Taking Back Our Stolen History
HISTORY HEIST
Surveillance / Government Spying

Surveillance / Government Spying

The government is spying on us through our computers, phones, cars, buses, streetlights, at airports and on the street, via mobile scanners and drones, through our smart meters, and in many other ways. Even now – after all of the revelations by Edward Snowden, Bill Binney, and other whistleblowers – spying apologists say that the reports are “exaggerated” or “overblown”, and that the government only spies on potential bad guys. In reality, the government is spying on everyone’s digital and old-fashioned communications. For example, the government is photographing the outside information on every piece of snail mail. The government is spying on you through your phone … and may even remotely turn on your camera and microphone when your phone is off.

As one example, the NSA has inserted its code into Android’s operating system … bugging three-quarters of the world’s smartphones. Google – or the NSA – can remotely turn on your phone’s camera and recorder at any time. Moreover, Google knows just about every WiFi password in the world … and so the NSA does as well, since it spies so widely on Google. But it’s not just the Android.  In reality, the NSA can spy on just about everyone’s smart phone.

Cell towers track where your phone is at any moment, and the major cell carriers, including Verizon and AT&T, responded to at least 1.3 million law enforcement requests for cell phone locations and other data in 2011. (And – given that your smartphone routinely sends your location information back to Apple or Google – it would be child’s play for the government to track your location that way.) Your iPhone, or other brand of smartphone is spying on virtually everything you do (ProPublica notes: “That’s No Phone. That’s My Tracker“). Remember, that might be happening even when your phone is turned off.

 

Read More…

Chronological History of Surveillance

Panel of Whistleblowers Discuss National Security Secrecy & Surveillance

Panel of Whistleblowers Discuss National Security Secrecy & Surveillance

A panel discussion on National Security, Secrecy and Surveillance in New York City was sponsored by the Open Society Foundations and the Government Accountability Project, and moderated by Steven Aftergood, the renowned editor of Secrecy News for the Federation of American Scientists. The speakers were Thomas Drake, the courageous former intelligence officer who blew the whistle on National Security Agency/contractor corruption during the Bush administration and was wrongly prosecuted by the Obama administration as a result; his ...
U.S. Government Retaliation Charges of Espianage Act Violations Against NSA Whisleblower Thomas Drake Dropped

U.S. Government Retaliation Charges of Espianage Act Violations Against NSA Whisleblower Thomas Drake Dropped

In April 2010, the government alleged that Thomas Drake - a former senior executive of the U.S. National Security Agency (NSA), a decorated U.S. Air Force and U.S. Navy veteran, and a whistleblower - mishandled documents, one of the several Espionage Act cases in U.S. history, as retaliation and persecution for challenging the unconstitutional domestic spying Trailblazer Project. He is the 2011 recipient of the Ridenhour Prize for Truth-Telling and co-recipient of the Sam Adams Associates for Integrity in Intelligence (SAAII) award. On ...
Rockefeller Report: Operation Lockstep Scenario Scripts Blueprint of Covid-19 as Pandemic for "tighter top-down government control"

Rockefeller Report: Operation Lockstep Scenario Scripts Blueprint of Covid-19 as Pandemic for “tighter top-down government control”

There is little doubt that technology will continue to drive change across the developing world. However, uncertainty exists about the role of technological advances in alleviating poverty. To uncover the range of possibilities that may emerge, novel approaches like scenario planning are essential. "Scenarios for the Future of Technology and International Development," a new report, features four very different - yet very plausible - visions of ...
Christmas Underwear Bomber a False Flag? Full Body Scans in Airports Follow

Christmas Underwear Bomber a False Flag? Full Body Scans in Airports Follow

On May 7, AP headlined “US: CIA thwarts new al-Qaida underwear bomb plot,” saying: Agents foiled “an ambitious plot by al-Qaida’s affiliate in Yemen to destroy a US-bound airliner using a bomb with a sophisticated new design around the one-year anniversary of the killing of Osama bin Laden, The Associated Press has learned.” AP described an upgraded underwear bomb plot. Like the earlier one, it was ...
Wikileaks: INDECT to Build Automatic Dossiers on Individuals and Organizations from Web, Mobile, & Social Networking Data

Wikileaks: INDECT to Build Automatic Dossiers on Individuals and Organizations from Web, Mobile, & Social Networking Data

Wikileaks published a document by the INDECT , the Intelligence Information System Supporting Observation, Searching and Detection for Security of Citizens in Urban Environments of Europe. According to Wikileaks, INDECT's "Work package 4" is designed "to comb web blogs, chat sites, news reports, and social-networking sites in order to build up automatic dossiers on individuals, organizations and their relationships." Mind Your Tweets: The CIA Social Networking ...
The FISA Court Grants Near Dictatorial Powers to US Attorney General, Eric Holder and the Obama Administration to Spy on Americans

The FISA Court Grants Near Dictatorial Powers to US Attorney General, Eric Holder and the Obama Administration to Spy on Americans

The Foreign Intelligence Surveillance Court (FISC, also called the FISA Court) granted almost dictatorial powers to the U.S. Attorney General to spy on Americans, signed by Judge Reggie B. Walton, a James P. Chandler, Eric H. Holder, Jr., David J. Kappos (IBM) colleague. This opinion was declared unconstitutional by the Second Circuit Court of Appeals on May 07, 2015. However, it gave Eric Holder the excuse ...
The C.I.A. Internally Published NightSkies v1.2 User Guide for Exploiting Apple iPhone 3G v2.1 Granting Remote CIA Command and Control

The C.I.A. Internally Published NightSkies v1.2 User Guide for Exploiting Apple iPhone 3G v2.1 Granting Remote CIA Command and Control

Dec. 01, 2008, the C.I.A. internally published NightSkies v1.2 User Guide for exploiting Apple iPhone 3G v2.1. Whistleblower Source: WikiLeaks Vault 7 DARK MATTER. This program "Grants full remove command and control" ... "The tool operates in the background providing upload, download and execution capability ... will wait for user activity before beaconing. When user activity is detected, NS will attempt to beacon to a preconfigured ...
The C.I.A. internally Published SeaPea v2.0 - User Guide for Exploiting Apple Mac OSX 10.4.X through 10.5.X

The C.I.A. internally Published SeaPea v2.0 – User Guide for Exploiting Apple Mac OSX 10.4.X through 10.5.X

On Nov. 6, 2008, the C.I.A. internally published SeaPea v2.0 - User Guide for exploiting Apple Mac OSX 10.4.X through 10.5.X. Whistleblower Source: WikiLeaks Vault 7 DARK MATTER Released in 2017. SeaPea hijacks Apple Macintosh computers undetectably, below the operating system, so that it continues to operate even when the infected target computer is rebooted. SeaPea even includes a stealth feature that deletes itself if it ...
Google Chrome Released: An Addition to Googles Products Designed to Create Personal  Dossiers on Everyone

Google Chrome Released: An Addition to Googles Products Designed to Create Personal Dossiers on Everyone

Google Chrome was first publicly released on September 2, 2008 for Windows XP and later, with 43 supported languages, officially a beta version, and as a stable public release on December 11, 2008. On the same day, a CNET news item drew attention to a passage in the Terms of Service statement for the initial beta release, which seemed to grant to Google a license to all content transferred via ...
Dropbox Recieves Initial Funding. A CIA Internal Publishing References use of DROPBOX for 'Exfiltration' defined as "Unauthorized Transfer of Data from a Computer or Server"

Dropbox Recieves Initial Funding. A CIA Internal Publishing References use of DROPBOX for ‘Exfiltration’ defined as “Unauthorized Transfer of Data from a Computer or Server”

Following its first round of seed funding on June 1, 2007, Dropbox was founded by MIT students Drew Houston and Arash Ferdowsi, as a startup company, with initial funding from seed accelerator Y Combinator. Dropbox is operated by American company Dropbox, Inc., headquartered in San Francisco, California, that offers cloud storage, file synchronization, personal cloud, and client software. In 2007-2008, the CIA internally published the Triton ...