Category Archives: technology

5G Super-Hotspots: You better know where the “kill zones” are located!

The deployment of 5G continues unabated across the USA in spite of zero mandatory health and safety testing being conducted.

This illegal roll-out is focusing on the largest urban centers and especially high-profile venues that can be used as an advertisement for how ‘awesome’ 5G is [NOT].

It will be these specially chosen venues where smartphone users can play with their own portable Internet of Things (IoT)… at the expense of everyone else in those 5G super-hotspots.

5G Super-Hotspots

Continue reading

Advertisements

UK Cops Fine Pedestrian $115 For Avoiding Facial Recognition Camera

A UK pedestrian was arrested and fined £90 ($115 US) after attempting to cover his face while passing a controversial facial recognition camera van on a East London street. The notorious London police vans scan the faces of passers-by and compare them to a database of wanted criminals.

https://www.zerohedge.com/s3/files/inline-images/facial-recognition-van%20%281%29.jpg?itok=wWFB2h3j

One man wasn’t having any of it, and was seen covering his face with his hat and jacket before London police stopped him and took his picture anyway according to the Daily Mail

https://www.zerohedge.com/s3/files/inline-images/bbc%20click.jpg?itok=hncBlJtM

If I want to cover me face, I’ll cover me face. Don’t push me over when I’m walking down the street,” said the man after his stop. 

“How would you like it if you walked down the street and someone grabbed your shoulder? You wouldn’t like it, would you?” the man asked an officer, who replied “Calm yourself down or you’re going in handcuffs. It’s up to you. Wind your neck in.” 

“You wind your neck in,” the man replied.

https://www.zerohedge.com/s3/files/inline-images/man%20van.jpg?itok=fdcuWtK8

After being fined, the man told a reporter: ‘The chap told me down the road – he said they’ve got facial recognition. So I walked past like that (covering my face).

‘It’s a cold day as well. As soon as I’ve done that, the police officer’s asked me to come to him. So I’ve got me back up. I said to him ‘f*** off’, basically.  

‘I said ‘I don’t want me face shown on anything. If I want to cover me face, I’ll cover me face, it’s not for them to tell me not to cover me face. 

‘I’ve got a now £90 fine, here you go, look at that. Thanks lads, £90. Well done.’ –Daily Mail

The ticketing comes in the wake of another similar incident in February, in which another man refused to be scanned by one of the facial recognition vans and was also fined £90. 

He simply pulled up the top of his jumper over the bottom of his face, put his head down and walked past,” said Silkie Carlo, director of Big Brother Watch, who added that at least one man had seen placards warning the public of the facial recognition cameras being used from a parked police van.

“There was nothing suspicious about him at all … you have the right to avoid [the cameras], you have the right to cover your face. I think he was exercising his rights,” said Carlo.

Meanwhile, the technology is terribly inaccurate – wrongly matching over 2,000 people to criminals when it was deployed ahead of the Champions League Final in Cardiff in 2017. 

Last December, a suspect was arrested by the Metropolitan Police during a trial of the facial recognition technology among Christmas shoppers at Leicester Square in London’s West End.  

Another man was stopped due to the technology, but found not to be the man the computer thought he was – although he was arrested over another offence. 

Big Brother Watch has previously said the technology is a ‘breach of fundamental rights to privacy and freedom of assembly’. –Daily Mail

“It is important to note that police are now days away from making a decision about the future of facial recognition in the UK,” Carlo told MailOnline. “We believe it has no place in a democracy and we will continue with our legal challenge against the Met if they do go ahead with it.

Source: ZeroHedge

President Trump Declares National Emergency For Information and Communication Technology…

Here we go….  President Trump is laying the groundwork to ban telecommunication companies based on identified risk to national security (ie. Huawei). Nations who engage in 5-G technology agreements are on notice they may be cut-off from communication partnerships with the U.S.A.

[I think Wall Street just pee’d their pants a little..]

https://theconservativetreehouse.files.wordpress.com/2017/04/trump-oval-office-4.jpg

Continue reading

Twitter Admits To Collecting, Sharing User Location Data

Twitter announced on Monday that it ‘inadvertently” collected and shared iOS location data due to a software bug.

https://cdn.grahamcluley.com/wp-content/uploads/2016/04/pinpoint-600.jpeg

In a blog post, the company admitted: “We have discovered that we were inadvertently collecting and sharing iOS location data with one of our trusted partners in certain circumstances,” adding “Specifically, if you used more than one account on Twitter for iOS and opted into using the precise location feature in one account, we may have accidentally collected location data when you were using any other account(s) on that same device for which you had not turned on the precise location feature.” 

Separately, we had intended to remove location data from the fields sent to a trusted partner during an advertising process known as real-time bidding. This removal of location did not happen as planned. However, we had implemented technical measures to “fuzz” the data shared so that it was no more precise than zip code or city (5km squared). This location data could not be used to determine an address or to map your precise movements. The partner did not receive data such as your Twitter handle or other unique account IDs that could have compromised your identity on Twitter. This means that for people using Twitter for iOS who we inadvertently collected location information from, we may also have shared that information with a trusted advertising partner.  –Twitter

Twitter says that the location data was not retained by the trusted partner, and that it only existed in their systems for a short period of time before it was deleted as part of their normal process. 

The company reports that it has fixed the problem and will work to ensure that it doesn’t happen again. 

Those who have been affected by the bug have been notified to let them know what happened, and the company is “very sorry this happened.”

Source: ZeroHedge

Israeli Company Uses WhatsApp Voice Calls To Install Spyware On Phones

With so much attention focused recently on constant consumer spying and privacy violations, erroneous or otherwise, by Amazon, Facebook and now Twitter, it is easy to forget that virtually other communication apps have the same purpose, and that’s what one secretive Israeli company relied on when they used a vulnerability in the popular messaging app WhatsApp (owned by Facebook) to inject commercial Israeli spyware on to phones, the company and a spyware technology dealer said. What is unique is how the app was infected: with a simple phone call.

According to the FT, WhatsApp which is used by 1.5bn people worldwide, discovered in early May that attackers were able to install surveillance software on to both iPhones and Android phones by ringing up targets using the app’s phone call function. The malicious code, developed by the secretive NSO Group, a notorious and controversial Israeli hacking and surveillance tools vendor, could be transmitted even if users did not answer their phones, and the calls often disappeared from call logs.

It is unclear how many apps were infected with the spyware trojan, which could for example, allow anyone to get access to John Podesta’s email password (and then blame say, Vladimir Putin for example) as WhatsApp is too early into its own investigations of the vulnerability to estimate how many phones were targeted using this method, although it is likely a substantial number. As late as Sunday, the FT reports that WhatsApp engineers were racing to close the loophole.

For those who thought that Alexa’s constant eavesdropping was bad, this is even worse: NSO’s flagship product is Pegasus, a program that can turn on a phone’s microphone and camera, trawl through emails and messages and collect location data. It effectively opens up one’s entire cellphone to the hacker, and to get “infected”, one just needs to receive an inbound phone call without ever answering it.

Many people probably heard of NSO for the first time in December 2018, when a New York Times story that claimed the company helped Saudi Arabia spy on the Washington Post journalist Jamal Khashoggi before he was killed in the Saudi consulate in Istanbul, Turkey in October of last year.

NSO advertises its products to Middle Eastern and Western intelligence agencies, and says Pegasus is intended for governments to fight terrorism and crime. NSO was recently valued at $1bn in a leveraged buyout that involved the UK private equity fund Novalpina Capital

Since the application is Israeli, its hardly a surprise that the spies’ preferred targets were Middle Eastern: as the FT reports, in the past, human rights campaigners in the Middle East have received text messages over WhatsApp that contained links that would download Pegasus to their phones.

“This attack has all the hallmarks of a private company known to work with governments to deliver spyware that reportedly takes over the functions of mobile phone operating systems,”

the company said, with the government in question being that of Israel. “We have briefed a number of human rights organisations to share the information we can, and to work with them to notify civil society.”

WhatsApp disclosed the issue to the US Department of Justice last week, according to a person familiar with the matter. A justice department spokesman declined to comment.

Of course, if instead of a “secretive Israeli” company, the offender was found to be – say – a fabricated Russian outfit, the deep state would ensure that we would now be on the verge of World War III. However, since it’s Israel…. well, turn on your TV and see how many TV stations discuss this grotesque spying incident which could affect virtually anyone.

NSO, of course, said it had carefully vetted customers and investigated any abuse. Asked about the WhatsApp attacks, NSO said it was investigating the issue.

“Under no circumstances would NSO be involved in the operating or identifying of targets of its technology, which is solely operated by intelligence and law enforcement agencies,” the company said. “NSO would not, or could not, use its technology in its own right to target any person or organisation, including this individual [the UK lawyer].”

Among others, the attack targeted a UK lawyer, who declined to be identified, who has helped a group of Mexican journalists and government critics and a Saudi dissident living in Canada, sue NSO in Israel, alleging that the company shares liability for any abuse of its software by clients.

“It’s upsetting but not surprising that my team has been targeted with the very technology that we are raising concerns about in our lawsuits,” said Alaa Mahajne, a Jerusalem-based lawyer who is handling lawsuits from the Mexican and Saudi citizens. “This desperate reaction to hamper our work and silence us, itself shows how urgent the lawsuits are, as we can see that the abuses are continuing.”

On Tuesday, NSO will also face a legal challenge to its ability to export its software, which is regulated by the Israeli ministry of defense.

It was unclear if the entity behind the actual espionage was NSO in conjunction with the Israeli government, or if Israel had sold the hacking application to one or more of its best clients, including Saudi Arabia.

“NSO Group sells its products to governments who are known for outrageous human rights abuses, giving them the tools to track activists and critics. The attack on Amnesty International was the final straw,” said Danna Ingleton, deputy director of Amnesty International, which identified an attempt to hack into the phone of one its researchers.

“The Israeli ministry of defense has ignored mounting evidence linking NSO Group to attacks on human rights defenders. As long as products like Pegasus are marketed without proper control and oversight, the rights and safety of Amnesty International’s staff and that of other activists, journalists and dissidents around the world is at risk.

For more on NSO, watch this 60 Minutes interview with the company’s CEO.

Source: ZeroHedge

New CIA “Flying Ginsu” Missile Shreds Individual Targets With 6 Long Blades

The CIA’s latest high tech assassination precision strike missile appears something straight out of Mortal Kombat. “To the targeted person, it is as if a speeding anvil fell from the sky,” the WSJ wrote, revealing the weapon publicly for the first time based on interviews with over a dozen current and former defense officials.

The R9X is the newest “secret” missile in the CIA arsenal and is nicknamed the “flying Ginsu”  given its six blades used to kill targets on impact as the missile lands at high speed, without carrying an explosive payload.

https://www.zerohedge.com/s3/files/inline-images/hellfire%20missile.jpg?itok=FZWh7H6q

A see-throough model of the original Hellfire missile. The R9X is a modification of the original hellfire, modified with blades that exit the missile’s surface moments before impact. File photo via Lockheed Martin.

It’s a modified version of the Hellfire missile which can shred anything in its path on impact, but designed to prevent or minimize civilian deaths

It’s also sometimes called “the Ninja Bomb” for its ability to rip through cars and buildings after being fired from a UAV as a kind of 100-pound giant flying switchblade, but since it doesn’t create a blast radius, is optimal for individual targeting. 

According to the WSJ, the CIA began development of the missile in 2011 for close proximity “war on terror” targeted assassinations  also as a way to protect non-combatants who might be used as human shields, as terrorists tend to embed themselves within urban civilian populations.

The WSJ described the newly revealed weapon further as follows:

To the targeted person, it is as if a speeding anvil fell from the sky, the officials said. But this variant of the Hellfire missile, designated as the R9X, also comes equipped with a different kind of payload: a halo of six long blades that are stowed inside and then deploy through the skin of the missile seconds before impact, shredding anything in its tracks.

One official noted in the report the R9X is “for the express purpose of reducing civilian casualties” — which has apparently worked the handful of times it’s been used on the battlefield.

Defense and intelligence officials cited by the WSJ revealed successful deployments in counter-terror operations in Libya, Iraq, Syria, Somalia, and Yemen.

https://www.zerohedge.com/s3/files/inline-images/Idlib%20cia%20assassination.png?itok=OxIjtJ7O

Via The Telegraph: “The missle did not even shatter the windhield of the car carryng Ahmad Hasan Abu Khayr al-Masri, al Qaeda’s former 2nd in command in Egypt.”

One of the confirmed uses of the R9X was in Syria on Feb 26, 2017 in Idlib, during the reported CIA assassination of al-Qaeda deputy leader Abu Al-Khayr al-Masri.

Analysts had been perplexed at the time as to the precision hole in the car’s roof yet without any clear trace of an explosive blast impact, and Masri was confirmed dead inside. 

Now it’s mystery solved: that’s right, the CIA took out a jihadist via a giant 6-bladed flying knife, apparently.

If US officials are now going public with this high tech yet somewhat medieval sounding slice-and-dice device, in an apparent attempt to assure the public it cares about civilian casualties, we only wonder what kind of “creative” killing machines still remain classified. 

Source: ZeroHedge

Tucker Carlson Outlines Big Tech’s Moves To Control Political Speech…

Tucker Carlson discusses the scale and scope of Big Tech’s latest efforts to silence voices they define as against their interests.

Things are going to get a lot worse, a lot worse, in the days and months ahead.

In the final analysis, the big picture is about authoritarian control. Currently the largest tech companies are leveraging their power and influence to remove dissenting voices from commonly used social media platforms. Back in 2015 there was a prescient discussion between Matt Drudge and Alex Jones where this exact scenario was outlined.

https://theconservativetreehouse.files.wordpress.com/2015/11/benjamin-franklin-on-freedom-of-speech.jpg

Unfortunately, federal political leadership is aligned with Big Tech’s goals and opinions. This is one of the issues where the UniParty becomes most visible. There is a history of similar common cause that might provide reference.

In 2010 when the Tea Party was targeted by President Obama’s Attorney General, Eric Holder, the DOJ and IRS worked together to create the target list of voices they deemed adverse to their political interests. Because the establishment republican party was also a target of the Tea Party, the GOP and DNC viewed the Tea Party political rebellion as a common enemy. In 2019 and 2020 the same dynamic exists.

Populists, ordinary freedom loving Americans, are considered an enemy of the statists; adverse to the interests of the institutionalists. As a result DC politicians have no motive to confront Big Tech and their goals to silence voices based on inherent political views.

https://theconservativetreehouse.files.wordpress.com/2013/12/bumper-sticker-politics.jpg

Source: by Sundance | The Conservative Tree House