Leaked: NSA Spies Steal Encryption Keys from Global SIM Manufacturer

Leaked: NSA Spies Steal Encryption Keys from Global SIM Manufacturer

AMERICAN AND BRITISH Leaked: NSA Spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.

The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data.

The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania.

In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”

With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.

As part of the covert operations against Gemalto, spies from GCHQ — with support from the NSA — mined the private communications of unwitting engineers and other company employees in multiple countries.

Gemalto was totally oblivious to the penetration of its systems — and the spying on its employees. “I’m disturbed, quite concerned that this has happened,” Paul Beverly, a Gemalto executive vice president, told The Intercept. “The most important thing for me is to understand exactly how this was done, so we can take every measure to ensure that it doesn’t happen again, and also to make sure that there’s no impact on the telecom operators that we have served in a very trusted manner for many years. What I want to understand is what sort of ramifications it has, or could have, on any of our customers.” He added that “the most important thing for us now is to understand the degree” of the breach.

Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”

THE MASSIVE KEY THEFT IS “BAD NEWS FOR PHONE SECURITY. REALLY BAD NEWS.”

Beverly said that after being contacted by The Intercept, Gemalto’s internal security team began on Wednesday to investigate how their system was penetrated and could find no trace of the hacks. When asked if the NSA or GCHQ had ever requested access to Gemalto-manufactured encryption keys, Beverly said, “I am totally unaware. To the best of my knowledge, no.”

According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto.

Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”

The Mobile Handset Exploitation Team (MHET), whose existence has never before been disclosed, was formed in April 2010 to target vulnerabilities in cellphones. One of its main missions was to covertly penetrate computer networks of corporations that manufacture SIM cards, as well as those of wireless network providers. The team included operatives from both GCHQ and the NSA.

While the FBI and other U.S. agencies can obtain court orders compelling U.S.-based telecom companies to allow them to wiretap or intercept the communications of their customers, on the international front this type of data collection is much more challenging. Unless a foreign telecom or foreign government grants access to their citizens’ data to a U.S. intelligence agency, the NSA or CIA would have to hack into the network or specifically target the user’s device for a more risky “active” form of surveillance that could be detected by sophisticated targets. Moreover, foreign intelligence agencies would not allow U.S. or U.K. spy agencies access to the mobile communications of their heads of state or other government officials.

“It’s unbelievable. Unbelievable,” said Gerard Schouw, a member of the Dutch Parliament, when told of the spy agencies’ actions. Schouw, the intelligence spokesperson for D66, the largest opposition party in the Netherlands, told The Intercept, “We don’t want to have the secret services from other countries doing things like this.” Schouw added that he and other lawmakers will ask the Dutch government to provide an official explanation and to clarify whether the country’s intelligence services were aware of the targeting of Gemalto, whose official headquarters is in Amsterdam.

Last November, the Dutch government proposed an amendment to its constitution to include explicit protection for the privacy of digital communications, including those made on mobile devices. “We have, in the Netherlands, a law on the [activities] of secret services. And hacking is not allowed,” Schouw said. Under Dutch law, the interior minister would have to sign off on such operations by foreign governments’ intelligence agencies. “I don’t believe that he has given his permission for these kind of actions.”

The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”

…Continued at Firstlook.org

June 11, 2013 – Decrypted Matrix Radio: Alphabet Spies, Physicians Against Fluoridation, CellPhone Industry Cover-Up, Project Camelot Super Soldiers Update

IRS Buying Spying Equipment: Covert Cameras in Coffee Trays, Plants

NSA Leak Proves Conspiracy to Create Big Brother Control System

600 Physicians Come together on water Fluoridation

What the Cellphone Industry Doesn’t Want You to Know About Radiation Concerns

CLIP: Project Camelot Super Soldiers – WOW!

Every Week Night 12-1am EST (9-10pm PST)

– Click Image to Listen LIVE –

<

The Electromagnetic War On Humanity

The Electromagnetic War On Humanity

It gets worse by the hour. While France wisely outlawed wi-fi in its schools due to its serious effects on children, more appliances, transmitters, signals, antennas, phone masts, dishes, and electronic gadgetry is being added by the minute.

And we’re supposed to be excited about it.

Just look at this insane ad intended to sex-up the electromagnetic crap blasting our biosignals to smithereens.

Looks like V-rizin’ wants to “Rule the Air!” with their death-dealing microwaves.

The Orwellian voice-over?

“Signal – Airborne, beautiful and strong. There to insure the most powerful transmitter is YOU!”

 

The Sinister Assumptive Message

“Oh how we love getting blasted with our phone signals!! You rock, Verizon!..bring on the microwaves, robo-automation and anything else! We are techno-crazy and love it so!”

Wrong, you bastards. Don’t tell us what we want, Big Corp, we’re sick of it! And for those falling for this…wake the hell up!

Your playing with our health, well being and environment is about to come to an end.

Diabolical Microwaves

The effects of these cell towers and other microwave technologies bear witness to their perfidy. While they make light of these death-dealing devices and pretend they’re innocuous, the unwitting sheeple wither and die from mutated brain cells, injured immune and nervous systems, organ damage, and our children are predicted to have genetically altered offspring within 2 generations!

Never mind seriously influencing our minds.

We Live in ‘Electromagnetic Soup’

The “electrosmog” that first began developing with the rollout of the electrical grid a century ago and now envelops every inhabitant of Earth is responsible for many of the diseases that impair or kill them.

In 2007, the Bioinitiative Working Group released a 650-page report citing more than 2,000 studies (many very recent) that detail the toxic effects of EMFs from all sources. Chronic exposure to even low-level radiation (like that from cell phones), can cause a variety of cancers, impair immunity, and contribute to Alzheimer’s disease and dementia, heart disease, and many other ailments.

“For the first time in our evolutionary history, we have generated an entire secondary, virtual, densely complex environment — an electromagnetic soup — that essentially overlaps the human nervous system,” says Michael Persinger, PhD, a neuroscientist at Laurentian University who has studied the effects of EMFs on cancer cells.

And it appears that, more than a century after Thomas Edison switched on his first light bulb, the health consequences of that continual overlap are just now beginning to be documented. (Source)

http://sacredg.files.wordpress.com/2008/08/protectyourself.jpg?w=278&h=210

They Didn’t Have to Use These Damaging Frequencies–They CHOSE To!

Retired British military intelligence scientist Barrie Trower who for years worked in microwave and stealth warfare, has been speaking out and supplying scientific documentation regarding the serious dangers of EMFs, and getting results.

He said,

During the 1950s and 1960s during the Cold War, it was realised by accident that microwaves could be used as stealth weapons when the Russians beamed the American embassy during the Cold War and it gave everybody working in the embassy cancer, breast cancers, leukemias whatever, and it was realised then that low level microwaves were the perfect stealth weapon to be used on dissident groups around the world, because you could make dissident groups sick, give them cancer, change their mental outlook on life without them even knowing they were being radiated.

The electromagnetic spectrum is a band that goes from gamma rays and x-rays at one end, the very high energy waves, and it comes down through visible light, which is also some radiation, and then it goes through infrared microwaves, tv and radio. Now the only ones which really affect us in the communications industry are the microwaves, and microwaves have a special ability to interfere with water, which is how microwave ovens work, and we are made of water.

All of our chemical and electrical signals involve water in the body, somehow, electrical communications in the body. So, the industry has picked the worst possible part of the electromagnetic spectrum to give to young children and to adults (with regards to cell phones).

The Frightening Effects of WiFi and Cell Phone Radiation on Young Girls

Trower: I have three research papers. I am a scientific adviser to five organisations. Part of my brief is I read international scientific papers, I retranslate them into a language that most people can understand, which is how I advise.

I have three papers showing that low level microwaves can interfere with the genetics in the ovarian follicles. Now what that means in everyday language, different from boys, young girls when they’re born, they will have up to four hundred eggs in their ovaries. The microwaves can damage the genetic structure, we now know, in those ovaries. So, when this young girl grows up, gets married, and has children, if she has a daughter, this particular mitochondrial genetic damage is irreparable. There is nothing at all that can repair it.

(See full transcript of interview with Barrie Trower here)

Barrie Trower Speaks about Microwave Radiation

On August 24, 2010, Mr. Barrie Trower, a British physicist who was a microwave weapons expert and who worked for the Royal Navy and the British Secret Service, gave a talk at the University of Toronto about the health effects of WiFi and other forms of microwave radiation.

Mr. Trower came out of retirement because he was concerned that the microwave frequencies and intensities to which children are exposed in schools are similar to those used for microwave weapons.  He provided Dr. Havas with a copy of a talk he gave to the King of Botswana earlier this year (April 2010) and that document can be viewed here.

Link to article in Toronto Star August 26, 2010:  ”U.K. Expert Warns against Wi-Fi.”

Here is a PDF of his credentials and a presentation to the Welsh Parliament.

For a genuine visit with Mr. Trower and to hear his full views, this is for you:

These Same Wicked PTBs Electrify Our Atmosphere – And Put Towers Near Schools, Hospitals and Population Centers

If you’ve driven around under our metalisized skies, noticing these proliferating phone towers or masts, you’ll notice how many have been diabolically placed near or directly on schools, institutions, medical facilities, strip malls, businesses and housing areas. You can be sure the ‘Phone Company’ is well aware of what they’re doing and the dangerous effects–they just lie to the underlings.

That’s why things like THIS happen when the informed take drastic action to draw attention to this horrific reality.

We’re dealing with intentional harm to our young people and overall population by the same corporate devils who genetically modify our crops, poison our air and water, and add carcinogenic genetically altering additives to our food.

Are All These Towers Just For Cell Phones…or Mind and Thought Manipulation?

The use of EMFs (electromagnetic frequencies) is one of our elite controllers most effective stealth technologies. Besides breaking down human health, the human brain is known to operate at a certain frequency, and is easily accessed and manipulated within that range using the ‘right’ technology. You can be sure the Powers That Be are using these for other purposes as well.

The day is now approaching in which government mind control technologies will be directed at you, your neighbors, and your loved ones. Every single day, equipment is being erected and installed in this country with the hidden purpose of exerting mind control over the entire population.  Everywhere in this country (and overseas), ELF/microwave transmission towers are being erected. No one is saying anything, but you’re expected to presume that they’re for cell phones. (Do you really think that we need that much ‘cell phone’ transmission capability, every few blocks? Do you realize how very little energy is used by genuine cell phone usage? Yet these towers are capable of putting out levels of power that exceed cell phone requirements by a wide margin.

These mind control technologies have been in place for a long time. It’s not an accident that the frequency band chosen for cell phone use just happens to match the second order waves that Wilhelm Reich discovered in the late1940′s to effect thought transmission and allow the mind to be manipulated without the victim realizing it. Reich worked on this project secretly for the CIA for over 5 years, from 1947-1952,  until he realized who the CIA was planning to use the mind control on -the American people. He was outraged that he was deceived and used for such a treasonous motive and swore never to cooperate with the CIA, FDA, etc. again. Reich was covertly murdered in Federal prison in 1957, just a few weeks before he was due to be released, having been in prison for 2 years on a trumped up charge leading to a contempt of court citation.

A method was discovered to disable these ELF towers from exerting their mind control functions by placing a simple device known as an orgone generator within a radius of 1,300 feet of these towers. These microwave towers are used in conjunction with HAARP based technology to not only affect subliminal mind control influences, but also to control the weather, the creation of artificially induced drought conditions are also greatly influenced by the population-reduction chemtrail spraying operations which take place daily over the skies in America and in many other countries) . Source

Can We Stop Cell Phone Tower Construction?

Deadly Cell-Phone Towers

from Lynn Quiring, RPh, CCN, NMDLogical Health LLC

‘Unfortunately, there is not much one can do to stop the proliferation and continued build out of cell phone towers and structures. Although thought to be legislation about deregulation issues, the Telecommunications Act of 1996 (TCA) was really an open invitation for the cell phone industry to place their towers anywhere they wanted. Section 704 of the TCA basically states that local authorities can’t ban the placement of towers in their jurisdictions. The law says: “No State or local government or instrumentality thereof may regulate the placement, construction, and modification of personal wireless service facilities on the basis of the environmental effects of radio frequency emissions to the extent that such facilities comply with the Commission’s regulations concerning such emissions.” So legally the local government can’t refuse the construction of a cell phone tower in your neighborhood! Any challenge by local communities could easily end up in federal court. Our lawmakers have basically given the cell phone industry free reign to install these towers wherever they want. And, by the way, the cell phone industry helped write this legislation that our government officials passed as law! The public, therefore, now has no voice and no vote. Is there something wrong with this picture? Why didn’t our public officials represent the people instead of big business? Why would you let the very industry you’re trying to regulate write it’s own laws?

How Many Cell Phone Towers Are Near You?

The average person lives within one-half mile of a cell phone tower. Have you ever wondered how close you live or work to one of these towers? Would it bother you if one were right in your backyard? How many of these towers and antennas do you think there are in your immediate area? Find out by visiting the website www.antennasearch.com/. Simply type in your address and you’ll get a listing and a map of all the towers and antennas within a short radius of your address. Like most people you’ll probably gasp when you see the numbers. These towers are literally everywhere. Hundreds and hundreds of them are probably located within a few miles of your home or office.

What Can We Do?

Obviously, we can’t escape the exposure. We’ve established that fact. So what can we do to minimize the damage?

Here are few ideas: We need to limit our exposure any way possible. Don’t live near a cell phone tower if you have a choice. Don’t buy a home near one even if the price is right. Limit your use of wireless devices. Go back to ‘wired’ connections whenever possible. Maximize your health through proper nutrition and good hydration. Eat foods high in antioxidants and take supplements. Eat organically as much as possible. There is no safe distance to locate away from a mast tower. Obviously, the closer to the tower the greater the exposure risk so do locate as far away as possible. Whenever possible encourage your local government officials to consider transitioning to the use of fiber optic cable. Most of it has already been laid underground. It’s just not being used. There are no masts with fiber optics and the small amount of radiation at the exits can be neutralized with technology now available. Discourage the use of Wi-Fi in schools by meeting with your school officials and school boards. Wi-Fi hotspots are popping up everywhere now. Even whole cities are going wireless with the installation of Wi-Fi. Again, it’s all done through a wireless signal, which is damaging to your health. Don’t let cell phone companies install cell phone antennas on the roofs of schools where your children attend. The radio waves are disruptive to their ability to focus, not to mention the health hazards we’ve already outlined. If you can’t change your current situation there is some hope. There are some intervention devices now available that you can use in your home, school and office to help lessen the risk of exposure. Some very good cutting-edge technology has been developed that will intervene and help mitigate the damage being done by wireless connections.’ (Source)

The Smart Meter Onslaught

This is the nastiest wave yet. They’re attacking residences with extremely powerful rapid intermittent blasts under the guise of checking your energy consumption.

Not the case. They’re not only monitoring your every activity, but you’re being bombarded with the most sinister waves yet.

A tremendously helpful site can be found HERE..at freedomtaker.com. Read it carefully and take advantage of its info. We’re being killed off if we let them, don’t be the next.

Protect Yourself and Your Family

If you look up EMF protection devices, you’ll find plenty.

One particular technology I find particularly intriguing is the Orgone Technology mentioned above. This is believed to work at the quantum level and to be able to convert the negative entropy of these destructive waves into a positive force. There is a growing army of enthusiasts who are experimenting with orgonite devices and getting amazing results.

Be sure to research it.

Knowing what we do regarding the crystalline structure of the universe, I find it intuitively makes a lot of sense, especially when coupled with prayer or intention. Our own magnificent bodies are crystalline, for which reason we need to realize we are either receiving and amplifying this negative entropy, or helping to convert it to a positive force.

It’s certainly something worth researching. But in whatever form we can, we should resist with consciousness in every form possible.

Conclusion

http://cdn.crooksandliars.com/files/uploads/2009/02/no-ostrich_0_20c70.gif

We’re under attack.

We need to be informed, aware and willing to inform others, as well as effect changes to help people escape the effects of these debilitating technologies as much as possible. As more and more people become aware of these facts, the change of consciousness and behavior that ensues will continue to transform our planet.

These are serious times we live in, and we need to respond accordingly.

Any way we can.

Love, Zen

14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You

14 Incredibly Creepy Surveillance Technologies That Big Brother Will Be Using To Spy On You

Most of us don’t think much about it, but the truth is that people are being watched, tracked and monitored more today than at any other time in human history. The explosive growth of technology in recent years has given governments, spy agencies and big corporations monitoring tools that the despots and dictators of the past could only dream of.

Previous generations never had to deal with “pre-crime” surveillance cameras that use body language to spot criminals or unmanned drones watching them from far above. Previous generations would have never even dreamed that street lights and refrigerators might be spying on them. Many of the incredibly creepy surveillance technologies that you are about to read about are likely to absolutely astound you. We are rapidly heading toward a world where there will be no such thing as privacy anymore. Big Brother is becoming all-pervasive, and thousands of new technologies are currently being developed that will make it even easier to spy on you. The world is changing at a breathtaking pace, and a lot of the changes are definitely not for the better.

The following are 14 incredibly creepy surveillance technologies that Big Brother will be using to watch you….

#1 “Pre-Crime” Surveillance Cameras

A company known as BRS Labs has developed “pre-crime” surveillance cameras that can supposedly determine if you are a terrorist or a criminal even before you commit a crime.

Does that sound insane?

Well, authorities are taking this technology quite seriously. In fact, dozens of these cameras are being installed at major transportation hubs in San Francisco….

In its latest project BRS Labs is to install its devices on the transport system in San Francisco, which includes buses, trams and subways.

The company says will put them in 12 stations with up to 22 cameras in each, bringing the total number to 288.

The cameras will be able to track up to 150 people at a time in real time and will gradually build up a ‘memory’ of suspicious behaviour to work out what is suspicious.

#2 Capturing Fingerprints From 20 Feet Away

Can you imagine someone reading your fingerprints from 20 feet away without you ever knowing it?

This kind of technology is actually already here according to POPSCI….

Gaining access to your gym or office building could soon be as simple as waving a hand at the front door. A Hunsville, Ala.-based company called IDair is developing a system that can scan and identify a fingerprint from nearly 20 feet away. Coupled with other biometrics, it could soon allow security systems to grant or deny access from a distance, without requiring users to stop and scan a fingerprint, swipe an ID card, or otherwise lose a moment dealing with technology.

Currently IDair’s primary customer is the military, but the startup wants to open up commercially to any business or enterprise that wants to put a layer of security between its facilities and the larger world. A gym chain is already beta testing the system (no more using your roommate’s gym ID to get in a free workout), and IDair’s founder says that at some point his technology could enable purchases to be made biometrically, using fingerprints and irises as unique identifiers rather than credit card numbers and data embedded in magnetic strips or RFID chips.

#3 Mobile Backscatter Vans

Police all over America will soon be driving around in unmarked vans looking inside your cars and even under your clothes using the same “pornoscanner” technology currently being utilized by the TSA at U.S. airports….

American cops are set to join the US military in deploying American Science & Engineering’s Z Backscatter Vans, or mobile backscatter radiation x-rays. These are what TSA officials call “the amazing radioactive genital viewer,” now seen in airports around America, ionizing the private parts of children, the elderly, and you (yes you).

These pornoscannerwagons will look like regular anonymous vans, and will cruise America’s streets, indiscriminately peering through the cars (and clothes) of anyone in range of its mighty isotope-cannon. But don’t worry, it’s not a violation of privacy. As AS&E’s vice president of marketing Joe Reiss sez, “From a privacy standpoint, I’m hard-pressed to see what the concern or objection could be.”

You can see a YouTube video presentation about this new technology right here.

#4 Hijacking Your Mind

The U.S. military literally wants to be able to hijack your mind. The theory is that this would enable U.S. forces to non-violently convince terrorists not to be terrorists anymore. But obviously the potential for abuse with this kind of technology is extraordinary. The following is from a recent article by Dick Pelletier….

The Pentagon’s Defense Advanced Research Projects Agency (DARPA) wants to understand the science behind what makes people violent, and then find ways to hijack their minds by implanting false, but believable stories in their brains, with hopes of evoking peaceful thoughts: We’re friends, not enemies.

Critics say this raises ethical issues such as those addressed in the 1971 sci-fi movie, A Clockwork Orange, which attempted to change people’s minds so that they didn’t want to kill anymore.

Advocates, however, believe that placing new plausible narratives directly into the minds of radicals, insurgents, and terrorists, could transform enemies into kinder, gentler citizens, craving friendship.

Scientists have known for some time that narratives; an account of a sequence of events that are usually in chronological order; hold powerful sway over the human mind, shaping a person’s notion of groups and identities; even inspiring them to commit violence. See DARPA proposal request HERE.

#5 Unmanned Drones In U.S. Airspace

Law enforcement agencies all over the United States are starting to use unmanned drones to spy on us, and the Department of Homeland Security is aggressively seeking to expand the use of such drones by local authorities….

The Department of Homeland Security has launched a program to “facilitate and accelerate the adoption” of small, unmanned drones by police and other public safety agencies, an effort that an agency official admitted faces “a very big hurdle having to do with privacy.”

The $4 million Air-based Technologies Program, which will test and evaluate small, unmanned aircraft systems, is designed to be a “middleman” between drone manufacturers and first-responder agencies “before they jump into the pool,” said John Appleby, a manager in the DHS Science and Technology Directorate’s division of borders and maritime security.

The fact that very few Americans seem concerned about this development says a lot about where we are as a nation. The EPA is already using drones to spy on cattle ranchers in Nebraska and Iowa. Will we eventually get to a point where we all just consider it to be “normal” to have surveillance drones flying above our heads constantly?

#6 Law Enforcement Using Your Own Cell Phone To Spy On You

Although this is not new technology, law enforcement authorities are using our own cell phones to spy on us more extensively than ever before as a recent Wired article described….

Mobile carriers responded to a staggering 1.3 million law enforcement requests last year for subscriber information, including text messages and phone location data, according to data provided to Congress.

A single “request” can involve information about hundreds of customers. So ultimately the number of Americans affected by this could reach into “the tens of millions” each year….

The number of Americans affected each year by the growing use of mobile phone data by law enforcement could reach into the tens of millions, as a single request could ensnare dozens or even hundreds of people. Law enforcement has been asking for so-called “cell tower dumps” in which carriers disclose all phone numbers that connected to a given tower during a certain period of time.

So, for instance, if police wanted to try to find a person who broke a store window at an Occupy protest, it could get the phone numbers and identifying data of all protestors with mobile phones in the vicinity at the time — and use that data for other purposes.

Perhaps you should not be using your cell phone so much anyway. After all, there are more than 500 studies that show that cell phone radiation is harmful to humans.

#7 Biometric Databases

All over the globe, governments are developing massive biometric databases of their citizens. Just check out what is going on in India….

In the last two years, over 200 million Indian nationals have had their fingerprints and photographs taken and irises scanned, and given a unique 12-digit number that should identify them everywhere and to everyone.

This is only the beginning, and the goal is to do the same with the entire population (1.2 billion), so that poorer Indians can finally prove their existence and identity when needed for getting documents, getting help from the government, and opening bank and other accounts.

This immense task needs a database that can contain over 12 billion fingerprints, 1.2 billion photographs, and 2.4 billion iris scans, can be queried from diverse devices connected to the Internet, and can return accurate results in an extremely short time.

#8 RFID Microchips

In a previous article, I detailed how the U.S. military is seeking to develop technology that would enable it to monitor the health of our soldiers and improve their performance in battle using RFID microchips.

Most Americans don’t realize this, but RFID microchips are steadily becoming part of the very fabric of our lives. Many of your credit cards and debit cards contain them. Many Americans use security cards that contain RFID microchips at work. In some parts of the country it is now mandatory to inject an RFID microchip into your pet.

Now, one school system down in Texas actually plans to start using RFID microchips to track the movements of their students….

Northside Independent School District plans to track students next year on two of its campuses using technology implanted in their student identification cards in a trial that could eventually include all 112 of its schools and all of its nearly 100,000 students.

District officials said the Radio Frequency Identification System (RFID) tags would improve safety by allowing them to locate students — and count them more accurately at the beginning of the school day to help offset cuts in state funding, which is partly based on attendance.

#9 Automated License Plate Readers

In a previous article, I quoted a Washington Post piece that talked about how automated license plate readers are being used to track the movements of a vehicle from the time that it enters Washington D.C. to the time that it leaves….

More than 250 cameras in the District and its suburbs scan license plates in real time, helping police pinpoint stolen cars and fleeing killers. But the program quietly has expanded beyond what anyone had imagined even a few years ago.

With virtually no public debate, police agencies have begun storing the information from the cameras, building databases that document the travels of millions of vehicles.

Nowhere is that more prevalent than in the District, which has more than one plate-reader per square mile, the highest concentration in the nation. Police in the Washington suburbs have dozens of them as well, and local agencies plan to add many more in coming months, creating a comprehensive dragnet that will include all the approaches into the District.

#10 Face Reading Software

Can computers tell what you are thinking just by looking at your face?

Don’t laugh.

Such technology is actually being actively developed. The following is from a recent NewScientist article….

IF THE computers we stare at all day could read our faces, they would probably know us better than anyone.

That vision may not be so far off. Researchers at the Massachusetts Institute of Technology’s Media Lab are developing software that can read the feelings behind facial expressions. In some cases, the computers outperform people. The software could lead to empathetic devices and is being used to evaluate and develop better adverts.

#11 Data Mining

The government is not the only one that is spying on you. The truth is that a whole host of very large corporations are gathering every shred of information about you that they possibly can and selling that information for profit. It is called “data mining“, and it is an industry that has absolutely exploded in recent years.

One very large corporation known as Acxiom actually compiles information on more than 190 million people in the U.S. alone….

The company fits into a category called database marketing. It started in 1969 as an outfit called Demographics Inc., using phone books and other notably low-tech tools, as well as one computer, to amass information on voters and consumers for direct marketing. Almost 40 years later, Acxiom has detailed entries for more than 190 million people and 126 million households in the U.S., and about 500 million active consumers worldwide. More than 23,000 servers in Conway, just north of Little Rock, collect and analyze more than 50 trillion data ‘transactions’ a year.

#12 Street Lights Spying On Us?

Did you ever consider that street lights could be spying on you?

Well, it is actually happening. New high tech street lights that can actually watch what you do and listen to what you are saying are being installed in some major U.S. cities. The following is from a recent article by Paul Joseph Watson for Infowars.com….

Federally-funded high-tech street lights now being installed in American cities are not only set to aid the DHS in making “security announcements” and acting as talking surveillance cameras, they are also capable of “recording conversations,” bringing the potential privacy threat posed by ‘Intellistreets’ to a whole new level.

#13 Automated ISP Monitoring Of Your Internet Activity

As I have written about before, nothing you do on the Internet is private. However, Internet Service Providers and the entertainment industry are now taking Internet monitoring to a whole new level….

If you download potentially copyrighted software, videos or music, your Internet service provider (ISP) has been watching, and they’re coming for you.

Specifically, they’re coming for you on Thursday, July 12.

That’s the date when the nation’s largest ISPs will all voluntarily implement a new anti-piracy plan that will engage network operators in the largest digital spying scheme in history, and see some users’ bandwidth completely cut off until they sign an agreement saying they will not download copyrighted materials.

Word of the start date has been largely kept secret since ISPs announced their plans last June. The deal was brokered by the Recording Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA), and coordinated by the Obama Administration.

Spying On Us Through Our Appliances

Could the government one day use your refrigerator to spy on you?

Don’t laugh.

That is exactly what CIA Director David Petraeus says is coming….

Petraeus says that web-connected gadgets will ‘transform’ the art of spying – allowing spies to monitor people automatically without planting bugs, breaking and entering or even donning a tuxedo to infiltrate a dinner party.

‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,’ said Petraeus.

‘Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters – all connected to the next-generation internet using abundant, low-cost, and high-power computing.’

Petraeus was speaking to a venture capital firm about new technologies which aim to add processors and web connections to previously ‘dumb’ home appliances such as fridges, ovens and lighting systems.

For many more ways that Big Brother is spying on you, please see these articles….

Every Breath You Take, Every Move You Make – 14 New Ways That The Government Is Watching You

30 Signs That The United States Of America Is Being Turned Into A Giant Prison

The things that I have written about above are just the things that they admit to.

There are also many “black box technologies” being developed out there that the public does not even know about yet.

So how far will all of this go?

Has Big Brother already gone way too far?

Please feel free to post a comment with your opinion below….

Source: The American Dream

Attention Activists: Your Phone May Not Be Safe at Protests

Attention Activists: Your Phone May Not Be Safe at Protests

Ever wondered why your cell phone reception suddenly becomes terrible at protests? Ever worried that police could use electronic spoofing devices to suck up your mobile data because you are in the streets exercising your rights?

You might have been onto something.

Mobile “IMSI catchers”, currently on the market and being pushed to police and intelligence agencies worldwide, enable these creepy, stealth spying tactics. And if they build it and hawk it, history tells us police will buy it and deploy it.

On Tuesday, July 3, 2012, electronic privacy advocate and technology researcher Chris Soghoian tweeted a link to a photograph of a talk he gave at TED in Scotland in late June. Behind him in the photograph is another image, this one taken by privacy researcher Eric King at a surveillance trade show. (King’s Twitter bio contains a quote from a representative of the notorious ISS World — a global surveillance trade firm that often hosts such trade shows: the rep called him an “Anti-lawful interception zealot blogger.” High praise.)

Look at the slide behind Soghoian; that’s the photo in question. It shows an IMSI catcher strapped onto a model, under the model’s shirt.

IMSI stands for “International Mobile Subscriber Identity”. The technology is essentially a mobile phone tower with “a malicious operator”. It mimics the behavior of a cell tower and tricks mobile phones into sending data to it, instead of to the tower.

As such it is considered a Man In the Middle (MITM) attack. It is used as an eavesdropping device used for interception and tracking of cellular phones and usually is undetectable for the users of mobile phones.

Once it has made a connection with the phone and tricked it into thinking it is a mobile tower, the IMSI catcher forces the phone to drop its encryption, enabling easy access to the contents of the device. The tool then lets the attacker listen in on mobile conversations and intercept all data sent from a mobile phone, remaining undetected. In some cases the tool also allows the operator to manipulate messages.

Here’s a creepy video that a purveyor of IMSI catchers made to advertise its product:

Please note that by playing this clip YouTube and Google will place a long term cookie on your computer.

Police in the United States claim they do not need a warrant to use an IMSI catcher or other spoofing device to track your location. A case to determine whether or not the courts agree is working itself through the system.

Privacy International’s Eric King took the photo on the slide behind Soghoian at a surveillance trade show, where he says the tool was “pitched to me as being perfect for covert operations in public order situations.” In other words, at protests. 

 

The FBI uses IMSI catchers and claims it does so legally, even though it says it doesn’t need a warrant to deploy them. The Electronic Privacy Information Center is currently pursuing FOIA litigation to find out exactly how the bureau uses the “Stingray” (a brand name IMSI catcher); unsurprisingly, the FBI wasn’t forthcoming with documents to reveal its legal standard or other information about how it uses the tool. Stay tuned for more information as that case makes its way through the courts.

Meanwhile, how can you protect yourself against IMSI catchers? Unfortunately, you probably can’t. And the threats are not just from government. As Soghoian and others warned in a friend of the court brief,

Finally, the communications privacy of millions of law-abiding Americans is already threatened by the use of this and similar interception technologies by non-US government entities, such as stalkers, criminals, and foreign governments engaged in espionage. As such, the public interest is best served by greater public discussion regarding these tracking technologies and the security flaws in the mobile phone networks that they exploit, not less.

Yet again, we are faced with a situation in which our technology has outpaced our law reform. It’s time for Congress to change that.


To get a more detailed sense of how the technology actually works, watch this excellent talk from DefCon 2011, with Chris Paget: “Practical Cellphone Spying”. He spoofs the phones of the people in the audience during the talk; it’s well worth watching if you have some time.

 

For more on IMSI catchers and the state of the law, click here.

 

SOURCE: PrivacySOS

Line Noise: Electronic Device Search and Seizure

Line Noise: Electronic Device Search and Seizure

EFF activist Eva Galperin interviews EFF criminal defense attorney, Hanni Fakhoury, on the newest edition of Line Noise, the EFF podcast. Whether law enforcement wants to search your home computer, tries to browse through your smart phone at a traffic stop, or seeks to thumb through your camera at customs, you should know your rights.

Learn more about your privacy rights by reading our Know Your Rights guide, or test your skills with our quiz.

This edition of Line Noise was recorded on-site from the San Francisco studio of Bamm.tv

 

https://www.eff.org/deeplinks/2011/08/line-noise-electronic-device-search-and-seizure