Tag Archives: surveillance

This is the week that the drone surveillance state became real

Affordable consumer technology has made surveillance cheap and commoditized AI software has made it automatic.

Those two trends merged this week, when drone manufacturer DJI partnered June 5 with Axon, the company that makes Taser weapons and police body cameras, to sell drones to local police departments around the United States. Now, not only do local police have access to drones, but footage from those flying cameras will be automatically analyzed by AI systems not disclosed to the public.

Related image

Footage will be uploaded or streamed to Axon’s digital cloud for police cameras, like the body cameras it currently sells, where it can be analyzed by Axon’s AI and used for anything from crowd monitoring to search and rescue, the company writes on its website.

This sounds vague, but AI research published two days earlier by academics from India and the UK shows exactly how such a drone system could be used. The paper, titled “Eye in the Sky,” details how drone footage could be used to detect “violent individuals” in real-time.

To train the AI, the researchers flew a drone to snap 2,000 images of people pretending to hurt each other. But since the researchers didn’t use real data, and carefully staged the information the AI analyzed to learn the difference between violence and normal human motion, there’s no guarantee that it would work well in the real world, David Sumpter, author of Outnumbered: Exploring the Algorithms that Control Our Lives, wrote on Medium.

“What the algorithm has done is classify individuals with their hands or legs in the air as violent,” Sumpter wrote. Others, like Google ethics hawk Meredith Whittaker, tweeted that the research was flawed and that “AI is facing a mounting ethical crisis.”

Other researchers, including Google (pdf) and Facebook, have also done extensive research trying to solve the same problem of tracking how people move, and what those movements might indicate they’re doing.

But the “Eye in the Sky” researchers are trying to associate certain poses with intent. The researchers don’t discuss any false-positives for actions that could be misinterpreted as violence, such as play-fighting, knocking a fly off someone’s shoulder, or grabbing someone who’s falling.

Regardless of questions surrounding the AI’s legitimacy, The Verge reports that the researchers have gotten approval to test the technology during two festivals in India in October.

With $160 for a Parrot drone like the “Eye in the Sky” team used, and a few pennies for Amazon’s cloud AI platform, anyone with a coding background could have made a similar system. Even teens and cucumber farmers are building their own AI systems.

But the “Eye in the Sky” paper was published publicly, unlike Axon’s technology. The firm, which has acquired two AI companies and has access to petabytes of police camera footage, has no obligation to disclose how the AI was trained or whether it’s accurate or unbiased. Axon wasn’t immediately available to explain how it analyses footage captured by its cameras.

Other kinds of AI, like facial recognition, are already in use in China to surveil ethnic minorities. US authorities, like the Chicago police department are already starting to adopt AI systems for predictive policing, another pursuit rife with bad data. In Baltimore, a plane loaded with cameras was secretly deployed as a surveillance tool until 2016. But now, AI-powered surveillance systems are becoming as easy for a police department to order as a car, handcuffs, or anything else they feel they need to effectively do their jobs.

And now, drones are already getting the green light for police use, not just for surveillance but also to dispense pepper spray and tear gas.

Please follow and like us:

Other articles of interest:

12 signs of imminent war between the West and Russia In May, many people in Russia and other countries honor the memory of those who were killed in World War Two. Since the end of the bloodiest war in ...
Why Taxation is Slavery: Words From Frederick Douglass What do you call it when someone takes 100% of your labor by force? Slavery. Slavery is being forced to work against your will for the benefit of y...
North Korea fires missile through Japan’s airspace Pyongyang has launched a missile which, according to the Japanese and South Korean governments, passed through northern Japan’s airspace. The Jap...
Catholic Priest: Petrus Romanus And A “Hidden Power” At Vatican Giving Rise To The Anti-Church Of Pr... Pope Francis’ influence in the Catholic Church has been a “great and true blessing” since his ambiguous teachings have drawn the “anti-Church” out of ...
Death Race Damascus Update – On the Precipice of WW III As the clock runs down on the Obama “presidency” and as the Clinton candidacy is becoming more fragile by the day, the information I received fr...

Related Posts

Zuckerberg Protein Shakes and the Coming Surveillance State: Mark of the beast System

Car companies are preparing to sell driver data to the highest bidder https://arstechnica.com/cars/2018/02/…

CERN to Transport Antimatter in a Van to Study Neutron Stars https://www.extremetech.com/extreme/2…

Intel hid security flaws from U.S. officials until they were leaked https://globalnews.ca/news/4041986/in…

SpaceX successfully launches Falcon 9 carrying Starlink demo satellites https://techcrunch.com/2018/02/22/spa…

Serious quantum computers are finally here. What are we going to do with them? https://www.technologyreview.com/s/61…

China’s Xinjiang surveillance is the dystopian future nobody wants https://www.engadget.com/2018/02/22/c…

China is building the world’s largest facility for robot ship research https://www.popsci.com/china-world-la…

Airbus’ ‘flying taxi’ isn’t much to look at, but it’s a major step toward electric flight https://www.theverge.com/2018/2/22/17…

Kingdom Come developer promises changes to game’s controversial save system https://www.polygon.com/2018/2/19/170…

The best Kingdom Come: Deliverance mods (so far) https://www.pcgamer.com/best-kingdom-…

Hunt: Showdown | Early Access Launch trailer https://youtu.be/1r4JpEly21E

Konami Warns Users that Metal Gear Survive is Not a Dating Service http://www.playstationlifestyle.net/2…

Super Mario Odyssey’s first DLC is now available — time for a Luigi balloon hunt (update) https://www.polygon.com/2018/1/11/168…

Sometimes You Need To Take a Step Back In Order To Take Two Steps Forward https://www.kickstarter.com/projects/…

Video games, not guns, to blame for school shooting, says Kentucky gov. https://arstechnica.com/gaming/2018/0…

Pokémon Switch Generation 8 Starter Pokémon Reportedly Leaked http://gearnuke.com/pokemon-switch-ge…

Please follow and like us:

Other articles of interest:

4 Dangerous (and Common) Vitamin Fillers You Must Avoid Despite the decline in health today, the supplement industry is a billion dollar a year business (topping in at $6 billion in 2008.) You would think t...
Barack Obama publishes legalistic reply to Trump’s wiretap charge Barack Obama's response to Donald Trump's claims of wiretapping does not deny it happened, merely that he ordered it. Barack Obama’s spokesman Kevi...
Top 15 Natural Home Remedies for Migraines By Jenny Heth, Natural News Migraines can be simply understood as a severe case of headache. More specifically, they are described as a health ...
This is the Stunning Electric Car Porsche is Creating to Oust Tesla Porche unveiled their first fully electric vehicle last year and we are hoping to see a production model by 2020. An increased focus on the developmen...
Don’t Make Yourself A Target For Predators – Be Ready – Be Aware By now we have all heard about the for black thug low-lifes who kidnapped a handicapped kid and beat and tortured him for close to 48 hours. This i...

Private surveillance footage reveals “helicopter hovering overhead” at time of Las Vegas Massacre, FBI never asked for tape

Footage captured by a private surveillance camera on the night of the deadliest mass shooting in modern U.S. history reveals several shocking details which authorities have failed to investigate.

The bombshell footage was released on Fox News’s “Tucker Carlson Tonight” on Friday evening and is presumed to have been captured by a nearby business’s southward facing security camera which is located approximately 780 feet due east of the venue where the Route 91 Harvest Music Festival was held on Oct. 1. The tape was given to Fox News by an attorney who represents several shooting victims.

Although the date burned into the video says ‘Oct. 2,’ Tucker Carlson confirms that the tape was in fact recorded on Oct. 1, the night of the shooting. The discrepancy comes after the proper date was not entered upon installation of the system.

A close look at the footage reveals the first notable detail occurs at 10:06 p.m. which is just one minute into the shooting, according to the official timeline, as Carlson points out.

At 10:06 concertgoers can be seen running eastward through the parking lot in an effort to get to safety.

“By ten-fourteen much larger crowds of people can be seen streaming through the area to escape the massacre going on,” Carlson explains. “You can see a large amount of wind and debris, apparently that is due to a helicopter hovering overhead.”

This is astonishing, to say the least! A helicopter hovering overhead?

Then at 10:16, two men drag a “fallen victim” across the parking lot. The men position the victim behind a Ford pickup truck, presumably to shield themselves and the victim from taking any further incoming rounds as they attempted to give the victim medical assistance.

“Later at ten-twenty-four p.m., one of the men places his shirt across the victim’s face and then at ten-thirty-two a man places what appears to be a blanket or towel over the body after they had given up hope,” Carlson said. “Police only arrive in this area for the first time around ten-forty-five p.m. when the body is still there.”

The victim’s body was eventually was loaded into the back of a Ford Raptor pickup truck at 11:50 p.m. and taken away.

Astonishingly, between the times of 10:13 and 10:16 a good amount of debris can be seen being pushed downward and sideways in front of the camera which Carlson claims is from a “helicopter hovering overhead.”

A quick review of flight records during that time reveals that a squadron of EC-130 Eurocopters departed from Maverick Leasing LLC at 10:12 p.m., several of which appear to have overflown the parking lot where the victim and debris were seen. However, the departure of the choppers and the fact that several of them overflew the parking lot does not explain all of the debris being kicked up from by a heavy downdraft, prop wash, possibly from a helicopter hovering in place much closer. In fact, the downdraft appears to be constant from 10:13-10:16 p.m. and not intermittent as if several choppers had just passed overhead.

According to Carlson, the owner of the tape maintains that law enforcement investigators have never asked to see the footage.

Cover-up or negligence?

Please follow and like us:

Other articles of interest:

A Must See Video for Those Who Spy on the Rest of Us! https://www.youtube.com/watch?time_continue=5&v=yUVp13bbeGU
A FEMA Secret Has Just Been Made Public! What They Don’t Want Out Exposed! In the video below I reveal BOMBSHELL information about FEMA that they are attempting to keep quiet.  In it, I expose not only document 908, a documen...
‘In 1971, Muslims murdered 2.4 million Hindus and raped 200,000 Hindu women’ Will the Muslim violence against the Indian people, and the contamination of barbaric Islamic ideals blended into their culture, ever end? The Israeli...
“The News” is a Social Construct. It is Used to Program You. SHOW NOTES: https://www.corbettreport.com/?p=24020 If all the "alternative" media ever does is report on "the news" (as decided by the MSM), then aren...
Russian senator: Israel risks being ‘wiped off the map with nuclear counterstrike’  Israel, which recently said it could launch a preemptive nuclear strike “in the most extreme circumstances,” runs the risk of being “wiped off the fa...

WOW! Surveillance Video Shows Stephen Paddock Practice Shooting Before Massacre

On Thursday Tony Hernandez Armenta, an employee at Mandalay Bay Hotel in Las Vegas, posted a room receipt that shows killer Stephen Paddock was with a guest at the hotel four days before the massacre.


Via Infowars

Investigative journalist Laura Loomer also posted evidence that Paddock was in the hotel earlier than was reported.

Waiters at Mandalay Bay said they heard Stephen Paddock “speaking with others” in his room while ordering food.

But the FBI says he was faking that discussion.

That’s what the waiters are now saying — Paddock was “speaking with others” but he was just pretending

How would room service know he was not speaking to another person?

Here is the video from ABC News:

ABC Breaking News | Latest News Videos

Reporter Laura Loomer says the employees may be coerced to say it was just pretend.

A new report reveals Paddock practiced shooting in the desert days before the Las Vegas massacre.

WSJ reports:

The gunman who killed 58 people here Sunday appears to have gone out to the desert to practice shooting two days before the massacre, according to a law-enforcement official familiar with the investigation. Investigators have uncovered video footage from a home-surveillance system that shows Stephen Paddock driving alone to an area on the outskirts of Mesquite, Nev. where locals go for target practice. The footage shows Paddock heading to the area on the Friday before the attack, the official said. A spokeswoman for the Las Vegas Metropolitan Police Department didn’t immediately return a request for comment. In recent years, Paddock split time between a home on a quiet cul-de-sac in Mesquite and hotels in Las Vegas, about a 90-minute drive. His neighbors say they hardly knew him. His home backed up to a golf course, but he wasn’t known there, either.

Please follow and like us:

Other articles of interest:

Super humans who are sexier, stronger and smarter will arrive by 2029 as brains begin to fuse with m... Ray Kurzweil has made 147 predictions since 1990 and is correct 86% of the time By 2029 our brains fuse with machines - an event known as singu...
DNA from old skeleton suggests humanity’s been here longer than we thought Enlarge / Our family tree, with the dates inferred from this new data. Note how many major branches there are within Africa, and the recent exch...
Hezbollah leader says 55 missiles were fired on Israeli-occupied Golan Heights to mark the start of ... The leader of Lebanon's powerful Hezbollah group, Sayyed Hassan Nasrallah, said on Monday a missile attack from Syria into the Israeli-occupied Golan ...
Hidden Symbols Connecting All Major Ancient Civilizations One of the questions most of us have asked about ancient history is why did so any ancient civilizations build Pyramids all over the world? If th...
Trump Just Shut Down Obama’s Post-Presidency Hustle – Bongo Is Furious! We’ve all heard that Obama and his family are planning on staying in Washington DC after their illegal stint as First Family is over so they can conti...

Infrared signals in surveillance cameras let malware jump network air gaps

aIR-Jumper weaves passwords and crypto keys into infrared signals. Researchers have devised malware that can jump airgaps by using the infrared capabilities of an infected network’s surveillance cameras to transmit data to and from attackers.

The malware prototype could be a crucial ingredient for attacks that target some of the world’s most sensitive networks. Militaries, energy producers, and other critical infrastructure providers frequently disconnect such networks from the Internet as a precaution. In the event malware is installed, there is no way for it to make contact with attacker-controlled servers that receive stolen data or issue new commands. Such airgaps are one of the most basic measures for securing highly sensitive information and networks.

The proof-of-concept malware uses connected surveillance cameras to bridge such airgaps. Instead of trying to use the Internet to reach attacker-controlled servers, the malware weaves passwords, cryptographic keys, and other types of data into infrared signals and uses a camera’s built-in infrared lights to transmit them. A nearby attacker then records the signals with a video camera and later decodes embedded secrets. The same nearby attackers can embed data into infrared signals and beam them to an infected camera, where they’re intercepted and decoded by the network malware. The covert channel works best when attackers have a direct line of sight to the video camera, but non-line-of-sight communication is also possible in some cases.

Researchers at Israel’s Ben-Gurion University of the Negev and Shamoon College of Engineering said the malware establishes a two-way channel that attackers can use to communicate with compromised networks even when they’re air-gapped. The covert channel can transmit data from a video camera to an attacker at 20 bits per second and from an attacker transmitter to a video camera at 100 bits per second. When more than a camera is used in the attacks the bit-rate may be increased further.

A leg in both worlds

The proximity required between the transmitter and receiver is in the tens of meters when data is being siphoned out of a network. It’s hundreds of meters to kilometers when data is being sent into a network. The researchers have dubbed the prototype aIR-Jumper to emphasize the key role that infrared plays.

“Security cameras are unique in that they have ‘one leg’ inside the organization, connected to the internal networks for security purposes, and ‘the other leg’ outside the organization, aimed specifically at nearby public space, providing very convenient optical access from various directions and angles,” Mordechai Guri, head of research and development at Ben-Gurion’s cyber-security research center, told Ars.

Hidden communication via security cameras.
Leaking data via security cameras.

aIR-Jumper uses several different schemes to encode the zeroes and ones that form the basic building blocks of all digital data. The malware breaks large data streams into small packets or frames that include a preamble, a payload, and a 16-bit cyclic redundancy check to ensure the data was sent correctly. The proof-of-concept attack uses an infected camera’s own programming interfaces to control the infrared LEDs to transmit the data according to the encoding scheme and other parameters selected. Infrared LEDs are used to enable night vision so that cameras can produce images when there is little or no ambient light.

aIR-Jumper works best when attackers have direct line of sight to the video camera inside the infected network. Non-line-of-sight communication is also possible when the area illuminated by infrared lights is within the field of vision of the receiver. The attack is not only useful for air-gapped networks. It is also suitable for internal networks where traffic is heavily monitored by firewalls, intrusion prevention systems, and similar security measures, since it can bypass them without requiring any physical access between the attacker and the network.

aIR-Jumper is only the latest covert channel devised to shuttle data into and out of air-gapped networks once they have been infected. Previous proof-of-concept attacks developed by many of the same researchers include the manipulation of acoustic signals emitted from hard drives, malware that turns USB devices inside an air-gapped facility into covert radios that transmit data through electromagnetic signals, and a technique that allows an infected computer’s video card to transmit radio signals that can be received by a smart phone.The wide body of attacks starts with the assumption the attacker has already infected the target with malware. The research shows that air-gaps alone aren’t always sufficient for ensuring an attacker can’t transfer data into and out of mission-critical networks. Countermeasures against the aIR-Jumper include placing surveillance cameras in restricted zones that are optically inaccessible to attackers.

Please follow and like us:

Other articles of interest:

VEGAS SHOOTING: BREAKING!! Audio Evidence from 1/2 a mile away PROVES TWO SHOOTERS! How does ShotSpotter work? It measures the audio levels from different vantage points. How does John Cullen work? Same principles: https://youtu.be/xm...
Bosnian Pyramids are the Largest and Oldest in the World Did you ever think to wonder the true purpose of the Pyramids? It is completely ignorant of us to take what we are told at face value as fact, I...
The Real Story of David Rockefeller That the Media Isn’t Telling No one person encapsulates the enduring legacy of the “robber barons” of the Industrial Age quite like David Rockefeller. Rockefeller, who died today ...
SCIENCE FACT: Chicken pox vaccine is made with “human embryonic lung cell cultures” and human diploi... Every individual or organization that tells you chicken pox vaccines are not made with human fetal tissue cell lines is engaged in science denialism. ...
Musk called out for greed, sued over his mammoth $2.62bn Tesla package Tesla CEO Elon Musk faces legal action from a Tesla shareholder who accused the visionary CEO of neglecting the needs of investors and using the tech ...

Sweden May Introduce VPN Surveillance and More Data Retention Requirements

According to documents obtained by Swedish internet service provider Banhof, the Swedish government appears to be interested in increasing the country’s data retention requirements, and may even be interested in starting surveillance of virtual private networks (VPNs) and other anonymization services.

Image result for sweden totalitarian

Data retention requirements in Sweden first took effect in 2010. Privacy advocates such as Rick Falkvinge, the founder of the Pirate Party, say that the current Swedish data retention laws already violate fundamental European Union privacy rights. In 2010 German courts struck down a German data retention directive as an unconstitutional violation of privacy. The 2010 ruling in Germany was followed by a ruling from the European Court of Justice in 2014 which struck down the European Union’s data retention directive.

After the 2014 court ruling, Swedish internet service providers were told that the data retention requirements would no longer be enforced. Banhof had stopped retaining customer metadata, and several other Swedish internet service providers then followed Banhof in stopping their data retention programs as well. However, the suspension of data retention requirements in Sweden did not last for long, as government officials deemed the Swedish data retention laws were compatible with the European Union’s Charter of Fundamental Rights. Swedish internet service provider Tele2 filed a lawsuit which they lost when the Swedish courts ruled that the data retention acts were still lawful and could be enforced. Banhof resisted the court’s ruling but was then threatened with a multimillion dollar fine if it continued to refuse to retain customer metadata.

Under current Swedish law, internet service providers must record and store customer metadata for 6 months. Sweden’s new data retention proposal would increase the length of data retention from 6 months to 10 months. While implementing the European Union’s data retention directive from 2006, the Swedish government considered making data retention requirements between 6 months to 2 years. The Swedish government decided to make their data retention law only require data to be stored for 6 months. A broader Data Retention Act which was passed by the Swedish parliament in 2003 was struck down by the European Court of Justice in late December of last year. That 2003 data retention law was struck down for violating the Charter of Fundamental Rights of the European Union.

What remains a mystery is what exactly was meant by requirements to log the activation of anonymization services. A post made on Banhof’s website originally referred to this requirement as applying to VPNs, however, the company updated the post and said that they believe this may be a requirement aimed at prepaid cellular phones. A spokesman for a Swedish VPN called PrivateVPN said that the VPN surveillance requirements were so far only rumors, but did suggest the company would likely leave the country if the Swedish government ever did enact VPN surveillance. Another option would be to force the VPN’s customers to use Network Address Translation (NAT) firewalls. It appears unlikely that the government would ban NAT. However, VPN surveillance could be enforced by internet service providers instead of by the VPN provider, through the use of deep packet inspection.

“Sweden now acts as China when the state requires the network to be tailor-made for monitoring, instead of the internet functioning as well as possible,” Jon Karlung, Banhof’s CEO, said on a post on the company’s website. Karlung says that it will cost hundreds of millions of Swedish kronors to be able to meet the new data retention requirements. He estimates that the average service provider will need to get 300 terabytes of more storage to implement the proposed requirement. “The whole industry is in rebellion,” Karlung says. He believes the government wants service providers to rebuild the network to make surveillance easier, than to make it perform well. The information Banhof received came from a government investigation that is being conducted on the data retention laws. The government’s new report and recommendations will be delivered on October 9.

Please follow and like us:

Other articles of interest:

Complete List Of Banks Owned By Illuminati Rothschild Family There’s no question, on the surface or without doing any research on the matter, the whole concept of a “New World Order,” or a secret group of people...
UPDATED: Intel Drop: After warning from VT, Turkey arrests Israeli trained Air Force officers If one wanted to embroil Turkey in a war in the next year or two, then it would be a rather good idea to weaken Turkey’s military by greatly thinning ...
EXCLUSIVE: Eric Paddock lying and taking up for his brother FULL 34 minutes Audio of an interview today showing Eric Paddock lying, all of a sudden Eric says he knew his brother had these weapons and tells a lot more!  ...
Former Central Banker: Oil Pipeline Protesters Will Be Killed. So Be It. As Canada’s controversial Trans Mountain pipeline expansion project faces ongoing opposition, the former governor of the Bank of Canada said that prot...
Still refusing to recommend vitamin D, the pharmaceutical industry now wants to use a CANCER drug to... Big Pharma doesn’t miss a single trick when it comes to making money out of human suffering, and just such an opportunity was recently handed to them ...

Obamagate: NSA Documents Prove Surveillance on Donald Trump and Alex Jones

Infowars.com have obtained credible information regarding individual records of U.S. citizens under National Security Agency (NSA) electronic surveillance in the years 2004 through 2010 – a database that documents both Donald J. Trump and Alex Jones were under illegal, unauthorized government monitoring during those years.

Michael Zullo, formerly the commander and chief investigator of the Cold Case Posse (CCP), a special investigative group created in 2006 in the office of Joseph M. Arpaio, formerly the sheriff in Maricopa County, an Arizona State Certified Law Enforcement Agency, headquartered in Phoenix, Arizona.

The NSA electronic surveillance data was created by the NSA as part of the NSA’s illegal and unconstitutional Project Dragnet electronic surveillance of U.S. citizens, https://www.eff.org/deeplinks/2015/12/dragnet-nsa-spying-survives-2015-review first revealed by news reports published in 2005, https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded as further documented by the revelations of whistleblower Edward Snowden in 2013 – a project that Sheriff Arpaio and his chief CCP investigator Michael Zullo believe has never been shut down.

Sheriff Arpaio and Chief Investigator Zullo have identified dozens of entries at various addresses, including both Trump Tower in New York City and Mar-a-Lago in Palm Beach, Florida, under which Trump was under NSA electronic surveillance, as a result of the analysis they conducted on Project Dragnet records of U.S. citizens that were the targets of electronic surveillance from 2004, during President George W. Bush’s term of office, through 2009, the first year of President Obama’s presidency.

Here is an abstract of the NSA line-item listings as they appeared in the database detailing NSA electronic surveillance of Donald Trump, produced here as it shows up in the Project Dragnet Database (with the exception that the last four digits of the telephone number are redacted):

Master Database Records

Donald Trump

Trump International

1 Central Park, NYC



Donald Trump


World Tower

845 United Nations Plaza, NYC


No Date

Donald Trump

Trump Tower SAL

108 Central Park, NYC



Donald Trump

Trump Palace Co

200 E. 69th Street A, NYC



Donald Trump

Trump Entrmt Re

725 Fifth Ave. FL, NYC



Donald Trump

Trump Organization

725 Fifth Ave. BSM, NYC



Donald Trump

Trump Palace

725 Fifth Ave., NYC



Donald Trump

Mar-a-Lago Club

1100 S. Ocean BL, Palm Beach, FL


No Date

Donald Trump

No Business Identified

1100 S. Ocean BL, Palm Beach, FL



Donald Trump

Trump International

401 N. Wabash Ave.



Donald Trump

Douglass Limous

239 Nassau St., Princeton, New Jersey



Donald Trump

Trump International

3505 Summit BLV, West Palm Beach, FL



Donald Trump

Flights INC

P.O.Box 196, Hamilton MA



Donald Trump

No Business Identified

10 Market St., NYC


No Date

Donald Trump

Trump International

1 Central Park, NYC



Donald Trump

Trump Hotels

Huron Ave. BrigA, Atlantic City, NJ


No Date

Donald Trump

Trump National

339 Pine Rd, Briarcliff M


No Date

Donald Trump

Trump Plaza & C

2500 Pacific Ave, Atlantic City, NJ



Donald Trump

Trump Palace Co.

200 E. 69th St., NYC



Donald Trump

Seven Springs L.

66 Oregon Rd, Mount Kisco, NY





The Project Dragnet database suggests Trump was under surveillance not only for phone conversations, but also for financial information, including most likely bank account transactions, credit card transactions, and tax filings.

Also listed as under NSA surveillance in the period 2004-2010 was Trump’s former wife, Ivanka Trump at House of Ivanka, 10 East 64th Street, New York City.

The Project Dragnet database also indicates that the NSA was conducting electronic surveillance on an extensive list of Trump employees in the years 2004-2010 – the only years for which Sheriff Arpaio had data.

Here is a partial list of the Trump employees that show up in the Project Dragnet database:

Patricia Hernandez, a Manager for the Trump Organization, was under NSA electronic surveillance at Trump Parc, Central Park South, in New York City, at phone 212-586-xxxx, date: 9/16/2008.

Mike van der Goes, a Golf Pro at Oceans Trails Golf Course in Palos Verdes, who was promoted to be general manager when Trump bought the course from the bank in 2005 and renamed it Trump National. Mike van der Goes was under surveillance at Trump National, 1 Ocean TRL, Rancho Palos Verdes, California, at phone: 310-265-xxxx, no date.

Carolyn Kepcher, a frequent guest on NBC’s television program “The Apprentice,” who was under NSA electronic surveillance when she was General Manager at the Trump National Golf Course in Briarcliff, New York, in Westchester County north of New York City, at 339 Pine Rd., in Briarcliff, New York, at phone 914-944-xxxx, date: 9/7/206.

Joe Traci, a Real Estate Property Manager at Trump New World Property Management, at 438 W. 69th Street, New York City, phone 212-769-xxxx, date: 11/12/2008; and at 5 12th Street, New York City, phone: 212-586-xxxx, no date.

Roger Socio, a Senior Project Manager, Trump Organization, Trump Tower, 725 Fifth Avenue, New York City, phone: 212-715-xxxx, 2/23/2009.

Bill Fichter, Residents Manager, Trump Organization, Trump Palace, 200 E. 69th Street, New York City, phone: 212-879-xxxx, date: 2/24/2009.

Florin Bogosel, Trump Park Avenue, 502 Park Avenue, New York City, phone: 212-223-xxxx, no date.

Grace Dunne, Trump Park Residence, 3770 Barger Street, Shrub Oak, New York, phone: 914-245-xxxx, date 1/26/2006.

Greg Bradley, Vice President, Trump Pavilion for Nursing and Rehabilitation, 9028 Van Wyck, East Richmond Hill, New York, phone: 718-291-xxxx, no date.

All these employees appear to have been under NSA phone surveillance, plus various of them under financial surveillance as well.

Alex Jones is listed as being under electronic surveillance for phone records, as well as under surveillance for financial records, in 2006. The address listed for Alex Jones in the NSA Project Dragnet database was correct for his residence at that time. So too, Alex Jones confirmed the phone number listed was also correct.

Sheriff Arpaio and Chief Investigator Zullo have validated through law enforcement channels the validity of the name, address, and telephone numbers for the dates that appear in the Project Dragnet database.

Sheriff Arpaio and Chief Investigator Zullo are prepared to share relevant information with appropriate federal law enforcement agencies, including the FBI, as well as the Department of Justice, Homeland Security Department, the White House, and members of Congress the Project Dragnet Database in whole, or in part, as it pertains to NSA electronic surveillance of Donald J. Trump and his various employee.

Sheriff Arpaio and Chief Investigator Zullo also show up in the database, listed as being under both phone and financial surveillance.

Zullo explained that he and Arpaio came in contact with the information from Operation Dragnet during an unrelated investigation that began in October 2013 and ended January 2015.

A whistleblower by the name of Dennis Montgomery brought forward information that Montgomery alleges was collected while he was employed as a subcontractor for the NSA, working on various surveillance projects.

Court documents do verify Montgomery was contracted by the NSA, in part to develop computer breaching software that has been utilized in government mass surveillance operations targeting American citizens without legal justification.

While Montgomery’s credibility has been called into question, Zullo maintains that the amount of information provided by Montgomery related to Operation Dragnet was extraordinarily voluminous and that Montgomery had shared information with investigators in 2013 that is only now being revealed by media outlets.

Source: http://blogdogcicle.blogspot.com/2017/03/nsa-documents-prove-surveillance-on.html

Please follow and like us:

Other articles of interest:

Global Supply Chains Paralyzed After World’s 7th Largest Container Shipper Files Bankruptcy, A... After years of relentless decline in the Baltic Dry index... today the largest casualty finally emerged on Wednesday when South Korea's Hanjin Ship...
US Dollar Rejected World Wide – It Has Begun The US Dollar has been rejected around the world. DOLLAR REJECTED WORLDWIDE – PUTIN SAYS PETRO DOLLAR DEAD – YouTube Yesterday at a restaura...
Anonymous: New Las Vegas Shooting Revelations and Insights (Video) New insights and revelations from Anonymous and an individual on Facebook as well. The video from Anonymous is below the posts from the individual on ...
Mysterious ‘pyramids’ are spotted on the ocean floor: Conspiracy theorists claim they ha... Speculation that there are mysterious pyramids at the bottom of the Atlantic is circulating online. Conspiracy theorists have been debating whether a...

FBI says utility pole surveillance cam locations must be kept secret

“Disclosure of even minor details about them may cause jeopardy,” bureau says.

Please follow and like us:

Other articles of interest:

The United Nations Finally Admits The Truth About Chemtrails The following video is an admission by Rosalind Peterson, President of the Agriculture Defence Coalition, who addresses the UN on the truth behind che...
Want to live longer? Eat spicy food Many people enjoy spicy foods for a variety of reasons: the flavor, the heat, the rush. But if you’ve got a penchant for hot peppers and all things sp...
Child Porn Legalized In Britain, Bring Back Public Hangings Now! #Pedogate Child Porn Legalized In Britain, People who share Child Porn will not longer be arrested or even taken to court in Britain. Maybe once these pigs see ...
“Hillary Clinton has 1 Year to Live,” says Medical School Professor I am a professor at a medical school. I have taught at three institutions (currently in my third). I will not provide my exact credentials because sev...
The Federal Reserve Made a FB Post About Avoiding Scams… And It’s Getting Destroyed by T... Last August, the Federal Reserve came face-to-face with an army of trolls when it launched a public Facebook page, but whoever runs their social media...

NSA surveillance extends to biomedical implants including pacemakers to collect data on unsuspecting Americans

(NaturalNews) Maybe it’s something in the water at the National Security Agency, but for some reason, officials there just can’t seem to get enough of spying on us by continually expanding their surveillance dragnet.

Cyber command uses same symbolology as Nazi SS the double forn nordic ZIG/ZIEG sign that means the Black Sun Lucifer

As reported by The New American, the agency is now looking into possibly stealing data from Internet-connected biomedical devices like pacemakers, according to the NSA’s deputy director, Richard Ledgett.

“We’re looking at it sort of theoretically from a research point of view right now,” Ledgett told the attendees of the 2016 Defense One Tech Summit, held June 10 in Washington, D.C. Defense One is a defense/national security oriented news and information website.

The deputy director referred to the devices as just “another tool in the toolbox” of electronic surveillance, agreeing with a comment that the data that could be collected from pacemakers and other devices would be akin to a “signals intelligence bonanza.”

“As my job is to penetrate other people’s networks, complexity is my friend,” he told the conference. “The first time you update the software, you introduce vulnerabilities, or variables rather. It’s a good place to be in a penetration point of view.”

The ‘Internet of things’ is turning out to be a huge privacy issue

Penetrating networks is spy-speak for essentially violating rights that are supposed to be protected by the Fourth Amendment, which (supposedly) guarantees “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures … .” The amendment also requires government to get search warrants issued only “upon probable cause” from a court of law, which describes “the place to be searched, and the persons or things to be seized.”

The NSA would likely get cute and argue that hey, signals from a pacemaker aren’t “papers” or “houses,” so they aren’t covered by the Fourth Amendment. But they certainly are “effects,” and no one could reasonably argue that stealing data from a device (without a warrant) is not an invasion of privacy, given that the data was not being sent to NSA for analysis voluntarily.

Are you starting to see why this “Internet of things” isn’t all it is cracked up to be?

That said, according to The New American, Ledgett is not the only one who is anxious to begin collecting data from biomed devices and other Internet-connected devices and appliances:

At a Senate hearing in February, Director of National Intelligence James Clapper said that Internet-connected devices of all sorts could help with “identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials.”

In a letter to electronic privacy champion Sen. Ron Wyden, D-Ore., Clapper actually identified, in passing, some devices that could be hacked by the NSA and other federal agencies so that they could gain access to private data. Those items included “a refrigerator, a washing machine, or a child’s toy.”

No more value of liberty?

The fact that top officials with U.S. intelligence agencies are so blatant about their desire to scoop up as much personal data on American citizens as possible ought to be alarming to many in Congress, but at least publicly there has not been much push-back. Many of these intelligence briefings are held in secret; there are portions held in public, but eventually the House and Senate intelligence committees most generally launch closed-door sessions so that they can discuss classified materials.

They apparently also discuss new and innovative ways to destroy constitutional protections.

Very influential states’ rights advocate and jurist, St. George Tucker, wrote regarding the importance of the checks included in the Fourth Amendment: “The constitutional sanction here given to the same doctrine, and the test which it affords for trying the legality of any warrant by which a man may be deprived of his liberty, or disturbed in the enjoyment of his property, can not be too highly valued by a free people.”

In the Information Age, however, “free people” seem to have forgotten what value is inherent in liberty.





Please follow and like us:

Other articles of interest:

US, Russia on Brink of Military Showdown in Syria There is a sense in Washington and Moscow alike that a military showdown between the US and Russia is inevitable – direct this time, not through p...
The 239 Year Timeline of America’s Involvement in Military Conflict Isaac Davis Waking Times “I should welcome almost any war, for I think this country needs one.” -President Theodore Roosevelt The American pu...
Taylor Swift Is Actually A Clone Of A Satanist, According To Insane Theory If you're a fan of celebrity conspiracy theories, then this one will make your brain hurt. The internet is freaking out over an old photo from the ...
Alert: Top Navy Officer Fired by Obama For Exposing Massive Threat to US FIRST: THANK YOU TO ALL WHO HAVE SERVED! I GUESS WE CAN JUST ADD FANELL TO THE GROWING LIST BELOW… When you see the list of high ranking officer...
This must-see interview with James Rickards will make you completely rethink your financial prepared... This Greg Hunter interview with James Rickards will make you completely rethink your financial preparedness for the coming collapse. James Rickards...