Tag Archives: spying

Conspiracy Theory Confirmed: Researcher Shows How Phone Shows Ads Based on Conversations It Hears

For years, smartphone users have been growing increasingly suspicious that their devices are listening to them to feed them advertisements and to “enhance their experience” on third-party apps. Companies like Google and Facebook have consistently denied these claims, saying that targeted ads and messages are merely a coincidence, and that data for these services are taken in other ways.Image result for spying mobile

However, earlier this year during the Cambridge Analytica scandal we began to see some of the first hints that our phones may actually be listening to us.

Cambridge Analytica whistleblower Christopher Wylie says that they have probably been listening all along. During an appearance before the UK parliament, Wylie said, “There’s audio that could be useful just in terms of, are you in an office environment, are you outside, are you watching TV, what are you doing right now?”

Since the scandal, experts who have studied this possibility began revealing their surprising results.

In a recent interview with Vice, Dr. Peter Hannay, the senior security consultant for the cybersecurity firm Asterisk, explained how third-party apps exploit a loophole to gather the voice data from your phone.

Hannay said that while your microphone is always on, your voice data is only sent out to other parties if you say specific trigger words such as “Hey Siri” or “OK Google,” but there is a catch. Third-party apps often ask to gain access to voice data in their user agreements to “enhance the experience” of their products.

“From time to time, snippets of audio do go back to [other apps like Facebook’s] servers but there’s no official understanding what the triggers for that are. Whether it’s timing or location-based or usage of certain functions, [apps] are certainly pulling those microphone permissions and using those periodically. All the internals of the applications send this data in encrypted form, so it’s very difficult to define the exact trigger,” Hannay said.

While this process is becoming more obvious by the day, many tech companies continue to deny that they are engaged with this practice, and since all of the outgoing information is encrypted there is no way of telling exactly which information they are getting and how they are using it.

“Seeing Google are open about it, I would personally assume the other companies are doing the same. Really, there’s no reason they wouldn’t be. It makes good sense from a marketing standpoint, and their end-user agreements and the law both allow it, so I would assume they’re doing it, but there’s no way to be sure.” Hannay said.

Vice reporters then conducted their own experiment, saying random phrases into their phones and then seeing advertisements affiliated with those terms pop up in their news feeds. You can try this experiment at home yourself, and it is highly likely that you have experienced results like this by accident.

In April, I experienced something like this when a friend visited my house from the west coast. I picked him up from the Baltimore-Washington airport and during a conversation about his flight, he told me that he had a layover in Charlotte, North Carolina, and mentioned that they had a nice airport.

The following morning I woke up with these messages on my phone:

 

Oddly enough, I have never been to Charlotte, North Carolina, never really thought about the place, and have never typed anything about that place into Google or Facebook. But sure enough, after having a conversation about the airport in Charlotte, my phone thought I was interested.

As of right now, there is no way to avoid this spying, aside from being extremely careful about the apps that you sign up for, and actually reading their user agreements—or getting rid of your cell phone altogether, which could be counterproductive if you use it for business.

Please follow and like us:

Other articles of interest:

Banned on Facebook: Syria Inspections, the Truth, Duff on Press TV Experts from the international chemical weapons watchdog start work in Syria on Saturday as Damascus reaffirms willingness to fully cooperate with the...
George Soros: ‘I Am A God, I Created Everything, I Control America And Hillary Clinton’ Soros also c... George Soros claims he is a god and “the creator of everything,” however the billionaire globalist also warns he is a “self-centred” god who believes ...
Dangers of a Deadly Fungus: The Candida auris ‘Superbug’ A fungus has recently emerged as a dangerous health threat in over a dozen countries, with 77 clinical cases reported in U.S. healthcare facilities ...
Unique breathprint:’ Scientists develop device able to ‘sniff out’ 17 deadly diseases An international team of researchers has developed a unique device that can detect and distinguish between as many as 17 illnesses, ranging from multi...
Why You Should Start Using Coconut Oil as a Toothpaste Coconut oil has revealed another of its many health benefits – it can kill bacteria associated with tooth decay. Researchers from Ireland’s Athlone In...

Talpiot – Antichrist Domination of Earth!

Talpiot – Total Domination! from Truth Warriors on Vimeo.

Incredible information on the biggest spy and control program in the history of the world!  It’s called Talpiot and it’s being completely hidden by the Fake News and fake alternative news too!  The Talpiot program was created way back in the 1980s to totally dominate all aspects of society by taking over all high technology for Israel!   Israel has built the biggest spy machine in human history and used it to steal US technology that it uses to dominate industries, create massive new companies and embed spyware and control into every high technology on the planet!

I had no idea it was this bad but Israel has taken over everything!  We give them billions each year and in return they take our technology, sell it to Russia and others and  then totally dominate us with it!   Want to find out who is real and fake in alternative media?  Find out who is covering Talpiot and who hides it!

Do a search yourself on Alex Jones using the command on Google: site:infowars.com talpiot and see what comes up!  You’ll see one listing and it was from a member of Planet Infowars and it was about a tomb, not the Israeli Talpiot program for dominating everything!  If you think it’s wrong for Alex Jones with his millions and over 100 employees to be censoring Talpiot DEMAND he report on it by emailing him at showtips@infowars.com and watch him and his staff ignore you!  You’re only good for milking for money baby!  You don’t deserve an answer from the tip of the spear or his staff!  Watch and see, I dare you!   Demand answers for all lies and censorship and we can win!   If you can never get a response from somebody even though they have over 100 employees, what does that tell you?  They don’t CARE about you and certainly don’t care about winning!  You are a resource and that’s it!  Nobody runs and hides when they are REAL!

If you don’t realize there is much evil going on in Israel then you don’t read your bible!  Where does the antichrist rule from?   Jerusalem!    He’s probably there right now building the Talpiot system of total control!  I’m not saying all people of Israel are evil but the evil Rothschilds setup the modern state of Israel and they do much evil.   When Israel does evil it must called out just as when the US bombs Syria on a lie.   Nobody gets a free pass for doing evil.    When Israelis shoot Palestinians in the head who are not holding guns is this what Jesus would want?   If you think so then you should go work for the antichrist!   You know where he’ll be building his base of operation!

More great information can be found in the link below.

To Understand Globalist Zionist Power And How It Rules From Israel, You Must Understand These Words – “THE TALPIOT PROGRAM” and “THE TECHNION”

Founded in Israel five years ago by entrepreneurs Omri Lavie and Shalev Hulio, NSO makes software that secretly targets a user’s mobile phone and gathers information, including text messages, photos and internet browning data.

https://isolatebutpreserve.blogspot.com/2016/11/israel-greatest-spy-machine-of-all-time.html

 

Please follow and like us:

Other articles of interest:

You Are EXILES (minus Maserati commercial and conclusion) The big secret about your identity that the world does not want you to know about. There is a very dark truth about Satanic ritualistic cannibalism an...
Aleppo (Again) Turns Into Focal Point Of The War On Syria On Thursday I judged that the U.S. supported al-Qaeda attack in southwest Aleppo was failing. Despite the failure of their main thrust, al-Qaeda and ...
Do You Want The Chemtrails Gone? “Trump Promises End of Chemtrails” Chemtrails CONTINUE across the nation NOW comes the time of revelation to Trump that he is NOT a ‘presiden...
Obamagate: CNN Host Stunned, Chokes, Unable to Speak Holds Back Tears After Trump Supporter’s Obama ... The media are melting down because Trump’s saying Obama wiretapped him. The CNN host tears up: holds back sobs and she chokes up. It’s great. Sh...
EU Daesh Attacks – Blind man’s bluff The Reality is Daesh Doesn’t Even Know of the Attacker Until After the Attack These Daesh people sure know how to reach out to a certain segment of...

Related Posts

Obama Ordered Spying! Everybody is ratting him out!

Intel Briefing – Tom Heneghan, Stew Webb (6-1-18) from Truth Warriors on Vimeo.

Right after this show, Tom reported one of his US French Intelligence sources is reporting Barack Obama is telling his inner circle he didn’t KNOW about the CIA using Stefan Halper to SPY on Donald Trump!  They have intercepted conversations apparently.  This is a HUGE admission because Obama used to say there was absolutely no spying going on!  Remember when the fraud also said it was impossible to steal an election!   Obama and his deep state is in a PANIC right now!   He knows he is BUSTED and he is claiming ignorance!   It’s not going to work!  Get the TRUTH out EVERYWHERE and rout those demons!  Obama and Hillary ordered spying on Trump!  TREASON!  Here’s more information below on this!  Share to ALL social networks and email lists to overload the censorship grid!  They can’t stop us if you all do this NOW!  Tom says it’s time for every patriot around the world to help put Bush, Clinton and Obama in prison!  We need you to RAGE all over social media by sharing information like this and other truth to all your friends also via email!  If you all do this, we cannot lose!  We only lose if you stay silent because of fear!  God told you in his word to not be fearful!  Go crazy out there and wake up the planet!  It’s an honor to serve with all of you truth warriors!  Increase all your efforts by double!  It’s time to blow up their death star and put Obama, Bush and Clinton in jail and destroy their filthy legacies in the court of public opinion!  Tell everybody Trey Gowdy is a TRAITOR and is covering up for evil too!  He’s pulled off his mask too and everybody sees the evil underneath!

Image result for Obama i'm not a crook

John Solomon Bombshell: Obama Deep State Was Spying on Trump Campaign with Human Sources Before Investigation Launched

“The revelation of purposeful contact initiated by alleged confidential human sources prior to any FBI investigation is troublesome,” Rep. Mark Meadows (R-N.C.), an ally of President Trump and chairman of a House subcommittee that’s taking an increasingly aggressive oversight role in the scandal, told me. “This new information begs the questions: Who were the informants working for, who were they reporting to and why has the [Department of Justice] and FBI gone to such great lengths to hide these contacts?”

https://www.thegatewaypundit.com/2018/06/john-solomon-bombshell-obama-deep-state-was-spying-on-trump-campaign-with-human-sources-before-investigation-launched/

Here’s some bullet points on what Tom and Stew cover in this broadcast!

FBI/CIA spy Stefan Halper was hired by Hillary Clinton and Barack Obama to spy on Michael Flynn and Donald Trump.  Michael Flynn knows ALL the truth on 9/11, the Bush Scherf connection making all Bushes illegal to hold any public office and much more!  They had to neutralize Flynn and take down Trump or their treasonous acts would be discovered!  Remember Hillary screamed “If Trump Wins, We All Hang by Nooses” after the Matt Lauer interview when he went off script and asked her a real question about the email server!   

Tom also covers the treason of David Ignatius at the Washington post fake news rag and how he works for the CIA and leaked information to damage Trump!

Hillary Clinton worked directly with Jonathon Pollard at the Rose Law Firm!  Pollard was America’s most notorious spy who got over 30 CIA agents killed form information he released!   Both Hillary and Bill were recruited by the CIA.

Stefan Halper worked with Hillary and the Bushes in the 80s!

French Intelligence has passed on a treasure trove of information relating to illegal activities of John Brennan, Robert Mueller, Andrew McCabe!

Image result for Obama criminal

Please follow and like us:

Other articles of interest:

Anatomy of a purge: MBS’s actions, Saudi Arabia’s crisis, and its coming collapse Saudi Arabia's Deputy Crown Prince Mohammed bin Salman reacts upon his arrival at the Elysee Palace in Paris, France in this June 24, 2015 file ph...
LOL: Facebook Boss Zuckerberg Sits on Briefcase/Cushion Mark Zuckerberg spent Tuesday afternoon being grilled by senators from the comfort of a black leather arm chair topped up with an extra inches-thick b...
Casino condenses timeline of start of mass shooting in Las Vegas The corporate owner of the high-rise Las Vegas Strip casino from which a gunman unleashed one of the deadliest mass shootings in modern U.S. histo...
David Dees’ Art KILLS FASCISTS My friend, political artist David Dees returns to SGT Report to discuss his upcoming book, David Dees Art Volume 3… and I put David on the spot and as...
How a Young Blonde Party Girl “Woke Up” And What God Showed Her About Those Who “Can See” Almost ALL of the people I know in “real life” have blocked or unfriended me on Facebook  (as well as in reality) b/c I don’t hold back. I am so inter...

Related Posts

How Israeli Hardware Back-Doored Everything! Jeff & Brendon O’Connell – Shocker…The Talpiot Program! – Pt 1

The Intel Management system. Or, the Israel Management System. This extract is 2.32 minutes long. Perfect for todays busy IT housewife as she breastfeeds, makes dinner and runs her corporate level business in red high heels waiting for hubby to get home from the office.

Image result for Talpiot Program

Taken from the excellent mini doco – “Israeli Drones World Wide”. https://www.youtube.com/watch?v=U4ce3…

Israel’s Secret Weapon – The Talpiot Program https://www.youtube.com/watch?v=rYE9U…

A tiny “Arc Processor” sitting of The Talpiot Program. No one is safe – no one. AMD has the exact same system – Platform Security System – and that is now totally owned and run by China. The ENTIRE worlds “Cloud Based” Internet system is backdoored by Israel. THIS is a national security disaster.

Disaster is spelt D-I-S-A-S-T-E-R. I have copped endless shit for 9 years exposing this. I have been jailed, beaten, bashed, vilified and threatened with the dreaded “Wood Shed” within the Intel CPU with it’s own custom version of Linux (Minix) operating beyond the software level – completely transparent to the end user.

Does not matter if your using Windows, Linux or Apple iOS…you are toast and THIS is how Israel does it. All part y Ry Ry Dawson [shivers], but I am still here. And so are you. I have been greeted by high level players. Everyone HATES Israel. Everyone. They just have the key staff in key positions bribed and blackmailed.

They have “kill switched” the worlds infrastructure. This is why Netanyahu is soooooooooo cocky and why we never seem to get anywhere. With thanks to Luke for the details on the IME. Luke worked as a software engineer and specialized in all things Intel.

special/rense_O_Connell_051518_hr3.mp3
HOW ISRAEL HARDWARE BACKDOORED – EVERYTHING
Please follow and like us:

Other articles of interest:

Flat earth prison https://www.youtube.com/watch?v=RcvDUDx0DrU
Global Collapse – Trading When The Dollar Fails – Globalization – David Morgan of ... What do you do when the paper dollar fails? Global Collapse - Money When The Grid Fails - Globalization and Tyranny With David Morgan: https://www...
Trump says he’ll allow release of Kennedy assassination files   This file photo taken on November 8, 2013 shows a historic photo of post JFK assassination Dealey Plaza diplayed near its original locatio...
Airport Systems Crashed Worldwide, Could A Power Grid Failure Be Next? Airport computer systems crashed around the globe today. The crash caused passenger delays, angst, and fright among travelers,...

Related Posts

ISRAEL’S SECRET WEAPON – THE TALPIOT PROGRAM

Netanyahu can get away with murder because Israel controls the worlds high technology sector – over and above even the US. That “American” you see “controlling” something?

He or she is an American Jew or Zionist, dual national Israeli American citizen. Israel rules. Until we target specifically this control of the high technology sector and specifically The Talpiot Program, we will all continue to wonder how Israel gets away with all it does. It is a racist state of the most odious kind. But who will stand up to them?

From medical nano technology to cyber security to private hacking companies to military technology to police databases, banking, finance and medical – Israel runs them all. This is Israel’s false flag nuke.

Please follow and like us:

Other articles of interest:

Vegas Massacre Real Event Update 2 William Ramsey Investigates - https://www.youtube.com/watch?v=5twq6... https://www.youtube.com/watch?v=KxEElmZHZKM
DOD Conducts Blackout Simulation Nov 4-6th – Why on Earth the Same Days as Antifa ‘Rally’? Plus US/N... Elements of the US Department of Defense will conduct a “communications interoperability” training exercise November 4-6, once again simulating a “ver...
Russia Still Playing ‘Where’s the S-300?’ With NATO Apparently the game of S-300 hide-and-seek between Russia and NATO is still going strong. It was revealed late last year that Russia had mobilized ...
Australian 60 Minutes exposed the Worldwide Satanic Pedophile Network Australian 60 Minutes published a story that 60 Minutes (America) would never dare touch. In America and the UK, the Pedophile Network controls high r...
The #1 Reason Why Your Friends and Family Don’t Believe Your Conspiracy Theories Are you growing weary of trying to warn people about the New World Order and their FEMA camps, forced vaccinations, soon-to-be skyrocketing utilities ...

Related Posts

USA Liberty Act: New ‘Foreign’ Intelligence Law Will Legalize Spying On Americans

House Judiciary Chairman Bob Goodlatte (R-VA), Ranking Member John Conyers (D-MI), Rep. Jim Sensenbrenner (R-WI), and Rep. Sheila Jackson Lee (D-TX) unveiled a new bill called the “USA Freedom Act,” which aims to reauthorize and modify the Foreign Intelligence Surveillance Act (FISA). Without the renewal, FISA would expire at the end of this year.

Codifying Mass Surveillance Of Americans

Those who have followed the passing and then usage of mass surveillance-enabling bills such as the Patriot Act and its successor, the USA Freedom Act, may already be suspicious about a bill named the “USA Liberty Act.”

 Indeed, although the bill does aim to curtail some illegal NSA activities and abuses that shouldn’t have happened in the first place, it also codifies into law the bulk collection of Americans’ data. It also codifies the NSA’s ability to share data with other domestic agencies.

President Obama also expanded some executive rules last year that allowed the NSA to share raw intelligence data without a warrant with 16 other agencies. Because the shared data is raw, Americans’ data can be seen by agents from any of the 17 agencies, without any judicial approval. Such broad access may also put this data at risk from cyber attacks.

It’s not clear if the new USA Liberty Act, which does require a warrant when Americans’ communications content is accessed by the other 16 agencies, including the FBI, overrides those rules. The USA Liberty Act is also much more relaxed when it comes to metadata (phone or email records, etc.), requiring only a supervisor’s approval for access.

What is clear is that until last year, the so-called “incidental” data collected on Americans through foreign intelligence programs was supposed to be minimized and then automatically purged. However, President Obama’s expanded rules now allow 17 agencies to scour through that data before any minimization or purging happens.

Meanwhile, the USA Liberty Act seems to imply that data will be kept long enough that there will be enough time for domestic agencies to get warrants from judges or other type of approvals to obtain it. In other words, the supposed “incidental” collection is starting to seem less incidental and more purposeful.

The agencies have been caught many times with their hands in the proverbial cookie jar of domestic data. However, because these surveillance laws, including the new USA Liberty Act, never mention any criminal sanctions for such abuses, no one has been punished for it.

The NSA and DEA even built a parallel construction program together, where the DEA would get illegal surveillance information in drug cases that it would then use in court, while telling judges it came from other legal requests. The program was eventually terminated due to Edward Snowden’s revelations.

“Backdoor Search” Reform Is Broken

Demand Progress, a civil liberties group, claimed that although on the surface the bill seems to add some important reforms, most of them are surface-deep.

One of the primary issues civil liberties activists, as well as Senator Ron Wyden, have had with FISA section 702 surveillance in the past is that it allowed for “backdoor searches” on Americans. In theory, the NSA should be spying only on foreign communications. However, as always, the devil is in the details.

Until recently, for instance, the NSA would collect any communication of people who would even talk “about” a terror plot or some other national security concern. Therefore, anyone who may be talking to friends or family, or post online about a recent attack seen on the news, may have had their communications collected by the NSA.

The NSA interpreted this type of collection to be “relevant” to its investigations. However, common sense would dictate that this interpretation is quite broad. It may have also been one of primary factors paralyzing the agency’s analysts with too much data.

The FISA Court eventually put an end to this practice, after having previously been accused of rubber-stamping virtually all of the NSA’s requests. The USA Liberty Act now codifies this prohibition to collect communications that are simply “about” targets.

However, Demand Progress still believes that by allowing the NSA to collect data for “foreign intelligence purposes,” this gives the agency too much latitude to define what exactly that would mean and who can be its targets. The civil liberties group feels that the exception would eventually “swallow the rule.”

Other Paper Reforms

Demand Progress thinks that because there’s no strict limit on how accessed data can be used and for how long, this could lead to abuses. Other agencies could be allowed to use Americans’ data in other investigations that have nothing to do with national security.

The civil liberties group also complained that the USA Liberty Act is missing a key provision that requires the government to give notice when it uses FISA section 702 surveillance in prosecutions.

According to one of the co-authors of the Patriot Act, the NSA didn’t interpret the law as it was intended by Congress. Instead, the NSA used secret interpretations of the law to expand its own surveillance capabilities. Demand Progress fears that this could happen once more unless the executive branch is mandated to tell Congress and the public how it’s interpreting the new USA Liberty Act.

FISA will expire on December 31, 2017, unless the USA Liberty Act or some other bill that aims to reauthorize the same programs pass by then. If the USA Liberty Act passes, it would be in place for six years, until September 30, 2023. Many civil liberties organizations believe that unless real reforms are added to the bill, then FISA should be allowed to expire.

The EFF has set up a page to email your Congress representatives, and you can also call their offices directly if you’d like either to see the FISA surveillance law expire or see the implementation of stronger reforms via the USA Liberty Act.

Please follow and like us:

Other articles of interest:

Judicial Watch Exposes Steve Bannon! Warren Hysterical Rant! Bannon Prophetic Speech! He’s Awake! (V... The left and the Establishment/NWO/Globalists are losing the minds over Trumps decision to place Steve Bannon of Breitbart as his number two guy. ...
How the Mother of All Bombs kills people: Vaporized bodies, crushed internal organs and suffocated t... The GBU-43, also known as the Mother of All Bombs, or MOAB unleashes a devastating fireball that incinerates and vaporizes anything within 30 feet upo...
Report: 7 Percent of Americans Think Brown Cows Make Chocolate Milk  It might seem like a "Saturday Night Live" bit, but it's true nonetheless. An online survey from the Innovation Center for U.S. Dairy found that se...
Caught On Tape: Did The US Target That Syrian Aid Convoy With Hellfire Missile? Hellfire Signature? Footage of the nighttime attack on the Syrian aid convoy in Aleppo has surfaced. But there’s something curious about how the fo...
No Matter Who Wins…The Bad Guys Will Lose The Good Guys have pulled off an amazing feat - they have destroyed the Democratic and Republican Party establishments. Clearly they were attacking ...

HP Laptops Discovered To Be Spying On Users With Keylogger

Swiss cybersecurity firm Modzero has discovered that 28 models of HP laptops running the “MicTray64.exe” audio driver on Windows 7 and 10 systems – a little over 20% of all laptops – have been spying on users via a ‘keylogger,’ a program which records every keystroke made on the device. This means that passwords for banking, email accounts, and private communications on affected laptops are being stored locally – which “leads to a high risk of leaking sensitive user input.”

“Users are not aware that every keystroke made while entering sensitive information – such as passphrases (or) passwords on local or remote systems – are captured by (the software)” –Modzero

When Modzero contacted HP about the issue the company went radio silent, so the Swiss firm went public with it’s findings. When UK based Sky News picked up the story and reached out to HP, the company said they were “aware of the keylogger issue on select HP PCs.”

HP told Sky News: “Our supplier partner developed software to test audio functionality prior to product launch and it should not have been included in the final shipped version. Fixes will be available shortly via HP.com.” Sky News

A full list of affected laptops can be found here.

Here is Modzero’s writeup on how the keylogger works:

Conexant’s MicTray64.exe is installed  with the Conexant audio driver
package and registered as a Microsoft Scheduled Task to run after each
user login. The  program monitors all  keystrokes made by  the user to
capture  and  react  to  functions  such  as  microphone   mute/unmute
keys/hotkeys. Monitoring of keystrokes is added by implementing a low-
level keyboard input  hook [1] function…

In addition to the handling  of hotkey/function key strokes, all  key-
scancode information [2] is written into a logfile in a world-readable
path (C:\Users\Public\MicTray.log).

Content originally generated at iBankCoin.com

BIG BROTHER: Key-loggers installed in new HP Laptops security firm says

Key-loggers installed in new HP Laptops security firm says #1984

VIDEO:

HP laptops are recording EVERYTHING you type: Sinister keylogging software is found on dozens of models #1984

http://www.dailymail.co.uk/sciencetec…

 

Please follow and like us:

Other articles of interest:

Trump to Avenge CIA Vegas Massacre on TV! (Before It's News) Paddock CIA Accomplice Caught in Tennessee! Webb, Heneghan (10-6-17) from Truth Warriors on Vimeo. Thanks to the US Flag of...
Seth Cropsey – Has the Navy Been Hacked? Senior Fellow Seth Cropsey began his career in government at the Defense Department as Assistant to the Secretary of Defense Caspar Weinberger and has...
Puerto Rico Cop Blasts Truth! Send Troops or We Die! A Puerto Rico cop probably just lost her job by getting on radio and telling the truth! She says the Mayor, Carmen Yulin is letting people die now...
Trump’s win is causing a surge in demand for mental health services Crisis hotlines saw an increase in calls following the election It’s not uncommon for election cycles to cause anxiety, but mental health professiona...
Chip Lake – The Useful Idiots are Becoming Useless Chip Lake, noted political consultant sees the role of the mainstream or legacy media becoming redundant. As their hostility and ignoble agenda become...

Alert: Your Cell Phone is Spying on You! 4 Ways to Block Your Cell Phone and Prevent Being Monitored

ReadyNutrition Guys and Gals, this piece is on the heels of an article released by RT News on 3/8/17, entitled “85% of World’s Smart Phones ‘Weaponized’ by CIA.”  The article is a very disturbing report; however, it isn’t something that just “surfaced” out of the zone of unpredictability.  The basis for the report stems from the recent WikiLeaks release of the CIA-documents and information that just occurred.  Here is an excerpt from that article:

Image result for +Block +"Cell Phone" +mylar

 “Google’s Android operating system, used in 85 percent of the world’s smart phones, including Samsung and Sony, was found to have 24 ‘zero days’ – the code name used by the CIA to identify and exploit vulnerabilities for the purpose of secretly collecting data on individuals.  The techniques allow the CIA to access data from social messaging platforms, including WhatsApp, Weibo and Clockman before encryption, according to WikiLeaks.  Both audio and message data were vulnerable to the exploit through the CIA’s exploitation of gaps in the OS.”

Now mind you, Readers, this piece is not a “news article,” although this event was just reported on 3/8/17.  The purpose of this article is to serve as a “wake-up” call, in case you haven’t taken the measures already outlined in previous articles to protect yourself from your own devices tracking, recording, and (essentially) “spying” upon you.  You may research past articles on electronic security that you can do, and this piece is a “refresher” that will enable you to secure yourself…. from your own equipment.

4 Ways to Block Your Cell Phone and Prevent Being Monitored

As mentioned in times past, Mylar can be your best ally.  Mylar is simple to use, affordable, and it works at blocking the signals going to and from your happy cell-phone tracking and recording device.  Here are some inexpensive sources for the Mylar:

  1. Chip/Snack bags: An infinite variety of sizes are available, and you will have to gauge what size you use after taking the size of your phone/device into account.
  2. Mylar in the form of “ponchos” or “space blankets”: these are a little more expensive than the chips, but only slightly so. You will end up with more Mylar to use, and the pieces you cut will not need to be cleaned off of salt and other detritus as with the chip bags.
  3. Freezer bags: Also in a variety of sizes, such as ones that hold up to 30 lbs. of food/ice (for a laptop-sized device) or just a small 1’ x 1’ bag, such as a lunchbag-cooler size.
  4. Another thing to do is to place your device inside of an ammo can (military issue). In doing so, make sure the rubber gasket around the mouth seals efficiently for a tight seal.  There are other containers that can be used; however, you may have to reinforce the seams with something such as Aluminum HVAC duct tape (available for about $15 per roll from your local Home Depot), and cover them over.  With the ammo cans, the container is contiguous with only the lid needing that rubber gasket that works.

How to Test for Protection

There is a way to test it out with your phone to see if you have the protection.  Take your chip bag or bags.  If they’re small, be advised that you will need about three complete layers around the cell phone.  Also, place your phone in a plastic Ziploc bag before putting them into the chip bags.  This will keep them clean just in case you missed wiping all of the stuff out of them.  Wiping out the bags can best be accomplished with a dry paper towel: the oils, salts, and other filth will be caught up by the towel.  Just remember to cover/swipe the entire inside surface of the bag.

Then turn your phone on, and turn up the volume of its ring all the way.  Next, roll/wrap up your phone and fold it over in at least three complete layers of Mylar.  Then use your house phone/landline/etc. to dial your wrapped-up cell phone’s number, and hold the wrapped-up phone close to your ear.

If you did the job correctly, you will not hear a thing.  Also, make sure you only ring it 3 times.  Any more than that and it may go to a voice-mail/other function, that will send it stored to your cell phone after you unwrap it as a missed call.  This way it will not ring it, and the call will have been cancelled.

Remember what General David Petraeus mentioned about the “Internet of things?”  Well, those days are upon us.  So, what else?  You’ll have to figure out the best method for making your layers work and last a long time.  You can take the chip bags, cut them open with scissors, and make three premeasured layers.  Form a pouch, and cover them inside and out with duct tape.  Then you just slip in your phone, and secure the top (fold it over) with whatever type of clamp or clip works for you.

The continuous signal your cell phone sends out (every 4 seconds) will be interrupted.  Inconvenient?  No.  Coordinate with your family members when you will call and talk to them beforehand.  Emergency?  Pull the phone out of the pouch and use it.


Bottom line: It is a discipline that will have to be followed to enable your privacy…from your own device.


99% of all people carry that thing around with them everywhere.  They’re hooked to it more closely than a fetus to the umbilicus: they can’t function without it.  But the point I’m making is this: Do you own the phone, or does it own you?

You can accomplish the same thing with your laptops and other “smart” toys…your palm-pilots, blackberries, cameras, and all of the other damnable devices that have made you an unwitting prisoner to the powers and systems that set them in place…not for your “technological convenience,” but for the very purposes of control, dominion, and surveillance over you.

Ammo cans work.  The Mylar (when cleaned and fashioned properly) will work.  Now you just received confirmation that it is happening, and I’ve given you methods to use to stop it from happening to you.  The methods work.  I have tested and used them myself.  So, without further ado, figure out how much material you need and make one of these pouches for yourself.  Your privacy is guaranteed under the 4th Amendment from illegal searches and seizures by the government.  That right, however, needs to be exercised by action.  So, finish those Doritos, clean out that bag, and wrap that phone up!  We’d love to hear of any tips or improvements you have come to trust.  Keep fighting that good fight, and send us your comments!  JJ out!

Please follow and like us:

Other articles of interest:

Shooting the Messenger in Sweden On August 8, I wrote here in praise of Sylvi Listhaug, Norway's Minister of Migration and Integration, who has criticized hijab in her country...
WW3 ALERT NORTH KOREA WAR ABOUT TO BREAK OUT TRIGGERING MILITARY INVASION https://www.youtube.com/watch?time_continue=6&v=69g37YyDzCI
Delving into the underground world of urban farming with a WWII air raid shelter transformed into a ...   The WWII shelter in Clapham consists of two large tunnels that were set to link the London Underground That never happened and the shel...
Best diet to heal cancer? Try the Budwig Diet, the meal plan that has been proven to work for more t... The Budwig diet has been around for more than 50 years — and it may be the best anti-cancer diet you’ve never heard of before. Developed by the late D...
ATTACK UPON SYRIA IN PROGRESS Thirteen and a half hours ago, at 9:07 PM eastern time on Saturday night, I warned my Subscribers that a Chlorine Gas attack had allegedly taken place...

Secret Stingray Manuals Reveal How Spying Tools Leave ‘No Place to Hide’

The technology manufacturing company Harris Corporation has fought to keep the public from knowing about how its surveillance devices work—specifically, the controversial cell phone spying tools known as Stingrays—but The Intercept on Monday published about 200 pages of Harris Corp. instruction manuals detailing how to build and use them.

https://assets.documentcloud.org/documents/3105793/Gemini-3-3-Quick-Start-Guide.pdf

Harris has argued that releasing information about Stingrays could help criminals. But privacy activists and the general public say the devices threaten “civil liberties, communications infrastructure, and potentially national security,” especially as wireless capability extends more and more into our personal lives, The Intercept‘s Sam Biddle explains.

He writes:

The documents also make clear just how easy it is to execute a bulk surveillance regime from the trunk of a car: A Gemini “Quick Start Guide,” which runs to 54 pages, contains an entire chapter on logging, which “enables the user to listen and log over the air messages that are being transmitted between the Base Transceiver Station (BTS) and the Mobile Subscriber (MS).” It’s not clear exactly what sort of metadata or content would be captured in such logging. The “user” here, of course, is a police officer.

[….] In order to maintain an uninterrupted connection to a target’s phone, the Harris software also offers the option of intentionally degrading (or “redirecting”) someone’s phone onto an inferior network, for example, knocking a connection from LTE to 2G[.]

Richard Tynan, a technologist with Privacy International, told Biddle that the latest version of the Stingray and similar devices can monitor up to four cell towers simultaneously, and certain add-ons allow it to spy on 2G, 3G, and 4G networks at the same time as well.

“As more of our infrastructure, homes, environment, and transportation are connected wirelessly to the internet, such technologies really do pose a massive risk to public safety and security,” Tynan said. “There really isn’t any place for innocent people to hide from a device such as this.”

Stingrays operate by simulating cell phone towers, which tricks nearby phones into connecting with them, allowing police and other law enforcement agencies to monitor incoming and outgoing calls and texts and other communications. They also have the capability to interfere with communications, which can be dangerous in cases of emergency calls. A recent complaint filed by the American Civil Liberties Union (ACLU) with the Federal Communications Commission (FCC) said the Baltimore Police Department, which used Stingrays to monitor residents without a warrant, violated the law through racial discrimination and willfully interfered with cell phone calls.

Please follow and like us:

Other articles of interest:

The Most Secured Smartphones in the World Smartphones have been around for some time now, however, it has only been a few years since we have adapted the technology to its fullest; changing ou...
Stealth Attack On USS Fitzgerald Proves US Navy No Longer Controls Seven Seas The Official US Navy “Fitzgerald” Narrative is not only totally implausible, it’s beyond ridiculous! USS Fitzgerald showing major damage located to...
Jim Willie Warns US Dollar Faces 30% Devaluation As BRICS Prepare Return of Gold Standard The Fascist Business Model incorporates all the worse elements of Keynesian economics, a broken fallacious school of thought. The model also integrate...
U.S. Tried to Kill North Korea’s Kim Jong Un in May, According to North Korea North Korea has come out strongly against the U.S.’s stated war on terror, accusing Washington of using it as a pretext to overthrow hostile governmen...