Cell Phones What every activist needs to know

see this recent post.


By Daniel J Towsey

All Truth Soldiers Need to know this.

Here’s some scary information you need to know about cell phones, and your privacy.

All conversations on digital cell phones are stored forever.

They never erase the digital files. [As well as the GPS location of the cell phone or vehicle.]
The GPS pinpoints you to within a few feet. If you are being stalked or spied on.

They send out agents that know where you are.
The agents carry small hand held units that zero in on you.

Your cell phone is a listening device.

They can listen to all your conversations within fifty feet of the phone whether the phone is on or not.

The software that permits them to take over your phone is not preinstalled.

They install it by making a very quick call to
your phone. And the phone does not need to be on and it does not ring.

They also are able to read all your stored information such as telephone numbers in your phones memory.

They can even remotely turn on and ring your phone.

They can and have changed the ring tone with a voice message.
Such as ‘Answer your phone’ or anything else they want to say.

If your phone has a camera.

They can see everything that the lenses is pointing at. anytime!

The digital files of your voice can be used to create  a computerized conversation with your own voice.

This can be used against you.

Someone can actually make a call using your voice and speak to anyone you know.

They would actually believe they are talking to you. They use a computer program to replace the callers voice as they speak.

Cell phone also can and do read any RFID chips that are near it.

Many more items including clothing has RFID chips in them.

With these chips they can even tell what you’re wearing and what color your clothes is.

They can even use your voice track to transmit microwave sound to you while you sleep.

You would actually think they are your own thoughts.

This can be done through any walls. I am not kidding.

This technology was developed long ago.

After all microwaves are sound wave.

Some cell phones have the option to be set to work in analog.

Set it that way.

It is well worth it.

Even if phone does not work as well.

Ask when you get your phone if you can set it to analog.

Any calls made to your phone can not be traced.

The calls well appear to come from your own house phone.

Also it does not matter that your phone is not listed.

One last thing. In North America, all cell phone systems are controlled by Israeli companies.
All land lines are pre-wired for eavesdropping by the same companies.

And this is related, so I thought I would mention it here.

If you have an anti-theft system on your vehicle. It probably has GPS too.
And if it has Ontrac.

They can listen in to all conversations while you are in your vehicle.

Oh I forgot to mention a very important thing.

The telephone does not need to be turned on for them to do these things.

Removing the battery is a good idea.

I am not guessing here. I know this is done from reading court transcripts from intelligence trials.

Daniel J Towsey  June 24, 2007

Translated to Portuguese Portugues

Government surveillance explained


Stakeouts have always been an essential tool for law enforcement and national security. The difference now is that they’ve moved beyond binoculars, bugs and bad guys: surveillance has gone digital. All that data we generate through our daily activities online allows governments to keep an eye on lots of people at once, in hopes of catching the ones who are up to no good. It’s like grabbing a giant haystack just in case there might be a needle inside.


Two years after they said they didn’t, Toronto police admit they use Stingray cellphone snooping device

Documents that took more than two years to obtain show that Toronto police have used an IMSI catcher, also known as a Stingray, in investigations ranging from a major drug and gun case to a bank robbery.


After denying use of the controversial technology, documents obtained by the Star show that the Toronto Police Service has used the cellphone data-capturing device known as an IMSI catcher, or Stingray, in five separate investigations.

IMSI catchers capture identifying data from all mobile devices being used in a given location — including, in the context of a police investigation, the data of innocent citizens in the vicinity of the target.

In December 2015, a Toronto police spokesperson told the Star: “We do not use the Stingray technology and do not have one of the units.”

The documents, which took more than two years to obtain through an access-to-information request and subsequent appeal with the province’s information commissioner, say otherwise. They show that Toronto police used the technology in investigations ranging from a major drug and gun case to a bank robbery to a missing person case, starting in 2010.

Asked why the spokesperson, Const. Craig Brister, said Toronto police did not use the device and then why police failed to correct the record, Mark Pugash, head of communications for the service, said: “We should have.”

Brenda McPhail, a privacy, technology and surveillance expert with the Canadian Civil Liberties Association (CCLA), said there has been a long-standing lack of transparency surrounding police use of the devices.

“It’s troubling that it took a freedom of information request to confirm, despite past denials, that the (Toronto police) have been using IMSI catchers,” McPhail said.

An IMSI (international mobile subscriber identity) catcher, also known as a mobile device identifier, is a controversial tool because it is indiscriminate in whose mobile device is affected. The technology essentially mimics a cellphone tower, tricking all phones within a particular range to go through it. It can be used to pinpoint the location of a specific phone with far more accuracy than data that can be obtained from a mobile provider like Bell or Rogers.

The device also has the ability to capture other data such as numbers dialed from a phone or text messages, and some can eavesdrop on calls and jam phones to prevent them from being used. Police services that have admitted to using the technology, including the RCMP, have claimed their equipment does not capture private communications, and documents obtained by the Star suggest the same is true for Toronto police.

Although police say it’s a vital investigative tool that has been used in cases involving national security, serious organized crime and more, privacy experts have long decried the secrecy surrounding the device and its use.

“This is a form of mass surveillance,” said Chris Parsons, of the University of Toronto’s Citizenlab.

“It’s a far more intrusive and invasive technology as compared to other tools that are available to law enforcement.”

Asked what Toronto police does with any data from citizens captured through the use of an IMSI catcher, Pugash said the service “does not get third-party data.”

oronto police used the IMSI catcher during its gang and gun investigations called Project Rx and Project Battery. The probes ran in 2013.  (Chris So)

When the Star questioned Pugash further, given that the devices temporarily attract data from cellphones other than those used by the intended target, he said he was unable to answer because the service does not own such a device.

Pugash would not say whether the force had partnered with another police agency that owns the device, such as the RCMP. The Mounties admitted, in a rare press briefing on the devices last year, to owning 10 IMSI catchers.

Documents obtained by the Star suggest that Toronto police requested the RCMP’s IMSI catcher on at least two occasions. (An RCMP spokesperson would not confirm to the Star that their device has been used by Toronto police, citing a policy not to disclose techniques used in specific investigations).

The documents released to the Star through access to information legislation state that Toronto police have used the device on five occasions. Specifics were not provided for two of those uses because “one of the incidents is currently before the courts and the other is still under investigation.”

The service also released a “general warrant” form that they say was used in at least one of the cases, a three-page document that sheds some light on the steps police say they take when using IMSI catchers.

It’s unclear if Toronto police had a warrant in all five cases. Pugash said the service would not use a IMSI catcher without judicial authority or urgent circumstances to prevent the loss of life.

Details for the remaining three incidents are sparse. The documents have been largely blacked out.

Available details, however, show the device was first used on May 2010. Officers put a trace on a phone of a missing man through Bell Mobility, locating it in Pickering. Durham police then checked the area “with negative results,” according to the documents. The man was later found.

In April 2013, following a bank robbery that involved two suspects armed with a rifle and a handgun, police tracked a cellphone stolen during the heist by using “tracking software installed on the phone.” After tracing the phone to an area near Eglinton Ave. and Weston Rd., one officer noted that the RCMP attended the area and “attempted to locate the phone” but were unsuccessful.

For the third occasion, Toronto police used the device in gang and gun investigations dubbed Projects Rx and Battery, probes that ran in 2013 and centred on two rival street gangs, the Asian Assassins and Sick Thugz. The documents note that Toronto police were granted a warrant authorizing the use of an IMSI catcher.

The general warrant, used by police to get permission from a judge to use the device, answers some questions about how police are proposing to employ the device, including their suggested solution to the issue of third-party data.

According to the document, police say that if the warrant were granted, a trained member of the RCMP would operate the device. That person would ensure investigators were given access to information only about the persons of interest, the warrant states.

What the warrant does not detail, however, is what would happen to the information about “every other innocent individual in the area every time it is activated,” McPhail said.

“The public deserves reassurance that that information is not retained,” she said.

Last year, a senior RCMP officer said all the data captured by their IMSI catchers is considered evidence and will be kept — though nothing except the target information would be accessed. The Ontario Provincial Police, which owns at least one IMSI catcher, has a similar protocol.

“The OPP seals and then destroys any collected data from non-targets (third parties) following court proceedings, including appeal periods and regulatory requirements for retention,” OPP Staff Sgt. Carolle Dionne wrote in an email.

Dionne would not confirm to the Star whether the OPP has ever worked with Toronto police on an investigation involving its IMSI catcher, but said the agency does “assist our municipal policing services when requested.”

The warrant also states that the device would be used as close as possible to the target to “limit the range of the surveillance device as much as is reasonably possible.

“This will reduce the number of mobile telephones which will be affected by the use of the (device),” the warrant states.

The device would also “not receive voice or audio communications and will not receive text messages or emails.”



Published on May 12, 2015

Are you a lawyer? An activist? A journalist? A doctor, teacher, parent, student, researcher, politician, or citizen? Communications surveillance affects you. This video is a high level overview of communications surveillance!

More videos and information here: https://privacyinternational.org

Weaponized Wi-fi: Population Control

Published on Jul 22, 2015

Dr. Nick Begich delves into the history of weaponized technology and how this brain-stimulation is still being utilized today to control the population.

DNA BEING MANIPULATED BY YOUR WIFI – http://www.infowars.com/dna-being-manipulated-by-your-wifi/

WIFI MAY BE MORE DANGEROUS TO KIDS THAN PREVIOUSLY THOUGHThttp://www.infowars.com/wifi-may-be-more-dangerous-to-kids-than-previously-thought/

STUDY SUGGESTS WI-FI EXPOSURE MORE DANGEROUS TO KIDS THAN PREVIOUSLY THOUGHT – http://www.infowars.com/study-suggests-wi-fi-exposure-more-dangerous-to-kids-than-previously-thought/

NEW WIFI SYSTEMS WILL TAKE THE POLICE STATE TO A NEW LEVEL TRACKING YOUR EVERY MOVE – http://www.infowars.com/new-wifi-systems-will-take-the-police-state-to-a-new-level-tracking-your-every-move/

SCIENTISTS URGE GOVERNMENTS TO TURN OLD TV FREQUENCIES INTO FREE “SUPER WIFI” – http://www.infowars.com/scientists-urge-governments-to-turn-old-tv-frequencies-into-free-super-wifi/

‘SMART’ LIGHTBULBS REVEAL WI-FI PASSWORDS – http://www.infowars.com/smart-lightbulbs-reveal-wi-fi-passwords/

Researchers Find and Decode the Spy Tools Governments Use to Hijack Phones



Newly uncovered components of a digital surveillance tool used by more than 60 governments worldwide provide a rare glimpse at the extensive ways law enforcement and intelligence agencies use the tool to surreptitiously record and steal data from mobile phones.

The modules, made by the Italian company Hacking Team, were uncovered by researchers working independently of each other at Kaspersky Lab in Russia and the Citizen Lab at the University of Toronto’s Munk School of Global Affairs in Canada, who say the findings provide great insight into the trade craft behind Hacking Team’s tools.

The new components target Android, iOS, Windows Mobile, and BlackBerry users and are part of Hacking Team’s larger suite of tools used for targeting desktop computers and laptops. But the iOS and Android modules provide cops and spooks with a robust menu of features to give them complete dominion over targeted phones.

They allow, for example, for covert collection of emails, text messages, call history and address books, and they can be used to log keystrokes and obtain search history data. They can take screenshots, record audio from the phones to monitor calls or ambient conversations, hijack the phone’s camera to snap pictures or piggyback on the phone’s GPS system to monitor the user’s location. The Android version can also enable the phone’s Wi-Fi function to siphon data from the phone wirelessly instead of using the cell network to transmit it. The latter would incur data charges and raise the phone owner’s suspicion.

“Secretly activating the microphone and taking regular camera shots provides constant surveillance of the target—which is much more powerful than traditional cloak and dagger operations,” notes Kaspersky researcher Sergey Golovanov in a blog post about the findings.

It’s long been known that law enforcement and intelligence agencies worldwide use Hacking Team’s tools to spy on computer and mobile phone users—including, in some countries, to spy on political dissidents, journalists and human rights advocates. This is the first time, however, that the modules used to spy on mobile phone users have been uncovered in the wild and reverse-engineered.

Kaspersky and Citizen Lab discovered them after developing new methods to search for code fragments and digital certificates used by Hacking Team’s tools.

The modules work in conjunction with Hacking Team’s core surveillance tool, known as the Remote Control System, which the company markets under the names Da Vinci and Galileo.

In a sleek marketing video for Galileo, Hacking Team touts the tool as the perfect solution for obtaining hard-to-reach data—such as data taken by a suspect across borders or data and communications that never leave the target’s computer and therefore can’t be siphoned in transit.

“You want to look through your targets’s eyes,” says the video. “While your target is browsing the web, exchanging documents, receiving SMS….”

Hacking Team’s tools are controlled remotely through command-and-control servers set up by Hacking Team’s law enforcement and intelligence agency customers to monitor multiple targets.

Kaspersky has tracked more than 350 command-and-control servers created for this purpose in more than 40 countries. While Kaspersky found only one or two servers in most of these countries, the researchers found 64 in the United States—by far the most. Kazakhstan followed with 49, Ecuador with 35 and the United Kingdom with 32. It’s not known for certain whether law enforcement agencies in the U.S. use Hacking Team’s tool or if these servers are used by other governments. But as Kaspersky notes, it makes little sense for governments to maintain their command servers in foreign countries where they run the risk of losing control over the servers.

Map showing the number of countries where command-and-control servers for the Hacking Team are currently being used.

In addition to the modules that were uncovered, Citizen Lab obtained from an anonymous source a copy of the lengthy user’s manual (

Police Story: Hacking Team’s Government Surveillance Malware)


that Hacking Team provides customers. The illustrated document explains in detail how to build the surveillance infrastructure needed to deliver implants to targeted devices and to use the software tool’s dashboard to manage intelligence gleaned from infected computers and phones.

“This gives new visibility into the operational procedures of lawful intercept malware,” says Citizen Lab researcher Morgan Marquis-Boire. “Previous research has allowed us to understand how the software works. This allows us a holistic view of how this type of targeted surveillance is conducted.”

Image from Hacking Team's user manual showing the interface for managing hacked systems and data siphoned from them.

The modules and training manual all show that Hacking Team is well aware of the attention its products have received from researchers in recent years and has taken several steps to thwart attempts to understand how its spy tools work.

“They are well aware that their product may show up on the analyst chopping block at some stage, and they’re taking various steps to mitigate this risk,” says Marquis-Boire.

The Android spy module, for example, uses obfuscation to make it harder to reverse-engineer and examine the module. And before installing itself on machines, Hacking Team’s main spy tool has scouting agents that conduct reconnaissance to identify anything on a system that might detect it.

Once on a system, the iPhone module uses advance techniques to avoid draining the phone’s battery, turning on the phone’s microphone, for example, only under certain conditions.

“They can just turn on the mic and record everything going on around the victim, but the battery life is limited, and the victim can notice something is wrong with the iPhone, so they use special triggers,” says Costin Raiu, head of Kaspersky’s Global Research and Analysis team.

One of those triggers might be when the victim’s phone connects to a specific WiFi network, such as a work network, signaling the owner is in an important environment. “I can’t remember having seen such advanced techniques in other mobile malware,” he says.

Hacking Team’s mobile tools also have a “crisis” module that kicks in when they sense the presence of certain detection activities occurring on a device, such as packet sniffing, and then pause the spyware’s activity to avoid detection. There is also a “wipe” function to erase the tool from infected systems. Hacking Team asserts that this will uninstall and erase all traces of the tools, but Citizen Lab discovered that initiating a wipe on some mobile phones creates telltale signs. On a BlackBerry, for example, it causes the device to automatically restart. On Android devices, the uninstall can, under certain conditions, cause a prompt to appear onscreen asking permission from the user to uninstall an application called “DeviceInfo”—the name the Android spy tool uses for itself.

In addition to the variety of obfuscation measures the tools use, Hacking Team also advises customers to set up several anonymous proxy servers through which to route data stolen from victim machines. In this way, researchers and victims won’t be able to easily follow the path the data takes back to command servers. Oddly, Hacking Team borrows the logo of the hacktivist group Anonymous—an empty black business suit—to designate the anonymized proxy servers in its user manual.

Hacking Team borrowed the logo of the hacking group Anonymous to designate anonymized proxy servers in its user manual.

Hacking Team first developed its Remote Control System spy suite in 2001. Prior to this, the developers had made a free, open-source tool for conducting man-in-the-middle attacks that was used by hackers and security researchers alike. Soon, police in Milan contacted the two authors of this tool—Alberto Ornaghi and Marco Valleri—for help developing something to eavesdrop on Skype communications. It was from this that their collaboration with law enforcement was born.

Hacking Team has long argued that its products are intended for lawful governmental interception only and that it won’t sell its products to repressive regimes and countries blacklisted by NATO. But its spy suite reportedly has been used to spy on the citizen journalist group Mamfakinch in Morocco and appears to have been used by someone in Turkey to target a woman in the U.S. who was a vocal critical of Turkey’s Gulen movement.

Indeed, the Android spy module that Citizen Lab uncovered was masquerading as a legitimate news app for Qatif Today, an Arabic-language news and information service that covers the Qatif region in eastern Saudi Arabia. The government of Saudi Arabia has faced off several times in the last few years against Shia protestors in the Qatif region who have demanded political reform from the Sunni government and the release of political prisoners.

Although the Citizen Lab researchers are careful to point out that they don’t know for certain that the Saudi government is using the Hacking Team tool to spy on political dissidents, circumstantial evidence shows this may be the case.

The malicious Qatif Today app was discovered after someone uploaded the file in March to the VirusTotal web site—a site owned by Google that aggregates several dozen antivirus scanners to detect malware. The file was signed with a bogus certificate that appeared to belong to Sun Microsystems. Citizen Lab found evidence that a Twitter account of interest to Shiites in Qatif may have been used to tweet a link to the malicious file to lure targets into downloading it onto their phones.

While Hacking Team’s core Galileo tool for spying on computers is valuable for governments, the mobile spy modules are particularly attractive to repressive regimes where activists and others use their mobile phones to organize and stay connected during protests.

Cops can install the phone implants directly onto a mobile device if they have physical access to it. But they can also install the implants if a user connects the mobile device to a computer—for example, to charge the device—and the computer is already infected with Da Vinci or Galileo.

The iOS spy module works only on jailbroken iPhones, but agents can simply run a jailbreaking tool and then install the spyware. The only thing protecting a user from a surreptitious jailbreak is enabling a password on the device. But if the device is connected to a computer infected with Da Vinci or Galileo software and the user unlocks the device with a password, the malware on the computer can surreptitiously jailbreak the phone to install the spy tool.

So far, the researchers haven’t uncovered any methods used for remotely infecting phones with the Hacking Team malware via a phishing attack or a malicious web site.

Citizen Lab points out in its report on the malware that it’s important to understand how Hacking Team’s tools work, since they are powerful weapons, no different from the types of tools used by nation states against one another. But in this case they’re employed by government customers not against other government targets but against ordinary citizens.

“This type of exceptionally invasive toolkit, once a costly boutique capability deployed by intelligence communities and militaries, is now being marketed for targeting everyday criminality and ‘security threats,’” they write. “An unstated assumption is that the entities able to buy these tools will use them correctly, and primarily for law enforcement purposes. As our research has shown, however, by dramatically lowering the entry cost on invasive and hard-to-­trace monitoring, it lowers the cost of targeting political threats” too.

Update 6:45 am:: To clarify that the work the two Italian developers did on their man-in-the-middle tool was separate from the work they later did to create their flagship tool, RCS/Galileo.

Follow Truth Soldier on twitter

Cell Phone Searches: Come Back with a Warrant!


Cell phones contain a near endless amount of information. Treating cell phone searches as though they are the same as looking through a backpack just doesn’t make sense.

The BCCLA intervened in the R. v. Mann case to argue that cell phone searches require a warrant. On June 18, the BC Court of Appeal ruled that the law no longer permits police to conduct warrantless searches of the entire contents of an individual’s cell phone.  The court decided not to rule on whether or not a “cursory search” of a cell phone would be permissible.

R. v. Mann

Posted on May 6, 2013

This case concerns an issue that is arising with increasing frequency in the law enforcement context: whether the power to search incident to a lawful arrest includes the authority to search the contents of cell phones.

Mr. Mann was twice arrested in connection with an alleged kidnapping. On both occasions, his Blackberry cell phone was seized from him. Both phones were eventually sent for data extraction, which was completed after a significant period of time had passed from the initial seizure of the phones. The analysis of the smartphones captured every piece of data generated by the user.

The BCCLA was granted leave to intervene in this case. The BCCLA argued that applying the traditional rule of search incident to arrest to mobile devices would significantly undermine privacy rights and greatly expand warrantless police search powers. The BCCLA argued that warrantless searches of cell phones violate the Charter’s section 8 right to be free from unreasonable search and seizure in all circumstances.

The BCCLA’s argument can be found here 


On June 18, 2014, the BC Court of Appeal released its judgment in this case. The Court of Appeal held that warrantless searches of cell phones violated section 8 of the Charter. According to the Court, the law no longer permits police to conduct warrantless searches of the entire contents of an individual’s cell phone. The Court declined to make a ruling about whether a warrantless “cursory search” of a cell phone would be permissible. Although the evidence was obtained in violation of the Charter, the Court went on to find that it should not be excluded as its admission would not bring the administration of justice into disrepute.

The reasons of the BC Court of Appeal can be found here >>

The BCCLA is represented by Brent Olthuis and Eileen Patel of Hunter Litigation Chambers.

BC Court of Appeal

Adam Harvey // OFF pocket

An anti-phone accessory for privacy lovers.

To create an anti-phone accessory that blocks all incoming and outgoing signals… Metalised fabric, DWR nylon




Don’t stop there..also check this out.

Stealth Wear: New Designs for Countersurveillance, and also ‘Anti-Drone’ Wear



Warning” ” If you or kids take pics from your phone?

Your Cell Phone Makes You A Prisoner Of A Digital World Where Virtually Anyone Can Hack You And Track You

Posted by truther on April 8, 2012 // Leave Your Comment

If you own a cell phone, you might as well kiss your privacy goodbye. Cell phone companies know more about us than most of us would ever dare to imagine. Your cell phone company is tracking everywhere that you go and it is making a record of everything that you do with your phone.

Much worse, there is a good chance that your cell phone company has been selling this information to anyone that is willing to pay the price – including local law enforcement. In addition, it is an open secret that the federal government monitors and records all cell phone calls.

The “private conversation” that you are having with a friend today will be kept in federal government databanks for many years to come. The truth is that by using a cell phone, you willingly make yourself a prisoner of a digital world where every move that you make and every conversation that you have is permanently recorded.

But it is not just cell phone companies and government agencies that you have to worry about. As you will see at the end of this article, it is incredibly easy for any would-be stalker to hack you and track your every movement using your cell phone.

In fact, many spyware programs allow hackers to listen to you through your cell phone even when your cell phone is turned off. Sadly, most cell phone users have absolutely no idea about any of this stuff.

The next time that you get a notice from your cell phone company about “changes” to the privacy policy, you might want to play close attention. Your cell phone company might be about to sell off your most personal information to anyone that is willing to write a big enough check. The following is from a recent CNN article….

Your phone company knows where you live, what websites you visit, what apps you download, what videos you like to watch, and even where you are. Now, some have begun selling that valuable information to the highest bidder.

In mid-October, Verizon Wireless changed its privacy policy to allow the company to record customers’ location data and Web browsing history, combine it with other personal information like age and gender, aggregate it with millions of other customers’ data, and sell it on an anonymous basis.

So who is buying this information?

We just don’t know.

But we do know that local law enforcement agencies all over the country are increasingly using cell phone data to nail suspects, and often it is the cell phone companies that are the ones selling them the cell phone data that they need.

According to a recent New York Times article, many local police departments are doing this without getting a warrant first….

“Law enforcement tracking of cellphones, once the province mainly of federal agents, has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight.”

That same article says that cell phone companies have standard prices that they charge to local law enforcement officials for information that they request….

“Cell carriers, staffed with special law enforcement liaison teams, charge police departments from a few hundred dollars for locating a phone to more than $2,200 for a full-scale wiretap of a suspect.”

So if you are breaking the law, your cell phone may be used to gather evidence and to track you down. In the United States, cell phone companies are required by law to be able to pinpoint the locations of their customers to within 100 meters. So if you are a criminal, your cell phone could be leading the police right to you even as you are reading this article.

Sometimes the police don’t even use the cell phone companies. Recently, the Wall Street Journal ran an article that discussed the capabilities of the “stingray devices” that many local law enforcement agencies are using now.

A “stingray device” acts like a cell phone tower and it can gather any information that a normal cell phone tower can. The following is how a recent Wired article described these “stingrays”….

You make a call on your cellphone thinking the only thing standing between you and the recipient of your call is your carrier’s cellphone tower. In fact, that tower your phone is connecting to just might be a boobytrap set up by law enforcement to ensnare your phone signals and maybe even the content of your calls.

So-called stingrays are one of the new high-tech tools that authorities are using to track and identify you. The devices, about the size of a suitcase, spoof a legitimate cellphone tower in order to trick nearby cellphones and other wireless communication devices into connecting to the tower, as they would to a real cellphone tower.

The government maintains that the stingrays don’t violate Fourth Amendment rights, since Americans don’t have a legitimate expectation of privacy for data sent from their mobile phones and other wireless devices to a cell tower.

Isn’t that just great?

The attitude that law enforcement agencies seem to have is that once we use a cell phone we are essentially willingly throwing our Fourth Amendment rights out the window.

In some areas of the United States, police are physically extracting data from cell phones any time they want as well. According to the ACLU, state police in Michigan have been using “extraction devices” to download data from the cell phones of motorists that they pull over. This is taking place even if the motorists that are pulled over are not accused of doing anything wrong. The following is how an article posted on CNET News describes the capabilities of these “extraction devices”….

The devices, sold by a company called Cellebrite, can download text messages, photos, video, and even GPS data from most brands of cell phones. The handheld machines have various interfaces to work with different models and can even bypass security passwords and access some information.

Fortunately these “extraction devices” are being challenged in court. Let us hope that they will be banned.

But what local law enforcement officials are doing pales in comparison to what federal agencies are doing.

For example, the FBI claims that it can demand to see your cell phone data whenever it would like to.

Not only that, the FBI has also been remotely activating the microphones on the cell phones of suspects that they want to listen to. This can be done even when the cell phone is turned off….

The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby conversations.

The technique is called a “roving bug,” and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.

Could the FBI be listening to you right now?

If there is a cell phone in the room they could be.

But some other federal agencies listen to a lot more cell phone calls than the FBI does.

It has been an open secret for a long time that the federal government monitors and records all cell phone calls that are made for national security reasons.

In fact, the federal government is even trying to collect records for calls that have been made in the distant past. According to USA Today, the goal is “to create a database of every call ever made”….

The National Security Agency has been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth, people with direct knowledge of the arrangement told USA TODAY.

In addition, the federal government has been constructing the largest data center in the history of the world out in the Utah desert. This data center will be used to house an almost unimaginable amount of digital data (including your cell phone calls). The following is how a recent Wired article described this new facility….

Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade.

Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks.

The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.”

But isn’t it illegal for the federal government to intercept our phone calls?

Well, the cold, hard reality of the matter is that they use all kinds of loopholes and legal technicalities to get around that.

For example, if a call is “intercepted” outside of the United States and then routed to a government building inside the United States that is considered to be okay.

Of course that is a bunch of nonsense, but that is how they think.

And it is very frightening thing for governments around the world to be able to monitor and track us like this.

Increasingly, governments around the world are using cell phones to hunt down people that they do not like and haul them off to prison. For example, a recent Bloomberg article detailed how the Iranian government is aggressively using cell phones to crack down on dissidents….

The Iranian officers who knocked out Saeid Pourheydar’s four front teeth also enlightened the opposition journalist. Held in Evin Prison for weeks following his arrest early last year for protesting, he says, he learned that he was not only fighting the regime, but also companies that armed Tehran with technology to monitor dissidents like him.

Pourheydar, 30, says the power of this enemy became clear as intelligence officers brandished transcripts of his mobile phone calls, e-mails and text messages during his detention. About half the political prisoners he met in jail told him police had tracked their communications and movements through their cell phones, he says.

Christians in Iran have learned that they must take the batteries entirely out of their cell phones before they gather for home church meetings. If they don’t take the batteries out of their cell phones, there is a good chance that the secret police will show up and drag them off to prison.

Most Americans don’t need to worry about getting hauled off to prison for political or religious reasons at this point, but there is another aspect of cell phone security that could potentially affect all of us.

Most Americans are completely unaware of what stalkers can potentially do if they are able to hack into a cell phone. For example, did you know that spyware can make it possible for a stalker to monitor where you are 24 hours a day and listen to everything that you say even when your cell phone is turned off? The following is from an article posted by WTHR….

Spyware marketers claim you can tap into someone’s calls, read their text messages and track their movements “anywhere, anytime.” They say you can “catch a cheating spouse”, protect your children from an evil babysitter and “hear what your boss is saying about you.” And while you’re spying on others, the Spyware companies say “no one will ever know” because it’s supposed to be “completely invisible” with “absolutely no trace.”

Security experts say it’s no internet hoax.

“It’s real, and it is pretty creepy,” said Rick Mislan, a former military intelligence officer who now teaches cyber forensics at Purdue University’s Department of Computer and Information Technology.

Mislan has examined thousands of cell phones inside Purdue’s Cyber Forensics Lab, and he says spy software can now make even the most high-tech cell phone vulnerable.

For much more from WTHR about what stalkers can do to your cell phone, just check out this amazing video. It is one of the best news reports that I have ever seen.

Are you starting to see how your cell phone makes you a prisoner of a digital world?

The police can listen to you and track you any time that they want to.

The federal government can listen to you and track you any time that they want to.

Big corporations can buy all of the personal information that cell phones gather any time that they want to from certain cell phone companies.

Stalkers can listen to you and track you 24 hours a day if they are able to hack in to your cell phone somehow.

If you own a cell phone and you still want to have some privacy, then you need to take the battery completely out of the cell phone when you are not using it.

Our world is becoming a much less private place, and we all need to be mindful of the changes that are happening.

Unfortunately, as our world becomes even more interconnected and even more dependent on technology, the amount of privacy we all have is likely to continue to decrease. A digital Big Brother control grid is being constructed all around us, and in the future that control grid could potentially be used for very malevolent purposes.

So let us be as wise as serpents and innocent as doves. Our world is changing, and not for the better.



Published on May 5, 2015

Proof that over 100 different companies record your telephone calls, your texts, and even your location from companies located all over the world — form Turkey to China, Hong Kong to the USA.

“Warning” If you, your kids or grand kids take pics from your phone—WATCH THIS!

This is alarming – please take the time to watch. At the end they’ll tell you how to set your phone so you don’t run this risk!

This is important info, about what your posting things on your cell phones can do TO YOU!
Too much technology so beware….If you have children or grandchildren you NEED to watch this.
I had no idea this could happen from taking pictures on the blackberry or cell phone.. It’s scary.

10 Ways We Are Being Tracked, Traced, and Databased


USA PATRIOT ACT makes your cell phone a tracking weapon

If You Value Your Privacy, Dump Your Iphone. Seriously.


Your Cell Phone Can Still Be On Even If You Turn It Off Recording Everything You Do And Say In Front Of It.read Why


Maxx J Frankel do you know what a primary source is?
Daniel J Towsey Maxx..do you know..what critical thinking is?
Do you know to seek truth?
Do you know about protecting sources?
Maxx J Frankel Yeah i was doing some critical thinking when i looked up the latin and hebrew word for truth and realized they don’t start with T.
Why spread bullshit if you are supposed to spread truth.

You know that what you do carries tremendous responsibility yet you are so sloppy.
You are going to lose all the people you need to persuade to make a change with that strategy, and get all the people you really could do without.

yeah im a internet troll hired by the nwo to take you down because you are a “free thinker” thats why i gave you that advice.

If i really was a troll i would say:

keep calling people sheeple… it works wonders on get them to listen to what you have to say. Also using the words evil, occult, matrix, conspiracy,
they will get tons of people to follow your movement.

come on son.

there are other ways from protecting your sources and still showing evidence than just saying some bullshit and making it look like you did not do any
research except look at some other crazy dudes paranoid fantasies.
Daniel J Towsey Hey Max…Did you notice I am not writing in Latin or Hebrew?
Maxx J Frankel “Jesus was a Truth Soldier..ever notice that his cross is a t for truth? because God is the truth.”

My statement was in response to this bullshit.

Are you telling me the Romans got together and said… “hey.. we should start killing people on crucifixes because someday,
hundreds and hundreds of years from now, the first letter of the word “truth” in English will look like the pieces of wood we will put
together to nail and suffocate people we don’t like…

and one day one of those people will be the messiah, born of a virgin mother, only to be slain by us,
the people he wishes to grant the graces of God… Why yes, that is a great idea.”

my point is you are making comparisons that dont exist. If Christ did exist as legend has it, he was a person who fought for the poor, and the sick,
was a man of peace, justice and virtue. And he would have been a lot better of convincing me anything you are trying to say, even though there is some of it
I probably do already agree with.

You ask a lot of questions and give few answers.
Maxx J Frankel Critical thinking is the intellectually disciplined process of actively and skillfully conceptualizing, applying, analyzing, synthesizing, and/or
evaluating information gathered from, or generated by, observation, experience, reflection, reasoning, or communication, as a guide to belief and action.
In its exemplary form, it is based on universal intellectual values that transcend subject matter divisions: clarity, *accuracy*, precision, consistency,
relevance, **sound evidence***, good reasons, depth, breadth, and fairness.

“I am not guessing here. I know this is done from reading court transcripts from intelligence trials.”

^ hook a brother up with copies of those transcripts. that would be the primary sources im looking for, and you dont have to protect anyone.
Maxx J Frankel oh yeah, that definition came from the Foundation for Critical Thinking

that would have been silly of me to post something like that with out including a source, after making such a big fuss about you not showing sources.
Daniel J Towsey So go do some critical thinking..go to TheTruthSoldiersClub and go look in the ‘Invassion of privacy’ folder
then go read all the evedence about cell phones.. If I remember correctly..I mentioned that in my article..

Since you know what critical thinking is..do some..
Maxx J Frankel cant even hook a brother up with a link
Maxx J Frankel okay after creating a yahoo account, joining the group.. and finding Invasion of Privacy.. which one are you talking about that is the primary
document you used to come to this conclusion.
Maxx J Frankel this is what someone who isn’t a dick does when trying to get the truth out:

Daniel J Towsey Max first of all a primary link is not possiblee as you have to be a member to access the the link.

Second you have shown me that you can not do critical thinking…

You want me to spoon fed everything to you..

Will go do some reading and while your reading you will discover even more about cell phones then what I wrote.

How to Use a Cell Phone As a Listening Device | eHow.com **
If you’ve ever wanted to listen in on a conversation, but didn’t know how to bug a room, then you should know that it’s easy to use a cell phone as a listening device …

Tracking Devices in Cell Phones | www.Bizplenty.com *
Are there tracking devices in cell phones? … Have Cell Phones Become Personal Tracking Devices? … Listening to Cell Phone Calls

FBI Can Eavesdrop on You Even When Your Cell Phone is Turned Off – axiomsun.com ****
FBI can turn on the mic of your cell phone and eaves drop on you even when the phone is turned off. Daily hand picked amazing and funny videos.
Watch the latest viral videos, music videos, movie trailers, vidcasts and more.

There is no shortage of articles these days..

I wrote the above article long before it was known to most..

So for a critical thinker I am amazed you could not do a simple search online.

Daniel J Towsey Maxx your the dick..I have been polite with you and you just attack me with your shit mouth…

Maxx J Frankel http://www.appleinsider.com/articles/09/01/08/apple_files_patent_for_camera_hidden_behind_display.html

some of the other things i read were nonsense.

I did not find court cases today. maybe tomorrow i will.

Maxx J Frankel yeah im from nyc, we have attitude. you haven’t been all that polite either. just because you dont say the words “bullshit”, or “dick”,
does not mean you weren’t being a snobbish dick to me.

Daniel J Towsey Maxx the original court case is why all this information is now out..The court case was about eight years ago..that information will be hard
to find but it is no longer necessary..

Plus there somewhere info about Bush making it mandatory by law that all new cells phones be equipped with this option when the cell phones went from
analogue to digital in 2001

Maxx J Frankel yes i wanted everything spoon feed… why the hell do i have to look up your sources? you have them right on your computer, you could
have just sent them over. but no, i had to create another email, then use a system i am completely alien to, to find some files that I still have not had the
patience to find.

Could you please show me the mandatory law that new phones have to have this option, so when people ask me about this i can have evidence for what i am
talking about, and not sound like a lunatic.

Daniel J Towsey hey by the way ..our thread of responses will be included as comments with all my future postings of this article..So hey you will be read by
many more over the years..

Maxx J Frankel awesome I am a celebrity. www.Reverbnation.com/maxxscian

Daniel J Towsey anyway..thanks for the comments..a little bit of attitude is good..it means were not pussies..so you have my respect..

Lets keep the battle going to defeat the insane Zionist NWO..

Maxx J Frankel You do realize this whole argument has more to do with you improving how you spread information than it does anything else right? If you want
people to believe you off the bat, instead of wasting their time and your time looking for sources… just put the sources in there.

and there were no sources for you to protect any of that time so why were you asking me if i knew anything about protecting sources.. you made yourself sound
really important there though… that was pretty bad ass.

Maxx J Frankel lol werd up

Maxx J Frankel man you lose me with the Zionist thing but whatever lets agree to disagree on somethings.

Daniel J Towsey Hey I am just checking out your site..I love hip hop…when I can understand the words that ius..hahaha

Maxx J Frankel thats why my music doesn’t really have words most of the time.. i mainly make beats. thanks for checking it out.

Maxx J Frankel http://www.facebook.com/topic.php?topic=23&post=214&uid=107171896014674#!/pages/Maxx-Scian/114246771036

^ if you feel like adding my facebook page theres the link for that

peace, keep doing what you do, keep refining your message, it makes the reality easier to share.

however be careful

Daniel J Towsey haha yes if we always agreed we would be pussies..hey man yes Zionism is very real and it really has little to do with Jews..anyone can be a Zionist..
But the real enemies are the international banksters….trying to own the world..

Daniel J Towsey I really like ‘Immortal technique”

Maxx J Frankel yeah he has been popular among people in the truth movement.

Maxx J Frankel you might like Dead Prez too if you like him.

Daniel J Towsey We I am listening to you stuff..It is pretty good so far…oh here comes the next song..

Daniel J Towsey hey you must play at clubs..your stuff sounds great

Maxx J Frankel thanks. im working on doing a 2011 circuit of NYC.

Maxx J Frankel maybe i will make it up to Quebec sometime this year. No one has heard about me up there though lol

Maxx J Frankel oh you are in nova scotia according to your profile now… even less people know about me over there hahah

Daniel J Towsey Montreal will love you..I am from there but I now live in deadville Nova Scotia..I am thinking of moving back to Montreal..where the ladies are really fineeeee

Maxx J Frankel HELLS YEAH! When i was in Montreal as a teenager that’s all the sightseeing i did!

The women there are some of the most gorgeous women I have ever seen.

Daniel J Towsey Most people in Nova Scotia know nothing… I am a revolutionary here..

Maxx J Frankel i bet they know how to fish and a lot about boats.

Daniel J Towsey yeah thats about all they know..

Daniel J Towsey Man your music has got life….wow i have allot of great sound systems in my place.. My main stereo is like concert speakers..I love music..
I have your tunes playing kind of loud it is 6 am . I guess I will wake some neighbors.. They think twice about banging on my ceiling..

My sound system actually
will literally shake everything in their place if i just turn it up a bit..That is what we call stereo wars…I just drove my last neighbor out..ahahha

Maxx J Frankel thanks. you can down load my first album for free at maxxscian.bandcamp.com

Maxx J Frankel i appreciate the compliments!

Daniel J Towsey Hey I appreciate great creative sounds

Daniel J Towsey Hey Maxx..you know my passion is photography.. you have my permission to use any image you like ..you can download the hi-res pictures at

http://thevisonaryfolkphotograher.com/ I have allot more pics then this..

Maxx J Frankel cool, then you are going to like that first album a lot. its a concept album about post 9/11 american, set in new york city…
it is mainly instrumental, but features skits from real life that i recorded on a field recorder between 2007 and 2008.

heres the album description:

“Come Wander With Me” is a multi-genre album that harnesses the anxious emotions of New York City post 9/11/2001. Maxx Scian’s off-beat eclectic arrangements
blended with live recordings of organic “only-could-have-been-heard-in-New-York-City” experiences, resonate the sounds of the decade; one defined by insecurity,
confusion, and its absence of a concrete identity.”

Sweet photos.. i will check them all out tomorrow, i need to go to bed, its 5 am in nyc. It was good chatting with you Daniel. Good Night.

Miguel Urbina Artful trolling, to be sure. It really is exquisite.

Maxx J Frankel lol i was helping a dude post his sources, telling him the benefits of why you should do that in the first place instead of after arguments, and show him
he might encounter conflicts in the future, thus improving his message.. if that is trolling then bless the people who do that.

and in the end we became friends 😀

Spencer D. Marks I think that that was about the happiest ending to an internet gunfight that the world has ever seen.

That was amazing! Serious kudos to both of you! 🙂

Daniel J Towsey says, Spencer if only all other serious world political issues could end this way.

.we would have what I seek and that is PEACE ON EARTH FOR ALL (Jan 6 2011)

North Oregon Coast Anti-Chemtrail Alliance Good stuff! Thanks, Daniel.


Thank you for this very useful infomation..I was not aware of this crap…clearly another way to invade our privacy!

hilly7 has posted a reply to the topic “Cell Phones – All Truth Soldiers Need to know this.” you replied to in the forum “Basic Human Rights”:

“Well I didn’t read all of this, I do know that the Active Denial System is microwave technology.

You don’t have to be in a “space suit”,
just not in the direct path of the beam. As for the original post, who knows.

We know exactly what we are told, and that is about it, so I will not say none of this is incorrect.
The shadow government is bigger than we have a clue about, just as it was in Nazi Germany.

What I will say is that the nazification of our country sucks.
Now I really don’t care if they read this or hear this, just so long as they know this. ”

Please click the following link to view it:



go to this link to download the original video in .mov over thrre gigs


RESONANCE – BEINGS OF FREQUENCY from james russell on Vimeo.

from james russell


RESONANCE is a sensational eye opening documentary which reveals the harm we are doing by existing in an ocean of man made wireless frequencies.

Two billion years ago life first arrived on this planet; a planet, which was filled with a natural frequency. As life slowly evolved,

it did so surrounded by this frequency. and Inevitably, it began tuning in.

By the time mankind arrived on earth an incredible relationship had been struck; a relationship that science is just beginning to comprehend.

Research is showing that being exposed to this frequency is absolutely integral to us. It controls our mental and physical health,

it synchronizes our circadian rhythms, and it aids our immune system and improves our sense of wellbeing.

Not only are we surrounded by natural frequencies, our bodies are filled with them too. Our cells communicate using electro magnetic frequencies.

Our brain emits a constant stream of frequencies and our DNA delivers instructions, using frequency waves.

Without them we couldn’t exist for more than a second.

This delicate balance has taken billions of years to perfect. But over the last 25 years the harmony has been disturbed. and disturbed dramatically.

Mankind has submerged itself in an ocean of artificial frequencies. They are all around us, filling the air and drowning out the earth’s natural resonance.

To the naked eye the planet appears to be the same. But at a cellular level it is the biggest change that life on earth has endured;

the affects of which we are just starting to see and feel.

How Cellphone Companies Have Resisted Rules for Disasters

Cora Currier, News Report:

In a natural disaster or other emergency, one of the first things you’re likely to reach for is your cellphone. Landlines are disappearing. More than 30 percent of American households now rely exclusively on cellphones.

Despite that, cell carriers have successfully pushed back against rules on what they have to do in a disaster. The carriers instead insist that emergency standards should be voluntary, an approach the Federal Communications Commission has gone along with.

After Hurricane Katrina, for instance, carriers successfully opposed a federal rule that would have required them to have 24-hours of backup power on cell towers. In another instance, an FCC program to track crucial information during an emergency — such as which areas are down and the status of efforts to bring the network back — remainsentirely voluntary. Nor is the information collected made public.

After Sandy, when thousands roamed the streets looking for service, many had no idea where they could get a signal. AT&T and Sprint, among the major carriers, didn’t initially release details on what portion of their network was down.

The emergency issue has been part of a trend in deregulation of the telecommunications industry. Since 2010, more than 20 states have passed laws limiting their regulation of telecoms.

“The FCC is very concerned about the nature of their overall authority and whether rules would survive a court challenge,” says Harold Feld, senior vice president of Public Knowledge, a technology advocacy nonprofit. “So their approach is to push and nudge and come up with things that would be more acceptable to the industry.”

“Traditional carriers had reliability requirements, and reporting requirements,” says Susan Crawford, a visiting professor at Harvard’s Kennedy School of Government and a former technology adviser to President Obama. “We treat wireless and broadband much differently.”

An FCC spokesperson declined to comment on emergency planning issues beyond pointing to field hearings announced last week, to study the response by networks to Hurricane Sandy and other recent disasters.

Katrina also generated concern over emergency communications plans, but did not lead to binding rules. Instead, the FCC advised that the industry work with them to create emergency preparations checklists — voluntary best practices, rather than requirements.

The FCC’s voluntary Disaster Information Reporting System was also created in the wake of Katrina. The agency does not say which carriers are participating in the system, and says it can’t release the data that is reported because it is considered “sensitive, for national security and/or commercial reasons.” The FCC also hasn’t determined to what extent it can share information with state and local governments.

Carriers “actively report” to the database, and also work with the Department of Homeland Security during emergencies, according to Chris Guttman-McCabe, vice-president of regulatory affairs at CTIA-The Wireless Association, an industry group. “It’s clearly a balance,” he says, between “working with the government on getting information to them” and “trying to stand up the networks.”

Others argue that a voluntary system isn’t enough to inform the public or hold companies accountable. “When it’s voluntary, what are the expectations about the accuracy of information?” Feld says. “It’s a whole other thing to have to give a serious, mandatory assessment to a federal agency.”

Another instance where a voluntary initiative met pushback from carriers is a new system of Wireless Emergency Alerts, beamed out from cell towers in a disaster area to anyone with a capable phone within reach. Most carriers are participating, graduallyphasing in new phones with the ability to receive WEAs.

But the carriers resisted recommendations that they should be able to target the alerts more precisely, and not just to county-level.

First responders in Western states in particular, where counties can be enormous, would like the ability to issue more local warnings, according to Art Botterell and Lorin Bristow, both emergency planning experts. Botterell also noted that cities could benefit from the ability to blast messages to a radius of just a few blocks, citing New York City’s 2007 steam pipe explosion. “Worrying about lighting up the whole county creates a disincentive to use it at all,” says Botterell.

The industry had argued that not all carriers had the technological capability to offer that kind of precise targeting. The Telecommunications Industry Association wrote that “geotargeting rules that are more stringent” than county-level could “stifle innovation, delay the roll-out [of the program] and reduce voluntary participation.” (Some carriers are now working with local officials to offer more flexible targeting, according to Bristow.)

Carriers have long argued along these lines — that disasters each present unique scenarios and that companies need to stay flexible as technologies change. The carriers say it is in their best interest to keep networks running, and point to the quick deployment of portable towers after Sandy and examples like AT&T and T-Mobileallowing customers to roam between networks.

Feld, of Public Knowledge, says that the “technological flexibility argument is true, but it’s not a show-stopper. We have to balance flexibility against the need to have real emergency planning.”


11 thoughts on “Cell Phones What every activist needs to know”

  1. Pingback: Blog

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s