Tag Archives: surveillance

This is the week that the drone surveillance state became real

Affordable consumer technology has made surveillance cheap and commoditized AI software has made it automatic.

Those two trends merged this week, when drone manufacturer DJI partnered June 5 with Axon, the company that makes Taser weapons and police body cameras, to sell drones to local police departments around the United States. Now, not only do local police have access to drones, but footage from those flying cameras will be automatically analyzed by AI systems not disclosed to the public.

Related image

Footage will be uploaded or streamed to Axon’s digital cloud for police cameras, like the body cameras it currently sells, where it can be analyzed by Axon’s AI and used for anything from crowd monitoring to search and rescue, the company writes on its website.

This sounds vague, but AI research published two days earlier by academics from India and the UK shows exactly how such a drone system could be used. The paper, titled “Eye in the Sky,” details how drone footage could be used to detect “violent individuals” in real-time.

To train the AI, the researchers flew a drone to snap 2,000 images of people pretending to hurt each other. But since the researchers didn’t use real data, and carefully staged the information the AI analyzed to learn the difference between violence and normal human motion, there’s no guarantee that it would work well in the real world, David Sumpter, author of Outnumbered: Exploring the Algorithms that Control Our Lives, wrote on Medium.

“What the algorithm has done is classify individuals with their hands or legs in the air as violent,” Sumpter wrote. Others, like Google ethics hawk Meredith Whittaker, tweeted that the research was flawed and that “AI is facing a mounting ethical crisis.”

Other researchers, including Google (pdf) and Facebook, have also done extensive research trying to solve the same problem of tracking how people move, and what those movements might indicate they’re doing.

But the “Eye in the Sky” researchers are trying to associate certain poses with intent. The researchers don’t discuss any false-positives for actions that could be misinterpreted as violence, such as play-fighting, knocking a fly off someone’s shoulder, or grabbing someone who’s falling.

Regardless of questions surrounding the AI’s legitimacy, The Verge reports that the researchers have gotten approval to test the technology during two festivals in India in October.

With $160 for a Parrot drone like the “Eye in the Sky” team used, and a few pennies for Amazon’s cloud AI platform, anyone with a coding background could have made a similar system. Even teens and cucumber farmers are building their own AI systems.

But the “Eye in the Sky” paper was published publicly, unlike Axon’s technology. The firm, which has acquired two AI companies and has access to petabytes of police camera footage, has no obligation to disclose how the AI was trained or whether it’s accurate or unbiased. Axon wasn’t immediately available to explain how it analyses footage captured by its cameras.

Other kinds of AI, like facial recognition, are already in use in China to surveil ethnic minorities. US authorities, like the Chicago police department are already starting to adopt AI systems for predictive policing, another pursuit rife with bad data. In Baltimore, a plane loaded with cameras was secretly deployed as a surveillance tool until 2016. But now, AI-powered surveillance systems are becoming as easy for a police department to order as a car, handcuffs, or anything else they feel they need to effectively do their jobs.

And now, drones are already getting the green light for police use, not just for surveillance but also to dispense pepper spray and tear gas.

Please follow and like us:

Other articles of interest:

Trump resumes funding for White Helmets US President Donald Trump has agreed to resume funding for the supposed ‘humanitarian’ White Helmets group in Syria, which apparently has ties to radi...
U.S. Wants Control Over Anbar And Beyond – Iraq and Syria Will Prevent It The U.S. is casting its net over the desert between Iraq and Syria, Saudi Arabia and Jordan to install military bases and power-structures that will g...
Hey You Guys, I Found a Dude Who Got Actual Video of the 3rd Shooter in Las Vegas! I posted the Video showing gunfire flashes from the 5th floor right next to the hotel’s Neon sign. Trolls destroyed the store and said, Well, yes ...
“Pokemon Go” What You Need to Know About This Massive Mind Control Effort Less than a week after Pokémon Go’s launch, our streets are already filled with packs of phone-wielding, Weedle-catching zombies. They’re robbing our ...
Gold, Miners Under Trump: Is the Pain Just Beginning? Donald Trump’s epic underdog victory climaxing the US presidential race was radically unexpected by the great majority of the world.  Equally if not m...

Related Posts

Zuckerberg Protein Shakes and the Coming Surveillance State: Mark of the beast System

Car companies are preparing to sell driver data to the highest bidder https://arstechnica.com/cars/2018/02/…

CERN to Transport Antimatter in a Van to Study Neutron Stars https://www.extremetech.com/extreme/2…

Intel hid security flaws from U.S. officials until they were leaked https://globalnews.ca/news/4041986/in…

SpaceX successfully launches Falcon 9 carrying Starlink demo satellites https://techcrunch.com/2018/02/22/spa…

Serious quantum computers are finally here. What are we going to do with them? https://www.technologyreview.com/s/61…

China’s Xinjiang surveillance is the dystopian future nobody wants https://www.engadget.com/2018/02/22/c…

China is building the world’s largest facility for robot ship research https://www.popsci.com/china-world-la…

Airbus’ ‘flying taxi’ isn’t much to look at, but it’s a major step toward electric flight https://www.theverge.com/2018/2/22/17…

Kingdom Come developer promises changes to game’s controversial save system https://www.polygon.com/2018/2/19/170…

The best Kingdom Come: Deliverance mods (so far) https://www.pcgamer.com/best-kingdom-…

Hunt: Showdown | Early Access Launch trailer https://youtu.be/1r4JpEly21E

Konami Warns Users that Metal Gear Survive is Not a Dating Service http://www.playstationlifestyle.net/2…

Super Mario Odyssey’s first DLC is now available — time for a Luigi balloon hunt (update) https://www.polygon.com/2018/1/11/168…

Sometimes You Need To Take a Step Back In Order To Take Two Steps Forward https://www.kickstarter.com/projects/…

Video games, not guns, to blame for school shooting, says Kentucky gov. https://arstechnica.com/gaming/2018/0…

Pokémon Switch Generation 8 Starter Pokémon Reportedly Leaked http://gearnuke.com/pokemon-switch-ge…

Please follow and like us:

Other articles of interest:

It’s Coming… UNPRECEDENTED US BOND DUMPING | Jim Willie Jim Willie editor of the Hat Trick letter joins Silver Doctors to Sound the Alarm: foreign governments are getting concerned about the Federal Reserve...
Protect Your Savings With Gold: ECB Propose End To Deposit Protection Protect Your Savings With Gold: ECB Propose End To Deposit Protection – New ECB paper proposes ‘covered deposits’ should be replaced to allow for mor...
Deep State Collapsing, C.I.A. Being Defanged, Shadow Government Defeat Inevitable The Internet has changed everything, and there’s nothing the C.I.A. can do about it. From this point forward, dismantling the shadow governme...
The inside story of the Saudi night of long knives The House of Saud’s King Salman devises an high-powered “anti-corruption” commission and appoints his son, Crown Prince Mohammad Bin Salman, a.k.a. MB...
10 Unique Earth Dwellings Almost Anyone Can Afford Whether you’ve been house hunting or house dreaming, you know imagining your home is far less stressful than actually putting it into reality. You may...

Private surveillance footage reveals “helicopter hovering overhead” at time of Las Vegas Massacre, FBI never asked for tape

Footage captured by a private surveillance camera on the night of the deadliest mass shooting in modern U.S. history reveals several shocking details which authorities have failed to investigate.

The bombshell footage was released on Fox News’s “Tucker Carlson Tonight” on Friday evening and is presumed to have been captured by a nearby business’s southward facing security camera which is located approximately 780 feet due east of the venue where the Route 91 Harvest Music Festival was held on Oct. 1. The tape was given to Fox News by an attorney who represents several shooting victims.

Although the date burned into the video says ‘Oct. 2,’ Tucker Carlson confirms that the tape was in fact recorded on Oct. 1, the night of the shooting. The discrepancy comes after the proper date was not entered upon installation of the system.

A close look at the footage reveals the first notable detail occurs at 10:06 p.m. which is just one minute into the shooting, according to the official timeline, as Carlson points out.

At 10:06 concertgoers can be seen running eastward through the parking lot in an effort to get to safety.

“By ten-fourteen much larger crowds of people can be seen streaming through the area to escape the massacre going on,” Carlson explains. “You can see a large amount of wind and debris, apparently that is due to a helicopter hovering overhead.”

This is astonishing, to say the least! A helicopter hovering overhead?

Then at 10:16, two men drag a “fallen victim” across the parking lot. The men position the victim behind a Ford pickup truck, presumably to shield themselves and the victim from taking any further incoming rounds as they attempted to give the victim medical assistance.

“Later at ten-twenty-four p.m., one of the men places his shirt across the victim’s face and then at ten-thirty-two a man places what appears to be a blanket or towel over the body after they had given up hope,” Carlson said. “Police only arrive in this area for the first time around ten-forty-five p.m. when the body is still there.”

The victim’s body was eventually was loaded into the back of a Ford Raptor pickup truck at 11:50 p.m. and taken away.

Astonishingly, between the times of 10:13 and 10:16 a good amount of debris can be seen being pushed downward and sideways in front of the camera which Carlson claims is from a “helicopter hovering overhead.”

A quick review of flight records during that time reveals that a squadron of EC-130 Eurocopters departed from Maverick Leasing LLC at 10:12 p.m., several of which appear to have overflown the parking lot where the victim and debris were seen. However, the departure of the choppers and the fact that several of them overflew the parking lot does not explain all of the debris being kicked up from by a heavy downdraft, prop wash, possibly from a helicopter hovering in place much closer. In fact, the downdraft appears to be constant from 10:13-10:16 p.m. and not intermittent as if several choppers had just passed overhead.

According to Carlson, the owner of the tape maintains that law enforcement investigators have never asked to see the footage.

Cover-up or negligence?

Please follow and like us:

Other articles of interest:

Food Industry Study Slams Recommended Sugar Intake Limits A study made headlines after stating that there is no way of knowing just how much sugar consumption is too much, and the methods used to create dieta...
Militants distribute Israeli products in militant-held areas in Syria: Locals Terrorist groups have distributed Israeli foodstuff among their families in the areas under their control in the Syrian province of Quneitra, loca...
How To Clean Up The Pineal Gland Cleaning up the Pineal Gland is useful for those wishing to develop their multidimensional perception. The Pineal gland will naturally make its own DM...
Baker Planning Coup To Make Jeb VP? French Intel Reports Tom Heneghan is reporting on a coup d’etat being planned and pushed forward by Daddy Bush and James Baker who was responsible for stealing the year 20...
HOTEL WORKER JUST LEAKED THE RECEIPTS OF VEGAS GUNMAN THAT WILL CHANGE EVERYTHING Danny Gold for Liberty Writers reports, Las Vegas is still mourning the worst mass shooting in US history that happened on Sunday night. As time goes ...

WOW! Surveillance Video Shows Stephen Paddock Practice Shooting Before Massacre

On Thursday Tony Hernandez Armenta, an employee at Mandalay Bay Hotel in Las Vegas, posted a room receipt that shows killer Stephen Paddock was with a guest at the hotel four days before the massacre.


Via Infowars

Investigative journalist Laura Loomer also posted evidence that Paddock was in the hotel earlier than was reported.

Waiters at Mandalay Bay said they heard Stephen Paddock “speaking with others” in his room while ordering food.

But the FBI says he was faking that discussion.

That’s what the waiters are now saying — Paddock was “speaking with others” but he was just pretending

How would room service know he was not speaking to another person?

Here is the video from ABC News:

ABC Breaking News | Latest News Videos

Reporter Laura Loomer says the employees may be coerced to say it was just pretend.

A new report reveals Paddock practiced shooting in the desert days before the Las Vegas massacre.

WSJ reports:

The gunman who killed 58 people here Sunday appears to have gone out to the desert to practice shooting two days before the massacre, according to a law-enforcement official familiar with the investigation. Investigators have uncovered video footage from a home-surveillance system that shows Stephen Paddock driving alone to an area on the outskirts of Mesquite, Nev. where locals go for target practice. The footage shows Paddock heading to the area on the Friday before the attack, the official said. A spokeswoman for the Las Vegas Metropolitan Police Department didn’t immediately return a request for comment. In recent years, Paddock split time between a home on a quiet cul-de-sac in Mesquite and hotels in Las Vegas, about a 90-minute drive. His neighbors say they hardly knew him. His home backed up to a golf course, but he wasn’t known there, either.

Please follow and like us:

Other articles of interest:

The Red Line of Common Sense: The US Can’t Control Russian Ports Without War Moscow lashed out at a US Congress bill on tightening sanctions against North Korea which stipulates that the US military may establish control over p...
Investigators: Atlanta Airport Blackout Possible Decoy for Moving Nuclear Weapons to Israel (Video) With the outage leading to both the FAA and Atlanta’s mayor ordering the suspension and grounding of all inbound and outbound flights, one mysterious ...
Russia’s ‘Father Of All Bombs’ can make USA’s ‘mother’ blush The use of the most powerful Massive Ordnance Air Blast Bomb (MOAB) GBU-43/B against Islamic State fighters (the terrorist organisation is banned ...
Spain Prepares For Violent Take Over Of Catalonia Tensions between Spain and Catalonia appear to be on the verge of a breaking point. Spain plans to enforce Direct Rule over Catalan, beginning this Fr...
Mission Impossible: Official Story of Vegas Shooting Unravels; Physical Impossibility of Lone Gunman...  By: Mike Adams  /  Natural News It’s all hogwash. The “official” narrative of how things went down in the Las Vegas massacre is so full of holes t...

Infrared signals in surveillance cameras let malware jump network air gaps

aIR-Jumper weaves passwords and crypto keys into infrared signals. Researchers have devised malware that can jump airgaps by using the infrared capabilities of an infected network’s surveillance cameras to transmit data to and from attackers.

The malware prototype could be a crucial ingredient for attacks that target some of the world’s most sensitive networks. Militaries, energy producers, and other critical infrastructure providers frequently disconnect such networks from the Internet as a precaution. In the event malware is installed, there is no way for it to make contact with attacker-controlled servers that receive stolen data or issue new commands. Such airgaps are one of the most basic measures for securing highly sensitive information and networks.

The proof-of-concept malware uses connected surveillance cameras to bridge such airgaps. Instead of trying to use the Internet to reach attacker-controlled servers, the malware weaves passwords, cryptographic keys, and other types of data into infrared signals and uses a camera’s built-in infrared lights to transmit them. A nearby attacker then records the signals with a video camera and later decodes embedded secrets. The same nearby attackers can embed data into infrared signals and beam them to an infected camera, where they’re intercepted and decoded by the network malware. The covert channel works best when attackers have a direct line of sight to the video camera, but non-line-of-sight communication is also possible in some cases.

Researchers at Israel’s Ben-Gurion University of the Negev and Shamoon College of Engineering said the malware establishes a two-way channel that attackers can use to communicate with compromised networks even when they’re air-gapped. The covert channel can transmit data from a video camera to an attacker at 20 bits per second and from an attacker transmitter to a video camera at 100 bits per second. When more than a camera is used in the attacks the bit-rate may be increased further.

A leg in both worlds

The proximity required between the transmitter and receiver is in the tens of meters when data is being siphoned out of a network. It’s hundreds of meters to kilometers when data is being sent into a network. The researchers have dubbed the prototype aIR-Jumper to emphasize the key role that infrared plays.

“Security cameras are unique in that they have ‘one leg’ inside the organization, connected to the internal networks for security purposes, and ‘the other leg’ outside the organization, aimed specifically at nearby public space, providing very convenient optical access from various directions and angles,” Mordechai Guri, head of research and development at Ben-Gurion’s cyber-security research center, told Ars.

Hidden communication via security cameras.
Leaking data via security cameras.

aIR-Jumper uses several different schemes to encode the zeroes and ones that form the basic building blocks of all digital data. The malware breaks large data streams into small packets or frames that include a preamble, a payload, and a 16-bit cyclic redundancy check to ensure the data was sent correctly. The proof-of-concept attack uses an infected camera’s own programming interfaces to control the infrared LEDs to transmit the data according to the encoding scheme and other parameters selected. Infrared LEDs are used to enable night vision so that cameras can produce images when there is little or no ambient light.

aIR-Jumper works best when attackers have direct line of sight to the video camera inside the infected network. Non-line-of-sight communication is also possible when the area illuminated by infrared lights is within the field of vision of the receiver. The attack is not only useful for air-gapped networks. It is also suitable for internal networks where traffic is heavily monitored by firewalls, intrusion prevention systems, and similar security measures, since it can bypass them without requiring any physical access between the attacker and the network.

aIR-Jumper is only the latest covert channel devised to shuttle data into and out of air-gapped networks once they have been infected. Previous proof-of-concept attacks developed by many of the same researchers include the manipulation of acoustic signals emitted from hard drives, malware that turns USB devices inside an air-gapped facility into covert radios that transmit data through electromagnetic signals, and a technique that allows an infected computer’s video card to transmit radio signals that can be received by a smart phone.The wide body of attacks starts with the assumption the attacker has already infected the target with malware. The research shows that air-gaps alone aren’t always sufficient for ensuring an attacker can’t transfer data into and out of mission-critical networks. Countermeasures against the aIR-Jumper include placing surveillance cameras in restricted zones that are optically inaccessible to attackers.

Please follow and like us:

Other articles of interest:

Loss of FBI Reputation Irredeemable: James Comey Will Resign Fresh proof the FBI’s Hillary email probe was a joke … Yet another surprise revelation suggests strongly that the FBI’s probe of Hillary Clinton’s e-m...
CNN Journalist ‘Governments Pay Us To Fake Stories’, Shocking Exposé According to Amber Lyon, a three-time Emmy award winning journalist, CNN is routinely paid by the US government and foreign governments to selecti...
Health Ranger issues international financial alert as Deutche Bank approaches catastrophic collapse…... Since 2008, I’ve been warning Natural News readers about the inevitable, mathematically unavoidable global debt collapse. For the last eight years, cr...
Lindsey Williams – Warning to Prepare for an Emergency. Stock up on Food, Water and Supplies Now! It... Here is the scenario.  “Government agencies are having difficulty making their payments.  State governments are issuing vouchers to pay their bills.  ...
25 Forgotten Survival Lessons from the Pioneers Worth Finding and Learning This article was originally published at Bio Prepper / Alt-Market.com Pioneer life has a special meaning in America. In less than 300 years, civi...

Sweden May Introduce VPN Surveillance and More Data Retention Requirements

According to documents obtained by Swedish internet service provider Banhof, the Swedish government appears to be interested in increasing the country’s data retention requirements, and may even be interested in starting surveillance of virtual private networks (VPNs) and other anonymization services.

Image result for sweden totalitarian

Data retention requirements in Sweden first took effect in 2010. Privacy advocates such as Rick Falkvinge, the founder of the Pirate Party, say that the current Swedish data retention laws already violate fundamental European Union privacy rights. In 2010 German courts struck down a German data retention directive as an unconstitutional violation of privacy. The 2010 ruling in Germany was followed by a ruling from the European Court of Justice in 2014 which struck down the European Union’s data retention directive.

After the 2014 court ruling, Swedish internet service providers were told that the data retention requirements would no longer be enforced. Banhof had stopped retaining customer metadata, and several other Swedish internet service providers then followed Banhof in stopping their data retention programs as well. However, the suspension of data retention requirements in Sweden did not last for long, as government officials deemed the Swedish data retention laws were compatible with the European Union’s Charter of Fundamental Rights. Swedish internet service provider Tele2 filed a lawsuit which they lost when the Swedish courts ruled that the data retention acts were still lawful and could be enforced. Banhof resisted the court’s ruling but was then threatened with a multimillion dollar fine if it continued to refuse to retain customer metadata.

Under current Swedish law, internet service providers must record and store customer metadata for 6 months. Sweden’s new data retention proposal would increase the length of data retention from 6 months to 10 months. While implementing the European Union’s data retention directive from 2006, the Swedish government considered making data retention requirements between 6 months to 2 years. The Swedish government decided to make their data retention law only require data to be stored for 6 months. A broader Data Retention Act which was passed by the Swedish parliament in 2003 was struck down by the European Court of Justice in late December of last year. That 2003 data retention law was struck down for violating the Charter of Fundamental Rights of the European Union.

What remains a mystery is what exactly was meant by requirements to log the activation of anonymization services. A post made on Banhof’s website originally referred to this requirement as applying to VPNs, however, the company updated the post and said that they believe this may be a requirement aimed at prepaid cellular phones. A spokesman for a Swedish VPN called PrivateVPN said that the VPN surveillance requirements were so far only rumors, but did suggest the company would likely leave the country if the Swedish government ever did enact VPN surveillance. Another option would be to force the VPN’s customers to use Network Address Translation (NAT) firewalls. It appears unlikely that the government would ban NAT. However, VPN surveillance could be enforced by internet service providers instead of by the VPN provider, through the use of deep packet inspection.

“Sweden now acts as China when the state requires the network to be tailor-made for monitoring, instead of the internet functioning as well as possible,” Jon Karlung, Banhof’s CEO, said on a post on the company’s website. Karlung says that it will cost hundreds of millions of Swedish kronors to be able to meet the new data retention requirements. He estimates that the average service provider will need to get 300 terabytes of more storage to implement the proposed requirement. “The whole industry is in rebellion,” Karlung says. He believes the government wants service providers to rebuild the network to make surveillance easier, than to make it perform well. The information Banhof received came from a government investigation that is being conducted on the data retention laws. The government’s new report and recommendations will be delivered on October 9.

Please follow and like us:

Other articles of interest:

An Analysis of the Coup Against Trump (Part 2)     In Part One, I provided stunning reversal from Candidate Trump to President Trump with regard to the major initiatives that he...
California passes legislation allowing the liquification of human bodies (Natural News) Last Oct. 15, 2017, California Governor Jerry Brown signed the controversial Assembly Bill 967, or the bill that makes it legal to ...
FRONTLINE: Poverty in America Documentary 2017 https://www.youtube.com/watch?v=zGpE-F1HkO4
The Russians Have Already Shot Down Numerous US Drones Violating Crimean Airspace The war you don’t hear about: numerous American military aircraft (albeit of the unmanned variety, though with the possibility of being armed and dang...
These Are the Early Warning Signs That Most Cancers Have in Common Most people don’t bother to learn what the early warning signs of cancer are. That is until they or someone they love comes down with some form of the...

Obamagate: NSA Documents Prove Surveillance on Donald Trump and Alex Jones

Infowars.com have obtained credible information regarding individual records of U.S. citizens under National Security Agency (NSA) electronic surveillance in the years 2004 through 2010 – a database that documents both Donald J. Trump and Alex Jones were under illegal, unauthorized government monitoring during those years.

Michael Zullo, formerly the commander and chief investigator of the Cold Case Posse (CCP), a special investigative group created in 2006 in the office of Joseph M. Arpaio, formerly the sheriff in Maricopa County, an Arizona State Certified Law Enforcement Agency, headquartered in Phoenix, Arizona.

The NSA electronic surveillance data was created by the NSA as part of the NSA’s illegal and unconstitutional Project Dragnet electronic surveillance of U.S. citizens, https://www.eff.org/deeplinks/2015/12/dragnet-nsa-spying-survives-2015-review first revealed by news reports published in 2005, https://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded as further documented by the revelations of whistleblower Edward Snowden in 2013 – a project that Sheriff Arpaio and his chief CCP investigator Michael Zullo believe has never been shut down.

Sheriff Arpaio and Chief Investigator Zullo have identified dozens of entries at various addresses, including both Trump Tower in New York City and Mar-a-Lago in Palm Beach, Florida, under which Trump was under NSA electronic surveillance, as a result of the analysis they conducted on Project Dragnet records of U.S. citizens that were the targets of electronic surveillance from 2004, during President George W. Bush’s term of office, through 2009, the first year of President Obama’s presidency.

Here is an abstract of the NSA line-item listings as they appeared in the database detailing NSA electronic surveillance of Donald Trump, produced here as it shows up in the Project Dragnet Database (with the exception that the last four digits of the telephone number are redacted):

Master Database Records

Donald Trump

Trump International

1 Central Park, NYC



Donald Trump


World Tower

845 United Nations Plaza, NYC


No Date

Donald Trump

Trump Tower SAL

108 Central Park, NYC



Donald Trump

Trump Palace Co

200 E. 69th Street A, NYC



Donald Trump

Trump Entrmt Re

725 Fifth Ave. FL, NYC



Donald Trump

Trump Organization

725 Fifth Ave. BSM, NYC



Donald Trump

Trump Palace

725 Fifth Ave., NYC



Donald Trump

Mar-a-Lago Club

1100 S. Ocean BL, Palm Beach, FL


No Date

Donald Trump

No Business Identified

1100 S. Ocean BL, Palm Beach, FL



Donald Trump

Trump International

401 N. Wabash Ave.



Donald Trump

Douglass Limous

239 Nassau St., Princeton, New Jersey



Donald Trump

Trump International

3505 Summit BLV, West Palm Beach, FL



Donald Trump

Flights INC

P.O.Box 196, Hamilton MA



Donald Trump

No Business Identified

10 Market St., NYC


No Date

Donald Trump

Trump International

1 Central Park, NYC



Donald Trump

Trump Hotels

Huron Ave. BrigA, Atlantic City, NJ


No Date

Donald Trump

Trump National

339 Pine Rd, Briarcliff M


No Date

Donald Trump

Trump Plaza & C

2500 Pacific Ave, Atlantic City, NJ



Donald Trump

Trump Palace Co.

200 E. 69th St., NYC



Donald Trump

Seven Springs L.

66 Oregon Rd, Mount Kisco, NY





The Project Dragnet database suggests Trump was under surveillance not only for phone conversations, but also for financial information, including most likely bank account transactions, credit card transactions, and tax filings.

Also listed as under NSA surveillance in the period 2004-2010 was Trump’s former wife, Ivanka Trump at House of Ivanka, 10 East 64th Street, New York City.

The Project Dragnet database also indicates that the NSA was conducting electronic surveillance on an extensive list of Trump employees in the years 2004-2010 – the only years for which Sheriff Arpaio had data.

Here is a partial list of the Trump employees that show up in the Project Dragnet database:

Patricia Hernandez, a Manager for the Trump Organization, was under NSA electronic surveillance at Trump Parc, Central Park South, in New York City, at phone 212-586-xxxx, date: 9/16/2008.

Mike van der Goes, a Golf Pro at Oceans Trails Golf Course in Palos Verdes, who was promoted to be general manager when Trump bought the course from the bank in 2005 and renamed it Trump National. Mike van der Goes was under surveillance at Trump National, 1 Ocean TRL, Rancho Palos Verdes, California, at phone: 310-265-xxxx, no date.

Carolyn Kepcher, a frequent guest on NBC’s television program “The Apprentice,” who was under NSA electronic surveillance when she was General Manager at the Trump National Golf Course in Briarcliff, New York, in Westchester County north of New York City, at 339 Pine Rd., in Briarcliff, New York, at phone 914-944-xxxx, date: 9/7/206.

Joe Traci, a Real Estate Property Manager at Trump New World Property Management, at 438 W. 69th Street, New York City, phone 212-769-xxxx, date: 11/12/2008; and at 5 12th Street, New York City, phone: 212-586-xxxx, no date.

Roger Socio, a Senior Project Manager, Trump Organization, Trump Tower, 725 Fifth Avenue, New York City, phone: 212-715-xxxx, 2/23/2009.

Bill Fichter, Residents Manager, Trump Organization, Trump Palace, 200 E. 69th Street, New York City, phone: 212-879-xxxx, date: 2/24/2009.

Florin Bogosel, Trump Park Avenue, 502 Park Avenue, New York City, phone: 212-223-xxxx, no date.

Grace Dunne, Trump Park Residence, 3770 Barger Street, Shrub Oak, New York, phone: 914-245-xxxx, date 1/26/2006.

Greg Bradley, Vice President, Trump Pavilion for Nursing and Rehabilitation, 9028 Van Wyck, East Richmond Hill, New York, phone: 718-291-xxxx, no date.

All these employees appear to have been under NSA phone surveillance, plus various of them under financial surveillance as well.

Alex Jones is listed as being under electronic surveillance for phone records, as well as under surveillance for financial records, in 2006. The address listed for Alex Jones in the NSA Project Dragnet database was correct for his residence at that time. So too, Alex Jones confirmed the phone number listed was also correct.

Sheriff Arpaio and Chief Investigator Zullo have validated through law enforcement channels the validity of the name, address, and telephone numbers for the dates that appear in the Project Dragnet database.

Sheriff Arpaio and Chief Investigator Zullo are prepared to share relevant information with appropriate federal law enforcement agencies, including the FBI, as well as the Department of Justice, Homeland Security Department, the White House, and members of Congress the Project Dragnet Database in whole, or in part, as it pertains to NSA electronic surveillance of Donald J. Trump and his various employee.

Sheriff Arpaio and Chief Investigator Zullo also show up in the database, listed as being under both phone and financial surveillance.

Zullo explained that he and Arpaio came in contact with the information from Operation Dragnet during an unrelated investigation that began in October 2013 and ended January 2015.

A whistleblower by the name of Dennis Montgomery brought forward information that Montgomery alleges was collected while he was employed as a subcontractor for the NSA, working on various surveillance projects.

Court documents do verify Montgomery was contracted by the NSA, in part to develop computer breaching software that has been utilized in government mass surveillance operations targeting American citizens without legal justification.

While Montgomery’s credibility has been called into question, Zullo maintains that the amount of information provided by Montgomery related to Operation Dragnet was extraordinarily voluminous and that Montgomery had shared information with investigators in 2013 that is only now being revealed by media outlets.

Source: http://blogdogcicle.blogspot.com/2017/03/nsa-documents-prove-surveillance-on.html

Please follow and like us:

Other articles of interest:

Why Is Britain Being Prepared For A World War?   7th December 2015 / United Kingdom After the outbreak of world war in 1914, many new rules and regulations came to Britain. This ...
Video: 7 Dangerous Cults That Still Exist Today The Bilderberg Group, The Freemasons, The Mickey Mouse Club – when it comes to bizarre and perverse practices, these are the secret societies most peo...
Build Your Own Potato Growing Box (Effective Method to Produce a Large Quantity of Potatoes) Build Your Own Potato Growing Box (Effective Method to Produce a Large Quantity of Potatoes) Don’t you mean potato grow box? Nope, that’s not a typo....
Vitamin C 1000% More Effective Than Cancer Drugs An exciting medical breakthrough published in the science journal Oncotarget has discovered the astonishing ability of concentrated vitamin C to halt ...
How the Euro Group Works – Secret Meetings, Threats to the Family and Secret Recordings How the Euro Group Works – Secret Meetings, Threats to the Family and Secret Recordings by Rory, The Daily Coin Yanis Varoufakis recently published...

FBI says utility pole surveillance cam locations must be kept secret

“Disclosure of even minor details about them may cause jeopardy,” bureau says.

Please follow and like us:

Other articles of interest:

Zimbabwe Central Bank To Accept Cows, TVs, Fridges As Collateral Long before China Huishan Dairy Holdings, China's largest daily farmer, became known as the latest Chinese corporate fraud whose stock crashed 90%...
Amanita muscaria: The Mushrooms that shaped Mankind by James Arthur Figure 1.   Amanita muscaria A Typical RED variety of the Amanita muscaria. The Single most written about and mystically symbolized Mushroom th...
Flat Earth has no Forests – Human Amnesia Is Lifting What if I told you mountains were not mountains, volcanoes were not volcanoes, deserts were not deserts, and canyons were not canyons? You woul...
Our Uninvited Guests-Foreign Contract Agents Forming a 5th Column in the US The following video visits the notion that foreign contract agents have been let into the country in order to form a 5th column of subversives in orde...
Here, Sweden’s minister-president poses with the rapist of an 80-year-old Mahad A. (19) was sentenced a few years ago because he had kidnapped a severely handicapped 80-year-old woman in the Swedish Katrineholm and raped her...

NSA surveillance extends to biomedical implants including pacemakers to collect data on unsuspecting Americans

(NaturalNews) Maybe it’s something in the water at the National Security Agency, but for some reason, officials there just can’t seem to get enough of spying on us by continually expanding their surveillance dragnet.

Cyber command uses same symbolology as Nazi SS the double forn nordic ZIG/ZIEG sign that means the Black Sun Lucifer

As reported by The New American, the agency is now looking into possibly stealing data from Internet-connected biomedical devices like pacemakers, according to the NSA’s deputy director, Richard Ledgett.

“We’re looking at it sort of theoretically from a research point of view right now,” Ledgett told the attendees of the 2016 Defense One Tech Summit, held June 10 in Washington, D.C. Defense One is a defense/national security oriented news and information website.

The deputy director referred to the devices as just “another tool in the toolbox” of electronic surveillance, agreeing with a comment that the data that could be collected from pacemakers and other devices would be akin to a “signals intelligence bonanza.”

“As my job is to penetrate other people’s networks, complexity is my friend,” he told the conference. “The first time you update the software, you introduce vulnerabilities, or variables rather. It’s a good place to be in a penetration point of view.”

The ‘Internet of things’ is turning out to be a huge privacy issue

Penetrating networks is spy-speak for essentially violating rights that are supposed to be protected by the Fourth Amendment, which (supposedly) guarantees “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures … .” The amendment also requires government to get search warrants issued only “upon probable cause” from a court of law, which describes “the place to be searched, and the persons or things to be seized.”

The NSA would likely get cute and argue that hey, signals from a pacemaker aren’t “papers” or “houses,” so they aren’t covered by the Fourth Amendment. But they certainly are “effects,” and no one could reasonably argue that stealing data from a device (without a warrant) is not an invasion of privacy, given that the data was not being sent to NSA for analysis voluntarily.

Are you starting to see why this “Internet of things” isn’t all it is cracked up to be?

That said, according to The New American, Ledgett is not the only one who is anxious to begin collecting data from biomed devices and other Internet-connected devices and appliances:

At a Senate hearing in February, Director of National Intelligence James Clapper said that Internet-connected devices of all sorts could help with “identification, surveillance, monitoring, location tracking, and targeting for recruitment, or to gain access to networks or user credentials.”

In a letter to electronic privacy champion Sen. Ron Wyden, D-Ore., Clapper actually identified, in passing, some devices that could be hacked by the NSA and other federal agencies so that they could gain access to private data. Those items included “a refrigerator, a washing machine, or a child’s toy.”

No more value of liberty?

The fact that top officials with U.S. intelligence agencies are so blatant about their desire to scoop up as much personal data on American citizens as possible ought to be alarming to many in Congress, but at least publicly there has not been much push-back. Many of these intelligence briefings are held in secret; there are portions held in public, but eventually the House and Senate intelligence committees most generally launch closed-door sessions so that they can discuss classified materials.

They apparently also discuss new and innovative ways to destroy constitutional protections.

Very influential states’ rights advocate and jurist, St. George Tucker, wrote regarding the importance of the checks included in the Fourth Amendment: “The constitutional sanction here given to the same doctrine, and the test which it affords for trying the legality of any warrant by which a man may be deprived of his liberty, or disturbed in the enjoyment of his property, can not be too highly valued by a free people.”

In the Information Age, however, “free people” seem to have forgotten what value is inherent in liberty.





Please follow and like us:

Other articles of interest:

Wiki Leak Email Found Showing Secret Memo To Obama From ISIS Barack Hussein Obama and Hillary Clinton continue to act clueless when it comes to ISIS. They act clueless about when they formed, where they are toda...
The U.S. Military – Pampered, Safe And Very Scared The U.S. military is a socialist paradise: Service members and their families live for free on base. People living off base are given a stipend to ...
Islam was BANNED in the USA in 1952; But you’re not supposed to know that! ISLAM WAS BANNED FROM THE USA IN 1952 but Obama doesn’t want you to know that, nor does he respect or uphold US law. The Immigration and Nation...
Hillary’s Anti-Presidential Campaign Her malicious book reveals why she should never have been president. Daniel Greenfield, a Shillman Journalism Fellow at the Freedom Center,...