noticing can stop what is coming

usa-cyber-surveillance

User avatar
Storm
Site Admin
Posts: 1815
Joined: Mar 6th, '18, 23:36
Location: Pioneer Freedom
Contact:

usa-cyber-surveillance

Unread post by Storm »



Image Image Image [P]HARMA

User avatar
Storm
Site Admin
Posts: 1815
Joined: Mar 6th, '18, 23:36
Location: Pioneer Freedom
Contact:

Unread post by Storm »

https://www.westernjournal.com/ct/dozen ... ces-found/

By Benjamin Arie
May 20, 2018 at 3:46pm

There are countless cell phone towers all around us. Just take a look at any major phone company’s coverage map: Almost every populated area of America is blanketed with towers, which allow us to stay connected while roaming or even driving across the country.

But not every cell tower is there to help us. Spying devices commonly known as “StingRays” can mimic legitimate parts of the network, but track you in alarming ways.

Shockingly, an investigative report from WRC-TV in Washington, D.C., has found dozens of those spy devices around the nation’s capital. And even more troubling is the fact nobody is entirely sure how they got there.

“The technology can be as small as a suitcase, placed anywhere at any time, and it’s used to track cell phones and intercept calls,” explained the news outlet.

The trick is that your phone is always searching for a strong tower. When it finds one, it connects automatically. This happens constantly without the user ever realizing it.

By mimicking or “spoofing” a real cell tower, the StingRays — a brand name for one variant of the device — connect to your phone and gather important data, including its unique identification number.

This means that once a group knows what your phone looks like on the network, a cluster of StingRays can detect when you enter or leave an area. With enough of the spy devices, your location can be tracked with surprising accuracy.

It may also be possible for the devices to listen in on phone calls. By acting as a “man in the middle,” StingRays can intercept your traffic while forwarding calls to their intended destination. You would probably never know something was amiss.
Are you personally concerned about privacy issues with smartphones?

“While you might not be a target yourself, you may live next to someone who is. You could still get caught up,” security expert Aaron Turner told WRC.

With the help of Turner, WRC reporters installed special software that looks for anomalous or “out of place” cell sites. By looking for various telltale signs of a StingRay, the application can provide a pretty good idea about cell spying in an area, although it isn’t perfectly accurate.

“(WRC-TV’s) I-Team’s test phones detected 40 potential locations where the spy devices could be operating, while driving around for just a few hours,” the station explained.

“And the I-Team found them in high-profile areas like outside the Trump International Hotel on Pennsylvania Avenue and while driving across the 14th Street bridge into Crystal City. The I-Team got picked up twice while driving along K Street — the corridor popular with lobbyists,” the report continued.

There are clearly legitimate uses of the spy devices for law enforcement. For instance, there are many known cases of police using StingRays to track drug dealers and other wanted criminals. Detecting when a known terrorist enters an area is another obvious use for the technology.

RELATED: School Security Videos Who’s Been Pooping on Track, Astonished When They ID Culprit

Chillingly, however, law enforcement agencies may not be the only users of the spy units.

“A recent report by the Department of Homeland Security called the spy devices a real and growing risk,” explained WRC-TV.

“DHS has warned rogue devices could prevent connected phones from making 911 calls, saying, ‘If this type of attack occurs during an emergency, it could prevent victims from receiving assistance,'” the report continued.

Whether the devices detected in the D.C. area were placed there by U.S. law enforcement, criminal groups or international agents is not known — at least, not to the public. It’s possible that a mix of those possibilities could be responsible.

One thing is clear: The more we become dependent on complex technology, the easier it is for those advances to be abused or exploited.

Individual privacy and security are still important, and while smartphones have brought amazing convenience, it might not be a bad idea to think twice before blindly trusting phones and networks with our entire lives.

Facebook has greatly reduced the distribution of our stories in our readers' newsfeeds and is instead promoting mainstream media sources. When you share to your friends, however, you greatly help distribute our content. Please take a moment and consider sharing this article with your friends and family. Thank you.



Image Image Image [P]HARMA

User avatar
Storm
Site Admin
Posts: 1815
Joined: Mar 6th, '18, 23:36
Location: Pioneer Freedom
Contact:

Unread post by Storm »

Q on DARPA/Lifelog/FaceBook stolen tech from Michael McKibben, Leader Tech 1990s

2996
Q !!mG7VJxZNCI ID: 1e3478 No.5553154 📁
Mar 7 2019 02:07:05 (EST)
Anonymous ID: 54f4cb No.5552800 📁
Mar 7 2019 01:44:15 (EST)
5552746
kek, Q.

MZ gets called out and immeadiately panics.

Really nothing to see here… /s
5552800
Other articles prior to posts.
Privacy push to cover for past/future 'exposure' issue re: data release non_marketing.
There is no privacy.
There is no way to turn off (even through app deletion) their ability to extract info.
How is that possible for a 'supposed' non_gov entity?
Phone co's involved?
Phone_wipe resolve?
Q
2995
Q !!mG7VJxZNCI ID: 1e3478 No.5552746 📁
Mar 7 2019 01:41:31 (EST)
5551830
Trying to get ahead of something?
What a coincidence.
Q
2994
Q !!mG7VJxZNCI ID: 4e2679 No.5551524 📁
Mar 7 2019 00:34:41 (EST)
PEOPLE ARE PAWNS IN THEIR SICK GAME OF GLOBAL DOMINATION.
PEOPLE ARE DIVIDED TO PREVENT A RISING OF THE PEOPLE.
PEOPLE ARE DIVIDED AND TAUGHT TO FIGHT THEMSELVES INSTEAD OF THE RULING CLASS.
RACE VS RACE
RELIGION VS RELIGION
POLITICAL VS POLITICAL
CLASS VS CLASS
SEX VS SEX
WHEN YOU ARE DIVIDED, YOU ARE WEAK.
WHEN YOU ARE WEAK, YOU HAVE NO POWER.
WHEN YOU HAVE NO POWER, YOU HAVE NO CONTROL.
STAY STRONG, PATRIOTS.
STAY UNITED, NOT DIVIDED.
YOU ARE WHAT MATTERS.
YOU, AWAKE, IS THEIR GREATEST FEAR.
Q
2993
Q !!mG7VJxZNCI ID: 4e2679 No.5551229 📁
Mar 7 2019 00:23:50 (EST)
https://www.iqt.org/our-history/
Why did @Snowden only engage and attack the NSA?
If @Snowden really cared about privacy/citizenship awareness, why didn't he expose the C_A's main programs?
@Snowden was priv to DARPA, IQT, and NSA SURV / COV programs.
Why did @Snowden only focus on NSA?
Where did @Snowden work prior to NSA?
ASK YOURSELF A VERY SIMPLE QUESTION, WOULD YOU RELEASE (GO LIVE) TO THE PUBLIC ACROSS THE MEDIA ALL HIGHLY CLASSIFIED MATERIAL (NSA) ……………PRIOR TO…………..GETTING TO YOUR END DESTINATION?
OR, WOULD YOU LOGICALLY TRAVEL TO YOUR END DESTINATION, THEN RELEASE PUBLICLY?
WAS RUSSIA THE PLANNED LOCATION?
WHY RUSSIA?
WHY DID CHINA (HKG) LET HIM OUT OF THE COUNTRY?
WAS THERE A 'RED' SECURITY ALERT PUT OUT TO PREVENT PASSPORT TRAVEL ACROSS ALL NATIONS?
WHY DID CHINA GRANT ACCESS TO TRAVEL W/ THE BLOCK IN PLACE?
WHY RUSSIA?
RUSSIA RUSSIA RUSSIA
Q
2992
Q !!mG7VJxZNCI ID: 4e2679 No.5551010 📁
Mar 7 2019 00:16:14 (EST)
https://qz.com/1145669/googles-true-ori ... veillance/
[DARPA>GOOG]
Re-review past drops.
Major steps underway to challenge these control pockets.
Q
2991
Q !!mG7VJxZNCI ID: 5de4f4 No.5550834 📁
Mar 7 2019 00:09:07 (EST)
Q !!mG7VJxZNCI ID: 5de4f4 No.5550786 📁
Mar 7 2019 00:07:30 (EST)
5550547
Expand your thinking.
If covertly operated [data accessible to project designators] would they attempt to prevent any type of GOV regulations from being imposed?
Expand your thinking further.
Why was MZ chosen as CEO (public figure) tasked to expand growth?
Family tree of MZ?
Who is the wife of MZ?
Family tree of wife?
Why won't CHINA allow FB?
Situational awareness?
Do they know it's an individual collection asset program being covertly operated by the C_A?
Do they know it's been expanded to tap into the microphone of any device for listening and bulk data collection?
Do they know it's been expanded to tap into the GPS router of the device for RT tracking?
Do they know it's been expanded to tap into the camera function of the device in order to view/record all target designators?
Q
5550786
[2 of 9] complete.
Q
2990
Q !!mG7VJxZNCI ID: 5de4f4 No.5550786 📁
Mar 7 2019 00:07:30 (EST)
Q !!mG7VJxZNCI ID: 5de4f4 No.5550547 📁
Mar 6 2019 23:58:23 (EST)
Logical thinking.
Did DARPA complete build/code (tax-payer funded) 'LifeLog' program?
After completion, was there fear the public wouldn't accept the adoption if known it was DoD/C_A backed?
Do you believe people would join a platform knowing it was under the control of the C_A and FED GOV?
No.
How do you lure the masses into entering all their personal info and private messages (i.e. their LIFE LOG) onto a new platform?
Do you make it cool?
How did FB 'supposedly' start and launch?
Ivy league only?
Develop a trend and/or following?
How do you keep the project running w/o 'public' taxpayer funds? [DoD reported LifeLog was TERMINATED to Congress/Senate OS]
Define 'Black Budget'.
Did HWOOD push?
Do people follow the 'stars'?
Competitors systematically attacked (myspace) to prevent comp?
THE LARGEST 'COLLECTIVE' SOCIAL MEDIA PLATFORM IN THE WORLD (BILLIONS LOGGED) IS OWNED AND OPERATED (COVERTLY) BY THE CENTRAL INTELLIGENCE AGENCY OF THE UNITED STATES OF AMERICA.
The More You Know.
Q
5550547
Expand your thinking.
If covertly operated [data accessible to project designators] would they attempt to prevent any type of GOV regulations from being imposed?
Expand your thinking further.
Why was MZ chosen as CEO (public figure) tasked to expand growth?
Family tree of MZ?
Who is the wife of MZ?
Family tree of wife?
Why won't CHINA allow FB?
Situational awareness?
Do they know it's an individual collection asset program being covertly operated by the C_A?
Do they know it's been expanded to tap into the microphone of any device for listening and bulk data collection?
Do they know it's been expanded to tap into the GPS router of the device for RT tracking?
Do they know it's been expanded to tap into the camera function of the device in order to view/record all target designators?
Q
2989
Q !!mG7VJxZNCI ID: 5de4f4 No.5550547 📁
Mar 6 2019 23:58:23 (EST)
Logical thinking.
Did DARPA complete build/code (tax-payer funded) 'LifeLog' program?
After completion, was there fear the public wouldn't accept the adoption if known it was DoD/C_A backed?
Do you believe people would join a platform knowing it was under the control of the C_A and FED GOV?
No.
How do you lure the masses into entering all their personal info and private messages (i.e. their LIFE LOG) onto a new platform?
Do you make it cool?
How did FB 'supposedly' start and launch?
Ivy league only?
Develop a trend and/or following?
How do you keep the project running w/o 'public' taxpayer funds? [DoD reported LifeLog was TERMINATED to Congress/Senate OS]
Define 'Black Budget'.
Did HWOOD push?
Do people follow the 'stars'?
Competitors systematically attacked (myspace) to prevent comp?
THE LARGEST 'COLLECTIVE' SOCIAL MEDIA PLATFORM IN THE WORLD (BILLIONS LOGGED) IS OWNED AND OPERATED (COVERTLY) BY THE CENTRAL INTELLIGENCE AGENCY OF THE UNITED STATES OF AMERICA.
The More You Know.
Q
2988
Q !!mG7VJxZNCI ID: 27adf2 No.5550175 📁
Mar 6 2019 23:38:12 (EST)

Define 'Lifelog' [DARPA].
"an ontology-based (sub)system that captures, stores, and makes accessible the flow of one person's experience in and interactions with the world in order to support a broad spectrum of associates/assistants and other system capabilities". The objective of the LifeLog concept was "to be able to trace the 'threads' of an individual's life in terms of events, states, and relationships", and it has the ability to "take in all of a subject's experience, from phone numbers dialed and e-mail messages viewed to every breath taken, step made and place gone".
Define 'FB'.
The Facebook service can be accessed from devices with Internet connectivity, such as personal computers, tablets and smartphones. After registering, users can create a customized profile revealing information about themselves. Users can post text, photos and multimedia of their own devising and share it with other users as "friends". Users can use various embedded apps, and receive notifications of their friends' activities. Users may join common-interest groups.
Compare & Contrast.
DARPA senior employees > FB?
DARPA TERMINATES PROGRAM FEB 4, 2004.
FB FOUNDED FEB 4, 2004.
DARPA = FB
Q



Image Image Image [P]HARMA

User avatar
Storm
Site Admin
Posts: 1815
Joined: Mar 6th, '18, 23:36
Location: Pioneer Freedom
Contact:

Unread post by Storm »


🛈
Mar 10 2019
3025
Q !!mG7VJxZNCI ID: be3a94 No.5618750 📁
Mar 10 2019 23:59:43 (EST)
a057872849d545c961695749a1c2f77ff2f7a55ff5363df4c089e8a13e36ca48.jpg ⬇
Image

John Perry Barlow POST January 27, 2018
John Perry Barlow DEAD February 8, 2018.
Reconcile.
This is not a game.
Q
3024
Q !!mG7VJxZNCI ID: be3a94 No.5618461 📁
Mar 10 2019 23:48:58 (EST)

Banking on HRC to win?
You never thought she would lose.
Banking on BRENNAN to bring you home?
You never expected a new DIR to be appointed.
Agency rogue elements still in control of OP?
No.
GINA (EX_UK_DIV_) open attacks?
[3uD_hq]
WHAT DO YOU HAVE LEFT TO SELL TO RUSSIA TO RETAIN YOUR SAFETY AND SECURITY?
WELCOME HOME, @SNOWDEN.
Q
3023
Q !!mG7VJxZNCI ID: 8c541b No.5618056 📁
Mar 10 2019 23:31:23 (EST)
Q !!mG7VJxZNCI ID: 8c541b No.5617930 📁
Mar 10 2019 23:27:15 (EST)
5617724
Connect the dots?
@Snowden released code words (NSA_key(s)).
@Snowden travels to RUSSIA.
Shadow Brokers release actual code (NSA_key(s)).
Shadow Brokers ORIG in RUSSIA.
Can you make the connection why @Snowden went to RUSSIA?
Can you make the connection who provided the source code to SHADOW BROKERS?
Define 'Spook'.
Define 'Shadow'.
Do 'Spooks' hide in the 'Shadows'?
STAND STRONG, GINA.
Q
5617930
Who was Agency DIR from 2012- 2016?
[AGENCY DIR]
[JOHN PERRY BARLOW]
How did we know (prior to)?
Q
3022
Q !!mG7VJxZNCI ID: 8c541b No.5617930 📁
Mar 10 2019 23:27:15 (EST)
Q !!mG7VJxZNCI ID: 8c541b No.5617724 📁
Mar 10 2019 23:19:05 (EST)
https://www.nytimes.com/2017/11/12/us/n ... okers.html
@Snowden
Parades or Restraints?
[2019]
Q
5617724
Connect the dots?
@Snowden released code words (NSA_key(s)).
@Snowden travels to RUSSIA.
Shadow Brokers release actual code (NSA_key(s)).
Shadow Brokers ORIG in RUSSIA.
Can you make the connection why @Snowden went to RUSSIA?
Can you make the connection who provided the source code to SHADOW BROKERS?
Define 'Spook'.
Define 'Shadow'.
Do 'Spooks' hide in the 'Shadows'?
STAND STRONG, GINA.
Q
3021
Q !!mG7VJxZNCI ID: 8c541b No.5617724 📁
Mar 10 2019 23:19:05 (EST)
https://www.nytimes.com/2017/11/12/us/n ... okers.html
@Snowden
Parades or Restraints?
[2019]
Q
3020
Q !!mG7VJxZNCI ID: 1c9552 No.5617565 📁
Mar 10 2019 23:11:24 (EST)

Why did @Snowden only attack NSA?
Where did @Snowden work prior to NSA?
Why did @Snowden pick 'RUSSIA' as his SAFE-PLACE?
What events occurred directly after release of NSA_pack(s)?
How do you avoid data privacy laws?
Charter of NSA?
Charter of Agency?
DARPA>LifeLog>FB
Define 'Surveillance state'.
A surveillance state is a country where the government engages in pervasive surveillance of large numbers of its citizens and visitors.
Matters of NAT SEC?
Accepted Reality?
Why was the NSA targeted?
Why was the Agency protected/sheltered?
Q
3019
Q !!mG7VJxZNCI ID: e86c0f No.5616382 📁
Mar 10 2019 22:09:20 (EST)
https://www.nsa.gov/News-Features/News- ... c-tac-toe/
Shall We Play A Game?
How many Tweets has POTUS 'forwarded' in the past 12-hours?
Primary topic(s)?
March Madness.
Do you have your [ ] filled in?
Q



Image Image Image [P]HARMA

User avatar
Storm
Site Admin
Posts: 1815
Joined: Mar 6th, '18, 23:36
Location: Pioneer Freedom
Contact:

Unread post by Storm »

2 pdfs re cyber hacking and the tools used

CIA lost control of hacking tools a few years back..

Attachments
cyber-hijack-findings.pdf
(30.34 MiB) Downloaded 532 times
Mining the Social-Web-Data-Mining-FB-Twitter-LinkedIn-Google-GitHub-etc.pdf
(8.34 MiB) Downloaded 540 times


Image Image Image [P]HARMA

User avatar
Storm
Site Admin
Posts: 1815
Joined: Mar 6th, '18, 23:36
Location: Pioneer Freedom
Contact:

Unread post by Storm »

The disappearance of four members of a patent semiconductor traveling on Malaysia Airlines MH370 makes the famous billionaire Jacob Rothschild at the sole owner of the important patent.

The mystery surrounding the Malaysian Airlines MH-370 is growing as each day passes with more mysterious silence shadowing the disappearance of the airline. More and more conspiracy theories are beginning to boom on the internet.

One of the conspiracies is the Freescale Semiconductor's ARM microcontroller 'KL-03' which is a new improvised version of an older microcontroller KL-02.

This crazy story about how Illuminati Rothschild exploited the airlines to gain full Patent Rights of an incredible KL-03 micro-chip is going haywire across the internet especially when it's involving Jacob Rothschild as the evil master plotter.

A US technology company which had 20 senior staff on board Malaysia Airlines Flight MH370 had just launched a new electronic warfare gadget for military radar systems in the days before the Boeing 777 went missing.

FULL ARTICLE link
https://www.bibliotecapleyades.net/soci ... hild46.htm



Image Image Image [P]HARMA

User avatar
Storm
Site Admin
Posts: 1815
Joined: Mar 6th, '18, 23:36
Location: Pioneer Freedom
Contact:

Unread post by Storm »



Image Image Image [P]HARMA

User avatar
Herb GuitarLik jr
Posts: 471
Joined: Feb 4th, '19, 01:01
Contact:

Unread post by Herb GuitarLik jr »

Matt BlazeFollow
Mykotronx MYK-78T ("Clipper") Escrowed Encryption Chip
MYK-78T ("Clipper") encryption chip, installed in an AT&T TSD-3600E Telephone Security Device, an encrypting telephone from 1993.

The Clipper chip was the flagship component of a controversial National Security Agency-designed "key escrow" cryptography scheme, in which intercepted encrypted traffic could be decrypted easily by law enforcement or intelligence agencies for surveillance purposes. The program was extremely controversial and, in the end, not a success. Aside from the obvious fundamental problems (the security risks of having a large database of citizen's keys, the need to implement cryptography in expensive secret hardware, etc), the Clipper architecture had technical flaws that made it possible to circumvent the escrow features and preclude the possibility of law enforcement access. (See "Protocol Failure in the Escrowed Encryption Standard" [pdf format], for details.)

AT&T (my employer at the time) was the first (and ultimately only) company to produce a product based on the ill-fated system. The AT&T TSD-3600, announced in 1992, was a voice encryption device designed to be installed in a standard telephone (between the phone base and the handset). Calls placed to other TSD-3600-equipped telephones could be automatically digitized and encrypted, making eavesdropping on the conversation (by legal or illegal means) effectively infeasible. When the US government learned of AT&T's plans to market the device, it worried that criminals might used them to thwart wiretaps. Plans for a new encryption system with a wiretap backdoor were hurriedly drawn up by the NSA, and AT&T was persuaded to replace the regular (non-escrowed) DES-based encryption scheme in the original TSD product with the new system, called the Clipper chip. The Clipper-based model TSD-3600E hit the market in 1993. As incentive for AT&T's cooperation, the government agreed to purchase a significant quantity of Clipper-equipped TSD-3600Es, which sold for over $1000 each in quantity.

Hobbled by the controversial key escrow features and the high retail price, the government ended up being the TSD's only major customer, and even most of the units they bought sat unopened in storage for over ten years. AT&T, for its part, eventually sold off the division that produced the product.

I'm aware of five different TSD-3600 models produced between 1992 and the product's cancellation, differing in the cipher algorithm used. The TSD-3600D was the original, using standard DES with a 56 bit key. (These were quickly recalled and disappeared from the market after Clipper was announced). The 3600F was an exportable model that used a proprietary 40 bit cipher that, I was told, was "embarassingly" weak even given the short key. The 3600P used a proprietary 56 bit cipher similar to DES (but not inter-operable with the 3600D). The 3600E was the first controversial key escrowed model, with the then-classified Skipjack cipher and key escrow features implemented on a tamper-resistant MYK-78T Clipper chip. A later model, the 3600S, included a Clipper chip but would also downgrade (or upgrade, depending on your opinion of key escrow) to the F or P ciphers when communicating with those models. All five models use a Diffie-Hellman key exchange (768 bit, if I recall correctly) to establish a session key, a 4 character hash of which is displayed on each unit's LCD. To detect "man-in-the-middle" attacks, users could verify (by voice) that their displayed hashes matched.

This pictures shows the 1/2 inch square MYK-78T Clipper encryption chip, as installed on the TSD-3600E main circuit board.

Nikkor AM-120mm/5.6, Sinar P, BetterLight Super 6K-HS. Full resolution (6000x8000) version available.

MORE:
https://www.cryptomuseum.com/crypto/usa/clipper.htm



Herb Guitarlik jr and the Al Gore Rhythm BANNED :mrgreen:

Post Reply Previous topicNext topic

Return to “Social Media Spying”

Who is online

Users browsing this forum: No registered users and 7 guests