Posted on 06/01/2018 8:01:10 PM PDT by Fitzy_888
Tests found evidence of 'StingRay' cell phone data collectors operating near the White House, it has been revealed.
The tests conducted last year found signals consistent with technology that spoofs cell phone data towers to collect mobile data, according to a Department of Homeland Security letter released on Friday.
(...)
(Excerpt) Read more at google.com ...
Related...
http://freerepublic.com/focus/f-news/3659859/posts
http://freerepublic.com/focus/f-news/3659881/posts
Question: Was the data logging equipment widen within the standard equipment at a cell tower site or (seems less likely) some stand alone setup possibly with a directional antenna pointed directly at the White House?
Hmmmm
I sure hope Homeland Security isn’t filled with Trump hating globalist willing to undermine, compromise and criminally setup and frame the President of the United States. How closely do the work with the FBI?
How far away is the Obama-Jarrett compound from the White House?
There is ANOTHER smaller, parasitic COUNTRY inside of the USA, which secretly RULES us.
The ISIS concept force us to consider that there are non-country actors in the world which function a lot like states.
Blackwater did something similar —near armies can be raised privately.
We already were familiar with military/political occupation of the FORMAL variety.
This new Deep State concept is also new: SECRET OCCUPATION. The concept seems silly or ridiculous, but that may be what we have in the here and now.
There seems to be some entity ABOVE the US President; they have their own personel, funding, norms and customs.
CIA? NSA?
Im justgoing to come out and say right now, obama/hillary/dnc.
That's not sophisticated at all. It's been around for years, and any schlub with a sufficient wealth can drive around the country with one in their vehicle and slurp up all kinds of juicy information.
Basically, now that everyone knows we live in a Surveillance State which archives and transcripts every single cell call and text of every single smartphone in the country, a person has to be a friggin' moron if they think they can have a truly private conversation, in any form, using one—unless they're using strong encryption for both voice and text. And that still leaves voluminous meta-data that can be exploited!
What everyone needs to do—and I am one of the idiots who hasn't done it yet, even though I'm an IT professional—is download and start using encrypted communication apps.
A skeptic might say "Hey if you start using that they'll know you're up to something". Well, guess what? If you are up to something and use unencrypted comm—or, say, if you simply would like to actually have something resembling a private conversation, to avoid things like blackmail or being targeted for crime—then you must start using encryption. Why? Because if you aren't using encryption, the government already knows—or has the ability to know with trivial effort—every piece of private information which you reveal in either text or voice calls on your smartphone. Anyone who thinks that anything short of that is happening is profoundly naive, or in total denial.
Once configured—and once you convince your friends and family to join you in reclaiming their privacy—encryption generally becomes completely transparent, and functions identically to the non-encrypted apps with respect to both voice and text communications.
Finally, once enough people start doing this, the government won't know what the f-ck is going on with private citizens—and that's a good thing. It'll have to actually get a search warrant based on probable cause in order to even begin to try to start snooping. Preventing—or at least attempting to prevent—both government and private snooping is completely consistent with the exercise of Fourth Amendment Rights and the fierce defense thereof, and anyone who thinks otherwise fundamentally misunderstands Individual Liberty.
Sometimes preserving Liberty can be a bit inconvenient—and every intrusive, potentially Tyrannical government lives for situations like that.
Pause for a moment to think how many Congressmen, etc. are being extorted by the Deep State, simply because it has archived everything every one of them has said or texted on a phone—along with much more—for, say, at least the last decade!
And we wonder why so many supposedly "Patriotic" Congressmen suddenly flip and do totally inexplicable things—things which coincidentally always seem to support the agenda of the Globalist Establishment, Deep State, and DC Swamp? The answer in many cases is that they've been totally compromised by virtue of their desire to have some sort of damaging information not be used to destroy them.
If we don't begin to turn the tide in bona fide ways regarding rampant Fourth Amendment abuses by all levels and branches of government—as well as countless private citizens with potential criminal intent—we are done for, and we'll become either victims of such criminals, or Rightless, de facto Slaves of the Totalitarian State, just like all of Europe submissive peons are even further down the road to becoming...
Remember when cell phones first came out
Used frequency in high end of UHF band - old style TV sets
could tune in
Would go to high end of dial (above channel 68) and listen in
Heard some really juicy stuff .
I knew this in my gut before and after Trump took office.
No doubt our intelligence orgs are involved. Think of all the senators and house members being monitored.
That might have worked, except that every thing is captured prior to encryption.
Now you have me curious about Homeland’s enforcement reach, and what exactly it surveils and enforces.
Wasn’t one of BOs first acts a pResident to change the entire phone system of the White House?
Would be interested to see what is ‘hidden’ in the walls and rafters etc.
Wasn’t there a similar ‘problem’ with the renovated Embassy in Russia back in the 80s or so where they need hundreds of exterminating teams to ‘debug’ the building?
Of course, we would NEVER do anything like that or interfere in another countries elections.....(Barf Bag Please)
Nonsense. Howso? That would only be possible if malicious code was included in supporting software or the encryption software itself—or if there was an audio (and possibly digita?>) eavesdropping device within appropriate range of the physical location of both people communicating.
All software at every level of the smartphone's functionality would have to be audited and verified as not containing any malicious code. Any software in the encryption chain whose source code wasn't available for compilation would need to have its object code exhaustively reviewed—including all ROM's, EPROMS, and all other hardware-resident routines.
I'm doubtful that every instance of every smartphone must be compromised in this manner. Probably only 90%. Certainly theoretically a smartphone could be configured, with the entire software chain at all layers—from the hardware on up—in such a way that it didn't include any of this malicious code that you're apparently suggesting is ubiquitous...
Not nonsense. Think keylogger. As it is entered or spoken it is captured prior to encryption.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.