basis for this authority. And
to the extent that this statutory basis imposes any procedural requirements, such as judicial review or approval by
particular officials, please describe these requirements.
• If no, please explain the statutory basis for this
prohibition.
Thank you for your attention to this matter. We look forward to your prompt
response.
Sincerely,
Ron Wyden Mark Udall United States Senator United States
Senator
TRACKABLE SOCIETY
FBI Will Have Up To One Third Of
Americans On Biometric Database By Next Year
Privacy group warns “even if you have never been
arrested
you could be implicated as a criminal suspect”
Steve Watson
Infowars.com
April 15, 2014
A leading privacy watchdog has warned that the FBI
plans to have up to a third of all Americans on a facial recognition database by next year.
The Electronic Frontier Foundation notes in a communique that some 52 million Americans
could be on the Next Generation Identification (NGI) biometric database by 2015, regardless of whether they have
ever committed a crime or been arrested.
The group managed to obtain information pertaining to the program via a freedom of information request.
The database will also hold fingerprints, of which the FBI has around 100 million records, as well as retina
scans and palm prints. Profiles on the system will contain other personal details such as name, address, age and
race.
The system will be capable of searching through millions of facial records obtained not only via mugshots, but
also via so called “civil images”, the origin of which is vague at best.
“[T]he FBI does not define either the ‘Special Population Cognizant’ database or the ‘new repositories’
category.” The EFF writes. “This is a problem because we do not know what rules govern these categories, where the
data comes from, how the images are gathered, who has access to them, and whose privacy is impacted.”
A map within the EFF’s piece shows which states are
already complying with the program, and which ones are close to agreeing deals to do so.
The EFF notes that currently, the FBI has access to fingerprint records of non-criminals who have submitted them
for any kind of background check, by an employer or government agency. Going forward, however, all records, both
criminal and non-criminal will be stored on the same database.
“This means that even if you have never been arrested for a crime, if your employer requires you to submit a
photo as part of your background check, your face image could be searched – and you could be implicated as a
criminal suspect, just by virtue of having that image in the non-criminal file,” notes the EFF.
EFF points to a disturbing assertion from the FBI that it will not “make positive identifications,” via the
database, but will use it to produce “investigative leads.” The Feds claim that “Therefore, there is no false
positive [identification] rate.”
“[T]he FBI only ensures that “the candidate will be returned in the top 50 candidates” 85 percent of the time
“when the true candidate exists in the gallery.”” EFF states.
“It is unclear what happens when the “true candidate” does not exist in the gallery—does NGI still return
possible matches?” the feature asks, noting that those identified could potentially be subjected to criminal
investigation purely because a computer has decided that their face is similar to a suspect’s.
EFF continues: “This doesn’t seem to matter much to the FBI—the Bureau notes that because ‘this is an
investigative search and caveats will be prevalent on the return detailing that the [non-FBI] agency is responsible
for determining the identity of the subject, there should be NO legal issues.’”
“This is not how our system of justice was designed and should not be a system that Americans tacitly consent to
move towards,” the EFF piece concludes.
It is somewhat remarkable that when Google announced the release of its Glass product, it was forced to
ban applications with the capability for facial recognition due to a huge privacy
backlash. The Federal government, however, continues to use such technology unhindered to create biometric
profiles on anyone and everyone.
The Department of Homeland Security also has its own facial recognition program, which it routinely outsources to police departments. Meanwhile, new innovations in facial recognition
technology continue to be billed as potential tools for law enforcement, including the prediction of future crime.
—————————————————————-
Steve Watson is a London based writer and editor for Alex Jones’ Infowars.com, andPrisonplanet.com. He has a Masters Degree in International Relations from the School of
Politics at The University of Nottingham, and a Bachelor Of Arts Degree in Literature and Creative Writing from
Nottingham Trent University.
This article was posted: Tuesday, April 15, 2014 at 12:20 pm
“This is the future if nothing is done to stop it,” is the
ominous way
The Atlantic describes the recent Big Brother tactics used by LA County Sheriffs to “police” areas such as
Compton. Residents were unaware (“A lot of people do have a problem with the eye in the sky, the Big
Brother, so to mitigate those kinds of complaints we basically kept it pretty hush hush“)that, as the
police stated, “we literally watched all of Compton during the times that we were flying, so we could zoom in
anywhere within the city of Compton and follow cars and see people,” as they trialled a new system which if
adopted, would mean Americans can be policed like Iraqis and Afghanis under occupation. As
The Atlantic concludes, the sheriff didn’t conclude that the “wide area surveillance” wouldn’t be like
Big Brother after all, just that Big Brother capabilities would help to solve more crimes… so why not
tryout mass surveillance?
In a secret test of mass surveillance technology, the Los Angeles
County Sheriff’s Department sent a civilian aircraft over Compton, California, capturing high-resolution video of
everything that happened inside that 10-square-mile municipality.
Compton residents weren’t told about the spying, which happened in 2012. “We literally watched all of
Compton during the times that we were flying, so we could zoom in anywhere within the city of Compton and follow
cars and see people,” Ross McNutt of Persistence Surveillance Systems told the Center for
Investigative Reporting, which unearthed and did the first reporting on this important story. The technology
he’s trying to sell to police departments all over America can stay aloft for up to six hours. Like Google Earth,
it enables police to zoom in on certain areas. And like TiVo, it permits them to rewind, so that they can look back
and see what happened anywhere they weren’t watching in real time.
If it’s adopted, Americans can be policed like Iraqis and Afghanis under occupation…
…
Sgt. Douglas Iketani acknowledges that
his agency hid the experiment to avoid public opposition. “This
system was kind of kept confidential from everybody in the public,”he said. “A lot of people do have a problem with
the eye in the sky, the Big Brother, so to mitigate those kinds of complaints we basically kept it pretty hush
hush.” That attitude ought to get a public employee summarily terminated.
“Our first initial thought was, oh, Big Brother, we’re going to have a camera flying over us. But with the
wide area surveillance you would have the ability to solve a lot of the unsolvable crimes with no witnesses, no
videotape surveillance, no fingerprints.”
Notice that he didn’t conclude that the “wide area surveillance” wouldn’t be like Big Brother after all,
just that Big Brother capabilities would help to solve more crimes.
So why not try them out?
He later explains that while the public may think its against this, we’ll get used to it:
I’m sure that once people find out this experiment went on they might be a little upset. But knowing that we
can’t see into their bedroom windows, we can’t see into their pools, we can’t see into their showers. You know,
I’m sure they’ll be okay with it. With the amount of technology out in today’s age, with cameras in ATMs, at
every 7/11, at every supermarket, pretty much every light poll, all the license plate cameras, the red light
cameras, people have just gotten used to being watched.
Many Americans elect their own sheriffs. This is the future if
nothing is done to stop them.
This article was posted: Monday, May 5, 2014 at 5:45 am
The US intelligence whistleblower
Edward Snowden has warned that entire populations, rather than just individuals, now live under constant
surveillance.
“It’s no longer based on the traditional practice of targeted taps based on some
individual suspicion of wrongdoing,” he said. “It covers phone calls, emails, texts, search history, what you
buy, who your friends are, where you go, who you love.”
Snowden made his comments in a short video that was played before a debate on the proposition
that surveillance today is a euphemism for mass surveillance, in Toronto, Canada. The former US National
Security Agency contractor is living in Russia, having been granted temporary asylum there in June 2013.
Secret 'Minority Report' Tech In All Post-2010
iPhones
Apple installed secret 'Minority Report' tracking technology in all iPhones from 2010 and only
just told you about it.
Cell Phones Are
Tracking Devices That Governments, Police, Big Corporations And Stalkers Can Use To Easily Track Your
Movements
If you regularly carry a cell phone around with you, you might as well
say goodbye to your privacy. The truth is that any cell phone
you buy is going to track you wherever you go 24 hours a day.
Just as you leave "footprints" wherever you go on the Internet, so also your cell phone is constantly
recording wherever you go in the physical world. Most people do
not realize this, but the reality is that cell phones are tracking devices that governments, law
enforcement authorities, big corporations and even stalkers can use to easily track your
movements. If you do not know about this yet, then you are
going to be absolutely amazed by what you are about to read.
Not only do cell phones track you wherever you go, they can also be used to listen to your private
conversations even when they areturned
off. We live in a
brave new world, and there are a lot of control freaks out there that love to monitor where we go and what
we do. Unfortunately, it seems like every time technology
advances, we lose a little bit more privacy. Eventually, we may
wake up someday in a world where there is absolutely no privacy left.
On Black Friday, two U.S. shopping malls started
actively using the FootPath Technology tracking system to monitor their customers.
This system captures the unique identification
number that is assigned to each phone, and thus it enables the malls to constantly monitor what stores their
customers enter.
The malls are putting up signs that warn customers
about this system and that instruct them that they can "opt out" by turning off their cell phones.
But should we really have to "opt out" in order to
maintain our privacy?
A new article postedon CNN described the
"test" that will be running for the rest of the year at these malls....
Starting on Black Friday and running through New Year's Day, two U.S.
malls -- Promenade Temecula in southern California and Short Pump Town Center in Richmond, Va. -- will track
guests' movements by monitoring the signals from their cell phones.
While the data that's collected is anonymous, it can follow shoppers'
paths from store to store.
The goal is for stores to answer questions like: How many Nordstrom
shoppers also stop at Starbucks? How long do most customers linger in Victoria's Secret? Are there unpopular
spots in the mall that aren't being visited?
It is being argued that since our movements on the
Internet are tracked, we should not object when our movements in the physical world are tracked.
But if we say this is okay, where will it all
end?
Will we eventually live in a world that makes the
movie "Minority Report" look tame by comparison?
So exactly how intrusive is the FootPath Technology
tracking system?
It works like this: A network of monitoring units are set up across a mall
to track shoppers’ cellphone signals, locating them within a couple of meters. The data is then fed to a
central processing center. Afterwards, management can gain insight into their customers’ shopping habits,
letting them know which stores complement each other or which pathways have the most foot traffic so they can
allocate their maintenance crews and ad posters accordingly.
It is not as intrusive as it could be. But the
thing is, once you give these control freaks an inch, eventually they will take a mile.
In fact, governments all over the world are already
using cell phones to track down "enemies of the state".
For example, a recentBloomberg article described how the government of Iran is aggressively using cell phones to crack down on
dissidents....
The Iranian officers who knocked out Saeid Pourheydar’s four front teeth
also enlightened the opposition journalist. Held in Evin Prison for weeks following his arrest early last year
for protesting, he says, he learned that he was not only fighting the regime, but also companies that armed
Tehran with technology to monitor dissidents like him.
Pourheydar, 30, says the power of this enemy became clear as intelligence
officers brandished transcripts of his mobile phone calls, e-mails and text messages during his detention.
About half the political prisoners he met in jail told him police had tracked their communications and
movements through their cell phones, he says.
Christians in Iran have learned that they must take
the batteries entirely out of their cell phones before they gather at their secret meeting places. Otherwise, the
secret police are likely to show up and drag them off to prison.
Eventually, most of the governments on earth will
be utilizing these kinds of capabilities.
In the United States, cell phone companies are
actually required by law to be able to pinpoint the locations of their customers to within 100 meters. Of course
most cell phone providers are able to track their customers much more accurately than that.
Law enforcement authorities all over the U.S. are
already using cell phones to track the locations of criminal suspects and to listen to their
conversations.
Even if a cell phone is completely turned off, law
enforcement authorities can still listen in on the conversations that a suspect is having. All that is necessary is
for the battery to still be in the cell phone.
Accordingto CNET News, the FBI can
remotely activate the microphone on your cell phone and listen to whatever you are saying....
The FBI appears to have begun using a novel form of electronic
surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to
eavesdrop on nearby conversations.
The technique is called a "roving bug," and was approved by top U.S.
Department of Justice officials for use against members of a New York organized crime family who were wary of
conventional surveillance techniques such as tailing a suspect or wiretapping him.
When you make a telephone call, it is never
private. The reality is that the NSA has been monitoring all phone calls for years and years.
Accordingto USA Today, the NSA
intends "to create a database of every call ever made"....
The National Security Agency has been secretly collecting the phone call
records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth, people with
direct knowledge of the arrangement told USA TODAY.
Isn't that a bit sobering?
But it isn't just the federal government that is
using cell phone information for law enforcement purposes.
In some areas of the United States, law enforcement
authorities are pulling data out of cell phones for no apparent reason whatsoever.According to the ACLU,
state police in Michigan are now using "extraction devices" to download data from the cell phones of motorists
that they pull over. This is happening even if the motorists that are pulled over are not accused of doing
anything wrong.
The following is how an
articleon CNET News described the capabilities of these "extraction devices"....
The devices, sold by a company called Cellebrite, can download text
messages, photos, video, and even GPS data from most brands of cell phones. The handheld machines have various
interfaces to work with different models and can even bypass security passwords and access some
information.
Would you want the police doing that to
you?
Sadly, it is even incredibly easy for hackers and
stalkers to tap into your cell phone these days.
The following short excerpt comes from a news
storyposted by WTHR....
Spyware marketers claim you can tap into someone's calls, read their text
messages and track their movements "anywhere, anytime." They say you can "catch a cheating spouse", protect
your children from an evil babysitter and "hear what your boss is saying about you." And while you're spying on
others, the Spyware companies say "no one will ever know" because it's supposed to be "completely invisible"
with "absolutely no trace."
Security experts say it's no internet hoax.
"It's real, and it is pretty creepy," said Rick Mislan, a former military
intelligence officer who now teaches cyber forensics at Purdue University's Department of Computer and
Information Technology.
Mislan has examined thousands of cell phones inside Purdue's Cyber
Forensics Lab, and he says spy software can now make even the most high-tech cell phone
vulnerable.
For even more on what hackers and stalkers can do
to your cell phone, just check outthis amazing video.
This is just another sign that we are rapidly
becoming a "Big
Brother" society where virtually everything that we do is watched,
listened to, tracked or monitored.
But even with the advanced capabilities that they
now have, the control freaks that run things are going to want to push things even further in the
future.
For example, not all of us carry a cell phone with
us wherever we go.
So how will they track the rest of us?
Implanting a microchip in all of us would make
identification and tracking of the population so much easier.
How soon will it be before that idea starts getting
pushed to the forefront?
We can all see where all of this is
headed.
When George Orwell wrote "1984", a lot of people
believed that it was impossible for our world to end up like that.
Well, the technology for a world that is far more
repressive than "1984" is being put into place. Every single day, we lose a little bit more privacy. We are
constantly being told that we need to sacrifice just a "little bit" of liberty and freedom for the good of national
security.
The world is changing. All of us better wake
up.
For most of human history, the vast majority of
people have lived under repressive governments.
Today, liberty and freedom are being pushed back in
every corner of the globe.
Unless this trend is reversed, most of humanity
will once again end up living under deep tyranny. Only this time, the "authorities" will be equipped with "Big
Brother technology" unlike anything that the world has ever seen before.
Do not take liberty and freedom for
granted.
Once they are gone, they will be incredibly
difficult to get back.
Mastering The Human
Domain
Who You Are – Collected information includes names, addresses, biometrics,
social media accounts .
What You Do – Travel history, communications, financial transactions and
movement of physical assets.
Who You Know – Relational information including family, friends, associates
and organizations.
Context – Contextual data such as demographics, politics, cultural norms
and religion.
Acloser look at the
upcoming Jade Helm military exercise, specifically its “master the human domain” motto, reveals a larger agenda in
regards to domestic policy.
...“They’re building an infrastructure of tyranny,” stated Infowars David Knight.
“There’s a legal infrastructure with things like the NDAA, there’s a technical
infrastructure with things like the capability to do dragnet surveillance, and then of course there is going to be
a military and law enforcement infrastructure, and those are merging.”
Created by cell phones, power lines, computers and microwaves, as well as other
electronic and magnetic devices, EMFs [Electromagnetic Fields] wreck havoc on the body. These fields induce brain
fog, forgetfulness, anxiety, depression and chronic fatigue in those who are sensitive...Linked with cancer,
Alzheimer's, multiple sclerosis, chronic fatigue, miscarriage and a host of other devastating diseases,
electromagnetic fields (EMFs) are a serious modern concern. And exposure is almost impossible to avoid. But with
diet and a measure of awareness, the dangers of EMFs can be reduced.
The Truthseeker: 'Casualty
catastrophe':
Cell Phones And Child Brains
(E26)
Insurers stop covering for cell phone use, called the next 'casualty catastrophe' after tobacco
and asbestos; phone manufacturers hit with a class action and personal lawsuits; and the warning deep inside your
mobile. Seek truth from facts with Ellie Marks, whose husband Alan is suing the industry for his brain tumor, 'cell
phone survivor' Bret Bocook, leading radiation biologist Prof. Dariusz Leszczynski, Microwave News editor Dr. Louis
Slesin, Storyleak editor Anthony Gucciardi, and former senior White House adviser Dr. Devra Davis. Read the full
transcript here http://on.rt.com/jnaahv
"It's essentially cooking the
brain"
Keith L. Black American neurosurgeon specializing in the treatment of brain
tumors and a prolific campaigner for funding of cancer treatment
The National Security Agency and its UK counterpart GCHQ have been
developing capabilities to take advantage of “leaky” smartphone apps, such as the wildly popular Angry Birds
game, that transmit users’ private information across the internet, according to top secret documents.
The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from
phone model and screen size to personal details such as age, gender and location. Some apps, the documents state,
can share users’ most sensitive information such as sexual orientation – and one app recorded in the material even
sends specific sexual preferences such as whether or not the user may be a swinger.
Many smartphone owners will be unaware of the full extent this information is being shared across the internet,
and even the most sophisticated would be unlikely to realise that all of it is available for the spy agencies to
collect.
If you own a cell phone, you
might as well kiss your privacy goodbye. Cell phone companies know more about us than most of us would
ever dare to imagine. Your cell phone company is tracking everywhere that you go and it is making a
record of everything that you do with your phone. Much worse,
there is a good chance that your cell phone company has been selling this information to anyone that is
willing to pay the price – including local law enforcement. In addition, it is an open secret that the
federal government monitors and records all cell phone calls. The “private conversation” that you are
having with a friend today will be kept in federal government databanks for many years to come. The
truth is that by using a cell phone, you willingly make yourself a prisoner of a digital world where every
move that you make and every conversation that you have is permanently recorded. But it is not just cell
phone companies and government agencies that you have to worry about. As you will see at the end of this
article, it is incredibly easy for any would-be stalker to hack you and track your every movement using your
cell phone. In fact, many spyware programs allow hackers to listen to you through your cell phone even
when your cell phone is turned off. Sadly, most cell phone users have absolutely no idea about any of
this stuff.
The next time that you get a notice from your cell phone company about “changes”
to the privacy policy, you might want to play close attention. Your cell phone company might be about to sell
off your most personal information to anyone that is willing to write a big enough check. The following is
from a recent CNN article….
Your phone company knows where you live, what websites you visit, what apps you
download, what videos you like to watch, and even where you are. Now, some have begun selling that valuable
information to the highest bidder.
In mid-October, Verizon Wireless changed its privacy policy to allow the company
to record customers’ location data and Web browsing history, combine it with other personal information like age
and gender, aggregate it with millions of other customers’ data, and sell it on an anonymous basis.
So who is buying this information?
We just don’t know.
But we do know that local law enforcement agencies all over the country are
increasingly using cell phone data to nail suspects, and often it is the cell phone companies that are the ones
selling them the cell phone data that they need.
According to a recent New York Times article,
many local police departments are doing this without getting a warrant first….
“Law enforcement tracking of cellphones, once the province mainly of federal
agents, has become a powerful and widely used surveillance tool for local police officials, with hundreds of
departments, large and small, often using it aggressively with little or no court oversight.”
That same article says that cell phone companies have standard prices that they
charge to local law enforcement officials for information that they request….
“Cell carriers, staffed with special law enforcement liaison teams, charge police
departments from a few hundred dollars for locating a phone to more than $2,200 for a full-scale wiretap of a
suspect.”
So if you are breaking the law, your cell phone may be used to gather evidence and
to track you down. In the United States, cell phone companies are required by law to be able to pinpoint the
locations of their customers to within 100 meters. So if you are a
criminal, your cell phone could be leading the police right to you even as you are reading this article.
Sometimes the police don’t even use the cell phone companies.
Recently, the Wall Street Journal ran an article that discussed the capabilities of the “stingray devices” that many local
law enforcement agencies are using now.
A “stingray device” acts like a cell phone tower and it can gather any information
that a normal cell phone tower can. The following is how a recent Wired article described these “stingrays”….
You make a call on your cellphone thinking the only thing standing between you and
the recipient of your call is your carrier’s cellphone tower. In fact, that tower your phone is connecting to just
might be a boobytrap set up by law enforcement to ensnare your phone signals and maybe even the content of your
calls.
So-called stingrays are one of the new high-tech tools that authorities are using
to track and identify you. The devices, about the size of a suitcase, spoof a legitimate cellphone tower in order
to trick nearby cellphones and other wireless communication devices into connecting to the tower, as they would to
a real cellphone tower.
The government maintains that the stingrays don’t violate Fourth Amendment rights,
since Americans don’t have a legitimate expectation of privacy for data sent from their mobile phones and other
wireless devices to a cell tower.
Isn’t that just great?
The attitude that law enforcement agencies seem to have is that once we use a cell
phone we are essentially willingly throwing our Fourth Amendment rights out the window.
In some areas of the United States, police are physically extracting data from
cell phones any time they want as well. According to the ACLU,
state police in Michigan have been using “extraction devices” to download data from the cell phones of motorists
that they pull over. This is taking place even if the motorists that are pulled over are not accused of
doing anything wrong. The following is how an article posted on CNET News describes the capabilities of these “extraction devices”….
The devices, sold by a company called Cellebrite, can download text messages,
photos, video, and even GPS data from most brands of cell phones. The handheld machines have various interfaces to
work with different models and can even bypass security passwords and access some information.
Fortunately these “extraction devices” are being challenged in court. Let us
hope that they will be banned.
But what local law enforcement officials are doing pales in comparison to what
federal agencies are doing.
Not only that, the FBI has also been remotely activating the microphones on the cell phones of suspects that they want to listen to. This
can be done even when the cell phone is turned off….
The FBI appears to have begun using a novel form of electronic surveillance in
criminal investigations: remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby
conversations.
The technique is called a “roving bug,” and was approved by top U.S. Department of
Justice officials for use against members of a New York organized crime family who were wary of conventional
surveillance techniques such as tailing a suspect or wiretapping him.
Could the FBI be listening to you right now?
If there is a cell phone in the room they could be.
But some other federal agencies listen to a lot more cell phone calls than the FBI
does.
It has been an open secret for a long time that the federal government monitors
and records all cell phone calls that are made for national security reasons.
In fact, the federal government is even trying to collect records for calls that
have been made in the distant past. Accordingto USA Today, the goal is
“to create a database of every call ever made”….
The National Security Agency has been secretly collecting the phone call records
of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth, people with direct
knowledge of the arrangement told USA TODAY.
In addition, the federal government has been constructing the largest data center
in the history of the world out in the Utah desert. This data center will be used to house an almost
unimaginable amount of digital data (including your cell phone calls). The following is
how a recent Wired article described this new facility….
Under construction by contractors with top-secret clearances, the blandly named
Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final
piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store
vast swaths of the world’s communications as they zap down from satellites and zip through the underground and
undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be
up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases
will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google
searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases,
and other digital “pocket litter.”
But isn’t it illegal for the federal government to intercept our phone
calls?
Well, the cold, hard reality of the matter is that they use all kinds of loopholes
and legal technicalities to get around that.
For example, if a call is “intercepted” outside of the United States and then
routed to a government building inside the United States that is considered to be okay.
Of course that is a bunch of nonsense, but that is how they think.
And it is very frightening thing for governments around the world to be able to
monitor and track us like this.
Increasingly, governments around the world are using cell phones to hunt down
people that they do not like and haul them off to prison. For example, a recent Bloomberg article detailed how the Iranian government is aggressively using cell phones to crack down on
dissidents….
The Iranian officers who knocked out Saeid Pourheydar’s four front teeth also
enlightened the opposition journalist. Held in Evin Prison for weeks following his arrest early last year for
protesting, he says, he learned that he was not only fighting the regime, but also companies that armed Tehran with
technology to monitor dissidents like him.
Pourheydar, 30, says the power of this enemy became clear as intelligence officers
brandished transcripts of his mobile phone calls, e-mails and text messages during his detention. About half the
political prisoners he met in jail told him police had tracked their communications and movements through their
cell phones, he says.
Christians in Iran have learned that they must take the batteries entirely out of
their cell phones before they gather for home church meetings. If they don’t take the batteries out of their
cell phones, there is a good chance that the secret police will show up and drag them off to prison.
Most Americans don’t need to worry about getting hauled off to prison for
political or religious reasons at this point, but there is another aspect of cell phone security that could
potentially affect all of us.
Most Americans are completely unaware of what stalkers can potentially do if they
are able to hack into a cell phone. For example, did you know that spyware can make it possible for a stalker
to monitor where you are 24 hours a day and listen to everything that you say even when your cell phone is turned
off? The following is from an article posted by WTHR….
Spyware marketers claim you can tap into someone’s calls, read their text messages
and track their movements “anywhere, anytime.” They say you can “catch a cheating spouse”, protect your children
from an evil babysitter and “hear what your boss is saying about you.” And while you’re spying on others, the
Spyware companies say “no one will ever know” because it’s supposed to be “completely invisible” with “absolutely
no trace.”
Security experts say it’s no internet hoax.
“It’s real, and it is pretty creepy,” said Rick Mislan, a former military
intelligence officer who now teaches cyber forensics at Purdue University’s Department of Computer and Information
Technology.
Mislan has examined thousands of cell phones inside Purdue’s Cyber Forensics Lab,
and he says spy software can now make even the most high-tech cell phone vulnerable.
For much more from WTHR about what stalkers can do to your cell phone, just check
out this amazing video.
It is one of the best news reports that I have ever seen.
Are you starting to see how your cell phone makes you a prisoner of a digital
world?
The police can listen to you and track you any time that they want to.
The federal government can listen to you and track you any time that they want
to.
Big corporations can buy all of the personal information that cell phones gather
any time that they want to from certain cell phone companies.
Stalkers can listen to you and track you 24 hours a day if they are able to hack
in to your cell phone somehow.
If you own a cell phone and you still want to have some privacy, then you need to
take the battery completely out of the cell phone when you are not using it.
Our world is becoming a much less private place, and we all need
to be mindful of the changes that are happening.
Unfortunately, as our world becomes even more interconnected and even more
dependent on technology, the amount of privacy we all have is likely to continue to decrease. A digital Big
Brother control grid is being constructed all around us, and in the future that control grid could potentially be
used for very malevolent purposes.
So let us be as wise as serpents and innocent as doves. Our world is
changing, and not for the better.
CONFIRMED:
NSA Records ALL Phone Calls Using
Project MYSTIC
CONFIRMED: NSA Records ALL Phone Calls in Project MYSTIC
***BACKGROUND REFERENCE***
Technocracy is a replacement economic system
for Capitalism and Free Enterprise, and is represented by the United Nations’ program for Sustainable Development
and “Green Economy.” It proposes that all means of production and consumption would be controlled by an elite group
of scientists and engineers (technocrats) for the good of mankind. Technocracy was originally architected in the
1930s but regained favor when adopted by the Trilateral Commission in 1973, under their “New International Economic
Order” program. https://www.technocracy.news/faq-2/
The Roots of Technocracy with Expert Patrick M.
Wood
Alex welcomes to the broadcast The August Forecast & Review Editor Patrick M. Wood to discuss
how the global elite within the Trilateral Commission are replacing capitalism with their own technocracy in
order to create a New International Economic Order. http://www.augustforecast.com/
Click Image
[TECHNOCRACY]
Exposing the Dark Agenda Behind the
"Resource-Based Economy"
24/7 surveillance. Smart grid controls. Carbon rationing. Today we talk to
"Technocracy Rising" author Patrick Wood about the hidden history of technocracy, the dark plan for
a resource-based economy that is being pushed by the Trilateral Commission, the UN, and other
globalist institutions in order to bring about a completely managed, controlled and regulated
society.
How Technocracy ENSLAVED The World - The REAL Deep
State
(with Patrick Wood)
World Alternative Media
Published on Jul 3, 2017
Josh Sigurdson sits down with author of 'Technocracy Rising' and
researcher Patrick Wood to talk about the most insidious groups of collectivists on
Earth... The technocrats. Patrick breaks down the power wielded by the technocrats
as they've incrementally risen to take over world policy going back to the 1930s.
Wood goes into the very real threat of a global centrally planned cashless society
implemented through the SDR. He also goes into the automation of jobs and who truly
benefits from the raise of minimum wages and guaranteed basic income.
Patrick then breaks down the beginning of the Trilateral
Commission. Of course Patrick co-wrote the book Trilaterals Over Washington in 1979
with writing partner Antony Sutton. From Henry Kissinger's illegal visit with Mao
Zedong to Zbigniew Brzezinski's hijacking of the Carter administration and
subsequent work with China in propping up the society as a technocratic one, the
Trilateral Commission has been right in the middle of all of it. As people commonly
talk about the "deep state", not many seem to know exactly what it is. The answer
is simple. The Trilateral Commission, The Council on Foreign Relations, The United
Nations and the global central banking cartel. Every president for decades, since
its inception have been deeply entrenched in the Trilateral Commission and CFR, if
not members themselves. This goes right up to current day! Trump's administration
is surrounded by Trilateral members and CFR members. This is incredibly important
information to get out to the populace and we at WAM truly hope people share this
around and help in the educational process because the mainstream media isn't going
to do it.
Description:
With meticulous detail and an abundance of original research,
Patrick M. Wood uses Technocracy Rising to connect the dots of modern globalization
in a way that has never been seen before so that the reader can clearly understand
the globalization plan, its perpetrators and its intended endgame.
Technocracy.News for more information and the book can be bought
here:
link
"Technocracy in America" by Parag Khanna
trailer
Dr. Parag Khanna
Published on Nov 30, 2016
Technocracy in America...because democracy just isn't good enough.
Available January 10th, 2017.
How The Shadow Banking System Will Create A Global
Currency - BLOCKCHAIN 2016
World Alternative Media
Published on Feb 29, 2016
This is a must watch! Host Josh Sigurdson and author John Sneisen
were joined by derivatives and economic trend expert Stephen Kendal for a
presentation that may just change the way we look at the world. Stephen brought us
groundbreaking information that no one is talking about basically breaking down
step by step how central bankers intend to impose a world currency on the populace
using blockchain derivatives. This analysis has never been done before for the
masses to see and understand.
Stephen Kendal started by explaining derivatives and the different
types of derivatives. From that, he moved on to basic mortgage loans, bundled
loans, S.P.E. (Special Purpose Entity) or S.P.V. (Special Purpose Vehicles),
mortgage backed security (M.B.S.), collateralized debt obligation (C.D.O.), credit
default swap (C.D.S.), other types of derivatives. Stephen then wrapped everything
up by explaining blockchain technology and the future implementation of blockchain
by central bankers.Stephen predicts that we will soon see this implementation as
the economy crashes and central banks capitalize on their lack of accountability.
Basically, the creation of a New World Order as has been pushed for decades by the
highest up elites will emanate itself with blockchain derivatives forever dooming
the world economy.This is historic, but not only that, it's disastrous and
terrifying.If we can all come to understand what's happening right now, we may be
able to stop this.
Share this report on all social medias and let's make sure people are aware of
what's happening!
A big thanks to Stephen Kendal for providing us with this report as
well as sharing his excellent slides with us!
In the heat of the Great Depression during the 1930s, prominent
scientists and engineers proposed a utopian energy-based economic system called
Technocracy that would be run by those same scientists and engineers instead of
elected politicians. Although this radical movement lost momentum by 1940, it
regained status when it was conceptually adopted by the elitist Trilateral
Commission (co-founded by Zbigniew Brzezinski and David Rockefeller) in 1973 to be
become its so-called “New International Economic Order.”
Patrick Wood: Technocracy Rising Interview (Part 1 of
3)
Tragedy and Hope
Published on Sep 11, 2015
Patrick Wood: Technocracy Rising Interview (Part 2
of 3)
Tragedy and Hope
Published on Sep 11, 2015
Patrick Wood: Technocracy Rising Interview (Part 3 of
3)
Tragedy and Hope
Published on Sep 11, 2015
Author Patrick Wood discusses his recent book
"Technocracy Rising", in a 3-part interview. (Summary of parts, below) http://www.technocracyrising.com/
Patrick Wood is an author and lecturer who has studied elite
globalization policies since the late 1970's, when he partnered with the late
Antony C. Sutton to coauthor Trilaterals Over Washington, Volumes I and II. He
remains a leading expert on the elitist Trilateral Commission, their policies and
achievements in creating their self-proclaimed "New International Economic
Order.”
An economist by education, a financial analyst and writer by
profession and an American Constitutionalist by choice, Wood maintains a Biblical
world view and has deep historical insights into the modern attacks on sovereignty,
property rights and personal freedom. Such attacks are epitomized by the
implementation of U.N. policies such as Agenda 21, Sustainable Development, Smart
Growth and in education, the widespread adoption of Common Core.
Wood is a frequent speaker and guest on radio shows around the
nation. His current research builds on Trilateral Commission hegemony, focusing on
Transhumanism, Technocracy and scientism, and how these are co-opting economics,
politics and religion around the world.
Part 1: Energy based Currency, Columbia
University origins of Technocracy, Eugenics, Population Control, and Agenda 21,
origins of Positivism and Scientism;
Part 2: Trilaterals, CFR, Rockefellers, U.N., 1992 Rio
Conference, Agenda 21 and Trans-Pacific Partnership (TPP);
Part 3: Wood's work with Antony C. Sutton, the Origins of the
Trilateral Commission, Trilaterals and Larry King, and how the Trilateral
Commission influenced the U.S. Govt. since 1973 to present day. Thanks to Ernie
& Donna Hancock at FreedomsPhoenix.com for the use of their studio, and to Rick
Malchow for his assistance in bringing you this interview.
Glenn Greenwald "The Goal Of The U.S.
Government
Is To Eliminate ALL Privacy Globally!"
"The globalists create confusion by design so
that people see a smoke screen and can't figure out what's going on and that they hope would just
roll over and give up."
-- Alex Jones, vid: Trump Puppeted By Pro-War Left To
Attack Syria --
Adaptation and
Conformity The Selling Out of Alex Jones/Infowars Link:Psywars
-- Harriet Tubman --
"I freed a thousand slaves; I
could have freed a thousand more,
if only they knew they were slaves."
Only the vigilant can maintain their liberties, and only those who
are constantly and intelligently
on the spot can hope to govern themselves effectively by democratic procedures.
"A society, most of whose members spend a great part of their time,
not on the spot, not here and now and in their calculable future, but somewhere else, in the irrelevant other
worlds of sport and soap opera, of mythology and metaphysical fantasy, will find it hard to resist the
encroachments of those who would manipulate and control it.”