Taking Back Our Stolen History
HISTORY HEIST
Surveillance / Government Spying

Surveillance / Government Spying

The government is spying on us through our computers, phones, cars, buses, streetlights, at airports and on the street, via mobile scanners and drones, through our smart meters, and in many other ways. Even now – after all of the revelations by Edward Snowden, Bill Binney, and other whistleblowers – spying apologists say that the reports are “exaggerated” or “overblown”, and that the government only spies on potential bad guys. In reality, the government is spying on everyone’s digital and old-fashioned communications. For example, the government is photographing the outside information on every piece of snail mail. The government is spying on you through your phone … and may even remotely turn on your camera and microphone when your phone is off.

As one example, the NSA has inserted its code into Android’s operating system … bugging three-quarters of the world’s smartphones. Google – or the NSA – can remotely turn on your phone’s camera and recorder at any time. Moreover, Google knows just about every WiFi password in the world … and so the NSA does as well, since it spies so widely on Google. But it’s not just the Android.  In reality, the NSA can spy on just about everyone’s smart phone.

Cell towers track where your phone is at any moment, and the major cell carriers, including Verizon and AT&T, responded to at least 1.3 million law enforcement requests for cell phone locations and other data in 2011. (And – given that your smartphone routinely sends your location information back to Apple or Google – it would be child’s play for the government to track your location that way.) Your iPhone, or other brand of smartphone is spying on virtually everything you do (ProPublica notes: “That’s No Phone. That’s My Tracker“). Remember, that might be happening even when your phone is turned off.

 

Read More…

Chronological History of Surveillance

NSA director Michael Hayden initiated the Trailblazer Project - the NSA Spying Software for Cell Phones, Email and other Communications.

NSA director Michael Hayden initiated the Trailblazer Project – the NSA Spying Software for Cell Phones, Email and other Communications.

The Trailblazer Project was a National Security Agency (NSA) program intended to develop a capability to analyze data carried on communications networks like the Internet. It was intended to track entities using communication methods such as cell phones and e-mail. James P. Chandler, III was an advocate of Trailblazer for President Bill Clinton. Numerous NSA whistleblowers including J. Kirk Wiebe, William Binney, Tom Drake, Ed Loomis, ...
Alltel VP, Charles Miller, who Helped Create the Government 'Big Brother' Database for the Clinton Administration Shoots Himself Twice and Submerges Weapon in Nearby Water

Alltel VP, Charles Miller, who Helped Create the Government ‘Big Brother’ Database for the Clinton Administration Shoots Himself Twice and Submerges Weapon in Nearby Water

Charles Wilbourne Miller was vice president and board member for Alltel, the company that created the White House’s “Big Brother” computer system. As WND reported, an Arkansas medical examiner concluded “suicide” after Wilbourne Miller, 63, was found dead of a gunshot wound to the head in a shallow pit about 300 yards from his ranch house near Little Rock. Police found a .410 gauge shotgun near ...
Bill Clinton Issues Executive Order 13130 that formed the National Infrastructure Assurance Council (NIAC)

Bill Clinton Issues Executive Order 13130 that formed the National Infrastructure Assurance Council (NIAC)

Bill Clinton issued Executive Order 13130 that formed the National Infrastructure Assurance Council (NIAC). The stated goal was to coordinate "effort by both government and private sector entities to address threats to our Nation's critical infrastructure." Hindsight shows that NIAC was the beginning of a private spy agency for the Executive Branch, NSA, and crony banks, judges, bureaucrats, politicians, lawyers and nerds. Massive amounts of bulk ...
On the 50th Anniversary of the Universal Declaration of Human Rights, Clinton signed an EO that Monitors and Enforces UN Mandated Human Rights Regulations

On the 50th Anniversary of the Universal Declaration of Human Rights, Clinton signed an EO that Monitors and Enforces UN Mandated Human Rights Regulations

On the 50th anniversary of the Universal Declaration of Human Rights,  President Clinton signed a new executive order titled "The Implementation of Human Rights Treaties," which was the creation of a massive government bureaucracy to promote, monitor, and enforce compliance with human rights regulations mandated by the United Nations. Remember, the UN, founded by communist, shows only contempt for biblical values, American sovereignty, and the U.S. Constitution ...
Lotus, the go-to Communications and Collaboration Platform of the C.I.A., is Sold to IBM

Lotus, the go-to Communications and Collaboration Platform of the C.I.A., is Sold to IBM

Lotus sold to IBM. Lotus was the go-to communications and collaboration platform of the C.I.A. By the late 1990's, the government bagan to discover that Lotus Notes could not handle the large scale collaboration requirements of the Internet. That is when IBM advisor James P. Chandler met Michael McKibben and Leader Technologies who had invented what is now called 'social networking' in 2000. Chandler and IBM ...
The US Army’s Publication 'Special Forces Foreign Internal Defense Tactics Techniques and Procedures' Recommends Employing Terrorists and using False Flag Operations

The US Army’s Publication ‘Special Forces Foreign Internal Defense Tactics Techniques and Procedures’ Recommends Employing Terrorists and using False Flag Operations

The United States Army’s publication Special Forces Foreign Internal Defense Tactics Techniques and Procedures  – updated in 2004 – recommends employing terrorists and using false flag operations to destabilize leftist regimes in Latin America. False flag terrorist attacks were carried out in Latin America and other regions as part of the CIA’s “Dirty Wars“. And see this. Similarly, a CIA “psychological operations” manual prepared by a CIA contractor ...
'Demolition Man' Movie Released: It Perfectly Predicted (and Ridiculed) Today’s Society

‘Demolition Man’ Movie Released: It Perfectly Predicted (and Ridiculed) Today’s Society

(via VigilantCitizen) The movie Demolition Man takes place in 2032, in an oppressive society managed by a tyrannical doctor who rose to power after an epidemic and social unrest. Watching this movie today is an eerie experience as the “jokes” of the past are the realities of today. Here’s a look at the incredible predictions made by this movie made 30 years ago. Frozen in 1996, ...
Deep State Puppets Sponsor the 3rd CPSR Cryptography and Privacy Conference with Objective: "to require that telecom... redesign their systems to facilitate wiretapping."

Deep State Puppets Sponsor the 3rd CPSR Cryptography and Privacy Conference with Objective: “to require that telecom… redesign their systems to facilitate wiretapping.”

Clinton, Bush, Obama consiglieri James P. Chandler III and Chief of Staff John D. Podesta, via the Carnegie Endowment for International Peace, sponsored the "Third CPSR Cryptography and Privacy Conference" to gather intelligence with the objective: "to require that telecommunications manufacturers and service providers redesign their systems to facilitate wiretapping." This laid the foundation of Obama's eventual ICANN give away TREASON (Oct. 01, 2016) & NSA ...
Henry Kissinger at Bilderberg: "Individual Rights will be Willingly Relinquished for the Guarantee of their Well Being Granted to Them by Their World Government.”

Henry Kissinger at Bilderberg: “Individual Rights will be Willingly Relinquished for the Guarantee of their Well Being Granted to Them by Their World Government.”

Bilderberg meetings are not for the public or for the media to report on, as it is a meeting of the elite to determine how they will direct the affairs of the world, but fortunately we have the below quote as transcribed from a tape recording made by one of the Swiss delegates. On May 21, 1992 in an address to the Bilderberger organization meeting in Evian, France, ...
Michael Riconosciuto Files Affidavit in Inslaw Case that the DOJ Stole the PROMIS Software from Inslaw for Gov't Use

Michael Riconosciuto Files Affidavit in Inslaw Case that the DOJ Stole the PROMIS Software from Inslaw for Gov’t Use

Michael Riconosciuto, a computer expert, filed an affidavit before a House judiciary committee investigating the bankruptcy case of Inslaw Inc. v. US Government (see 1974 entry for INSLAW). Riconosciuto testified that he was working under the direction of CEO Earl Brian of Hadron Inc., a government consulting firm and Inslaw competitor, and that Peter Videnieks, the contract manager overseeing the Inslaw contract for the DoJ, had ...