It’s not Just your Phone Calls – it’s YOU they are Listening to

Email Print
FacebookTwitterShare

You, like most Americans, are friendly and like to mind your own business. You have 2.3 kids, a mortgage, and a loving spouse.

But, this is the 21st Century. A grand era of technology. Buck Rogers and H.G. Wells would be so proud of our technological advancements.

But so would Stalin, Mao and Hitler. The NSA’s recently leaked shopping catalog is chilling and would “harsh the mellow” of any regular Joe.

Let’s start with you.

You have a phone that you call home with. The NSA can listen in to your phone using PICASSO. It knows your phone book, your recent calls, where you’ve been, your PIN numbers that you’ve used, and can block your calls. Like if you’re being chased by black SUV’s and you want to call 911 – tough luck, they’ve shut down your phone.

But the REAL interesting part of the PICASSO- it can collect LIVE AUDIO from the phone. Are you carrying on a great conversation about how much you think Obamacare is a scam? Your political dissent can now be recorded in real time and documented.

MONKEYCALENDAR can remotely send your previous locations via text message to the NSA.

The Apple iPhone isn’t even safe. DROPOUTJEEP is a software implant that can pull files, photos, address book, listen in on your conversations, capture images with the camera, and tell them your exact location – all being sent covertly through the SMS system.

CANDYGRAM should be called FAKEOUT because it mimics a cell tower.  At 40,000 bucks a unit, it has been designed to be remotely erased in case it cannot be recovered.

How about your computer? We all know of PRISM and the other anagrams. Even your old computer isn’t safe.

SWAP and DEITYBOUNCE can be uploaded to Windows, LINUX, FreeBSD, or Solaris systems by the ARKSTREAM system to re-flash your computer’s BIOS to upload software via TWISTEDKILT to drop a payload. In other words, they can put files on your computer that you didn’t put on their, like child porn.

IRATEMONK alters your hard drive firmware and gains control of the Master Boot Record.

And the big guys aren’t immune from the NSA keyhole-peeking approach. Products such HEADWATER and HALLUXWATER are actually designed to defeat Huawei Eudeomon firewall servers and give the NSA a backdoor to many European and Asian companies. Don’t worry Cisco firewall owners, the JETPLOW can probably be found on your units.

TOTEGHOSTLY is designed for Windows Mobile PDA’s to do the same function as PICASSO and DROPOUTJEEP, including listening to conversations and taking photos.

Even old computers aren’t safe.  The Windows XP system has been compromised by SOMBERKNAVE, that helps VALIDATOR “calls home” and deliver the data to the NSA agent.

And this is nothing more than Tyranny, aided by the very manufacturers that expect you to trust them. Dell, Microsoft, and so many others have been in cahoots with the NSA since day one.

There is no room for individualism in this world. The government is everywhere, they see and hear everything and they control everything that isn’t human. They observe and report your actions, your thoughts, your feelings and emotions . You might think you and your family are succeeding in a small rebellion for a short while, but eventually it catches up with you. You realize they knew all along, they are already working against you and at the end of the day, they will kill every subversive thought you may or will have. There is not a chance to be an individual in this dictatorship. They will get you. They always get you. And eventually, they get to you.

Reprinted with permission from The Daily Sheeple.

Email Print
FacebookTwitterShare
  • LRC Blog

  • LRC Podcasts