Tuesday, June 12, 2018

PHONES LISTENING TO US

TARGETS HAVE KNOWN THIS FOR DECADES.

Conspiracy Theory Confirmed: Researcher Shows How Phone Shows Ads Based on Conversations It Hears

For years, smartphone users have been growing increasingly suspicious that their devices are listening to them to feed them advertisements and to “enhance their experience” on third-party apps. Companies like Google and Facebook have consistently denied these claims, saying that targeted ads and messages are merely a coincidence, and that data for these services are taken in other ways.
However, earlier this year during the Cambridge Analytica scandal we began to see some of the first hints that our phones may actually be listening to us.
Cambridge Analytica whistleblower Christopher Wylie says that they have probably been listening all along. During an appearance before the UK parliament, Wylie said, “There’s audio that could be useful just in terms of, are you in an office environment, are you outside, are you watching TV, what are you doing right now?”
Since the scandal, experts who have studied this possibility began revealing their surprising results.
In a recent interview with VICE, Dr. Peter Hannay, the senior security consultant for the cybersecurity firm Asterisk, explained how third-party apps exploit a loophole to gather the voice data from your phone.
Hannay said that while your microphone is always on, your voice data is only sent out to other parties if you say specific trigger words such as “Hey Siri” or “OK Google,” but there is a catch. Third-party apps often ask to gain access to voice data in their user agreements to “enhance the experience” of their products.
“From time to time, snippets of audio do go back to [other apps like Facebook’s] servers but there’s no official understanding what the triggers for that are. Whether it’s timing or location-based or usage of certain functions, [apps] are certainly pulling those microphone permissions and using those periodically. All the internals of the applications send this data in encrypted form, so it’s very difficult to define the exact trigger,” Hannay said.
While this process is becoming more obvious by the day, many tech companies continue to deny that they are engaged with this practice, and since all of the outgoing information is encrypted there is no way of telling exactly which information they are getting and how they are using it.
“Seeing Google are open about it, I would personally assume the other companies are doing the same. Really, there’s no reason they wouldn’t be. It makes good sense from a marketing standpoint, and their end-user agreements and the law both allow it, so I would assume they’re doing it, but there’s no way to be sure,” Hannay said.
VICE reporters then conducted their own experiment, saying random phrases into their phones and then seeing advertisements affiliated with those terms pop up in their news feeds. You can try this experiment at home yourself, and it is highly likely that you have experienced results like this by accident.
In April, I experienced something like this when a friend visited my house from the West Coast. I picked him up from the Baltimore-Washington airport and during a conversation about his flight, he told me that he had a layover in Charlotte, North Carolina, and mentioned that they had a nice airport.
The following morning I woke up with these messages on my phone:
Oddly enough, I have never been to Charlotte, North Carolina, never really thought about the place, and have never typed anything about that place into Google or Facebook. But, sure enough, after having a conversation about the airport in Charlotte, my phone thought I was interested.
As of right now, there is no way to avoid this spying, aside from being extremely careful about the apps that you sign up for, and actually reading their user agreements—or getting rid of your cell phone altogether, which could be counterproductive if you use it for business.
John Vibes is an author and researcher who organizes a number of large events including the Free Your Mind Conference. He also has a publishing company where he offers a censorship free platform for both fiction and non-fiction writers. You can contact him and stay connected to his work at his Facebook page.John just won a 3-year-long battle with cancer, and will be working to help others through his experience, if you wish to contribute to his treatments consider subscribing to his podcast to support . This article first appeared at The Free Thought Project.

ACTIVIST POST DAILY NEWSLETTER

Subscription is FREE and CONFIDENTIAL
Free Report: How To Survive The Job Automation Apocalypse with subscription

Monday, June 11, 2018

anchoring

  • Hi Barbara, Frank, Venetta, Ashli -
  • Below is a random comment from an anonymous source, which I found several years ago in the comment section of an older blog written by Lynnae Williams, a young, promising DIA and CIA employee.  According to this Daily Beast article, "Lynnae Williams: The CIA Spy Who Tweets": 


  • "Williams’s main grievance with the agency revolves around her termination. Williams says that as a trainee in the agency’s national clandestine service, she was sent to Dominion Hospital, a public mental-health facility in northern Virginia."


  • After getting out of the hospital and then leaving the CIA, Lynnae began getting stalked by groups of men who looked like former college and NFL football players, whom Lynnae believed wereF.B.I. agents. (And I think she was right, as I saw many photos of them around her, all over the place, in her older blog.)  I didn't look too hard, but I couldn't find Lynnae's older blog.

  • This comment describes the theoretical underpinnings of our harassment protocol(s) and how FBI's InfraGard, DHS's Citizen Corps, and local neighborhood watches could be mobilized—with Multi-Jurisdictional Task Forces also helping to coordinate intelligence agencies, branches of the military, joint terrorism task forces (JTTFs), state and local law enforcement, private security/defense contractors, local private investigators, and private companies—with all of these 'entities' getting marching orders ultimately originating from the approximately 80 State Data Fusion Centers.  
  • Information on Program from an Anonymous source 

  • For folks who are interested in this subject, the strategy is actually kind of cool. Any successful implementation relies on three key factors. One linchpin, excuse the pun, is an old form of Japanese torture -- death by a thousand cuts. The second key component is plausible deniability. The third is an effect that is known by many names in the psychological literature -- grounding, stimulus /response, anchoring, where the idea is to associate an otherwise innocuous auditory or visual stimulus with stress. [NLP - Neuro-Linguistic Programming] 
  • Stress triggers a release of a hormone called cortisol, which is associated with the fight or flight reaction. It is an evolutionary mechanism that kicks in as a sort of last resort. Studies on rats and mice indicate that chronic stress, however, is detrimental to higher level cognitive function. The response bypasses the neocortex, and the release of cortisol enhances the creation of memories of short term emotional events, raises blood pressure, and has some interesting anti-inflammatory effects. 

  • noun (plural neocortices | -ˈkôrtiËŒsÄ“z | Anatomy
  • a part of the cerebral cortex concerned with sight and hearing in mammals, regarded as the most recently evolved part of the      
  • cortex.

  • Long term exposure to cortisol, damages nerve cells in the hippocampus, the elongated ridges on the floor of each lateral ventricle of the brain, thought to be the center of emotion, memory, and the autonomic nervous system. resulting in impaired learning and memory retrieval of already stored information. The cumulative effect is to try to effect a psychological condition that is often referred to as PTSD. The short term goal is to try to make the subject paranoid both to discredit her in the eyes of the public and more importantly undermine personal sense of center. 
  • As with enhanced interrogation, the tactics all rely on bombarding the subject with stimuli that he or she can't process, and at the same time, to limit normal stimuli and modes of activity. 
  • Of course, knowing that stress can affect long term damage is not enough. From an implementation perspective in a relatively open democratic society with laws against most obvious types of harassment, it is much more difficult to pull this off than in, say Soviet Russia. This is where the 'death by a thousand cuts' strategy comes into play. The goal is to expose the subject to a constant barrage of small nuisances that individually are perfectly legal and bearable, but over longer periods of times amount to psychological intimidation. Each of these smaller nuisances can be as something trivial as tailgating the subject, shouting at the subject for no apparent reason -- and other various forms of street theater. 
  • The beauty of this is: 

  • 1. Most of these nuisances can be easily executed in a manner suitable to plausible deniability.
    2. If the subject actually tries to relate what is happening to her on an ongoing basis -- she will be deemed paranoid, delusional, schizophrenic, etc. 
  • The logistics for such an information operation appear prohibitively expensive at first blush. One should think it pretty expensive to hire a group of goons who keep stalking the subject for a prolonged period of time. In practice, it is actually not that difficult. 

  • For one, the strategy is to rely on an army of useful idiots – each of whom is told a suitably nasty story about the subject – and is told to keep their eyes open. Second -- as with supply chain management the implementation can be outsourced and automatized through some pretty simple software solutions. Again, one balks at the logistics of tracking the subject. In practice, the subject has helped the information operator solve that problem by carrying a cellphone in her pocket. 
  • The overall implementation will then look as follows. Using a variety of means -- gain access to cellphone/tower communication for the subject. Write a simple app that keeps track of a few dozen do-gooders who are either paid for this or provide their services for free, and the location of a subject. Every time that the subject comes within a radius of a mile or two of the operator, the server sends a message to the 'good Samaritan' with a picture of the subject and a choice of customized/personalized strategies for annoying the subject. Upon successful completion, the good Samaritan is able to submit feedback through his cellphone app back to the hq. Each couple of days/weeks a specialist back in hq sifts through the feedback and comes up with new personalized handling approaches which are put into the system. 
  • Voila. 
  • By virtue of crowd-sourcing, a bit of disinformation, and off-the-shelf cellphone tracking solutions you have yourself a pretty effective 'cocoa puff,' or 'psychic bunny' (an industry/IC term, actually) management solution that rivals the old school KGB, and that for a few hundred bucks tops maintenance per week. 


  • What is there not to like about the information revolution, folks? I am sure there are actually quite a few enterprising chaps in this game already. If anyone has any idea as to the ROI for such a business plan, I would really be interested in hearing from you. Also, if anyone is looking to hire developers to implement the game, please let yours truly know. Namaste.” [End of Comment]

  • Okay, that's it.  I did a little searching, but I couldn't find out what "cocoa puff," or "psychic bunny" meant, but I'd love to know.  I'll have to do some more serious digging.  Feel free to send this to whomever you think may like some of the insight.


  • I realize you all know a lot of the theory and the strategies already, but I like how the comment spells out the theory, strategies, and logistics:


  • Peace and 'V' (Victory) -

  • Patrick  C.
    ph: 336.763.5236


  • P.S.  My routine qualifier: I've proof-read this once after sending it to myself; so, while there may be a few grammar, spelling, punctuation mistakes, along with words added/omitted/changed, this email shouldn't contain many such errors, nor should large parts of the email be underlined, as my initial email sent to myself did not contain any of the text underlined, except for the links and a few key words I deliberately underlined.


patrick cleary 2

Hi Barbara, 

As I mentioned before, the scarcity of information about state data fusion centers--given the amount of money and the resources they are receiving, along with the participation of the military in fusion centers--should be something that the community is exploring, as it is a serious red flag.  

I also suspect that multijurisdictional task forces--which connect local, state and federal resources, supposedly for the "War on Drugs"--may also be a serious threat to our "Republic" and the rule of law, as they are a DoD project overseen by the the National Guard:

https://en.wikipedia.org/wiki/Multijurisdictional_Counterdrug_Task_Force_Training

Here's an article regarding the militarization of police and the great military toys they've been getting: 

"A Decade After 9/11, Police Departments Are Increasingly Militarized" by Radley Balko: 

https://www.huffingtonpost.com/2011/09/12/police-militarization-9-11-september-11_n_955508.html

I realize I'm not connecting all the dots.  But I've been getting hit with horrendous headaches, which come on instantaneously and are totally crippling.  When my next-door neighbors (the sex-trafficking, teenage-girl kidnappers) moved very abruptly and left most of their furniture, a young woman moved in within 24 hours.  She, of course, is a GSer.  

My home is being entered every time I leave it and seriously vandalized and property seriously damaged or stolen.  The new GSing neighbor-woman is about 8-10 feet from the chair I am sitting in right now (on the other side of my office's wall).  And with neighbors on both sides of my home participating in this abomination, I'm getting hammered from both sides. 

Here's the article about my next-door neighbor, just in case you never saw it: 

http://www.journalnow.com/news/crime/greensboro-man-charged-in-alamance-county-human-trafficking-case/article_0fd6b43a-229b-11e4-968b-001a4bcf6878.html

If you know any T.I.s who are good at researching, I'd strongly suggest looking at state data fusion centers, InfraGard, multijurisdictional task forces, and the militarization of local and state police.  It is not too late to highlight the parallels between our targeting with DEWs and the U.S. and Canadian Cuban embassies' staffers being attacked with 'directed energy.'  I've been disrupted, talked over, and even personally attacked far too often when I've tried to talk about Cuba, which is deeply troubling.  Far too many "T.I.s" want to talk about spiritual mumbo jumbo, rather than what's actually going on and objectives and strategies to expose and stop it.  Unfortunately, I can't download the program for Frank's online chat, without my computer going bonkers, which makes it hard to share specific articles on these issues. (I recognize it doesn't have anything to do with Frank, but it does stymie the flow of vital information.)

Hope you are relatively okay --

Patrick C.
ph: 336.763.5236


patrick cleary/fusion centers

Hi Barbara, 

As I mentioned before, the scarcity of information about state data fusion centers--given the amount of money and the resources they are receiving, along with the participation of the military in fusion centers--should be something that the community is exploring, as it is a serious red flag.  

I also suspect that multijurisdictional task forces--which connect local, state and federal resources, supposedly for the "War on Drugs"--may also be a serious threat to our "Republic" and the rule of law, as they are a DoD project overseen by the the National Guard:

https://en.wikipedia.org/wiki/Multijurisdictional_Counterdrug_Task_Force_Training

Here's an article regarding the militarization of police and the great military toys they've been getting: 

"A Decade After 9/11, Police Departments Are Increasingly Militarized" by Radley Balko: 

https://www.huffingtonpost.com/2011/09/12/police-militarization-9-11-september-11_n_955508.html

I realize I'm not connecting all the dots.  But I've been getting hit with horrendous headaches, which come on instantaneously and are totally crippling.  When my next-door neighbors (the sex-trafficking, teenage-girl kidnappers) moved very abruptly and left most of their furniture, a young woman moved in within 24 hours.  She, of course, is a GSer.  

My home is being entered every time I leave it and seriously vandalized and property seriously damaged or stolen.  The new GSing neighbor-woman is about 8-10 feet from the chair I am sitting in right now (on the other side of my office's wall).  And with neighbors on both sides of my home participating in this abomination, I'm getting hammered from both sides. 

Here's the article about my next-door neighbor, just in case you never saw it: 

http://www.journalnow.com/news/crime/greensboro-man-charged-in-alamance-county-human-trafficking-case/article_0fd6b43a-229b-11e4-968b-001a4bcf6878.html

If you know any T.I.s who are good at researching, I'd strongly suggest looking at state data fusion centers, InfraGard, multijurisdictional task forces, and the militarization of local and state police.  It is not too late to highlight the parallels between our targeting with DEWs and the U.S. and Canadian Cuban embassies' staffers being attacked with 'directed energy.'  I've been disrupted, talked over, and even personally attacked far too often when I've tried to talk about Cuba, which is deeply troubling.  Far too many "T.I.s" want to talk about spiritual mumbo jumbo, rather than what's actually going on and objectives and strategies to expose and stop it.  Unfortunately, I can't download the program for Frank's online chat, without my computer going bonkers, which makes it hard to share specific articles on these issues. (I recognize it doesn't have anything to do with Frank, but it does stymie the flow of vital information.)

Hope you are relatively okay --

Patrick C.
ph: 336.763.5236













































































buying a conversion van from hy motors

this is nor recommended for anyone.I saw this van and lied it it is in Quincy called Hy motors,,, and the place that is going to address my concerns just gave me the run around,,, the steering is off, it's either the upper or lower control arm or the ball and joint, and the brakes are squeaking sounds le metal on metal. i went to one stop auto shop and asked outside some guy who was an empower starting yelling at lee saying it is just employee parking, so I moved. he came out twice once asked who was gonna pay for the repairs I told them hy motors and so he said that hy motors has to drive it over because this wa their car,,, its bullshit the one stop auto does not want me there all day in the waiting room to see what they are going to do or not going to do to my van. it doesn't matter im still going to wait in their waiting room. no law says i cannot.. so thats that. I thin he knew when I told him about the control arms that they were off and that I knew if it ws done or not. both business are not to be dealt with, as I believe both are shady and will screw anyone over they want. or can.
11 june 18. 0822.