Tag Archives: phone

How to Safe if Your Phone is Spying Or Hacked Someone

We can really help you

* We are a team of ex government security professionals with over 50 years combined experience in the spy world.
* We have seen how easy it is to spy on anyone at anytime and we have decided to stop this. People deserve their privacy and we will not stop until we have wiped out all commercial spyware.
* Incognito is the only Anti Spyware application that protects you against real spyware that can be installed on your device by anyone with a credit card.
* You can trust us. We are the real deal. We provide real protection. Read our reviews.
* Product updates and customer support are free forever. We have you back from now on.
* Incognito is not like other Anti Virus products in that it only targets real threats from real spy technologies.
* A virus is different to spyware and most Anti Virus products do not register many spyware tools as threats.

======================================
Recent Review from AndroidTapp
“If you feel your device may have been compromised Incognito Anti Spy and Anti Surveillance is a good solution to help detect unwarranted spyware apps.”
Incognito is an AntiSpy App that detects and removes malicious SpywareMalware & Trojansoftware.
Are you being spied on by your husband, wife, partner, ex, employer etc? Are you sure?
Have they purchased and installed spyware on your phone or tablet? How do you know?
The Incognito AntiSpy scanner will:
✓ Protect you from commercial spyware tools.
✓ Stop people from spying on you.
✓ Return your privacy.
All you have to do is install Incognito and press Start Scanning to eliminate commercial spying android software. If any of the spy tools that Incognito targets are on your device they will be removed.
It is very EASY
The companies that make and sell these spy tools ( Commercial Virus, Trojan, Spyware and Malware) have millions of customers around the world. For as little as $7/month your husbandwifepartnerexemployeremployee, etc. can be a spy. They need no technical skills and no training to use these spy tools.
They will get access to all information on your device including:
✓ Listen to all of your calls in realtime.
✓ Who have you called and who has called you.
✓ Who are you messaging.
✓ Facebook, LINE, WhatsApp, Viber, WeChat etc .
✓ Where you are right now and where have you been.
✓ See and hear you in real time.
✓ Every photo and video on your device.
You will never know that they are spying on you. Until Now
Our mission is to make you safe from these spy tools.
* We purchase these spy tools every week.
* We analyze how they work.
* We STOP them.
Incognito can currently find and remove the following commercial Virus, Trojan, Spyware and Malware tools. We are adding to this list all the time and updates will always be free of charge:
mSpy, HighsterMobile, HelloSpy, SMS Tracker, mCouple, Cell Phone Tracker, Family Mobile Tracker, MobiStealth, MobileSpy, StealthGenie, PhoneSheriff, SpyBubble, ZealSpy, iCamSpy, LittleSpy.
Protect yourself now with a simple Security Scan
===============================================
Important Note about Anti Virus products
Incognito is not a replacement to Anti Virus. Incognito is not designed to be the same as these other tools. Incognito targets and removes spyware and only spyware. Anti Virus has its place and Incognito does what it cannot do. We recommend that you continue to use your Anti Virus tool of choice and run Incognito at the same time.
===============================================
How To Use Watch Full Tutorial
Please follow and like us:

Other articles of interest:

Picture of the day Why is it important for you to understand the subject of the Hegelian Dialectic? Because it is the process by which all change is being accomplished i...
Steve Quayle: New Demons Being Revealed – The Anointing (Video) Steve is the former editor and publisher of Survival Quest and Security and Survival Chronicles – monthly newsletters which dealt with perilous events...
This is The Reason Why They Give Gelatin to Sick People in Hospitals First and foremost, you know what gelatin really is? For those who don’t know the answer, gelatin is made of glyceine and proline, two amino aci...
Frosty Wooldridge – Terrorist Killers Embedded With ‘Migrants’ Audio http://rense.gsradio.net:8080/rense/http/MP3Download/Apr2016/D7ru3p/rense_041816_hr2.mp3
PIZZAGATE: Public Hangings Required To Restore Confidence Pizzagate is still real. Enough is enough. We demand fair trials, then public hangings for all to see. We won’t let these things to continue harassing...

Related Posts

Conspiracy Theory Confirmed: Researcher Shows How Phone Shows Ads Based on Conversations It Hears

For years, smartphone users have been growing increasingly suspicious that their devices are listening to them to feed them advertisements and to “enhance their experience” on third-party apps. Companies like Google and Facebook have consistently denied these claims, saying that targeted ads and messages are merely a coincidence, and that data for these services are taken in other ways.Image result for spying mobile

However, earlier this year during the Cambridge Analytica scandal we began to see some of the first hints that our phones may actually be listening to us.

Cambridge Analytica whistleblower Christopher Wylie says that they have probably been listening all along. During an appearance before the UK parliament, Wylie said, “There’s audio that could be useful just in terms of, are you in an office environment, are you outside, are you watching TV, what are you doing right now?”

Since the scandal, experts who have studied this possibility began revealing their surprising results.

In a recent interview with Vice, Dr. Peter Hannay, the senior security consultant for the cybersecurity firm Asterisk, explained how third-party apps exploit a loophole to gather the voice data from your phone.

Hannay said that while your microphone is always on, your voice data is only sent out to other parties if you say specific trigger words such as “Hey Siri” or “OK Google,” but there is a catch. Third-party apps often ask to gain access to voice data in their user agreements to “enhance the experience” of their products.

“From time to time, snippets of audio do go back to [other apps like Facebook’s] servers but there’s no official understanding what the triggers for that are. Whether it’s timing or location-based or usage of certain functions, [apps] are certainly pulling those microphone permissions and using those periodically. All the internals of the applications send this data in encrypted form, so it’s very difficult to define the exact trigger,” Hannay said.

While this process is becoming more obvious by the day, many tech companies continue to deny that they are engaged with this practice, and since all of the outgoing information is encrypted there is no way of telling exactly which information they are getting and how they are using it.

“Seeing Google are open about it, I would personally assume the other companies are doing the same. Really, there’s no reason they wouldn’t be. It makes good sense from a marketing standpoint, and their end-user agreements and the law both allow it, so I would assume they’re doing it, but there’s no way to be sure.” Hannay said.

Vice reporters then conducted their own experiment, saying random phrases into their phones and then seeing advertisements affiliated with those terms pop up in their news feeds. You can try this experiment at home yourself, and it is highly likely that you have experienced results like this by accident.

In April, I experienced something like this when a friend visited my house from the west coast. I picked him up from the Baltimore-Washington airport and during a conversation about his flight, he told me that he had a layover in Charlotte, North Carolina, and mentioned that they had a nice airport.

The following morning I woke up with these messages on my phone:

 

Oddly enough, I have never been to Charlotte, North Carolina, never really thought about the place, and have never typed anything about that place into Google or Facebook. But sure enough, after having a conversation about the airport in Charlotte, my phone thought I was interested.

As of right now, there is no way to avoid this spying, aside from being extremely careful about the apps that you sign up for, and actually reading their user agreements—or getting rid of your cell phone altogether, which could be counterproductive if you use it for business.

Please follow and like us:

Other articles of interest:

Crazy IMF has audacity to warn debt free Russia to diversify economy while Europe and U.S. moves tow... It is ironic when one of the West’s failed monetary structures chooses to give monetary or economic advice to sovereign country, but even more so ...
COURT: Illegal Aliens DO NOT HAVE CONSTITUTIONAL RIGHTS to Judicial Review if Denied Entry into USA  The United States Supreme Court on Monday refused to hear a case on the issue of expedited removal of individuals who have their claims for asylum de...
VAMPIRE scare forces UN to pull staff out of Malawi: Workers moved after mob violence triggered by &... The United Nations has been forced to pull staff out of Malawi, southeastern Africa, after rumors of vampirism triggered public lynchings in the sou...
NOW FINLAND TOO! Local Councils Warning Citizens “Stockpile Food & Water – Prepare&... First it was Germany, last Saturday (20 Aug) which began warning its citizens to "stockpile 10 days worth of food & water."  One day later, the Cz...
Trump Thinks Your Car’s Gas Mileage Is… Your Business The Clovers are aghast that Trump is threatening to do the unimaginable – and stop threatening the car companies with federal fuel economy fatwas (and...

To Avoid Mental Problems, Turn Your Phone Off By 10 PM

Late night phone use has been linked to many mental issues stemming from a lack of sleep.  Now experts are saying if you’d like a clean mental bill of health, turn your phone off by 10 PM.

Looking at your phone after 10 PM causes moodiness the next day because the light tricks your brain into thinking it’s daytime, leading to sleep issues.  Sleeping less than the eight hours per night is associated with intrusive, repetitive thoughts like those seen in anxiety or depression, says new research from Binghamton University, State University of New York.

And humanity’s growing addiction to their phones is not helping matters. Now. more recent research is showing that people who fail to follow their natural body clock rhythm – like staying up to look at their phone rather than going to sleep, are more likely to have depression and mental health problems. The study has also found that those who are inactive during the day and more active or restless at night have an increased risk of depression, bipolar disorder, and low mood.

The findings come from the largest study of its kind, involving more than 91,000 people across the United Kingdom.  The researchers discovered that regular sleep disruptions are associated with difficulty in shifting one’s attention away from negative information – like that we are bombarded with on social media via our phones in the dopamine feedback loop created by companies like Facebook.  This may mean that inadequate sleep is part of what makes negative intrusive thoughts stick around and interfere with people’s lives.

Binghamton Professor of Psychology Meredith Coles and Jacob Nota assessed the timing and duration of sleep in individuals with moderate to high levels of repetitive negative thoughts (e.g., worry and rumination). The research participants were exposed to different pictures intended to trigger an emotional response, and researchers tracked their attention through their eye movements.

According to The Daily Mail,  Professor Daniel Smith, professor of psychiatry at the university, said a healthy rhythm is the key to curing mood disorders. “A healthy rhythm is to be quite active during the day and very inactive at night. This is an important study demonstrating a robust association between disrupted circadian rhythm and mood disorders,” said Smith.

But have no fear if you don’t follow your natural rhythm.  Smith says there are a few things you can do to get more in tune with your body. “There are a lot of things people can do, especially during the winter, such as getting out of the house in the morning to get exposed to light and take exercise, so that by evening they are tired,” he said.  “You can also turn off your mobile phone around 10 pm because the light in it is telling your brain it’s daytime. But it is hard for some people, such as shift workers, because of their job or because of their family circumstances.”

It is already known that the internal body clock regulates many functions including body temperature and eating habits. Long-term night-shift work has previously been associated with an increased risk of cancer, heart disease, and obesity.

Scientists are often interested in finding biological fault in emotional or highly sensitive people (e.g. it’s your genes, it’s brain chemicals), studies like this should offer hope to the weary that you may need more rest and relaxation, less pressure, and maybe less evening phone time.

DISCLAIMER: This article is not intended to provide medical advice, diagnosis or treatment. 

Delivered by The Daily Sheeple

We encourage you to share and republish our reports, analyses, breaking news and videos (Click for details).

Please follow and like us:

Other articles of interest:

Zionist BitCoin Beast System Penetrates Truth Researchers #PIZZAGATE VIDEO: Ed. Note: One man’s harsh opinion on Bitcoin… BitCoin will be controlled by Zionist Israel if it isn’t already. People think CryptoCurrency...
Know Your Enemy: 9 Prepper Truths You Need for Defense Preparations   ReadyNutrition Readers, we just covered a segment on self-assessment and knowing yourself.  I had mentioned a paraphrase from Sun Tzu’s “The Art of...
Clif High – Wujo Update Friday 18th November Apologies for the blurry video. FStop stuck. Used camera. Pie is blended apples, Braeburn, Rosa, Yellow Delicious, Pippin, with a coconut oil crust...
Why People Don’t Believe in Science In November the magazine published an issue devoted to climate change. Susan Goldberg, editor since 2015, says that afterward she received a congratul...
Eerie Predictions in Vegas… Cui Bono? (Video) Who stands to benefit (profit) from the fear created by mass shootings like the one in Las Vegas? This video from Truthstream Media explores that q...

Your Cell Phone Is a Psychotronic Weapon of Mass Mind Control

Modern telecommunications usually involves devices that can both send and receive wireless signals. These devices are also almost invariably capable of producing and receiving signals that affect our moods, thoughts, and bodily functions. Your cell phone is a psychotronic weapon. That means that your cell phone CAN read and control and probably IS reading and controlling your mind. People should care more about that than whomever is currently on TV.

Most of the fields of man-made electromagnetic energy we experience on a routine, daily basis are byproducts of modern industry: electrical power grids, telecommunications, and all electrically powered devices produce them. As generally opposed to naturally occurring fields of the Earth’s magnetic energy, man-made fields of electromagnetic energy have been found to be generally bad for Humans. A preponderance of the best evidence suggests that they cause cancer. If this wasn’t bad enough for city dwellers, electromagnetic energy can also be weaponized and may be used against us routinely.

This scholarly article explores the notion that psychotronic weaponry is being used from near and afar to mind control us on a routine, daily basis. This article gives a background to the field of psychotronic weaponry, explores the current state of the art, and provides the author’s accounts of his experiences with weaponized electromagnetic energy.

Evidence suggests that these mind control activities are part of a larger effort the author calls The New Manhattan Project. The author became aware of psychotronic weaponry during the course of his research into this related subject. If you are not familiar with the New Manhattan Project, please refer to the author’s book Chemtrails Exposed: A new Manhattan Project.

Psychotronic weaponry

Electromagnetic energy can be produced and directed to influence Human moods, thoughts, and bodily functions. Devices that do this are known as ‘psychotronic weaponry’ or ‘psychotronics.’ Psychotronic weaponry utilizes electromagnetic energy frequencies primarily in the Extremely Low Frequency (ELF) range (3-30 Hz) because ELF is primarily the frequency range of the electromagnetic energy the Human brain naturally sends and receives. Electromagnetic fields in the Very Low Frequency (VLF / 3-30 kHz) and Super Low Frequency (SLF / 30-300 Hz) ranges can also have psychotronic effects.

Man-made electromagnetic energy (EM) signals produced and applied in the ELF range can be synchronized to Human brain waves so that the brain becomes ‘entrained.’ The targeted individual’s brain waves are firstly scanned to determine the frequency of the EM his or her brain is currently producing. Then, that same frequency produced by the targeted individual’s brain is produced by the psychotronic weapon and directed at the targeted individual. Once the targeted individual’s brain waves have been synchronized with the EM produced by the psychotronic weapon, the frequency produced by the psychotronic weapon is then gradually altered. Due to this synchronization, as the EM produced by the psychotronic weapon is gradually altered to produce any desired effects, the targeted individual’s brain waves will follow. This is the process of brain entrainment which is fundamental to psychotronic weaponry.

Don’t believe me? There is a mountain of supporting evidence. This investigation has found hundreds of pertinent documents readily available. The Navy, the Rand Corporation, NASA, the Massachusetts Institute of Technology’s Lincoln Laboratory, Lawrence Livermore National Labs, the Department of Energy, Battelle Pacific Northwest Labs, and many others have all been doing significant work here. All of those names are involved in the New Manhattan Project. The more general area of study is known as ‘bioelectromagnetics’ and that is the title of the leading scientific journal. If you want to look into it further, a good place to start is the ‘Mind control’ section of the author’s previous article “Other New Manhattan Chemtrail Project Agendas.”

Your author has since uncovered much more. This section provides an overview of the author’s previously published work pertaining to mind control and the New Manhattan Project as well as newly uncovered information. The three earliest scientists presented here all have strong connections to the New Manhattan Project.

Way back in the 1930s Alfred Lee Loomis (1887-1975) was studying and writing about brain waves as he helped to develop the field of electroencephalography; which is the field of brain wave measurement. This is the same Alfred Lee Loomis who made his fortune in the electrical power industry and later went on to help develop technologies capable of bouncing electromagnetic communication signals off the ionosphere; transmitting them over thousands of miles. These facts are significant because America’s electrical power grid produces EM fields in the same frequency range as that of the Human brain and the electrical power industry has incentives such as the generation of hydroelectric power to motivate their interests in a global weather modification endeavor such as the New Manhattan Project. Also, today’s New Manhattan Project chemtrail spray has been found to be coal fly ash. Coal fly ash is a byproduct of the electrical power industry’s coal-fired power plants. As if that wasn’t enough, today’s ionospheric heaters of the New Manhattan Project (with fundamental technologies developed by Loomis) are capable of producing tremendously strong EM signals and fields that can control the weather AND influence our moods, thoughts, and bodily functions. It makes one’s head spin. For more about the enigmatic Mr. Loomis, please refer to the author’s previous article “Chemtrails Exposed: Truly a New Manhattan Project.”

For more about the electrical power industry’s potential motives here, please refer to the author’s previous article “Cui Bono? New Manhattan Chemtrail Project Motives.”

For more about coal fly ash as common chemtrail spray, please refer to the author’s previous article “Chemtrails Exposed: Coal fly ash and the New Manhattan Project.”

For more about the ionospheric heaters of today’s New Manhattan project, one can refer to the author’s previous article “Smoking Gun: The HAARP and Chemtrails Connection.”

Loomis’ work in the field of electroencephalography involved electrical diodes placed directly on a subject’s skin. So, although his work is notable here as a precursor, it was a little bit different than modern psychotronics in that modern psychotronic weaponry is administered remotely, through the air. What we are examining here is more akin to the later field of magnetoelectroencephalography.

~~~

Although what appears to be the earliest scientific paper applicable to modern psychotronic weaponry was published in 1955, it wasn’t until the early 1960s that things in the field really started getting going. Among a few other early examples was 1961’s “Research in Electrical Phenomena Associated with Aerosols” by Bernard Vonnegut et al.

“Research in Electrical Phenomena Associated with Aerosols” involved measuring the effects of EM directed at the effigy of a man, in a small chamber, surrounded by gas. This is, of course analogous to today’s everyday environment where airplanes saturate our atmosphere with very small particles and man-made electromagnetic energy is hitting us all over the place.

The author of “Research in Electrical Phenomena Associated with Aerosols” Bernard Vonnegut (1914-1997), as astute readers know, was instrumental to the early development of what has become today’s New Manhattan Project. He was an original Manhattan Project scientist. He was one of the trio of General Electric scientists who rolled out the scientific era of weather modification and he later went on to do ‘space charge’ experiments in the vein of the New Manhattan Project. In the most cited weather modification report ever, he wrote about introducing ‘chemicals’ into the atmosphere or modifying the weather by ‘altering electrical variables.’ Atmospheric chemicals and atmospheric electricity are the two key elements of today’s New Manhattan Project. On a separate note, he just happened to be Kurt Vonnegut’s brother.

~~~

In the mid-1960s, UCLA’s Brain Research Institute was studying the effects of electromagnetic fields upon Human behavior. This was around the same time that our good friend and eminent geophysicist Dr. Gordon J.F. ‘How to Wreck the Environment’ MacDonald (1929-2002) was writing about entraining people’s brains with a man-made electronic signal from outer space. Yes, you read that correctly.

~~~

Starting around 1970, academic activity in this area increased greatly; many more scientific papers began to be published.

In 1974 a book edited by Dr. Michael A. Persinger titled ELF and VLF Electromagnetic Field Effects was published. This book references and details many studies conducted with animals and Humans pertaining to physiological and biochemical changes associated with EM fields in the ELF and VLF ranges. In the preface, Dr. Persinger writes that ELF signals are associated with, “weather changes, solar disturbances and geophysical-ionospheric perturbations.” That is very convenient considering that this New Manhattan Project is primarily a global weather modification project. ELF and VLF EM is fundamental to natural life processes here on Earth. Dr. Persinger also writes that ELF signals are preferable because they, “…have the capacity to penetrate structures which house living organisms.” He’s writing about weaponized EM! Like MacDonald did about 10 years earlier, Persinger is writing here about psychotronic weaponry mind controlling people in their houses from outer space. I’m not making this up! I wish I were! I don’t think I could!

Dr. Michael A. Persinger

In this area of study, it appears that Dr. Persinger has been most instrumental. Without boring the reader with a litany of details, it suffices to say that Persinger’s work in this area has been both prolific and seminal.

Dr. Michael Persinger has been a very public figure for many decades. He just goes on and on about all this stuff. He teaches it. He is most well known for inventing what is called the ‘God Helmet.’ The God Helmet was a device placed on a subject’s head which could apparently produce in the subject the feeling of having a religious experience. He has a big Wikipedia listing.

He even has a YouTube Channel.

~~~

A United States patent granted in 1990 titled “Cryogenic Remote Sensing Physiograph” details an apparatus and method for remotely scanning people’s brain waves. This is significant because, as noted earlier, the process of brain entrainment (the fundamental process of psychotronic weaponry) begins with remotely reading the brain waves of a targeted individual.

~~~

Another U.S. patent granted in 1998 titled “Thermal Excitation of Sensory Resonances” describes a method and apparatus for using directed microwave radiation or a laser beam to produce certain effects in Humans. The patent explains that, “sleepiness, drowsiness, relaxation, a tonic smile, ptosis of the eyelids, the feeling of a ‘knot’ in the stomach, sudden loose stool, and sexual excitement” can all be artificially induced in Humans using this technique.

~~~

Although the author has previously written about it in his “Other Agendas” article, it should be noted here that an expert in the field of psychotronics has written a book detailing how we can be mind controlled by all Internet connected devices. In his 2013 book Mind War Dr. Michael Aquino writes exactly that.

He writes, “BWR [mind control frequencies] can, for instance, be inserted into the Internet to be passively and indetectably (absent such sensors) received and radiated by any accessing device, from television station to desktop computer or cellular telephone.”

Dr. Michael Aquino should know. Although he is now retired, he was a Lt. Colonel, Psychological Operations, First Special Forces Regiment, U.S. Army.

My personal experiences

I often find myself staring at a computer or television screen feeling a little ‘stuck.’ Maybe you can relate.

I just came back to the computer to write this passage, but before that I was staring at the television screen as the local TV news sportscaster went on about women’s college basketball. I was standing there watching it when it occurred to me that it was odd that I would be staring at a report about women’s college basketball because I barely watch sports at all, much less have any interest in a niche like women’s college basketball.

Might the television be producing EM frequencies that encourage me to continue watching? It makes sense that this would be done. When more people watch programs for longer periods of time, they make more money. We have seen here the reality of the necessary technologies.

I often feel a compulsion to grab or hold my smartphone when there is no need to do so. I’m not sure if this is a naturally occurring psychological phenomena due to our heavy use of smartphones or something we are induced to do by EM frequencies generated by the phone.

It is in the interest of the phone maker and the telecommunications company to have their customers feeling as though they need their phone. In fact, it would be advantageous to them for us to feel addicted to our phones. That keeps the cash rolling in. Maybe the telecommunications company and/or the phone maker is complicit in the production of EM signals, coming from one’s phone, that make people feel compelled to have and use a phone.

Sometimes, I’ll be peacefully doing little things around the house when negative thoughts and feelings just start appearing in my head; for no reason. I’m a relatively happy guy. Most of my needs are met. I’m furiously building and I’m hopeful for the future. My having unprovoked negative thoughts and feelings is illogical. I didn’t used to have them. I find that, when these negative thoughts and feelings strike, if I turn off my WiFi and/or put my phone into airplane mode, then they rapidly disappear.

Might I be purposefully receiving EM through my wireless communication devices that makes me think negative thoughts and feel bad? At this point, with all my public and private railing against the establishment everywhere, I’m probably not the corporate superstate’s favorite individual. Maybe I am sent EM signals that produce negative thoughts and feelings in me as a form of punishment.

Lastly, a few weeks ago I was surfing the Internet on my desktop computer when I suddenly began to feel a distinct dryness at the top of my nasal passage. I quit my Internet browser and stepped away from the computer. As soon as I did, the dryness in my nasal passage went away. This, for me, is my most convincing episode yet.

I hope these things are the worst it’s going to get for me. If they are, then I’m getting off easy. I’ve heard plenty of super-scary horror stories from many targeted individuals who claim that their entire lives have been absolutely ruined by harmful EM frequencies.

Conclusions

It’s really just an extension of subliminal advertising. If advertisers do that, then why wouldn’t someone do this? Of course this is done.

It is very important to note that, as shown repeatedly here, the frequencies used to control minds and influence bodily functions (ELF/VLF/SLF) are the same frequencies that are germane to atmospheric phenomena. These frequencies are also fundamental to what is commonly referred to ‘the smart grid.’ The smart grid involves having our fundamental biological processes hacked and hijacked. The organizations and people responsible for exploiting these frequencies are tapping into the fundamental processes of life itself without our full knowledge or consent. That is why this information is so important and this is why people are so resistant to smart meters and WiFi; which play important roles in the smart grid.

As we go through our daily lives here in America and in many other parts of the world, as a matter of course we are all assaulted by psychotronic weaponry in one way or the other. It’s a good way to get people to do what somebody else wants without the targeted individuals knowing what hit them. This shows the cowardice, subversiveness, and lust for power not of man’s nature, but of an artificially constructed establishment.

The science of mind control (just like the New Manhattan Project) lies just outside of the Overton Window. The reality of these technologies, although exhaustively documented, is largely unknown in today’s society.

Even if your average American were to come to grips with the reality and power of these technologies, convincing them that these technologies are being purposefully used against us on a routine, daily basis is still a bridge too frickin’ far. Most people simply refuse to believe that monumental institutions of industry, academia, and government would engage in such malicious and blatant violations of the public’s trust.

This is how they get away with it and this the author’s frustration. We will never win the fight if we don’t recognize the enemy. As Edmund Burke said, “The only thing necessary for the triumph of evil is that good men should do nothing.”

I’m betting on Humanity. In the face of all the world, I’m betting that we will rise up and root out ALL of the establishment’s weapons used against us: physical and metaphysical. I’m betting on you, the reader. I’m betting that a relatively small percentage of intelligent and well-informed individuals will push the envelope and move the Overton Window into a size and position that will allow even the lowest common denominators to come to grips with such things as psychotronic weaponry and the New Manhattan Project. We are emerging from the cave. In the meantime, the dehumanizing agendas of mind control and chemtrails will continue.

This is why we need you, the New Media. Please share this article far and wide. Thank you.

Notes (in order of first appearance)

ELF: Webster’s Timeline History 1590-2007 a book edited by Philip M. Parker, PhD, published by ICON Group International, 2009

VLF: Webster’s Timeline History 1923-2006 a book edited by Philip M. Parker, PhD, published by ICON Group International, 2009

“Biological Effects of Extremely Low Frequency Electric and Magnetic Fields: A Review” a report by A.A. Marino and R.O. Becker, published by Physiological Chemistry and Physics, Volume 9, Number 2, 1977

“Biological and Human Health Effects of Extremely Low Frequency Electromagnetic Fields” a report by the Committee on Biological and Human Health Effects of Extremely Low Frequency Electromagnetic Fields, published by the American Institute of Biological Sciences, 1985

Tuxedo Park: A Wall Street tycoon and the secret palace of science that changed the course of World War II a book by Jennet Conant, published by Simon & Schuster, 2002

“VLF Signal Reception Capability of Three Experimental Crossed-Loop Antennas” a report published by the Naval Research Laboratory, Washington, DC, 1955

“Research in Electrical Phenomena Associated with Aerosols” a paper by Bernard Vonnegut, Arnold W. Doyle, and D. Read Moffett, produced by Arthur D. Little, published by the Department of Defense, 1961

“How to Wreck the Environment” a paper by Gordon J.F. MacDonald as it appeared in the book Unless Peace Comes: A Scientific Forecast of New Weapons edited by Nigel Calder, published by Viking Press, 1968

ELF and VLF Electromagnetic Field Effects a book edited by Michael A. Persinger, published by Plenum Press, 1974

U.S. patent #4,940,058 “Cryogenic Remote Sensing Physiograph” by Barry E. Taff and Kenneth P. Stoller, 1990

U.S. patent #5,800,481 “Thermal Excitation of Sensory Resonances” by Hendricus G. Loos, 1998

Mind War a book by Michael A. Aquino, Ph.D., self published, 2013

Please follow and like us:

Other articles of interest:

Under U.S. Proxy Attack Russia Readies For Full War In Syria U.S. State Department Daily Press Briefing September 28 2016 - Spokesperson John Kirby QUESTION: But what I don’t think we have heard here is, so w...
Fluoride’s Corruption Exposed There are some extremely salient facts that put the corruption concerning fluoridation in its proper perspective. FACT: In the year 2000, on Hawai...
After Tomahawks Start to Rain, Rusty Bedouine Swords Begin to Dance Rejoiced by the news of the US missile strike on Syria, the Bedouines of the Arabian deserts bring their lazy asses out of their tents, pour their ens...
What Is Fermentation? Benefits of Fermentation + How to Ferment Foods Share on Email Print Article Yes, fermentation. It’s everywhere and happening every day with no escaping it, and you’ve heard all a...
The $5 TRILLION Silver Scam (Video) https://www.youtube.com/watch?v=sMMwK4aiti8

Cell Phone Health Impacts: How Are Devices Impacting Our Bodies?

What are cell phones doing to our bodies - Dr. AxeIn just a few decades cell phones have totally taken over our lives. Many times, it’s for the better. When was the last time you actually pulled a map out of the glove compartment to try to navigate somewhere? Or had to stand out in the rain to hail a cab? But are potential cell phone health impacts something to worry about?

Are our devices completely safe? We haven’t been using cell phones long enough to fully study long-term impacts and say using them definitively causes specific diseases. But then again, it took decades to prove a  surefire link between smoking cigarettes and lung cancer, too.

Now, I’m not suggesting we all ditch our phones … I rely on mine for so many things. But the following findings may give you reason to take some commonsense cell phone safety precautions to minimize your risk.


Possible Cell Phone Health Impacts

Brain Cancer

Cell phones emit non-ionizing radiation, which are radio waves known as a type of electromagnetic radiation. We do know that human tissue closest to cell phone antennas absorb some of this energy.  (1)

While studies linking cell phone use to brain cancer bring mixed results, the chief medical officer of the American Cancer Society did give credence to a particular research project. In 2016, the U.S. National Toxicology Program released data related to the agency’s large-scale, $25 million study investigating cell phone use and cancer risk. The results? Very high signal cell phone radiation did result in a slightly increased risk of malignant gliomas in the brain. Risk of schwannomas, rare tumors that develop on the nerve sheath of the heart, also increased with cell phone use. As the dose of radiation increased, so did cancer risk. (2, 3)

The World Health Organization listed cell phone radiation as a 2B carcinogen in 2011. That classification means cell phone radiation is “possibly carcinogenic to humans.” (4)

Medical literature does suggest that beginning cell phone use during teenage years results in a four-to-five times higher risk of a brain cancer diagnosis. (5)

Thyroid Trouble

In a first-of-its-kind study published in the Oman Medical Journal, researchers found students who moderately and heavily used cell phones in talk mode experienced a significant alteration to thyroid stimulating hormone levels. (Higher than normal TSH levels, and low average T4 levels were observed.) That may not seem like a big deal, except that even tiny changes to thyroid hormone levels can alter brain function. The study authors say “based on these results, it may be concluded that electromagnetic fields emitted by mobile phones may cause some detrimental effects on thyroid function.” (6)

Cell phone radiation may trigger negative effects on the hypothalamic-pituitary thyroid axis, throwing off normal thyroid hormone levels. (7) However, a 2016 study published in International Radiation Biology found no link between cell phone electromagnetic radiation and thyroid cancer. (8)

Sperm Damage

Men, please think twice about keeping your cell phone in your pocket or clipped to your belt. Sperm of men exposed to cell phone radiation die three times faster than those unexposed to the radiation. The sperm also experience three times the level of mitochondrial DNA damage, too. Not good news for men’s health or fertility. (9)


Cell Phone Health: Protect Yourself

When it comes to cell phone radiation, it’s better to be safe than sorry. You can drastically reduce your exposure without giving up your device. Here are some common-sense tips:

  • Text instead of talking whenever possible, and use speaker mode or use a hands-free kit when you do make calls.
  • When talking on your cell phone, hold it an inch or more away from your head.
  • Make only short or essential calls on cell phones.
  • Avoid carrying your phone against the body, like in a pocket sock or bra.
  • Don’t talk on the phone or text while driving.
  • If you plan to watch a movie on your device, download it first, then switch to airplane mode while you watch.
  • If you can, avoid making calls when you have a weaker signal. Radiation is higher when your bars are lower.
  • Avoid making calls in cars, elevators, trains and buses. Cell phones work harder to push a signal through metal, so radiation increases.
  • Keep cell phones away from children and out of their mouths. (10)

Final Thoughts on Cell Phone Health Threats

  • We’ve only been heavily using cell phones since the 1990s. That’s not enough time to get a full scope of potential long-term health impacts in humans. Remember, it took decades to draw a conclusive link between lung cancer and cigarette smoking.
  • Studies linking cell phones to cancer, particularly brain cancer, are mixed. But several recent well-designed studies suggests cell phone use could slightly increase the risk of certain types of brain cancers.
  • Electromagnetic radiation from cell phones could also tinker with hormone health, sleep patterns, mental health and more.
  • You can drastically reduce your exposure to cell phone radiation using simple tactics like texting by holding the phone away from your body instead of making long calls, keeping the phone on airplane or away from you while you sleep and not keeping your phone on your body all day.
Please follow and like us:

Other articles of interest:

Globalists Ramp Up Mad Push For ‘A Boot Stamping Upon A Human Face – Forever’ And ... Jesus was good. He was caring. He had powerful, profound things to say—things that would change how we view people, alter government policies and chan...
Top Official: Over 60 million Japanese irradiated by Fukushima — Nuclear Expert: 50,000 sq. miles of Japan highly contaminated… Many millions need to be evacuated… Gov’t has decided to sacrifice them, it’s a serio...
Las Vegas Shooting: BREAKING VIDEO: TRUMP’S CALL TO LV POLICE RECORDED… TOTAL OPPOSITE ... Benjamin Arie for the Conservative Tribune reports, The true character of a leader is often revealed during terror and tragedy. There was unfortunatel...
Black Death: ‘It’s 100 % Likely’ It Spreads To The UK And A ‘Ticking Time Bomb’ Ready To Decimate Th... The death toll in Madagascar due to the plague has jumped for the first time since health officials claimed the infection was ...
The Holy Bible- Full Book Of Genesis (King James Version Dramatized) https://www.youtube.com/watch?v=6PjFM103X2o&list=PLYpGnMfJjHKlwYAdUiYgImSZ0N75l_gix

The FBI Can’t Decrypt the Texas Shooter’s Phone

The Federal Bureau of Investigation revealed today that it has been unable to decrypt a phone belonging to the gunman who killed 26 people in Sutherland Springs, Texas—an announcement that is likely to start another battle between law enforcement and technology companies over encryption.

The phone was flown to Quantico for examination, Christopher Combs, an FBI special agent who leads the San Antonio bureau, said at a press conference. But so far, the FBI has been unable to unlock it.

The episode is reminiscent of the FBI’s legal fight with Apple last year, in which the agency sought to force Apple to decrypt an iPhone used by one of the San Bernardino shooters. Although the FBI had a warrant to search the phone, the agency could not because the device was encrypted. Apple argued that creating special software to unlock the phone would jeopardize the security of all its products. Eventually, the FBI paid another company $900,000 to crack the phone.

Although the FBI was able to open the San Bernardino shooter’s phone, the incident is still a regular touchstone for law enforcement officials who argue that encryption is thwarting their ability to catch criminals.

Combs raised that exact point during his press conference. “Unfortunately, at this time, we are unable to get into that phone. So it actually highlights an issue that you’ve all heard about before with the advance of the technology and the phones and the encryptions, law enforcement whether it’s at the state, local, or the federal level is increasingly not able to get into these phones,” he said.

Combs declined to say what kind of phone the Sutherland Springs shooter used. “I’m not going to describe what phone it is because I don’t want to tell every bad guy out there what phone to buy to harass our efforts on trying to find justice here,” he added.

Please follow and like us:

Other articles of interest:

The Big Lie – Tolerance Get Souls To Heaven – WRONG We as Christians have gotten things totally mixed up and have bought into this total lie that “LOVE” means we accept everything everyone does because ...
Epsom Salt Can Do That? (Yes, and it Should Be in Your Stockpile) First, let’s dispense with its odd and utterly confusing name. Although it sounds like it could be a relative of gypsum, aka calcium sulfate, Epsom sa...
Leaked TTIP Papers Show Dawn of a New Authoritarian Epoch Leaked papers show ‘unsurprising’ TTIP disagreements: Dutch trade minister BusinessEurope May 2, 2016    The lack of agreement between the US and Euro...
NWO Insider Killed Over This Leak! Detailed Plans of the New World Order as Told to Dr. Dunegan  https://youtu.be/n8-zHjyP3A4 A New World Order Insider Reveals Entire NWO Plan...
McDonalds Is In Real Financial Trouble McDonalds foreign operations are doing well and overall, their stock is up slightly. However, trouble is coming as McDonalds could be in real trouble....

Alert: Your Cell Phone is Spying on You! 4 Ways to Block Your Cell Phone and Prevent Being Monitored

ReadyNutrition Guys and Gals, this piece is on the heels of an article released by RT News on 3/8/17, entitled “85% of World’s Smart Phones ‘Weaponized’ by CIA.”  The article is a very disturbing report; however, it isn’t something that just “surfaced” out of the zone of unpredictability.  The basis for the report stems from the recent WikiLeaks release of the CIA-documents and information that just occurred.  Here is an excerpt from that article:

Image result for +Block +"Cell Phone" +mylar

 “Google’s Android operating system, used in 85 percent of the world’s smart phones, including Samsung and Sony, was found to have 24 ‘zero days’ – the code name used by the CIA to identify and exploit vulnerabilities for the purpose of secretly collecting data on individuals.  The techniques allow the CIA to access data from social messaging platforms, including WhatsApp, Weibo and Clockman before encryption, according to WikiLeaks.  Both audio and message data were vulnerable to the exploit through the CIA’s exploitation of gaps in the OS.”

Now mind you, Readers, this piece is not a “news article,” although this event was just reported on 3/8/17.  The purpose of this article is to serve as a “wake-up” call, in case you haven’t taken the measures already outlined in previous articles to protect yourself from your own devices tracking, recording, and (essentially) “spying” upon you.  You may research past articles on electronic security that you can do, and this piece is a “refresher” that will enable you to secure yourself…. from your own equipment.

4 Ways to Block Your Cell Phone and Prevent Being Monitored

As mentioned in times past, Mylar can be your best ally.  Mylar is simple to use, affordable, and it works at blocking the signals going to and from your happy cell-phone tracking and recording device.  Here are some inexpensive sources for the Mylar:

  1. Chip/Snack bags: An infinite variety of sizes are available, and you will have to gauge what size you use after taking the size of your phone/device into account.
  2. Mylar in the form of “ponchos” or “space blankets”: these are a little more expensive than the chips, but only slightly so. You will end up with more Mylar to use, and the pieces you cut will not need to be cleaned off of salt and other detritus as with the chip bags.
  3. Freezer bags: Also in a variety of sizes, such as ones that hold up to 30 lbs. of food/ice (for a laptop-sized device) or just a small 1’ x 1’ bag, such as a lunchbag-cooler size.
  4. Another thing to do is to place your device inside of an ammo can (military issue). In doing so, make sure the rubber gasket around the mouth seals efficiently for a tight seal.  There are other containers that can be used; however, you may have to reinforce the seams with something such as Aluminum HVAC duct tape (available for about $15 per roll from your local Home Depot), and cover them over.  With the ammo cans, the container is contiguous with only the lid needing that rubber gasket that works.

How to Test for Protection

There is a way to test it out with your phone to see if you have the protection.  Take your chip bag or bags.  If they’re small, be advised that you will need about three complete layers around the cell phone.  Also, place your phone in a plastic Ziploc bag before putting them into the chip bags.  This will keep them clean just in case you missed wiping all of the stuff out of them.  Wiping out the bags can best be accomplished with a dry paper towel: the oils, salts, and other filth will be caught up by the towel.  Just remember to cover/swipe the entire inside surface of the bag.

Then turn your phone on, and turn up the volume of its ring all the way.  Next, roll/wrap up your phone and fold it over in at least three complete layers of Mylar.  Then use your house phone/landline/etc. to dial your wrapped-up cell phone’s number, and hold the wrapped-up phone close to your ear.

If you did the job correctly, you will not hear a thing.  Also, make sure you only ring it 3 times.  Any more than that and it may go to a voice-mail/other function, that will send it stored to your cell phone after you unwrap it as a missed call.  This way it will not ring it, and the call will have been cancelled.

Remember what General David Petraeus mentioned about the “Internet of things?”  Well, those days are upon us.  So, what else?  You’ll have to figure out the best method for making your layers work and last a long time.  You can take the chip bags, cut them open with scissors, and make three premeasured layers.  Form a pouch, and cover them inside and out with duct tape.  Then you just slip in your phone, and secure the top (fold it over) with whatever type of clamp or clip works for you.

The continuous signal your cell phone sends out (every 4 seconds) will be interrupted.  Inconvenient?  No.  Coordinate with your family members when you will call and talk to them beforehand.  Emergency?  Pull the phone out of the pouch and use it.


Bottom line: It is a discipline that will have to be followed to enable your privacy…from your own device.


99% of all people carry that thing around with them everywhere.  They’re hooked to it more closely than a fetus to the umbilicus: they can’t function without it.  But the point I’m making is this: Do you own the phone, or does it own you?

You can accomplish the same thing with your laptops and other “smart” toys…your palm-pilots, blackberries, cameras, and all of the other damnable devices that have made you an unwitting prisoner to the powers and systems that set them in place…not for your “technological convenience,” but for the very purposes of control, dominion, and surveillance over you.

Ammo cans work.  The Mylar (when cleaned and fashioned properly) will work.  Now you just received confirmation that it is happening, and I’ve given you methods to use to stop it from happening to you.  The methods work.  I have tested and used them myself.  So, without further ado, figure out how much material you need and make one of these pouches for yourself.  Your privacy is guaranteed under the 4th Amendment from illegal searches and seizures by the government.  That right, however, needs to be exercised by action.  So, finish those Doritos, clean out that bag, and wrap that phone up!  We’d love to hear of any tips or improvements you have come to trust.  Keep fighting that good fight, and send us your comments!  JJ out!

Please follow and like us:

Other articles of interest:

REALIST NEWS – Fantastic Clif High Interview REALIST NEWS – Fantastic Clif High Intervie... https://www.youtube.com/watch?v=qrL42vtc_bY&feature=youtu.be https://www.youtube.com/watch?v=3gWSz5CUIrk&feature=youtu.be
Make Yourself Uncomfortabler Starting the saga of that bizarre love triangle thing I found myself in last year. You missed the preamble. Click on the ‘uncomfortabler’ category. ...
The Best Ways To Remove Rust From Your Firearms Few things in life are more infuriating than realizing that a firearm you spent a fortune on is beginning to rust. What makes it so painful, is that y...
Antarctica High Strangeness: Tunnels as Tall as the Eiffel Tower Discovered (Video) This intrigues me for the obvious reason that it appears to confirm in some respects those persistent stories about Nazi bases in Antarctica that have...
GSR interviews ROB KIRBY – Dec 1, 2016 Nugget Rob Kirby of Kirby Analytics notes that the smart money, deep pockets and institutional investors are diversifying away the doll...

Obamagate: Government Spooks Can Use The Mic And Camera On Trump’s Phone Even When He Thinks It Is Turned Off

After reading this article you might not ever view your electronic devices the same way again.  Last year, Hollywood released a biographical political thriller based on the life of Edward Snowden that had one particularly creepy scene.  In that scene, a government spook used a program to remotely activate the microphone and camera on a laptop, and by doing so he was able to watch a woman as she got undressed.  Sadly, as you will see below, this kind of thing is happening constantly.

Image result for obamagate

Any digital device can potentially be accessed and used to spy on you even if it appears to be turned off.  And this is why Donald Trump needs to be so careful right now, because the intelligence community wants to take him down and they can literally use any digital device in his possession to try to gather dirt on him.  We have a “deep state” that is absolutely obsessed with watching, tracking and monitoring the American people, and something desperately needs to be done about this unconstitutional surveillance.  Now that Trump has become greatly upset about how the government was tapping into his phone calls, maybe something will finally get accomplished.

In an article that I just published on The Most Important News, I talked about the NSA’s brand new two billion dollar data storage facility in Utah that can store up to five zettabytes of data.  Secret “electronic monitoring rooms” embedded within the facilities of major communications companies across the United States send an endless flow of digital information to this facility, and most Americans have no idea that this is even happening.  The following comes from Wired

Before yottabytes of data from the deep web and elsewhere can begin piling up inside the servers of the NSA’s new center, they must be collected. To better accomplish that, the agency has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency. The broad outlines of the so-called warrantless-wiretapping program have long been exposed—how the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits.

Whistleblowers have come forward again and again to warn us about what was happening, but they have largely been ignored.  One of the most prominent whistleblowers was former NSA employee William Binney

Binney left the NSA in late 2001, shortly after the agency launched its warrantless-wiretapping program. “They violated the Constitution setting it up,” he says bluntly. “But they didn’t care. They were going to do it anyway, and they were going to crucify anyone who stood in the way. When they started violating the Constitution, I couldn’t stay.” Binney says Stellar Wind was far larger than has been publicly disclosed and included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts. The haul only grew from there.

Can you imagine recording 320 million phone calls a day?

And that was at the beginning of the program – I can’t even imagine what the number must be these days.

But even if you aren’t using your phone government spooks can still potentially be listening to you.  The following comes from a CNN article entitled “How the NSA can ‘turn on’ your phone remotely“…

Government spies can set up their own miniature cell network tower. Your phone automatically connects to it. Now, that tower’s radio waves send a command to your phone’s antennae: the baseband chip. That tells your phone to fake any shutdown and stay on.

A smart hack won’t keep your phone running at 100%, though. Spies could keep your phone on standby and just use the microphone — or send pings announcing your location.

John Pirc, who did cybersecurity research at the CIA, said these methods — and others, like physically bugging devices — let the U.S. hijack and reawaken terrorists’ phones.

Unfortunately, these tactics are not just used against “terrorists”.

The truth is that these tactics are employed against anyone that the NSA is interested in, and in fact they could be listening to you right now.

Thanks to Edward Snowden, we have learned quite a bit about how the NSA takes over digital devices…

The latest story from the Edward Snowden leaks yesterday drives home that the NSA and its spy partners possess specialized tools for doing exactly that. According to The Intercept, the NSA uses a plug-in called GUMFISH to take over cameras on infected machines and snap photos.

Another NSA plug-in called CAPTIVATEDAUDIENCE hijacks the microphone on targeted computers to record conversations.

Intelligence agencies have been turning computers into listening devices for at least a decade, as evidenced by the Flame spy tool uncovered by Kaspersky Lab in 2012, which had the ability to surreptitiously turn on webcams and microphones and perform a host of other espionage operations.

So what can you do to prevent this from happening?

If you have external webcams and microphones, you can unplug them when they are not in use.

If you have a built-in camera, some have suggested covering the camera with a sticker.

And of course pulling out the battery entirely will prevent someone from taking over your phone when you are not using it.

But at the end of the day, it is going to be really hard to keep government spooks out of your electronic devices completely.  They have become extremely sophisticated at using these devices to get what they want, and they will literally go after just about anyone.

For example, just consider what they did to former CBS reporter Sharyl Attkisson.  In her recent book, she details a campaign of digital harassment that sounds like something out of a spy novel.  The following comes from the Washington Post

The breaches on Attkisson’s computer, says this source, are coming from a “sophisticated entity that used commercial, nonattributable spyware that’s proprietary to a government agency: either the CIA, FBI, the Defense Intelligence Agency, or the National Security Agency (NSA).” Attkisson learns from “Number One” that one intrusion was launched from the WiFi at a Ritz Carlton Hotel and the “intruders discovered my Skype account handle, stole the password, activated the audio, and made heavy use of it, presumably as a listening tool.”

To round out the revelations of “Number One,” he informs Attkisson that he’d found three classified documents deep inside her operating system, such that she’d never know they were even there. “Why? To frame me?” Attkisson asks in the book.

If they can do all of that to Sharyl Attkisson, they can do it to Donald Trump too.

Trump needs to understand that the deep state is trying to destroy him, and that everything that he says and does is being monitored.

So until Trump can completely clean house at all of our intelligence agencies, he is going to have to be extremely careful 24 hours a day.

And let us hope that Trump is ultimately victorious in his struggle against the deep state, because the future of this nation is literally hanging in the balance.

Please follow and like us:

Other articles of interest:

Holy Moly, Now Wells Fargo Recommends a Credit Freeze in Equifax Hack Third largest US bank reaches out to its customers. A mass credit freeze would have a huge impact. No one knows yet how the Equifax hack – during whi...
Iran slams failed terror attack in Saudi Arabia I was more than a bit suspicious of this attack happening in the middle of the Qatar political spat, and the Crown Prince shake up. Added to that was ...
George Soros and UN Supplying migrants with a document on how to break the law Migrants are being issued with backpacks full of supplies, given to them by the UNHCR, and more often than not the migrants throw them away once all t...
A Working Vehicle Could Be The Difference Between Life And Death Once An EMP Event Strikes: Top 10 V... Thirty years ago, most of the cars used carburetors, and only a few people believed that electromagnetic pulse (EMP) is a ...
Here’s How You Can Still Get Heart Healthy After 40 A new study by Johns Hopkins Medicine researchers offers middle-aged Americans hope that they can still improve their heart health.The study, publishe...

Government Spooks Can Use The Mic And Camera On Trump’s Phone Even When He Thinks It Is Turned Off

After reading this article you might not ever view your electronic devices the same way again.  Last year, Hollywood released a biographical political thriller based on the life of Edward Snowden that had one particularly creepy scene.  In that scene, a government spook used a program to remotely activate the microphone and camera on a laptop, and by doing so he was able to watch a woman as she got undressed.  Sadly, as you will see below, this kind of thing is happening constantly.  Any digital device can potentially be accessed and used to spy on you even if it appears to be turned off.

Trump Speaking With Putin In The Oval Office - Public Domain

And this is why Donald Trump needs to be so careful right now, because the intelligence community wants to take him down and they can literally use any digital device in his possession to try to gather dirt on him.  We have a “deep state” that is absolutely obsessed with watching, tracking and monitoring the American people, and something desperately needs to be done about this unconstitutional surveillance.  Now that Trump has become greatly upset about how the government was tapping into his phone calls, maybe something will finally get accomplished.

In an article that I just published on The Most Important News, I talked about the NSA’s brand new two billion dollar data storage facility in Utah that can store up to five zettabytes of data.  Secret “electronic monitoring rooms” embedded within the facilities of major communications companies across the United States send an endless flow of digital information to this facility, and most Americans have no idea that this is even happening.  The following comes from Wired

Before yottabytes of data from the deep web and elsewhere can begin piling up inside the servers of the NSA’s new center, they must be collected. To better accomplish that, the agency has undergone the largest building boom in its history, including installing secret electronic monitoring rooms in major US telecom facilities. Controlled by the NSA, these highly secured spaces are where the agency taps into the US communications networks, a practice that came to light during the Bush years but was never acknowledged by the agency. The broad outlines of the so-called warrantless-wiretapping program have long been exposed—how the NSA secretly and illegally bypassed the Foreign Intelligence Surveillance Court, which was supposed to oversee and authorize highly targeted domestic eavesdropping; how the program allowed wholesale monitoring of millions of American phone calls and email. In the wake of the program’s exposure, Congress passed the FISA Amendments Act of 2008, which largely made the practices legal. Telecoms that had agreed to participate in the illegal activity were granted immunity from prosecution and lawsuits.

Whistleblowers have come forward again and again to warn us about what was happening, but they have largely been ignored.  One of the most prominent whistleblowers was former NSA employee William Binney

Binney left the NSA in late 2001, shortly after the agency launched its warrantless-wiretapping program. “They violated the Constitution setting it up,” he says bluntly. “But they didn’t care. They were going to do it anyway, and they were going to crucify anyone who stood in the way. When they started violating the Constitution, I couldn’t stay.” Binney says Stellar Wind was far larger than has been publicly disclosed and included not just eavesdropping on domestic phone calls but the inspection of domestic email. At the outset the program recorded 320 million calls a day, he says, which represented about 73 to 80 percent of the total volume of the agency’s worldwide intercepts. The haul only grew from there.

Can you imagine recording 320 million phone calls a day?

And that was at the beginning of the program – I can’t even imagine what the number must be these days.

But even if you aren’t using your phone government spooks can still potentially be listening to you.  The following comes from a CNN article entitled “How the NSA can ‘turn on’ your phone remotely“…

Government spies can set up their own miniature cell network tower. Your phone automatically connects to it. Now, that tower’s radio waves send a command to your phone’s antennae: the baseband chip. That tells your phone to fake any shutdown and stay on.

A smart hack won’t keep your phone running at 100%, though. Spies could keep your phone on standby and just use the microphone — or send pings announcing your location.

John Pirc, who did cybersecurity research at the CIA, said these methods — and others, like physically bugging devices — let the U.S. hijack and reawaken terrorists’ phones.

Unfortunately, these tactics are not just used against “terrorists”.

The truth is that these tactics are employed against anyone that the NSA is interested in, and in fact they could be listening to you right now.

Thanks to Edward Snowden, we have learned quite a bit about how the NSA takes over digital devices…

The latest story from the Edward Snowden leaks yesterday drives home that the NSA and its spy partners possess specialized tools for doing exactly that. According to The Intercept, the NSA uses a plug-in called GUMFISH to take over cameras on infected machines and snap photos.

Another NSA plug-in called CAPTIVATEDAUDIENCE hijacks the microphone on targeted computers to record conversations.

Intelligence agencies have been turning computers into listening devices for at least a decade, as evidenced by the Flame spy tool uncovered by Kaspersky Lab in 2012, which had the ability to surreptitiously turn on webcams and microphones and perform a host of other espionage operations.

So what can you do to prevent this from happening?

If you have external webcams and microphones, you can unplug them when they are not in use.

If you have a built-in camera, some have suggested covering the camera with a sticker.

And of course pulling out the battery entirely will prevent someone from taking over your phone when you are not using it.

But at the end of the day, it is going to be really hard to keep government spooks out of your electronic devices completely.  They have become extremely sophisticated at using these devices to get what they want, and they will literally go after just about anyone.

For example, just consider what they did to former CBS reporter Sharyl Attkisson.  In her recent book, she details a campaign of digital harassment that sounds like something out of a spy novel.  The following comes from the Washington Post

The breaches on Attkisson’s computer, says this source, are coming from a “sophisticated entity that used commercial, nonattributable spyware that’s proprietary to a government agency: either the CIA, FBI, the Defense Intelligence Agency, or the National Security Agency (NSA).” Attkisson learns from “Number One” that one intrusion was launched from the WiFi at a Ritz Carlton Hotel and the “intruders discovered my Skype account handle, stole the password, activated the audio, and made heavy use of it, presumably as a listening tool.”

To round out the revelations of “Number One,” he informs Attkisson that he’d found three classified documents deep inside her operating system, such that she’d never know they were even there. “Why? To frame me?” Attkisson asks in the book.

If they can do all of that to Sharyl Attkisson, they can do it to Donald Trump too.

Trump needs to understand that the deep state is trying to destroy him, and that everything that he says and does is being monitored.

So until Trump can completely clean house at all of our intelligence agencies, he is going to have to be extremely careful 24 hours a day.

And let us hope that Trump is ultimately victorious in his struggle against the deep state, because the future of this nation is literally hanging in the balance.

theeconomiccollapseblog.com/archives/government-spooks-can-use-the-mic-and-camera-on-trumps-phone-even-when-he-thinks-it-is-turned-off

 

Please follow and like us:

Other articles of interest:

The Real Story of David Rockefeller That the Media Isn’t Telling No one person encapsulates the enduring legacy of the “robber barons” of the Industrial Age quite like David Rockefeller. Rockefeller, who died today ...
Orlando Shooting Hoax…Crisis Actors Caught Off Guard https://www.youtube.com/watch?time_continue=67&v=OC5tDJTIzPQ What more proof do we need to show you that this Orlando Shooting was nothing more tha...
The shocking ingredients in flu vaccines The push for widespread flu vaccination is something that happens year after year. In fact, it seems as though the mainstream medical community is bec...
Queer Persona’s will Manifest at Halloween this year 1st Thessalonians 5:22 “Abstain from all appearance of evil.” What part of those six words do you not understand…….., Christian? Devil Worshiping A...
The Real Truth Behind the Greatest Illusion of All Time 9/11 (Before It's News) This is for all the serious 9/11 researchers out there. Read this info carefully. It changes everything you have EVER learned abou...

Your Cell Phone Is a Death Trap-5G Is a Killer- Virgina Farver

I recently interviewed Virginia Farver about the police state surveillance grid being installed at breakneck speed all across America.

The system will be powered by 5G. This is reckelss and very dangerous. Your cell phone has become a major impediment to your health, not to mention your privacy. The Intellistreet light poles spy on you. Every traffic cam recognizes you.

Image result for Death em radiation

Every move you make, every breath you take, the police state surveillance grid is stalking you.

 

Please follow and like us:

Other articles of interest:

AI Robotic Computers Making Hospital Life and Death Decisions on Patients Are we the last generation? Are carbon based life-forms going to disappear from the face fo the earth? Maybe, maybe not. But increasingly in the UK ...
White Helmets: Severed Heads of Syrian Arab Army Soldiers Paraded as Trophies – Endorsed by Channel ... Before the Grenfell Tower blaze had died down to a smouldering monument to the tragic death of possibly hundreds of, so far, unidentified victims, tra...
Gargantuan! Spook D’etat: Deep State Civil War Forthwith! Plus Police Raid Dem HQ You Won’t Believe ... The U.S. is experiencing a takeover from a criminal class and the criminal government is being interveined! The nation of America is being shaken to t...
Snowpiercer | Based on a True Story | Feudal System & Order Out of Chaos Snowpiercer analysis: Snowpiercer is basically the world we live in now. Seperated into classes like the feudal system, we have the peasants, the poli...
Russia writes off billions to the countries that do not even say thank you Why does the Russian leadership regularly write off multi-billion debts of the countries that may not even give Russia credit for that? Pravda.Ru Gene...