Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

CIA money behind Wi-Fi Positioning System (WPS)
Qbit.cc ^ | 2 September 2010 | qbit

Posted on 09/06/2010 6:32:19 AM PDT by ShadowAce

How amazing would it be if you could walk into McTaco King and order that mid-morning bacon taco meal with Mountain Dew Big Gulp from your mobile device?  Just imagine… as you approach the restaurant, a menu pops up on your screen, the phone makes suggestions and helps you super-size your order, before you even set foot in the restaurant!

Is there anything the IPad won't do?

This advertiser’s wet dream is about to become reality, thanks to WPS (Wi-Fi Positioning System) infrastructure pioneered by CIA front company Skyhook (formerly Quarterscope) and currently being implemented by several other intelligence-connected companies, including Google, Apple, and Navizon (which is supplying data to Microsoft).

WPS geolocates wireless network devices using a database of known wireless access points, such as in coffee shops.  Since at least 2004, WPS companies like Skyhook and Google have been war-driving for access point data.  More about the technical aspects of this later.

How did you conclude that Skyhook is an intelligence front company?

Follow the money.

In 2008 former CIA director George Tenet became Managing Director of Allen & Company, an investment bank that provided funding for Skyhook’s WPS development and Google’s IPO (Initial Public Offering) in 2004, while he was still director of the CIA.

Skyhook was also funded by shadowy investment firm Alliance Capital.  Frank Savage, Alliance Capital’s former board chairman, also served on the board of Lockheed Martin and Enron. Alliance was Enron’s largest shareholder.

Regardless of where the seed money came from, you can now buy this WPS data commercially.  Intelligence agencies are putting a lot of effort into developing new tracking and identification technologies.  Once they turn these technologies loose on society, the corporations exploit them, resulting in even more personal data being exchanged on private networks, which intelligence agencies can snoop on at will with their NSA Internet vacuum cleaners.

What exactly is WPS and how does it work?

Nearly every modern network connected device (phone, computer network card, cable modem, wireless router, bluetooth headset, etc), has a unique number called a MAC address (Media Access Control, not Apple) built in.

Please note that even if a mobile device doesn’t obtain an IP address when connecting to wi-fi, merely conducting a normal SSID (Session ID) scan can result in exchanging MAC addresses with access points.  Wireless devices scan for access points automatically, if you leave the default settings, resulting in the mobile obtaining the MAC addres of the access point and potentially revealing its own MAC, depending on the type of scan.

MAC addresses are embedded in beacon frames, which are part of the hardware link between wireless devices.  Under exactly what circumstances would MAC address be transmitted by the mobile during a SSID scan, rather than scanning passively?  I don’t know, but we’ll put that idea on the back burner for now.

Here is the relevant thing you need to know about them: they are unique and can identify any network connected device, wired or wireless, bluetooth, 802.11, etc.  The good news is you can change a device’s MAC address.†  The bad news is, that doesn’t really matter because that new number can be immediately correlated with your voice print and other biometric signatures in realtime by the mobile device (see Iphone trojan link below)

WPS is not generally used alone for geolocation. Hybrid systems including GPS and cell triangulation are more commonly used to geolocate. the advantage of adding WPS is that you can be located anywhere there’s a known wi-fi, such as inside buildings. and you can be triangulated more accurately than cell + GPS using a large number of access points.  How often have you been in an urban setting and seen 10 or 20 or more access points in the list?  If the exact location of those access points are known, they can all be used together to triangulate the mobile more precisely.

So my phone trades MAC addresses with a restaurant’s Wi-Fi. They show me the daily specials.   Aren’t there potential benefits to something like this?

Yes, there are many potential benefits to advertisers, law enforcement, and intelligence agencies who want to track masses of people.  WPS is going to dovetail beautifully with the NSA’s Main Core and Apple’s new biometric Iphone trojan.

The only potential benefit to you is that you will not have to speak to the person behind the counter and your latté will be ready faster.

Intelligence agencies and DARPA are creating an AI surveillance cloud right before our eyes.  Don’t think that because you don’t have an Iphone means the 3 people sitting around you haven’t had their trojans activated to identify your voice print and snoop on your conversation.

We already know how this ends.  You better not be reading qbit.cc either or you’re going on their s*** list!

But why is it that on Apple OSX 10.4 you can’t change the MAC address of your wireless card even as root?  It simply fails with no error and keeps the original MAC address.  I will find the answer to this question.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: wifi; wps
Navigation: use the links below to view more comments.
first previous 1-2021-37 last
To: paulycy

This behavior is nothing new for these agencies — they’ve been doing it all along, only gaining access through the internet providers. Now the ISP’s are pretty much cut out of the picture, along with, all the legal entanglements associated with gaining access through them, as well as, less need for gag orders on the companies.


21 posted on 09/06/2010 7:43:17 AM PDT by TiaS
[ Post Reply | Private Reply | To 4 | View Replies]

To: raybbr
"...information can be collected and, quite possibly, used against you in the future..."

OK, fair enough, all new kinds of info gathering will have good as well as bad possible uses, just as we always should be aware that bad things are possible when ever good things happen.

The bottom line here is that planning for success is better than planning for failure.

22 posted on 09/06/2010 7:44:14 AM PDT by expat_panama
[ Post Reply | Private Reply | To 17 | View Replies]

To: 6SJ7

What are burners?


23 posted on 09/06/2010 8:09:13 AM PDT by Jack Hydrazine (It's the end of the world as we know it and I feel fine!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: raybbr
Okay, don't try anymore then.

The concept of "privacy" seems to elude most people these days doesn't it?

24 posted on 09/06/2010 8:11:06 AM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 20 | View Replies]

To: ShadowAce
The concept of "privacy" seems to elude most people these days doesn't it?

This is one of those "damned if you - damned if you don't" situations. People want the technology but along with that comes the type of tracking referred to in this article. Not sure how you would get around it if you wanted the tech.

Demanding that all producers give you complete privacy, no tracking and unlimited access just ain't gonna happen.

The best thing to do is to educate yourself about what you are doing on the 'net and do the best you can. Limit what you do to the things you absolutely need and forget the rest.

The thing that bothers me is the my son's third grade teacher puts all her stuff on the web. Expecting third graders to rely on the web is too much.

25 posted on 09/06/2010 8:17:29 AM PDT by raybbr (Someone who invades another country is NOT an immigrant - illegal or otherwise.)
[ Post Reply | Private Reply | To 24 | View Replies]

To: expat_panama

This sort of stuff makes me want to throw my cell phone against a wall and revert back to 1980’s technology. But then how would a freep?


26 posted on 09/06/2010 8:48:17 AM PDT by goseminoles
[ Post Reply | Private Reply | To 18 | View Replies]

To: ShadowAce

Thanks for the ping.


27 posted on 09/06/2010 8:56:06 AM PDT by GOPJ (BE the change you wish to see.... Gandhi)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce
ıʇɐuıɯnllı ɥǝʇ ʎq noʎ oʇ ʇɥƃnoɹq ǝƃɐssǝɯ ʇǝɹɔǝs sıɥʇ
28 posted on 09/06/2010 9:06:09 AM PDT by martin_fierro (< |:)~)
[ Post Reply | Private Reply | To 1 | View Replies]

To: goseminoles

bingo!


29 posted on 09/06/2010 9:07:04 AM PDT by expat_panama
[ Post Reply | Private Reply | To 26 | View Replies]

To: La Lydia
And, this is a threat to my freedom and happiness how?

It's not a threat to your freedom ... now. These systems are meant to target terrorists types. And that's not you... now. But project yourself into an America that's gone totalitarian. Trains are running to camps... You might be the target.

The systems that protect us in our day, can be switched and used against us... and that's the fear.

30 posted on 09/06/2010 9:31:52 AM PDT by GOPJ (BE the change you wish to see.... Gandhi)
[ Post Reply | Private Reply | To 16 | View Replies]

To: GOPJ

So we better give up our telephones, too? How about our cars? Our TVs? All travel is out, I guess?


31 posted on 09/06/2010 9:33:53 AM PDT by La Lydia
[ Post Reply | Private Reply | To 30 | View Replies]

To: 6SJ7

Google maps is also gathering wi-fi addresses as it drives around taking pictures.

It could well be that in a few decades, it will be impossible to be anonymous while out in public. It will probably also be possible to infer where and what a person is going to be doing at any one time. If they deviate (ala THX 1138) it will be taken as de-facto proof of probable cause for detention.


32 posted on 09/06/2010 10:01:01 AM PDT by glorgau
[ Post Reply | Private Reply | To 9 | View Replies]

To: raybbr
Can't they just look at the Caller ID?

Caller ID can be spoofed. Think of the number showing up on your handset as something from Wikipedia - it could well be true.

33 posted on 09/06/2010 10:07:01 AM PDT by glorgau
[ Post Reply | Private Reply | To 12 | View Replies]

To: La Lydia
No, we don't need to ‘give up’ anything. Just live your life - be aware what your ‘connections’ would mean if the country went totalitarian.

Years ago some calls were made to and from my home to people who lived in the ME (Iran, UAE etc) (long story) - and 5 different friends ( who didn't know each other) told me separately that my phone calls would be recorded for a minimum of 4 years... ( Not that anyone would actually listen to them - just that they would be recorded... ) It didn't effect any phone conversations in our home.

Information is a good thing. Enjoy the fact you know the score ... no need to change anything. Today, the listeners are trying to protect us - and that's a good thing.

34 posted on 09/06/2010 10:55:58 AM PDT by GOPJ (BE the change you wish to see.... Gandhi)
[ Post Reply | Private Reply | To 31 | View Replies]

To: La Lydia
Why in the world would they want to know where I go?

Once you're a convicted, or even merely accused, offender they're going to track you very closely.

And if you're in one of the "special" categories (sex offender, domestic violence, DUI, FReeper, etc) they'll make your location available online along with your photo, license plate and other identification. You can run but you can't hide -- you can freely be "off"ed.

35 posted on 09/06/2010 11:41:02 AM PDT by Clint Williams ( America -- a great idea, didn't last.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Jack Hydrazine
What are burners?

It's a slang term for disposable prepaid cell phones that drug traffickers like to use to avoid tracing their calls. You use them once and then toss (burn) them. (Everything I learned about drug trafficking I learned from watching the HBO series "The Wire".)

36 posted on 09/06/2010 12:29:36 PM PDT by 6SJ7 (atlasShruggedInd = TRUE)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Ann Archy
George Tenet was the Managing Director of Allen and Co. WHILE HE WAS HEAD OF THE CIA???????? REALLY?? I CAN”T BELIEVE THAT!!!

Try reading the sentence again, not that it's well worded.

Allen and Co. was part of the financing for Google's IPO in 2004. Not that it's like Google succeeded only because Allen subsidized it. In 2004 Google had its pick of companies to work with.

Then in 2008 the retired Tenet went to work for Allen.

What's missing, of course, is anything resembling evidence that Tenet or the CIA had anything whatsoever to do with the Google IPO in 2004. Or that Google needed any such assistance.

Actually, I wish I could believe the CIA was as omniscient and omnipotent as these types of articles portray. In fact, the evidence is they're largely the gang that couldn't shoot straight.

37 posted on 09/06/2010 1:12:17 PM PDT by Sherman Logan
[ Post Reply | Private Reply | To 8 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-37 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson