Tag Archives: spying

Conspiracy Theory Confirmed: Researcher Shows How Phone Shows Ads Based on Conversations It Hears

For years, smartphone users have been growing increasingly suspicious that their devices are listening to them to feed them advertisements and to “enhance their experience” on third-party apps. Companies like Google and Facebook have consistently denied these claims, saying that targeted ads and messages are merely a coincidence, and that data for these services are taken in other ways.Image result for spying mobile

However, earlier this year during the Cambridge Analytica scandal we began to see some of the first hints that our phones may actually be listening to us.

Cambridge Analytica whistleblower Christopher Wylie says that they have probably been listening all along. During an appearance before the UK parliament, Wylie said, “There’s audio that could be useful just in terms of, are you in an office environment, are you outside, are you watching TV, what are you doing right now?”

Since the scandal, experts who have studied this possibility began revealing their surprising results.

In a recent interview with Vice, Dr. Peter Hannay, the senior security consultant for the cybersecurity firm Asterisk, explained how third-party apps exploit a loophole to gather the voice data from your phone.

Hannay said that while your microphone is always on, your voice data is only sent out to other parties if you say specific trigger words such as “Hey Siri” or “OK Google,” but there is a catch. Third-party apps often ask to gain access to voice data in their user agreements to “enhance the experience” of their products.

“From time to time, snippets of audio do go back to [other apps like Facebook’s] servers but there’s no official understanding what the triggers for that are. Whether it’s timing or location-based or usage of certain functions, [apps] are certainly pulling those microphone permissions and using those periodically. All the internals of the applications send this data in encrypted form, so it’s very difficult to define the exact trigger,” Hannay said.

While this process is becoming more obvious by the day, many tech companies continue to deny that they are engaged with this practice, and since all of the outgoing information is encrypted there is no way of telling exactly which information they are getting and how they are using it.

“Seeing Google are open about it, I would personally assume the other companies are doing the same. Really, there’s no reason they wouldn’t be. It makes good sense from a marketing standpoint, and their end-user agreements and the law both allow it, so I would assume they’re doing it, but there’s no way to be sure.” Hannay said.

Vice reporters then conducted their own experiment, saying random phrases into their phones and then seeing advertisements affiliated with those terms pop up in their news feeds. You can try this experiment at home yourself, and it is highly likely that you have experienced results like this by accident.

In April, I experienced something like this when a friend visited my house from the west coast. I picked him up from the Baltimore-Washington airport and during a conversation about his flight, he told me that he had a layover in Charlotte, North Carolina, and mentioned that they had a nice airport.

The following morning I woke up with these messages on my phone:


Oddly enough, I have never been to Charlotte, North Carolina, never really thought about the place, and have never typed anything about that place into Google or Facebook. But sure enough, after having a conversation about the airport in Charlotte, my phone thought I was interested.

As of right now, there is no way to avoid this spying, aside from being extremely careful about the apps that you sign up for, and actually reading their user agreements—or getting rid of your cell phone altogether, which could be counterproductive if you use it for business.

Please follow and like us:

Other articles of interest:

Jimmy Carter Offers To Meet With Kim Jong-Un To Prevent War With North Korea With tensions once again flaring up between the United States and North Korea, it was reported Tuesday that former U.S. president Jimmy Carter has off...
Turkey’s failed coup attempt was false flag operation: Analyst Turkey’s failed coup attempt was a staged operation for Turkish President Recep Tayyip Erdogan to eliminate the opponents of his government, acc...
Syrian War Report – April 17, 2018: Syrian forces reportedly repel more missile strikes https://www.youtube.com/watch?v=W4IiEJ7DttU Last night, the Syrian Air Defense Forces (SADF) repelled another missile attack allegedly carried out ...
Incredible Way to Grow Potatoes Do you have limited space to grow so you figure you must limit yourself to herbs and the like? “Blazing a path to natural health and wellness. Get nat...
CONFIRMED: Syrian Arab Army takes control of Jordanian border Fierce fighting with ISIS and US backed jihadists in southern Syria has been ongoing for months. In June, two convoys of Syrian and allied soldiers ca...

Talpiot – Antichrist Domination of Earth!

Talpiot – Total Domination! from Truth Warriors on Vimeo.

Incredible information on the biggest spy and control program in the history of the world!  It’s called Talpiot and it’s being completely hidden by the Fake News and fake alternative news too!  The Talpiot program was created way back in the 1980s to totally dominate all aspects of society by taking over all high technology for Israel!   Israel has built the biggest spy machine in human history and used it to steal US technology that it uses to dominate industries, create massive new companies and embed spyware and control into every high technology on the planet!

I had no idea it was this bad but Israel has taken over everything!  We give them billions each year and in return they take our technology, sell it to Russia and others and  then totally dominate us with it!   Want to find out who is real and fake in alternative media?  Find out who is covering Talpiot and who hides it!

Do a search yourself on Alex Jones using the command on Google: site:infowars.com talpiot and see what comes up!  You’ll see one listing and it was from a member of Planet Infowars and it was about a tomb, not the Israeli Talpiot program for dominating everything!  If you think it’s wrong for Alex Jones with his millions and over 100 employees to be censoring Talpiot DEMAND he report on it by emailing him at showtips@infowars.com and watch him and his staff ignore you!  You’re only good for milking for money baby!  You don’t deserve an answer from the tip of the spear or his staff!  Watch and see, I dare you!   Demand answers for all lies and censorship and we can win!   If you can never get a response from somebody even though they have over 100 employees, what does that tell you?  They don’t CARE about you and certainly don’t care about winning!  You are a resource and that’s it!  Nobody runs and hides when they are REAL!

If you don’t realize there is much evil going on in Israel then you don’t read your bible!  Where does the antichrist rule from?   Jerusalem!    He’s probably there right now building the Talpiot system of total control!  I’m not saying all people of Israel are evil but the evil Rothschilds setup the modern state of Israel and they do much evil.   When Israel does evil it must called out just as when the US bombs Syria on a lie.   Nobody gets a free pass for doing evil.    When Israelis shoot Palestinians in the head who are not holding guns is this what Jesus would want?   If you think so then you should go work for the antichrist!   You know where he’ll be building his base of operation!

More great information can be found in the link below.

To Understand Globalist Zionist Power And How It Rules From Israel, You Must Understand These Words – “THE TALPIOT PROGRAM” and “THE TECHNION”

Founded in Israel five years ago by entrepreneurs Omri Lavie and Shalev Hulio, NSO makes software that secretly targets a user’s mobile phone and gathers information, including text messages, photos and internet browning data.



Please follow and like us:

Other articles of interest:

The real reason to own Bitcoin In 1483, just as Johannes Gutenberg’s new moveable type printing press was spreading across Europe, Sultan Bayezid II of the Ottoman Empire issued a s...
Vegas shooting was a scheduled FEMA drill This is simply a Nother in a long line of FEMA drills nobody died these were crisis actors like I told you day one this is not real they weren't multi...
Rogue Mornings – Special Guest: London Paul (06/09/2017) https://www.youtube.com/watch?v=8i08uL0pdWE
Las Vegas gunman’s girlfriend says she had no idea he was ‘planning violence’ A member of the FBI leaves the Mandalay Bay hotel following the mass shooting in Las Vegas Marilou Danley, the girlfriend of Las Vegas gunman...
Jim Willie Warns US Dollar Faces 30% Devaluation As BRICS Prepare Return of Gold Standard The Fascist Business Model incorporates all the worse elements of Keynesian economics, a broken fallacious school of thought. The model also integrate...

Related Posts

Obama Ordered Spying! Everybody is ratting him out!

Intel Briefing – Tom Heneghan, Stew Webb (6-1-18) from Truth Warriors on Vimeo.

Right after this show, Tom reported one of his US French Intelligence sources is reporting Barack Obama is telling his inner circle he didn’t KNOW about the CIA using Stefan Halper to SPY on Donald Trump!  They have intercepted conversations apparently.  This is a HUGE admission because Obama used to say there was absolutely no spying going on!  Remember when the fraud also said it was impossible to steal an election!   Obama and his deep state is in a PANIC right now!   He knows he is BUSTED and he is claiming ignorance!   It’s not going to work!  Get the TRUTH out EVERYWHERE and rout those demons!  Obama and Hillary ordered spying on Trump!  TREASON!  Here’s more information below on this!  Share to ALL social networks and email lists to overload the censorship grid!  They can’t stop us if you all do this NOW!  Tom says it’s time for every patriot around the world to help put Bush, Clinton and Obama in prison!  We need you to RAGE all over social media by sharing information like this and other truth to all your friends also via email!  If you all do this, we cannot lose!  We only lose if you stay silent because of fear!  God told you in his word to not be fearful!  Go crazy out there and wake up the planet!  It’s an honor to serve with all of you truth warriors!  Increase all your efforts by double!  It’s time to blow up their death star and put Obama, Bush and Clinton in jail and destroy their filthy legacies in the court of public opinion!  Tell everybody Trey Gowdy is a TRAITOR and is covering up for evil too!  He’s pulled off his mask too and everybody sees the evil underneath!

Image result for Obama i'm not a crook

John Solomon Bombshell: Obama Deep State Was Spying on Trump Campaign with Human Sources Before Investigation Launched

“The revelation of purposeful contact initiated by alleged confidential human sources prior to any FBI investigation is troublesome,” Rep. Mark Meadows (R-N.C.), an ally of President Trump and chairman of a House subcommittee that’s taking an increasingly aggressive oversight role in the scandal, told me. “This new information begs the questions: Who were the informants working for, who were they reporting to and why has the [Department of Justice] and FBI gone to such great lengths to hide these contacts?”


Here’s some bullet points on what Tom and Stew cover in this broadcast!

FBI/CIA spy Stefan Halper was hired by Hillary Clinton and Barack Obama to spy on Michael Flynn and Donald Trump.  Michael Flynn knows ALL the truth on 9/11, the Bush Scherf connection making all Bushes illegal to hold any public office and much more!  They had to neutralize Flynn and take down Trump or their treasonous acts would be discovered!  Remember Hillary screamed “If Trump Wins, We All Hang by Nooses” after the Matt Lauer interview when he went off script and asked her a real question about the email server!   

Tom also covers the treason of David Ignatius at the Washington post fake news rag and how he works for the CIA and leaked information to damage Trump!

Hillary Clinton worked directly with Jonathon Pollard at the Rose Law Firm!  Pollard was America’s most notorious spy who got over 30 CIA agents killed form information he released!   Both Hillary and Bill were recruited by the CIA.

Stefan Halper worked with Hillary and the Bushes in the 80s!

French Intelligence has passed on a treasure trove of information relating to illegal activities of John Brennan, Robert Mueller, Andrew McCabe!

Image result for Obama criminal

Please follow and like us:

Other articles of interest:

Australia: Devout Muslim butchered wife, mutilated her body, gouged her eye out A devout Muslim who wanted to fight for the Islamic State has confessed to butchering his wife, and mutilating her body. The Australia court is no...
Brexit As A Roadmap BREXIT!  I have to admit, I did not believe it would happen.  Rather, I did not believe it would be “allowed” to happen.  In retrospect I believe ...
Resistance is futile This video is from Ron Johnson channel and we are all fucked if he is correct https://www.youtube.com/watch?v=v6dS-LsUqQQ  
Israel Won the First Round of the French Election                                                                                 By Sajjad Shaukat for Veterans Today Recall that three days befor...

Related Posts

How Israeli Hardware Back-Doored Everything! Jeff & Brendon O’Connell – Shocker…The Talpiot Program! – Pt 1

The Intel Management system. Or, the Israel Management System. This extract is 2.32 minutes long. Perfect for todays busy IT housewife as she breastfeeds, makes dinner and runs her corporate level business in red high heels waiting for hubby to get home from the office.

Image result for Talpiot Program

Taken from the excellent mini doco – “Israeli Drones World Wide”. https://www.youtube.com/watch?v=U4ce3…

Israel’s Secret Weapon – The Talpiot Program https://www.youtube.com/watch?v=rYE9U…

A tiny “Arc Processor” sitting of The Talpiot Program. No one is safe – no one. AMD has the exact same system – Platform Security System – and that is now totally owned and run by China. The ENTIRE worlds “Cloud Based” Internet system is backdoored by Israel. THIS is a national security disaster.

Disaster is spelt D-I-S-A-S-T-E-R. I have copped endless shit for 9 years exposing this. I have been jailed, beaten, bashed, vilified and threatened with the dreaded “Wood Shed” within the Intel CPU with it’s own custom version of Linux (Minix) operating beyond the software level – completely transparent to the end user.

Does not matter if your using Windows, Linux or Apple iOS…you are toast and THIS is how Israel does it. All part y Ry Ry Dawson [shivers], but I am still here. And so are you. I have been greeted by high level players. Everyone HATES Israel. Everyone. They just have the key staff in key positions bribed and blackmailed.

They have “kill switched” the worlds infrastructure. This is why Netanyahu is soooooooooo cocky and why we never seem to get anywhere. With thanks to Luke for the details on the IME. Luke worked as a software engineer and specialized in all things Intel.

Please follow and like us:

Other articles of interest:

Iraqi Kurdistan Prepares for a Vote That Will Shake Nations In less than a week, the largest nation in the world without a state of its own — the Kurds — may finally hold a vote on whether to declare one. T...
Top 10 Overlooked Survival Tips You Need To Know Today Let’s face it: The world is a scary place to be living in right now. Many countries are dealing with serious political instability and the threat of t...
John McCain: A Life Wasted? What’s happening to John McCain is tragic. It’s not something one should ever wish upon another human being. Nor is it decent, let alone useful, to wi...
President tweet goes nuts on China trade – No one is surprised Trump took to twitter once again to play the twit. He threatened to stop trade with all those doing business with North Korea – an economic act of...
Baking Soda and Castor Oil Wipes for More Than 25 Diseases – How to Make and Use Them ? Castor oil is cheap, but unfortunately not so popular remedy as it should be. This natural remedy has many positive effects on your health, and it can...

Related Posts


Netanyahu can get away with murder because Israel controls the worlds high technology sector – over and above even the US. That “American” you see “controlling” something?

He or she is an American Jew or Zionist, dual national Israeli American citizen. Israel rules. Until we target specifically this control of the high technology sector and specifically The Talpiot Program, we will all continue to wonder how Israel gets away with all it does. It is a racist state of the most odious kind. But who will stand up to them?

From medical nano technology to cyber security to private hacking companies to military technology to police databases, banking, finance and medical – Israel runs them all. This is Israel’s false flag nuke.

Please follow and like us:

Other articles of interest:

Information Stored in Clothes Invisibly, Without Electronics A new type of smart fabric developed at the University of Washington could pave the way for jackets that store invisible passcodes and open the door t...
VEGAS SHOOTING: BREAKING!! Audio Evidence from 1/2 a mile away PROVES TWO SHOOTERS! How does ShotSpotter work? It measures the audio levels from different vantage points. How does John Cullen work? Same principles: https://youtu.be/xm...
Top Secret Khazarian Mafia Human Disposal Operations (Part II) ISIS is just another top secret KM human disposal operation, with associated multi-faceted secondary goals by  Preston James In part one the top...
Texe Marrs reports PizzaGate—One of the Worst Satanic Scandals in Human History Texe Marrs reports. http://www.powerofprophecy.us/popcast/5016.mp3 http://www.powerofprophecy.com/
New study backs up reports of near-death experiences, claiming that consciousness continues to work ... (Natural News) Imagine lying on a hospital bed, closing your eyes, and then being able to hear the doctors announce your own time of death. If thi...

Related Posts

USA Liberty Act: New ‘Foreign’ Intelligence Law Will Legalize Spying On Americans

House Judiciary Chairman Bob Goodlatte (R-VA), Ranking Member John Conyers (D-MI), Rep. Jim Sensenbrenner (R-WI), and Rep. Sheila Jackson Lee (D-TX) unveiled a new bill called the “USA Freedom Act,” which aims to reauthorize and modify the Foreign Intelligence Surveillance Act (FISA). Without the renewal, FISA would expire at the end of this year.

Codifying Mass Surveillance Of Americans

Those who have followed the passing and then usage of mass surveillance-enabling bills such as the Patriot Act and its successor, the USA Freedom Act, may already be suspicious about a bill named the “USA Liberty Act.”

 Indeed, although the bill does aim to curtail some illegal NSA activities and abuses that shouldn’t have happened in the first place, it also codifies into law the bulk collection of Americans’ data. It also codifies the NSA’s ability to share data with other domestic agencies.

President Obama also expanded some executive rules last year that allowed the NSA to share raw intelligence data without a warrant with 16 other agencies. Because the shared data is raw, Americans’ data can be seen by agents from any of the 17 agencies, without any judicial approval. Such broad access may also put this data at risk from cyber attacks.

It’s not clear if the new USA Liberty Act, which does require a warrant when Americans’ communications content is accessed by the other 16 agencies, including the FBI, overrides those rules. The USA Liberty Act is also much more relaxed when it comes to metadata (phone or email records, etc.), requiring only a supervisor’s approval for access.

What is clear is that until last year, the so-called “incidental” data collected on Americans through foreign intelligence programs was supposed to be minimized and then automatically purged. However, President Obama’s expanded rules now allow 17 agencies to scour through that data before any minimization or purging happens.

Meanwhile, the USA Liberty Act seems to imply that data will be kept long enough that there will be enough time for domestic agencies to get warrants from judges or other type of approvals to obtain it. In other words, the supposed “incidental” collection is starting to seem less incidental and more purposeful.

The agencies have been caught many times with their hands in the proverbial cookie jar of domestic data. However, because these surveillance laws, including the new USA Liberty Act, never mention any criminal sanctions for such abuses, no one has been punished for it.

The NSA and DEA even built a parallel construction program together, where the DEA would get illegal surveillance information in drug cases that it would then use in court, while telling judges it came from other legal requests. The program was eventually terminated due to Edward Snowden’s revelations.

“Backdoor Search” Reform Is Broken

Demand Progress, a civil liberties group, claimed that although on the surface the bill seems to add some important reforms, most of them are surface-deep.

One of the primary issues civil liberties activists, as well as Senator Ron Wyden, have had with FISA section 702 surveillance in the past is that it allowed for “backdoor searches” on Americans. In theory, the NSA should be spying only on foreign communications. However, as always, the devil is in the details.

Until recently, for instance, the NSA would collect any communication of people who would even talk “about” a terror plot or some other national security concern. Therefore, anyone who may be talking to friends or family, or post online about a recent attack seen on the news, may have had their communications collected by the NSA.

The NSA interpreted this type of collection to be “relevant” to its investigations. However, common sense would dictate that this interpretation is quite broad. It may have also been one of primary factors paralyzing the agency’s analysts with too much data.

The FISA Court eventually put an end to this practice, after having previously been accused of rubber-stamping virtually all of the NSA’s requests. The USA Liberty Act now codifies this prohibition to collect communications that are simply “about” targets.

However, Demand Progress still believes that by allowing the NSA to collect data for “foreign intelligence purposes,” this gives the agency too much latitude to define what exactly that would mean and who can be its targets. The civil liberties group feels that the exception would eventually “swallow the rule.”

Other Paper Reforms

Demand Progress thinks that because there’s no strict limit on how accessed data can be used and for how long, this could lead to abuses. Other agencies could be allowed to use Americans’ data in other investigations that have nothing to do with national security.

The civil liberties group also complained that the USA Liberty Act is missing a key provision that requires the government to give notice when it uses FISA section 702 surveillance in prosecutions.

According to one of the co-authors of the Patriot Act, the NSA didn’t interpret the law as it was intended by Congress. Instead, the NSA used secret interpretations of the law to expand its own surveillance capabilities. Demand Progress fears that this could happen once more unless the executive branch is mandated to tell Congress and the public how it’s interpreting the new USA Liberty Act.

FISA will expire on December 31, 2017, unless the USA Liberty Act or some other bill that aims to reauthorize the same programs pass by then. If the USA Liberty Act passes, it would be in place for six years, until September 30, 2023. Many civil liberties organizations believe that unless real reforms are added to the bill, then FISA should be allowed to expire.

The EFF has set up a page to email your Congress representatives, and you can also call their offices directly if you’d like either to see the FISA surveillance law expire or see the implementation of stronger reforms via the USA Liberty Act.

Please follow and like us:

Other articles of interest:

Secrets (Volume 244) Texe Marrs discusses news the biased and controlled media will not report: (1) Atomic Bomb Secrets—new book offered by the Ministry discloses how Japa...
Bill Holter-World Facing Very, Very Dangerous Time So, is the world headed for a “Mad Max” future? Financial writer Bill Holter says, “I think the chances are better than a coin flip that we have socie...
Jaw Dropping Proof Emerges Americans Have Been Lied To For A Very Long Time – ‘Operation... With parts of western America quite literally melting as seen in the viral photograph seen below from this story over at Strange Sounds, the 2nd video...
Syria – U.S. CentCom Declares War On Russia Yesterday three high ranking Russian officers were killed in an "ISIS attack" in eastern-Syrian. It is likely that they were killed by U.S. special fo...
Top 16 Models of Shelter You Can Build Yourself for Free! Learn From Our Ancestors Want to learn how to build a shelter house? Look no further. Let me ask you; how would your life change if you never had to pay rent or interest on a ...

HP Laptops Discovered To Be Spying On Users With Keylogger

Swiss cybersecurity firm Modzero has discovered that 28 models of HP laptops running the “MicTray64.exe” audio driver on Windows 7 and 10 systems – a little over 20% of all laptops – have been spying on users via a ‘keylogger,’ a program which records every keystroke made on the device. This means that passwords for banking, email accounts, and private communications on affected laptops are being stored locally – which “leads to a high risk of leaking sensitive user input.”

“Users are not aware that every keystroke made while entering sensitive information – such as passphrases (or) passwords on local or remote systems – are captured by (the software)” –Modzero

When Modzero contacted HP about the issue the company went radio silent, so the Swiss firm went public with it’s findings. When UK based Sky News picked up the story and reached out to HP, the company said they were “aware of the keylogger issue on select HP PCs.”

HP told Sky News: “Our supplier partner developed software to test audio functionality prior to product launch and it should not have been included in the final shipped version. Fixes will be available shortly via HP.com.” Sky News

A full list of affected laptops can be found here.

Here is Modzero’s writeup on how the keylogger works:

Conexant’s MicTray64.exe is installed  with the Conexant audio driver
package and registered as a Microsoft Scheduled Task to run after each
user login. The  program monitors all  keystrokes made by  the user to
capture  and  react  to  functions  such  as  microphone   mute/unmute
keys/hotkeys. Monitoring of keystrokes is added by implementing a low-
level keyboard input  hook [1] function…

In addition to the handling  of hotkey/function key strokes, all  key-
scancode information [2] is written into a logfile in a world-readable
path (C:\Users\Public\MicTray.log).

Content originally generated at iBankCoin.com

BIG BROTHER: Key-loggers installed in new HP Laptops security firm says

Key-loggers installed in new HP Laptops security firm says #1984


HP laptops are recording EVERYTHING you type: Sinister keylogging software is found on dozens of models #1984



Please follow and like us:

Other articles of interest:

Israel attacks Syrian air defense systems, many missile strikes Follow the situation on the ground as reports come in on the escalation of the Iran/Israel conflict in Syria: https://syria.liveuamap.com/
Why Did FBI And Metro Hide The Fact That An Officer Fired His Weapon At Least Once In Paddock’... Las Vegas Cop 'Accidentally' Fired His Gun In Paddock's Suite! https://www.reviewjournal.com/crime/shootings/officer-accidentally-fired-weapon-in-las-...
Statin Drugs Linked to 300+ Adverse Effects Are You Dying To Lower Cholesterol? The biomedical literature on statin drugs show over 300 different signals of harm, including 30 different modes of...
Researchers report >4,000 apps that secretly record audio and steal logs SonicSpy family of apps pose as benign programs. Behind the scenes, they spy on users. A single threat actor has aggressively bombarded Android use...
Vegas Massacre Cover-Up: PR Firm Hired by Mandalay Bay Exposed Pushing Conspiracy Theories In another strange twist to the largest mass-shooting in recent U.S. history, a damning report indicates that the parent company of the Mandalay B...

Alert: Your Cell Phone is Spying on You! 4 Ways to Block Your Cell Phone and Prevent Being Monitored

ReadyNutrition Guys and Gals, this piece is on the heels of an article released by RT News on 3/8/17, entitled “85% of World’s Smart Phones ‘Weaponized’ by CIA.”  The article is a very disturbing report; however, it isn’t something that just “surfaced” out of the zone of unpredictability.  The basis for the report stems from the recent WikiLeaks release of the CIA-documents and information that just occurred.  Here is an excerpt from that article:

Image result for +Block +"Cell Phone" +mylar

 “Google’s Android operating system, used in 85 percent of the world’s smart phones, including Samsung and Sony, was found to have 24 ‘zero days’ – the code name used by the CIA to identify and exploit vulnerabilities for the purpose of secretly collecting data on individuals.  The techniques allow the CIA to access data from social messaging platforms, including WhatsApp, Weibo and Clockman before encryption, according to WikiLeaks.  Both audio and message data were vulnerable to the exploit through the CIA’s exploitation of gaps in the OS.”

Now mind you, Readers, this piece is not a “news article,” although this event was just reported on 3/8/17.  The purpose of this article is to serve as a “wake-up” call, in case you haven’t taken the measures already outlined in previous articles to protect yourself from your own devices tracking, recording, and (essentially) “spying” upon you.  You may research past articles on electronic security that you can do, and this piece is a “refresher” that will enable you to secure yourself…. from your own equipment.

4 Ways to Block Your Cell Phone and Prevent Being Monitored

As mentioned in times past, Mylar can be your best ally.  Mylar is simple to use, affordable, and it works at blocking the signals going to and from your happy cell-phone tracking and recording device.  Here are some inexpensive sources for the Mylar:

  1. Chip/Snack bags: An infinite variety of sizes are available, and you will have to gauge what size you use after taking the size of your phone/device into account.
  2. Mylar in the form of “ponchos” or “space blankets”: these are a little more expensive than the chips, but only slightly so. You will end up with more Mylar to use, and the pieces you cut will not need to be cleaned off of salt and other detritus as with the chip bags.
  3. Freezer bags: Also in a variety of sizes, such as ones that hold up to 30 lbs. of food/ice (for a laptop-sized device) or just a small 1’ x 1’ bag, such as a lunchbag-cooler size.
  4. Another thing to do is to place your device inside of an ammo can (military issue). In doing so, make sure the rubber gasket around the mouth seals efficiently for a tight seal.  There are other containers that can be used; however, you may have to reinforce the seams with something such as Aluminum HVAC duct tape (available for about $15 per roll from your local Home Depot), and cover them over.  With the ammo cans, the container is contiguous with only the lid needing that rubber gasket that works.

How to Test for Protection

There is a way to test it out with your phone to see if you have the protection.  Take your chip bag or bags.  If they’re small, be advised that you will need about three complete layers around the cell phone.  Also, place your phone in a plastic Ziploc bag before putting them into the chip bags.  This will keep them clean just in case you missed wiping all of the stuff out of them.  Wiping out the bags can best be accomplished with a dry paper towel: the oils, salts, and other filth will be caught up by the towel.  Just remember to cover/swipe the entire inside surface of the bag.

Then turn your phone on, and turn up the volume of its ring all the way.  Next, roll/wrap up your phone and fold it over in at least three complete layers of Mylar.  Then use your house phone/landline/etc. to dial your wrapped-up cell phone’s number, and hold the wrapped-up phone close to your ear.

If you did the job correctly, you will not hear a thing.  Also, make sure you only ring it 3 times.  Any more than that and it may go to a voice-mail/other function, that will send it stored to your cell phone after you unwrap it as a missed call.  This way it will not ring it, and the call will have been cancelled.

Remember what General David Petraeus mentioned about the “Internet of things?”  Well, those days are upon us.  So, what else?  You’ll have to figure out the best method for making your layers work and last a long time.  You can take the chip bags, cut them open with scissors, and make three premeasured layers.  Form a pouch, and cover them inside and out with duct tape.  Then you just slip in your phone, and secure the top (fold it over) with whatever type of clamp or clip works for you.

The continuous signal your cell phone sends out (every 4 seconds) will be interrupted.  Inconvenient?  No.  Coordinate with your family members when you will call and talk to them beforehand.  Emergency?  Pull the phone out of the pouch and use it.

Bottom line: It is a discipline that will have to be followed to enable your privacy…from your own device.

99% of all people carry that thing around with them everywhere.  They’re hooked to it more closely than a fetus to the umbilicus: they can’t function without it.  But the point I’m making is this: Do you own the phone, or does it own you?

You can accomplish the same thing with your laptops and other “smart” toys…your palm-pilots, blackberries, cameras, and all of the other damnable devices that have made you an unwitting prisoner to the powers and systems that set them in place…not for your “technological convenience,” but for the very purposes of control, dominion, and surveillance over you.

Ammo cans work.  The Mylar (when cleaned and fashioned properly) will work.  Now you just received confirmation that it is happening, and I’ve given you methods to use to stop it from happening to you.  The methods work.  I have tested and used them myself.  So, without further ado, figure out how much material you need and make one of these pouches for yourself.  Your privacy is guaranteed under the 4th Amendment from illegal searches and seizures by the government.  That right, however, needs to be exercised by action.  So, finish those Doritos, clean out that bag, and wrap that phone up!  We’d love to hear of any tips or improvements you have come to trust.  Keep fighting that good fight, and send us your comments!  JJ out!

Please follow and like us:

Other articles of interest:

Beijing seizes US underwater drone in South China Sea A Chinese navy warship seized an underwater drone deployed by an American oceanographic vessel in international waters. The mission of the survey...
Bizarre Leftist Claims Parents Need Consent From Babies Before Changing Diapers Leftists just continue to get stranger in their ideology and quest towards a completely totalitarian/government-controlled society.  But now, ...
Prepper Dudes – “Your Testosterone Has Everything To Do With Preparedness and Survival” ReadyNutrition Readers, I once did a piece a while back on firearms for the ladies, and in that light, it’s time to do one that pertains to the guys. ...
PUTIN’S RUSSIA TARGETS FIRST OFFENDER PEDOPHILES WITH LIFE IN PRISON! Kim Dotcom has actionable information about Seth Rich and Wikileaks, but Robert Mueller doesn't want to hear it, choosing instead to turn his farcical...
The Fight of Our Generation  Islam has declared war on you, me and our children As I write this article I am literally enraged beyond words, but I am going to try and assemble...

Secret Stingray Manuals Reveal How Spying Tools Leave ‘No Place to Hide’

The technology manufacturing company Harris Corporation has fought to keep the public from knowing about how its surveillance devices work—specifically, the controversial cell phone spying tools known as Stingrays—but The Intercept on Monday published about 200 pages of Harris Corp. instruction manuals detailing how to build and use them.


Harris has argued that releasing information about Stingrays could help criminals. But privacy activists and the general public say the devices threaten “civil liberties, communications infrastructure, and potentially national security,” especially as wireless capability extends more and more into our personal lives, The Intercept‘s Sam Biddle explains.

He writes:

The documents also make clear just how easy it is to execute a bulk surveillance regime from the trunk of a car: A Gemini “Quick Start Guide,” which runs to 54 pages, contains an entire chapter on logging, which “enables the user to listen and log over the air messages that are being transmitted between the Base Transceiver Station (BTS) and the Mobile Subscriber (MS).” It’s not clear exactly what sort of metadata or content would be captured in such logging. The “user” here, of course, is a police officer.

[….] In order to maintain an uninterrupted connection to a target’s phone, the Harris software also offers the option of intentionally degrading (or “redirecting”) someone’s phone onto an inferior network, for example, knocking a connection from LTE to 2G[.]

Richard Tynan, a technologist with Privacy International, told Biddle that the latest version of the Stingray and similar devices can monitor up to four cell towers simultaneously, and certain add-ons allow it to spy on 2G, 3G, and 4G networks at the same time as well.

“As more of our infrastructure, homes, environment, and transportation are connected wirelessly to the internet, such technologies really do pose a massive risk to public safety and security,” Tynan said. “There really isn’t any place for innocent people to hide from a device such as this.”

Stingrays operate by simulating cell phone towers, which tricks nearby phones into connecting with them, allowing police and other law enforcement agencies to monitor incoming and outgoing calls and texts and other communications. They also have the capability to interfere with communications, which can be dangerous in cases of emergency calls. A recent complaint filed by the American Civil Liberties Union (ACLU) with the Federal Communications Commission (FCC) said the Baltimore Police Department, which used Stingrays to monitor residents without a warrant, violated the law through racial discrimination and willfully interfered with cell phone calls.

Please follow and like us:

Other articles of interest:

Japan is so broke that its prisons are full of 80+ year old ‘felons’ ‘Mrs. F.’ was 84 years old the first time she ever went to prison. Her crime? Petty shoplifting. She stole rice, strawberries, and cold medicine. Sh...
Las Vegas guard Jesus Campos vanished after visiting urgent-care clinic, union leader says The Mandalay Bay security guard who disappeared last week moments before he was scheduled to break his silence in television interviews has not been...
Illegal Alien Amnesty Means $15K Tax Hike for Every Household Amnesty supporters have been pushing claims that deporting illegal aliens would cost fantastic amounts of money. The truth is that legalizing a ho...
Black Ops Operator Comes Forward And Tells All:Cody Snodgres Today's Guest: Cody Snodgres Websites: Cody Snodgres http://codysnodgres.com https://www.youtube.com/watch?v=e0C_qG5U7pE
Omega-3 Supplements Can Help Kids with ADHD If you’re the parent of a child with ADHD who’s looking for a natural treatment approach, you may have heard about an ADHD diet and how, in partic...