Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Homeland Security finds evidence of sophisticated surveillance NEAR THE WHITE HOUSE
UK Daily Mail ^ | June 1, 2018 | By Keith Griffith

Posted on 06/01/2018 8:01:10 PM PDT by Fitzy_888

Tests found evidence of 'StingRay' cell phone data collectors operating near the White House, it has been revealed.

The tests conducted last year found signals consistent with technology that spoofs cell phone data towers to collect mobile data, according to a Department of Homeland Security letter released on Friday.

(...)

(Excerpt) Read more at google.com ...


TOPICS: Crime/Corruption; Government; News/Current Events; Politics/Elections
KEYWORDS: fbi; mueller; spygate; trump
Navigation: use the links below to view more comments.
first 1-2021-28 next last
FULL TITLE: Homeland Security finds evidence of sophisticated surveillance equipment that can intercept cell phones NEAR THE WHITE HOUSE
1 posted on 06/01/2018 8:01:11 PM PDT by Fitzy_888
[ Post Reply | Private Reply | View Replies]

To: Fitzy_888

Related...

http://freerepublic.com/focus/f-news/3659859/posts

http://freerepublic.com/focus/f-news/3659881/posts


2 posted on 06/01/2018 8:04:21 PM PDT by ButThreeLeftsDo (MAGA/KAG!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fitzy_888

Question: Was the data logging equipment widen within the standard equipment at a cell tower site or (seems less likely) some stand alone setup possibly with a directional antenna pointed directly at the White House?


3 posted on 06/01/2018 8:06:26 PM PDT by Fitzy_888 ("ownership society")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fitzy_888

Hmmmm


4 posted on 06/01/2018 8:09:17 PM PDT by dragnet2 (Diversion and evasion are tools of deceit)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fitzy_888

I sure hope Homeland Security isn’t filled with Trump hating globalist willing to undermine, compromise and criminally setup and frame the President of the United States. How closely do the work with the FBI?


5 posted on 06/01/2018 8:13:02 PM PDT by dragnet2 (Diversion and evasion are tools of deceit)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fitzy_888

How far away is the Obama-Jarrett compound from the White House?


6 posted on 06/01/2018 8:31:16 PM PDT by capydick (“Within the covers of the Bible are the answers for all the problems men face.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fitzy_888

There is ANOTHER smaller, parasitic COUNTRY inside of the USA, which secretly RULES us.

The ISIS concept force us to consider that there are non-country actors in the world which function a lot like states.

Blackwater did something similar —near armies can be raised privately.

We already were familiar with military/political occupation of the FORMAL variety.

This new Deep State concept is also new: SECRET OCCUPATION. The concept seems silly or ridiculous, but that may be what we have in the here and now.

There seems to be some entity ABOVE the US President; they have their own personel, funding, norms and customs.


7 posted on 06/01/2018 8:32:11 PM PDT by gaijin
[ Post Reply | Private Reply | To 1 | View Replies]

To: gaijin

8 posted on 06/01/2018 8:33:28 PM PDT by gaijin
[ Post Reply | Private Reply | To 7 | View Replies]

To: Fitzy_888

CIA? NSA?


9 posted on 06/01/2018 8:53:06 PM PDT by Seruzawa (TANSTAAFL!w)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fitzy_888

Im justgoing to come out and say right now, obama/hillary/dnc.


10 posted on 06/01/2018 8:55:19 PM PDT by Secret Agent Man ( Gone Galt; Not averse to Going Bronson.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fitzy_888
Tests found evidence of 'StingRay' cell phone data collectors operating near the White House, it has been revealed.

That's not sophisticated at all. It's been around for years, and any schlub with a sufficient wealth can drive around the country with one in their vehicle and slurp up all kinds of juicy information.

Basically, now that everyone knows we live in a Surveillance State which archives and transcripts every single cell call and text of every single smartphone in the country, a person has to be a friggin' moron if they think they can have a truly private conversation, in any form, using one—unless they're using strong encryption for both voice and text. And that still leaves voluminous meta-data that can be exploited!

What everyone needs to do—and I am one of the idiots who hasn't done it yet, even though I'm an IT professional—is download and start using encrypted communication apps.

A skeptic might say "Hey if you start using that they'll know you're up to something". Well, guess what? If you are up to something and use unencrypted comm—or, say, if you simply would like to actually have something resembling a private conversation, to avoid things like blackmail or being targeted for crime—then you must start using encryption. Why? Because if you aren't using encryption, the government already knows—or has the ability to know with trivial effort—every piece of private information which you reveal in either text or voice calls on your smartphone. Anyone who thinks that anything short of that is happening is profoundly naive, or in total denial.

Once configured—and once you convince your friends and family to join you in reclaiming their privacy—encryption generally becomes completely transparent, and functions identically to the non-encrypted apps with respect to both voice and text communications.

Finally, once enough people start doing this, the government won't know what the f-ck is going on with private citizens—and that's a good thing. It'll have to actually get a search warrant based on probable cause in order to even begin to try to start snooping. Preventing—or at least attempting to prevent—both government and private snooping is completely consistent with the exercise of Fourth Amendment Rights and the fierce defense thereof, and anyone who thinks otherwise fundamentally misunderstands Individual Liberty.

Sometimes preserving Liberty can be a bit inconvenient—and every intrusive, potentially Tyrannical government lives for situations like that.

Pause for a moment to think how many Congressmen, etc. are being extorted by the Deep State, simply because it has archived everything every one of them has said or texted on a phone—along with much more—for, say, at least the last decade!

And we wonder why so many supposedly "Patriotic" Congressmen suddenly flip and do totally inexplicable things—things which coincidentally always seem to support the agenda of the Globalist Establishment, Deep State, and DC Swamp? The answer in many cases is that they've been totally compromised by virtue of their desire to have some sort of damaging information not be used to destroy them.

If we don't begin to turn the tide in bona fide ways regarding rampant Fourth Amendment abuses by all levels and branches of government—as well as countless private citizens with potential criminal intent—we are done for, and we'll become either victims of such criminals, or Rightless, de facto Slaves of the Totalitarian State, just like all of Europe submissive peons are even further down the road to becoming...

11 posted on 06/01/2018 9:19:02 PM PDT by sargon ("If the President doesn't drain the Swamp, the Swamp will drain the President.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fitzy_888

Remember when cell phones first came out

Used frequency in high end of UHF band - old style TV sets
could tune in

Would go to high end of dial (above channel 68) and listen in

Heard some really juicy stuff ……….


12 posted on 06/01/2018 9:43:26 PM PDT by njslim
[ Post Reply | Private Reply | To 1 | View Replies]

To: Fitzy_888

I knew this in my gut before and after Trump took office.


13 posted on 06/01/2018 9:56:32 PM PDT by Crucial
[ Post Reply | Private Reply | To 1 | View Replies]

To: sargon
Was in a car driving by the White House ten years ago. Younger person in the car was texting a friend and describing snipers on the roof of the White House, and expressing their disdain for the president. Suddenly, the cell phone began to act very strangely, as though information was being taken right off the phone. When we got to the Regan National airport, a security person came up to that young person and scanned them for explosives. No one else with them, and they selected that person individually while they were standing in the security line. Strange.
14 posted on 06/01/2018 10:04:30 PM PDT by binreadin
[ Post Reply | Private Reply | To 11 | View Replies]

To: sargon

No doubt our intelligence orgs are involved. Think of all the senators and house members being monitored.


15 posted on 06/01/2018 10:17:30 PM PDT by Fhios (1980's Where's Waldo, 2018 where's sessions)
[ Post Reply | Private Reply | To 11 | View Replies]

To: sargon

That might have worked, except that every thing is captured prior to encryption.


16 posted on 06/01/2018 10:21:10 PM PDT by CJ Wolf (Chim chim er ree)
[ Post Reply | Private Reply | To 11 | View Replies]

To: dragnet2

Now you have me curious about Homeland’s enforcement reach, and what exactly it surveils and enforces.


17 posted on 06/01/2018 10:47:30 PM PDT by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Fitzy_888

Wasn’t one of BOs first acts a pResident to change the entire phone system of the White House?

Would be interested to see what is ‘hidden’ in the walls and rafters etc.

Wasn’t there a similar ‘problem’ with the renovated Embassy in Russia back in the 80s or so where they need hundreds of exterminating teams to ‘debug’ the building?

Of course, we would NEVER do anything like that or interfere in another countries elections.....(Barf Bag Please)


18 posted on 06/01/2018 11:07:07 PM PDT by xrmusn ((6/98)""If bacon kills you and smoking kills you, How come you smoke bacon to cure it?")
[ Post Reply | Private Reply | To 1 | View Replies]

To: CJ Wolf
[Voice and text] might have worked, except that every thing is captured prior to encryption.

Nonsense. Howso? That would only be possible if malicious code was included in supporting software or the encryption software itself—or if there was an audio (and possibly digita?>) eavesdropping device within appropriate range of the physical location of both people communicating.

All software at every level of the smartphone's functionality would have to be audited and verified as not containing any malicious code. Any software in the encryption chain whose source code wasn't available for compilation would need to have its object code exhaustively reviewed—including all ROM's, EPROMS, and all other hardware-resident routines.

I'm doubtful that every instance of every smartphone must be compromised in this manner. Probably only 90%. Certainly theoretically a smartphone could be configured, with the entire software chain at all layers—from the hardware on up—in such a way that it didn't include any of this malicious code that you're apparently suggesting is ubiquitous...

19 posted on 06/01/2018 11:35:44 PM PDT by sargon ("If the President doesn't drain the Swamp, the Swamp will drain the President.")
[ Post Reply | Private Reply | To 16 | View Replies]

To: sargon

Not nonsense. Think keylogger. As it is entered or spoken it is captured prior to encryption.


20 posted on 06/02/2018 4:53:06 AM PDT by CJ Wolf (Chim chim er ree)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-28 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson