Sunday, April 26, 2015

making mass murder mandatory

Killing your immune system,  nervous system, and mind - one shot at a time

Dirpy

MessiahMews Blogs: Dirpy: One of many YouTube downloaders.  Some important videos tend to disappear or get taken down, especially if of a sensitive nature.  Dirpy to ...

Saturday, April 25, 2015

Friday, April 24, 2015

More rain in Ojai, 28 inches since 10-30-14

the drought is a fiction to seize your water, it's raining in the Sierras today, as  it has over a dozen times in six months

Tuesday, April 21, 2015

Hackers are more interested in hacking cars so they can take control from a distance. Unfortunately, they’re getting good at it, and it’s getting easier as cars become more and more computer controlled. Do you own one of the three most hackable cars in the world?

(Kim Komando)  Most commercial airplanes have an indestructible flight recorder, also called a “black box” – even though the casing is actually bright orange. The black box records information from the flight computers and another box records cockpit audio and other sources around the plane. In the event of a crash, investigators can recover the black boxes to help find out exactly what happened.
Cars can have black boxes, too. In fact, it’s a good bet your current car has one already, and if it doesn’t your next new car certainly will. That’s why you should know exactly what that black box is recording, who can get that information and how you can stay in control.
Black boxes in cars aren’t a new thing. The practice started in 1994 with cars from Cadillac, Buick, Chevrolet and Pontiac. The black boxes were meant to help manufacturers learn how their cars performed in crashes.
Since the early 2000s, the National Highway Traffic Safety Administration has been collecting black box information to get a better picture of the circumstances surrounding car accidents. In 2013, 96% of new cars sold in the United States came with a black box, and as of September 1, 2014, every new vehicle must have one installed.
Black box data have been used in a few high-profile investigations. In 2011, Massachusetts Lt. Gov. Timothy Murray totaled a government car, although he walked away. He claimed he was driving the speed limit and wearing a seat belt. Investigators used his black box data to show he was driving 100 mph without a seatbelt at the time of the crash.
Wondering if your car has a black box? This site lists the year, make and model of nearly every car that includes a black box. You can also check your car’s manual. If you’re buying a car from a dealership, they have to tell you if the car has a black box.

WHAT DO BLACK BOXES RECORD?

While the first-generation event data recorders did little more than track whether or not the car’s airbags deployed, recording and sensor technologies have become smaller and much more powerful. The NHTSA has mandated that every new recorder must track 15 variables, although older recorders might not have all of them.
The information includes vehicle speed, throttle position, airbag deployment times, whether the brakes were applied, if seatbelts were worn, engine speed, steering angles and more. Manufacturers may also include up to 30 additional data points if they want, but manufacturers say that doesn’t include GPS location, video or audio. Also, the black box only stores information for 20 seconds around the crash.
Still, many privacy advocates worry that the recording length might eventually increase and include more identifying information. That raises the question of who can access the data in the first place.

WHO CAN PULL THE DATA?


Why your doctors won't tell you about this Diabetes Breakthrough...


Actually getting your hands on black box data requires professional training, and a Crash Data Retrieval system that starts at $2,000 and can cost up to $20,000 with accessories. The CDR system plugs into the on-board diagnostics port under the dashboard on the driver’s side and transfers the information to a special computer program.
Obviously, car manufacturers have the equipment. The NHTSA and law enforcement have the resources to get the information either directly or through specialized third parties. Third-party shops often pull the data as part of an accident reconstruction service. Insurance companies and law firms may also use third parties to get data for accident investigations or court cases.
Then there’s the group everyone worries about – hackers. In most cases, I doubt hackers want your black box data. It would need to have a lot more data on you to make it worth their while.
Hackers are more interested in hacking cars so they can take control from a distance. Unfortunately, they’re getting good at it, and it’s getting easier as cars become more and more computer controlled. Do you own one of the three most hackable cars in the world? Click here to find out.
That’s the technical side of downloading black box data, but there’s a legal side as well. As of this writing, 15 states – Arkansas, California, Colorado, Connecticut, Delaware, Maine, Nevada, New Hampshire, New York, North Dakota, Oregon, Texas, Utah, Virginia and Washington – have passed regulations regarding who can pull the information with and without the car owner’s permission.
You can find an up-to-date list of the states and their rules at the National Conference of State Legislatures site. In general, however, no one can pull data without your permission or a court order. Insurance companies can’t use the data to set your rates unless you opt into a program, and those programs usually use another tracking unit. The rules are much less clear in states that haven’t passed any legislation yet.

CAN YOU KEEP YOUR DATA PRIVATE?

Still, anyone with a court order, or just the right tool and a little time, can get at your black box information. There’s no way you can delete the data or disable the black box.
Fortunately, there is a simpler option. Products like AutoCYB, OBD Lock and OBD Saver put a lock on the diagnostic port so no one can plug anything into it without your permission. That keeps people from resetting information, extracting data or falsifying records that could be used against you.
Whether a court order would require you to hand over the keys to the lock is another story. I’ll leave that one for the lawyers to decide. However, you can at least make sure that nothing short of a court order lets someone get your data.

Home › Big Brother & Police State › Police Seize $63,530 From Veteran Because He Kept It In Grocery Bags Police Seize $63,530 From Veteran Because He Kept It In Grocery Bags

(Daniel Jennings)  Simply carrying a large amount of cash in a grocery sack in your car is now sufficient grounds for a police officer to seize your money, a US circuit court has ruled. A panel of the Eighth US Circuit Court of Appeals found that all a deputy has to do to seize cash from a person is say it is drug money.
The court refused to return the $63,530 that Deputy Dave Wintle seized from a disabled veteran named Mark A. Brewer during a traffic stop in 2011. Brewer was never charged with a crime or even given a traffic ticket. Yet the decorated Air Force veteran lost his savings when a drug-sniffing dog smelled marijuana on it, even though no cannabis was found in Brewer’s car or his home.
Brewer saved the money from disability payments and his Air Force pay — as documents deputies found in the car indicated. He said he was traveling to Los Angeles to visit his uncle and to use the money as a down payment for a house. He added he was hoping his uncle could help him get a job there.
“The record here does not make clear whether the seized currency constitutes property used to facilitate a drug offense or proceeds from a drug offense,” Judge Bobby E. Shepherd wrote in a March 23 opinion upholding the seizure. “For the purposes of analysis, however, we will assume that the currency facilitated a drug offense and is thus subject to [to be seized].”
It was taken through a legal mechanism called civil forfeiture. (Listen to Off The Grid Radio’s report on civil forfeiture here.)
Brewer’s ordeal began when he was driving through Douglas County, Nebraska, outside of Omaha on Interstate 680 in November 2011. Wintle, a Douglas County sheriff’s deputy, pulled him over for not signaling when he made a lane change, and then Wintle asked for permission to search the vehicle.
Keeping Cash in a Grocery Bag Can Lead to Seizure
Wintle had just run a background check on Brewer and found he had “no major violations” on his record when he had the dog search the car. The search was apparently prompted by Wintle’s discovery of $1,000 in cash in Brewer’s pocket. He then found the other money in grocery sacks in a backpack.

The Bankster War on Cash; JPMorganChase Begins to Prohibit the Storage of Cash in Its Safety Deposit Boxes

Letters are apparently going out to some JPMoragnChase customers announcing that cash will be prohibited from being stored in the bank's safety deposit boxes.

At the Collectors Universe message board, a commenter reports:

My mother has a SDB at a Chase branch with one of my siblings as co-signers. Last week they got a letter outlining a number of changes to the lease agreement, including this:

"Contents of the box: You agree not to store any cash or coins other than those found to have a collectible value."

Another change is that signatures will no longer be accepted to access the box. The next time they go in they have to bring two forms of ID and they will be issued a four-digit pin number that will be used to access the box then and in the future.
Professor Joseph Salerno of the Mises Institute writes:
 As of March, Chase began restricting the use of cash in selected markets, including Greater Cleveland. The new policy restricts borrowers from using cash to make payments on credit cards, mortgages, equity lines, and auto loans. Chase even goes as far as to prohibit the storage of cash in its safe deposit boxes . In a letter to its customers dated April 1, 2015 pertaining to its “Updated Safe Deposit Box Lease Agreement,” one of the highlighted items reads: “You agree not to store any cash or coins other than those found to have a collectible value.” 
Just last week,  Citigroup's top economist, Willem Buiter, wrote a report calling for the abolishment of cash as a sound policy.

Hide your wallets, the banksters are on the move.

George Carlin "The American Dream"

Saturday, April 18, 2015

Walid Shoebat's Mark of the Beast Theory Debunked - Islamic Antichrist D...

BREAKING: Mandatory adult vaccination in Kalifornia - for the upcoming EBOLA scam in Kali this summer

MessiahMews Blogs: [Vaccination-Liberation] BREAKING: Mandatory adult...: CALIFORNIA ALERT: Under your nose, while the exemption bills are being argued and opposed, these creepy senators introduced a mandatory adul...

Military Exercise In Connecticut, Army Seeks Role ...

MessiahMews Blogs: Military Exercise In Connecticut, Army Seeks Role ...: I believe this is real pick up not a drill. It's called a drill and they are hiring people telling they are crises actors so they will &...

The troops are already deploying in cities in the WESTERN states only.... practiciing internment of civilians.

Notice in the videos, they are TRAINING THE TROOPS TO SHOOT AMERICAN CITIZENS? Here's the play. 
  • Deployment of troops in the west. First at schools, and major intersections and highways. 
  • People get used to seeing them as the NEW NORMAL. 
  •  There will be happy "glad to see the troops, troops playing with children, human interest stories, troops saving a little girl's life, troops stopping a bank robbery, etc" all designed to make human and friendly the conditioning of armed violent killers everywhere you look, go, or do business.
  • Then, they start directing traffic, cuz the traffic lights will start failing MORE AND MORE. 
  • People will get used to that, a NEW NORMAL. 
  • Then, they will start doing roadside search of cars, as the police have been doing for years to condition the public. 
  • People will get used to that, a NEW NORMAL. 
  • Then it will be seizure of citizens, in buses with blacked out windows to designated walmarts and large holding pens already built. 
  • The same week the STOCK MARKET CRASHES in the fall or just before it. Depending upon how they read the public. Either a week past the equinox or late October. Millions will disappear. 
  • Never to be seen again.

Martial Law, hundreds of thousands of tanks, troop carriers and men - for four months. Remember the big eviction of the national parks of 4 million people? Well, now its TEN STATES and troops on street corners with machine guns. Just like in Iraq or Afghanistan

Late last week, when we covered the various signs that "something big" may be coming, we discussed the one "exercise that people have really been buzzing about" - operation "Jade Helm", an “unconventional warfare exercise” during which the states Texas and Utah will be designated as hostile territory.
As previously profiled, "Jade Helm is a challenging eight-week joint military and Interagency (IA) Unconventional Warfare (UW) exercise conducted throughout Texas, New Mexico, Arizona, California, Nevada, Utah and Colorado,” according to an unclassified military document announcing the training drill, which runs from July 15 through September 15.
Multiple branches of the US military, including Green Berets, Navy Seals, and the 82nd Airborne Division, will participate in the 8-week long exercise, which may result in “increased aircraft in the area at night.”
Troops will be tasked with honing advanced skills in “large areas of undeveloped land with low population densities,” and will work alongside “civilians to gain their trust and an understanding of the issues.”
The exercise, in which some participants will be “wearing civilian clothes and driving civilian vehicles,” lists Texas and Utah as “hostile" territory.
The proposed theater of operations of Operation Jade Helm is shown on the map below:


So while there are still three months until Jade Helm officially opens, various documented reports of substantial national guard drills and troop exercises are starting to trickle in early. As Paul Joseph Watson notes, the first documented proof of National Guard drills comes from Ontario, California where National Guard troops can be seen patrolling residential streets and practicing traffic control.
In the video troops, followed by a humvee, are seen marching close to an elementary school and single family homes.
“I just watched it again and recognized the low block wall and the elementary school! It was right there where my sister and her husband live! OMG how frightening!” one YouTube commenter responded, while others insisted the patrols were a routine occurrence.

However, another respondent insisted that the patrol was not normal.

“During the last few seconds I got a quick glimpse of my sister and brother-in-laws house on Fuschia. Ave,” wrote the commenter.”That motorcycle was parked almost in front of their house. They told me they saw this procession going on from their front yard. They have lived in that house for 30 or so yrs and this is the first time they have seen this type of thing in their neighborhood. Might be a common thing to do their training someplace else but not in that area.”
This is not the first such clip: a disturbing video out of Fort Lauderdale, Florida last month also showed military and law enforcement practicing the internment of citizens during martial-law style training.
Meanwhile on the eastern US easboard, the PostStar reports that nearly 600 Army and Air National Guard forces from New Jersey and New York "are preparing for the worst."
They are participating in a homeland response force drill at New Jersey's Joint Base McGuire-Dix-Lakehurst on Friday.

The troops specialize in rescue, security, decontamination and medical treatment.

The units will train to rapidly assess and identify a chemical, biological, radiological or nuclear incident.
Of course, the bigger concern is that the real motive behind this major national guard exercise is not a focus on a "defensive" drill from an outside threat, but one dealing with a domestic threat.
How is that possible, some would say? Could the national guard really be preparing for a confrontation with the US population?
Unfortunately the answer is yes, as we reported last August in "Under What Conditions Can The US Army Engage Citizens: The Army's "Civil Disturbances" Primer" which lays out not only when the US Army (and national guard) can engage the US population, but lays out clearly the protocol under which the US army is specifically permitted to engage in "PSYOPs" against the US population.
Here are the salient points, as reported previously, from the primer which begins with the umbrella statement:
Civil unrest may range from simple, nonviolent protests that address specific issues, to events that turn into full-scale riots. Gathering in protest may be a recognized right of any person or group, regardless of where U.S. forces may be operating. In the United States, this fundamental right is protected under the Constitution of the United States...
"Protected" it may be, but as usual, the interpretation of the Constitution is in the eye of the beholder, or more appropriately, gun holder. Because shortly thereafter we further read the following:
The Constitution of the United States, laws, regulations, policies, and other legal issues limit the use of federal military personnel in domestic support operations. Any Army involvement in civil disturbance operations involves many legal issues requiring comprehensive legal reviews. However, federal forces are authorized for use in civil disturbance operations under certain circumstances.
What circumstances? For the answer we turn to section, 2-8. To wit:
The Constitution of the United States provides two exceptions for which the Posse Comitatus Act does not apply. These exceptions are based upon the inherent right of the U.S. government to ensure the preservation of public order and to carrying out governmental operations within its territorial limits by force, if necessary. These two exceptions are—
  • Emergency authority. A sudden and unexpected civil disturbance, disaster, or calamity may seriously endanger life and property and disrupt normal governmental functions to such an extent that local authorities cannot control the situation. At such times, the federal government may use military force to prevent the loss of life or wanton destruction of property and to restore government functions and public order. In these circumstances, federal military commanders have the authority, in extraordinary emergency circumstances where prior authorization by the President is impossible and duly constituted local authorities are unable to control the situation, to engage temporarily in activities that are necessary to quell large-scale, unexpected civil disturbances (see DODD 3025.18).
  • Protection of federal property and functions. When the need for the protection of federal property or federal functions exists, and duly constituted local authorities are unable to, or decline to provide adequate protection, federal action, including the use of military forces, is authorized.
2-9. Laws passed by the U.S. congress include four exceptions to the Posse Comitatus Act. With the first three laws discussed below (10 USC 331–333) there is a prerequisite that the President must take personal action, including the issuance of a proclamation calling upon insurgents to disperse and retire peaceably within a limited time. The four exceptions, based on law are—
  • 10 USC 331. When a state is unable to control domestic violence and they have requested federal assistance, the use of the militia or Armed Forces is authorized.
  • 10 USC 332. When ordinary enforcement means are unworkable due to unlawful obstructions or rebellion against the authority of the United States, use of the militia or Armed Forces is authorized.
  • 10 USC 333. When a state cannot or will not protect the constitutional rights of the citizens, due to domestic violence or conspiracy to hinder execution of State or Federal law, the use of the militia or Armed Forces is authorized.
  • House Joint Resolution 1292. This resolution directs all departments of the U.S. government, upon request of the Secret Service, to assist in carrying out its statutory duties to protect government officials and major political candidates from physical harm.
In other words, if and when the US Armed Forces decide that rioting infringes upon any of these exclusions, then the constitution no longer applies and the use of lethal force becomes a viable option against US citizens.
It gets worse, because whereas one would expect that a "Constitutional expert" such as the president, Barack Obama would be the one tasked with interpreting if and when the Constitution no longer applies, the primer is quite explicit in handing over responsibility to "federal military commanders":
... federal military commanders have the authority, in extraordinary emergency circumstances where prior authorization by the President is impossible and duly constituted local authorities are unable to control the situation, to engage temporarily in activities that are necessary to quell large-scale, unexpected civil disturbance.
So should Obama resume his vacation even as things in Missouri escalate dramatically, and be "unreachable", it may well come to pass that Obama's opinion will be irrelevant not only whether the National Guard should be unleashed in Ferguson, but whether Posse Comitatus is suddenly null and void.
The good news: the use of lethal force is not the only option the US Army would have if and when it engages with the population. US citizens may simply  be herded into "temporary internment camps" for reindoctrination purposes under the supervision of PSYOP Officer (no really, they used that word), as follows from the Army's FM3-39.40 "Internment and Resettlment Operations" manual:
Internment and Resettlement (I/R) operations facilitate the ability to conduct rapid and decisive combat operations; deter, mitigate, and defeat threats to populations that may result in conflict; reverse conditions of human suffering; and build the capacity  of a foreign government to effectively care for and govern its population. This includes capabilities to conduct  shaping operations across the spectrum of military operations to mitigate and defeat the underlying conditions  for conflict and counter the core motivations that result in support to criminal, terrorist, insurgent, and other destabilizing groups. I/R operations also include the daily incarceration of U.S. military prisoners at facilities  throughout the world.

An adaptive enemy will manipulate populations that are hostile to U.S. intent by instigating mass civil disobedience, directing criminal activity, masking their operations in urban and other complex terrain, maintaining an indistinguishable presence through cultural anonymity, and actively seeking the traditional sanctuary of protected areas as defined by the rules of land warfare. Such actions will facilitate the dispersal of threat forces, negate technological overmatches, and degrade targeting opportunities. Commanders will use technology and conduct police intelligence operations to influence and control populations, evacuate detainees and, conclusively, transition rehabilitative and reconciliation operations to other functional agencies. The combat identification of friend, foe, or neutral is used to differentiate combatants from noncombatants and friendly forces from threat forces.
Presenting army camps, hopefully not in a city near you:
Detainee facilities, an important planning consideration, are treated in the same basic fashion as any base camps. The same basic planning considerations are taken into  account. Some detainee facilities will be subordinate to a larger base camp but they may also be at a separate location.
Of course, none of this will be needed if the Army's Psyops work as required:
The PSYOP officer in charge of supporting I/R operations serves as the special staff officer responsible for PSYOP. The PSYOP officer advises the military police commander on the psychological impact of military police or MI actions to prevent misunderstandings and disturbances by detainees and DCs. The supporting I/R PSYOP team has two missions that reduce the need to divert military police assets to maintain security in the I/R facility.  The team—
  • Assists the military police force in controlling detainees and DCs.
  • Introduces detainees or DCs to U.S. and multinational policy.
  • Develops PSYOP products that are designed to pacify and acclimate detainees or DCs to accept U.S. I/R facility authority and regulations.
  • Gains the cooperation of detainees or DCs to reduce the number of guards needed.
  • Identifies malcontents, trained agitators, and political leaders within the facility who may try to organize resistance or create disturbances.
  • Develops and executes indoctrination programs to reduce or remove antagonistic attitudes.
  • Identifies political activists.
  • Provides loudspeaker support (such as administrative announcements and facility instructions when necessary).
  • Helps the military police commander control detainee and DC populations during emergencies.
  • Plans and executes a PSYOP
In other words, if and when the time comes to "override" Posse Comitatus, random US citizens may have two options: i) end up in the US version of a Gulag or, worse, ii) be shot. For now, however, just keep an eye on the various drill videos to get a sense of the US army's preparedness in dealing with "civil disobedience."

Wednesday, April 15, 2015

Obamacare really is working (for the fascists)

Since the Obama administration began pushing the healthcare reform bill in early 2009, the stock prices of the Big Five health insurers have done remarkably well, even vs. the S&P 500, and even without taking into account their phenomenal dividend yields.

“Encryption Doesn’t Matter In a World Where Anyone Can Plant Software On Your Phone and See What You’re Seeing”

John McAfee invented commercial antivirus software. He may be a controversial and eccentric figure … but the man knows his technology.
Earlier this month, McAfee told security expert Paul Asadoorian that encryption is dead.  Specifically, he said:
  • Every city in the country has 1 to 3 Stingray spy devices … Bigger cities like New York probably have 200 or 300
  • When you buy a Stingray, Harris Corporation makes you sign a contract keeping your Stingray secret (background here and here)
  • Stingray pushes automatic “updates” – really malicious software – onto your phone as soon as you come into range
  • The software – written by the largest software company in the world – allows people to turn on your phone, microphone and camera, and read everything you do and see everything on your screen
  • Encryption doesn’t matter in a world where anyone can plant software on your phone and see what you’re seeing.  Protecting transmission of information from one device to the other doesn’t matter anymore … they can see what you see on your device
  • There are many intrusions other than Stingray.   For example, everyone has a mobile phone or mobile device which has at least 10 apps which have permission to access camera and microphone
  • Bank of America’s online banking app requires you to accept microphones and cameras. McAfee called Bank of America and asked why they require microphones and cameras. They replied that – if you emptied all of the money in your account and said “it wasn’t me”, they could check, and then say:
Well, it certainly looks like you. And it certainly sounds like you.
  • In order to do that, B of A’s app keeps your microphone and camera on for a half hour after you’ve finished your banking
  • In addition, people can call you – and have you call them back – and plant software on your phone when you call them back

Eye In the Sky - Evidence of spirit in our world

MessiahMews Blogs: Eye In the Sky: The Eye in the Sky. Peggy Lee  September 8, 2014 My sister took this pic today....your thoughts?

Discovery Of Medieval Burial Ground Yields Surpris...

Prophecies, conspiracies, and endtimes stuff: Discovery Of Medieval Burial Ground Yields Surpris...: By:  Marshall Ramsey II, Worthy News U.S. Correspondent CAMBRIDGE, England -- ( WorthyNews )  The discovery of a medieval burial ground b...

Inventor of Antivirus Sofware: The Government Is Planting Malicious Software On Your Phone So It Can See What You're Doing

Top computer and internet experts say that NSA spying breaks the functionality of our computers and of the Internet. It reduces functionality and reduces security by – for example – creating backdoors that malicious hackers can get through.
Remember, American and British spy agencies have intentionally weakened security for many decades. And it’s getting worse and worse. For example, they plan to use automated programs to infect millions of computers.

Smart Phones Vulnerable to Spying

We documented in 2013 that smart phones are very vulnerable to spying:
The government is spying on you through your phone … and may even remotely turn on your camera and microphone when your phone is off.

As one example, the NSA has inserted its code into Android’s operating system … bugging three-quarters of the world’s smartphones. Google – or the NSA – can remotely turn on your phone’s camera and recorder at any time.

Moreover, Google knows just about every WiFi password in the world … and so the NSA does as well, since it spies so widely on Google.

But it’s not just the Android. In reality, the NSA can spy on just about everyone’s smart phone.

Cell towers track where your phone is at any moment, and the major cell carriers, including Verizon and AT&T, responded to at least 1.3 million law enforcement requests for cell phone locations and other data in 2011. (And – given that your smartphone routinely sends your location information back to Apple or Google – it would be child’s play for the government to track your location that way.) Your iPhone, or other brand of smartphone is spying on virtually everything you do (ProPublica notes: “That’s No Phone. That’s My Tracker“). Remember, that might be happening even when your phone is turned off.

The NSA has gathered all of that cellphone location information.

“Encryption Doesn’t Matter In a World Where Anyone Can Plant Software On Your Phone and See What You’re Seeing”

John McAfee invented commercial antivirus software. He may be a controversial and eccentric figure … but the man knows his technology.
Earlier this month, McAfee told security expert Paul Asadoorian that encryption is dead.  Specifically, he said:
  • Every city in the country has 1 to 3 Stingray spy devices … Bigger cities like New York probably have 200 or 300
  • When you buy a Stingray, Harris Corporation makes you sign a contract keeping your Stingray secret (background here and here)
  • Stingray pushes automatic “updates” – really malicious software – onto your phone as soon as you come into range
  • The software – written by the largest software company in the world – allows people to turn on your phone, microphone and camera, and read everything you do and see everything on your screen
  • Encryption doesn’t matter in a world where anyone can plant software on your phone and see what you’re seeing.  Protecting transmission of information from one device to the other doesn’t matter anymore … they can see what you see on your device
  • There are many intrusions other than Stingray.   For example, everyone has a mobile phone or mobile device which has at least 10 apps which have permission to access camera and microphone
  • Bank of America’s online banking app requires you to accept microphones and cameras. McAfee called Bank of America and asked why they require microphones and cameras. They replied that – if you emptied all of the money in your account and said “it wasn’t me”, they could check, and then say:
Well, it certainly looks like you. And it certainly sounds like you.
  • In order to do that, B of A’s app keeps your microphone and camera on for a half hour after you’ve finished your banking
  • In addition, people can call you – and have you call them back – and plant software on your phone when you call them back

 

Spy Agencies Are Intentionally Destroying Digital Security

 http://www.zerohedge.com/news/2015-04-14/inventor-antivirus-sofware-government-planting-malicious-software-your-phone-so-it-c