Showing posts with label domestic surveillance. Show all posts
Showing posts with label domestic surveillance. Show all posts

Tuesday, January 2, 2024

Approximately 3000 ULEZ cameras have been disabled, damaged, or disappeared in London during 2023

 This is all it takes to fix things, lest they get worse. Do nothing and the steam roller of satanic governance will erase you.

 

ULEZ spies, tracks, records and bio identifies everything and everyone around it. It is NOT for traffic, but for population spying the moment you leave the house.

Tuesday, March 28, 2017

This Map Will Show If Your Web Traffic Passes Through an NSA Listening Post

IXmaps wants to “make visible the secret, dangerous, often illegal forms of surveillance that are increasingly becoming part of everyday life.”

Internet data pinballs across national borders, and for Canadians this means potentially exposing it to eavesdropping by US-based corporations and the National Security Agency.
Now, an interactive mapping tool named Internet Exchange Mapping (IXmaps), re-launched for public use today, will show you how—and how easily—you data can be spied on by tracing the oftentimes byzantine routes data takes when traversing the internet.
IXmaps looks at what are known as traceroutes, the geographic path data takes when bouncing through internet exchanges—buildings connecting the most important internet cables. The NSA for example, is known to have installed listening posts in some of these buildings, and can listen in on the data that passes through.
The point of IXmaps is to reveal how your data might pass through one of these listening posts, said the site's founder and University of Toronto professor Andrew Clement. The idea is to "make visible the secret, dangerous, often illegal forms of surveillance that are increasingly becoming part of everyday life," he said in an interview.
The current version of IXmaps was developed with help from OpenMedia, the Canadian Internet Registration Authority (which manages the .CA domain), and Office of the Privacy Commissioner of Canada. The project has been in the works since 2008.
The NSA can look at pretty much all American data, Clement said. Listening posts presumably don't discriminate based on nationality—whether you're Canadian or American, they're interested in data crossing in and out of the US. The map includes 18 US cities where "reported and suspected" NSA interception facilities are located.
Read More: The Internet Doesn't Route Around Surveillance
"Once outside Canada, your data is treated by the NSA as foreign and loses Canadian legal and constitutional protections," the IXmaps website explains. "This represents a major loss of privacy."
Just this month, the Privacy Commissioner of Canada issued an open letter asking for better protection of Canadian privacy after Donald Trump signed an executive order that excluded permanent residents and non-US citizens from the protections under the US Privacy Act.
"This is a major challenge to democratic principles," Clement said. "And these fears greatly increased with what we saw with the Trump administration."

 https://motherboard.vice.com/en_us/article/ixmaps-privacy-surveillance-nsa-canada

Thursday, March 16, 2017

I can’t believe that this is what the United States has become. When I was young I remember reading about this sort of thing in Nazi Germany, the USSR and Communist China, but I never imagined that it would happen here.

I can’t believe that this is what the United States has become.  When I was young I remember reading about this sort of thing in Nazi Germany, the USSR and Communist China, but I never imagined that it would happen here.  For years I have been warning about this growing “Big Brother police state control grid”, and I wish that more Americans would realize how evil all of this government surveillance truly is.


Authored by Michael Snyder via The Economic Collapse blog,
As far as Big Brother is concerned, nothing that you do on your cell phone is ever private.  And if the government really wants to see what is on your cell phone, they are going to get that information one way or another, even if that means resorting to physical violence.   On Monday, NBC News provided us with yet another glaring example of how the United States is being transformed into a Big Brother police state.  On January 1st, Akram Shibly and Kelly McCormick from Buffalo, New York were coming back home from a trip to Toronto, and they didn’t anticipate any unusual problems when they got to the border.  Unfortunately for them, U.S. Customs & Border Protection agents decided to take their cell phones, demanded their passwords, and kept them in custody for the next two hours as they searched for anything that might be incriminating on those phones.
You might be thinking that sounds like it should be illegal, and you would be correct, but sadly federal courts have ruled that our constitutional rights do not apply to border searches.  So authorities use this legal loophole to do pretty much anything they want at the border.
If that young couple from Buffalo would have had something illegal on their phones, they could have been immediately arrested and put in prison.
And we haven’t even gotten to the worst part of the story yet.  Just a few days later Akram Shibly and Kelly McCormick took another trip to Canada, and this time border agents physically assaulted Akram when he did not immediately turn over his phone.  The following comes from NBC News
Three days later, they returned from another trip to Canada and were stopped again by CBP.

“One of the officers calls out to me and says, ‘Hey, give me your phone,'” recalled Shibly. “And I said, ‘No, because I already went through this.'”

The officer asked a second time.

Within seconds, he was surrounded: one man held his legs, another squeezed his throat from behind. A third reached into his pocket, pulling out his phone. McCormick watched her boyfriend’s face turn red as the officer’s chokehold tightened.
Is this still America?
I can’t believe that this is what the United States has become.  When I was young I remember reading about this sort of thing in Nazi Germany, the USSR and Communist China, but I never imagined that it would happen here.  For years I have been warning about this growing “Big Brother police state control grid”, and I wish that more Americans would realize how evil all of this government surveillance truly is.
You can watch an interview where this couple from Buffalo talks to NBC News about this recent incident at the border right here.
It is so disgusting that this is how we are treating law abiding people when countless numbers of drug dealers and gang members are pouring across unprotected sections of our border every single day.
Unfortunately, cell phone searches at the border appear to be rising at an exponential rate.  According to NBC News, more cell phone searches were conducted at the border during the month of February 2017 than in the entire year of 2015…
Data provided by the Department of Homeland Security shows that searches of cellphones by border agents has exploded, growing fivefold in just one year, from fewer than 5,000 in 2015 to nearly 25,000 in 2016.

According to DHS officials, 2017 will be a blockbuster year. Five-thousand devices were searched in February alone, more than in all of 2015.
And of course it isn’t just searches at the border that you need to be concerned about.
Not too long ago, it was being reported that the CIA has helped the Justice Department with technology that allows law enforcement officials to scan “data from thousands of U.S. cellphones at a time” from the safety of a plane…
The Central Intelligence Agency played a crucial role in helping the Justice Department develop technology that scans data from thousands of U.S. cellphones at a time, part of a secret high-tech alliance between the spy agency and domestic law enforcement, according to people familiar with the work.

The CIA and the U.S. Marshals Service, an agency of the Justice Department, developed technology to locate specific cellphones in the U.S. through an airborne device that mimics a cellphone tower, these people said.
So the next time a strange plane flies over your house, this may be what is happening.
Here is more on this disturbing new technology
The program operates specially equipped planes that fly from five U.S. cities, with a flying range covering most of the U.S. population. Planes are equipped with devices—some past versions were dubbed “dirtboxes” by law-enforcement officials—that trick cellphones into reporting their unique registration information.
I have a feeling that if this program was ever challenged in court that it would be ruled unconstitutional, so let’s hope that happens as soon as possible.
But then again, the NSA has been collecting and storing all forms of electronic communication for years and nothing is being done about.  We have even had a 36-year veteran of the NSA named William Binney come out and publicly admit that all of our phone conversations “are being monitored and stored” and still nothing is done to stop it.
So don’t do anything on your cell phone that you wouldn’t want the government to see, because someday they could use it to nail you.
Of course we also need to use discretion regarding the things that we know the public will be able to see.  When you post something to Facebook or Twitter, you may think that it is harmless, but it could end up costing you big time.  In fact, I just came across an article about how a number of pastors have actually been fired because of what is on their social media accounts
“It’s not fair I lost my job,” the pastor told me.

“My church members post a lot worse things than I do on social media. It’s a double standard.”

He’s right. It is a double standard. But it’s reality. And, with greater frequency, more pastors and church staff are losing their jobs because of what they post, particularly on Facebook and Twitter and, to some extent, their blogs.

By the way, churches will not always tell the pastor the specific reason for the firing. But, once we begin to infuriate our church members with our posts, many will find a myriad of reasons to give us the boot.
Like the title to this article says, what you do on your cell phone could come back to haunt you.
For many Americans, cell phones have become an essential part of modern life, but the truth is that those little electronic devices can also destroy our lives if we are not careful.
So if you are going to use them, use them wisely, because people are watching.




Monday, September 19, 2016

FBI Director Says He Covers His Webcam (And That You Should Too)

This isn’t the first time the FBI Director has mentioned his homemade security measures. During a Q&A after a speech on encryption and privacy at Kenyon College earlier this year, during which he claimed “absolute privacy hampers law enforcement,” he also admitted to wanting his own privacy.
“I saw something in the news, so I copied it. I put a piece of tape — I have obviously a laptop, personal laptop — I put a piece of tape over the camera. Because I saw somebody smarter than I am had a piece of tape over their camera.”
In the same breath, he also told the audience:
“[The public should] demand to know how the government conducts surveillance. Demand to know how they’re overseen, how they’re constrained. Demand to know how these devices work.” 
While that may seem open and honest, the message being sent by the U.S. government completely contradicts such a sentiment.


Thursday, November 27, 2014

Tuesday, June 10, 2014

Smart’ Meter Spying Finally Admitted

by Warren Woodward
smart-meters-godzilla
Industry mouthpiece SmartGridNews finally admitted that “smart” meters are surveillance devices.  Of course they didn’t quite put it that bluntly.  In fact, they celebrate the ability of utilities to know what appliances people use as another tool to help craft the wonderful world of the future.
Below is my letter to the Arizona Corporation Commission pointing out that industry has finally come out and admitted what I and others have been saying for years. [Note from TBYP: It's important that you send your utility your notice of Non-Consent via registered mail.  Subscribe to our Newsletter for forthcoming document templates, solutions & news -- and see our Solutions page for current links to templates.]
The SmartGridNews article, entitled “Now utilities can tell customers how much energy each appliance uses (just from the smart meter data),” is here.

May 15, 2014
Arizona Corporation Commission (ACC)
Docket Control Center
1200 West Washington Street
Phoenix, Arizona 85007
Re: Docket # E-01345A-14-0113
Ladies and Gentlemen;
Here is breaking news. SmartGridNews has just come out of the closet and admitted what I and others have been saying all long: “Smart” meters are surveillance devices.
APS and utilities nationwide have been denying the surveillance capability of “smart” meters but here is one of the foremost “smart” meter cheerleaders in the world finally admitting the truth.
SmartGridNews calls such “smart” grid industry names as Telvent, Silver Spring Networks and Lockheed Martin its “major sponsors”. So of course the news story attempts to put a positive spin on the surveillance, hyping such nonsense as an “over 4% conservation [of energy] after just a few months”.
Wow, that means I might save four whole dollars and change on a one hundred dollar electrical bill. Where do I sign up to be spied on?
Enclosed is the SmartGridNews article, Now utilities can tell customers how much energy each appliance uses (just from the smart meter data).
Sincerely,
Warren Woodward
PS – In the article, note the creepy picture of a guy dressed in black and using binoculars. SmartGridNews is shameless to promote Peeping Toms as cool. Note also Orwellian phrasing such as “behavioral science“ and turning ratepayers into “willing partners“. It’s not a “smart” grid; it’s a sick grid.

Saturday, January 4, 2014

It Ain't Just the NSA -- Your Local Cops are Spying on You

By Michael Price

By now, it’s well known that the National Security Agency (NSA) is collecting troves of data about law-abiding Americans. But the NSA is not alone: a series of new reports show that state and local police have been busy collecting data on our daily activities as well — under questionable or nonexistent legal pretenses. These revelations about the extent of police snooping in the U.S. — and the lack of oversight over it — paint a disturbing picture for anyone who cares about civil liberties and privacy protection.

The tactics used by law enforcement are aggressive, surreptitious, and surprising to even longtime surveillance experts. One report released last month made front page news: an investigation by more than 50 journalists that found that local law enforcement agencies are collecting cell phone data about thousands of innocent Americans each year by tapping into cellphone towers and even creating fake ones that act as data traps.

A new report by the Brennan Center for Justice at NYU School of Law details how police departments around the country have created data “fusion centers” to collect and share reports about residents. But the information in these reports seldom bears any relation to crime or terrorism. In California, for example, officers are encouraged to document and immediately report on “suspicious” activities such as “individuals who stay at bus or train stops for extended periods while buses and trains come and go,” “individuals who carry on long conversations on pay or cellular phones,” and “joggers who stand and stretch for an inordinate amount of time.” In Houston, Texas, the criteria are so broad they include anything deemed “suspicious or worthy of reporting.” Many police departments and fusion centers have reported on constitutionally protected activities such as photography andpolitical speech. They have also demonstrated a troubling tendency to focus on people who appear to be of Middle Eastern origin.

Like the NSA – their heavy-handed Big Brother – these fusion centers cast a wide net and risk civil liberties for paltry returns. And all of it is happening without sufficient oversight or accountability. In other words, no one is watching Little Brother.

How did it come to this? In the aftermath of the September 11, 2001 attacks, all levels of government – federal, state, and local – embarked on a massive effort to improve information sharing. Federal taxpayer dollars fueled the transition into a new role for state and local police as the eyes and ears of the intelligence community.

The ad-hoc system that has developed — of individual police departments feeding information to federal authorities — has been plagued by vague and inconsistent rules. For one thing, there’s a lack of agreement about what counts as “suspicious activity” and when that information should be shared.

The goal, in theory, is to reveal potential terrorist plots by “connecting the dots” of disparate or even innocuous pieces of information. But in practice, such programs often infringe on civil liberties and threaten safety, producing a din of data with little or no counterterrorism value. In Boston, for example, the regional fusion center fixated on monitoring peace activists and Occupy Boston protesters but may have been unaware that the FBI conducted an assessment of bombing suspect Tamerlan Tsarnaev based on a tip from Russia, or that local authorities had implicated him in a gruesome triple homicide on the anniversary of 9/11.

In fact, a 2012 report by the Senate Homeland Security Committee found that much of the information produced by fusion centers was not only useless, but also possibly illegal. Indeed, more than 95 percent of so-called “suspicious activity reports” are never investigated by the FBI.

We can do better. First and foremost, there must be a consistent, transparent standard for state and local intelligence activities based on reasonable suspicion of criminal activity – the traditional bar for opening an investigation. The federal government should make this standard a prerequisite for sharing suspicious activity reports on its networks. State and local police should adopt it as well.

Second, stronger oversight and accountability is necessary across the board. At the federal level, Congress should tie continued funding for fusion centers to regular, independent, and publicly available audits to assess compliance with privacy rules. State and local elected officials should also consider creating an independent police monitor, such as an inspector general, to safeguard privacy and civil rights.

To be sure, cooperation between levels of government is essential, and state and local law enforcement have an important role to play in keeping Americans safe. But the current system is ineffective, wasteful, and harmful to constitutional values.

It is time to recalibrate the system and make the state and local role in national security efficient, rational, and fair.

Wednesday, January 1, 2014

Its not paranoia if they really are spying on you.

NSA has spy hardware installed in every single electronic device in existence

The NSA Quartering “Digital” Troops Within Our Homes

Appelbaum shows that the NSA has literally taken over our computer and our phones, physically intercepting laptop shipments and installing bugware before themselves shipping the laptop on to the consumer, installing special hardware that overcomes all privacy attempts, including “air gaps” (i.e. keep a computer unplugged from the Internet). Appelbaum also notes that spyware can suck up a lot of system resources on a computer or smartphone. NSA spyware hardwired in our computers

Tuesday, December 31, 2013

So, it turns out the NSA can drop in on your Apple iPhone anytime it wants to - codename DROPOUT JEEP

Thanks to the best technical minds your tax dollars can buy, the NSA has come up with something called “DROPOUT JEEP,” an application that can hijack your an iPhone’s SMS messages, contacts, location, camera, and microphone. The hack is really comprehensive, according to a leaked NSA doc acquired by Der Spiegel:

DROPOUT JEEP is a software implant for the Apple iPhone that utilizes modular mission applications to provide specific SIGINT functionality. This functionality includes the ability to remotely push/pull files from the device. SMS retrieval, contact list retrieval, voicemail, geolocation, hot mic, camera capture, cell tower location, etc. Command, control and data exfiltration can occur over SMS messaging or a GPRS data connection. All communications with the implant will be covert and encrypted.

Apple said today they know nothing about any of this:

So, Apple is either lying or the NSA is so good at using this stuff big technology corporations are completely clueless.

It is now readily apparent most if not all computer technology and consumer electronic companies have been folded into the Stasi surveillance state architecture. It can no longer be denied that we are living in an all-encompassing Orwellian panopticon nightmare.

Kurt Nimmo