News reportage and analysis, criminal conspiracy investigations, general threat assessments and Information extractions from the memory hole. As well as insights and commentaries on the captive existence that we all experience currently as life under siege.


Showing posts with label iPhone. Show all posts
Showing posts with label iPhone. Show all posts

17 September, 2013

Pavlov's Degeneration X

 

Spot on new Apple iPhone advert send up that tells it just like it is. For all those shiny new object, toy worshippers who believe this little hipster monolith has the consumer's best intentions at heart. Don't say I didn't warn you earlier here: http://undeletedevidence.blogspot.com/2011/06/ispy-trojan-horse-technologies.html and here: http://undeletedevidence.blogspot.com/2010/12/grass-devices-iphone-or-spyphone.html

Question: Are we really so conditioned and trained, as to accept a piece of technology that actively spies on it's user in ways that would have made Allen Dulles and J. Edgar Hoover sexually climax at the prospect? Seriously every new piece of technology seems to be vetted at Langley, Virginia, DARPA or the NSA and then delivered to Apple for production. Hiring the best alpha-state programmers to then market (at exorbitant prices mind you) the latest super-grass device they can create (with Asian slave labour). What level have we allowed some of ourselves to sink to keep bastards like these in business? And that business is being a front for live-time SIGINT intelligence data collection at a rate never known in world previously. It's one thing to be so stupid as to joyously share the most intimate, up-to-date and private details  of your life and whereabouts on known intelligence fronts such as Facebook, Twitter, Instagram and the lot, but where does it end? You're literally giving it all away and selling yourself down the river, and for fucking well what? To own the newest, most expensive spy device that's all the rage with people who are indoctrinated to become their own worst enemies? 

There's a saying, that to serve them is to deserve them, and just what has this place become? What have we allowed ourselves to degenerate into? C'mon people, man and woman up, and tell these media-sanctified abominations that they can take the lot of their spy devices, cock them sideways and shove them up straight up their infernal arses. Time to become analogue people in the free-range digital panopticon, or enjoy your shiny iFriend grassing you out at every turn.

Let's peruse a checklist of personal data collected from you by Apple technology shall we?

Voiceprints (SIRI/phone) ✓
Fingerprint(s) ✓
Your exact geo-location via GPS ✓
Up-to-date pictures of you, your friends and family ✓
Email contents ✓
Names, addresses and phone numbers of all your contacts ✓
Every detail of the items stored in your Calendar ✓
Surveillance audio taken from the built-in microphone ✓
Your browsing history and bookmarks ✓

Think MKULTRA is an X-Files fantasy? Guess what, you're well soaking in it.

08 June, 2011

iSpy: Trojan Horse Technologies


*See new updates at end of post!*

Yesterday in the tech world, Apple's Steve Jobs announced a new service called "iCloud," which lets Apple product owners store documents and music on the Internet instead of on their own computer hard drives or mobile phones.

iCloud expands on the trend of cloud computing, which refers to the idea that computer users are storing more of their information "in the cloud" of the Internet rather than on their own storage drives.

For those who may not be familiar the newest introduction to the world of computing is this recently proposed idea of storing your personal data on a server that another party like Amazon, Google or Apple hosts. The idea in it's most sinister incarnation was first introduced by the likes of Amazon, Google and IBM acting as frontmen for obvious intelligence interests. Who else would benefit from inducing suckers people to store their most private of data on a total stranger's servers with zero knowledge of who has access? Cloud computing data storage is only the beginning, as companies like Google, Microsoft and Apple begin advancing steps to expand this technology to applications and even operating systems residing solely on the 'cloud'. User's home computers will be regulated to simple units that must access the cloud server to utilise virtualised systems. Instead of personal computers users will access the cloud for all their computing needs. They've even done up one better as money-mad thieving bastards. Instead of you just purchasing an operating system or applications for a pay and done deal, the cloud will introduce a monthly leasing fee. Sort of like rent-to-own scams where one "rents" furniture or computers from a company and pays upwards of three times the original price for the item(s) in leasing fees.

Eventually when this evil takes root and it will, as idiocratised people are trained to accept it, personal computing will be relegated as an antiquated notion used by "terrorists" with information to hide. Ponder this for a moment, what will you do when you've been using the cloud as your virtual system, and then suddenly you've been put on a digital 'no-fly' list and banned access to your data and computing access. All because your name just happened to turn up inadvertently on a federal watch-list. Or even worse, the iCloud is hacked and all your private information has been compromised and stolen? Still think the cloud is a safe environment for your data? Just ask Sony Playstation users who shared their data on Sony's servers how well that worked out recently.

I've stated it before and I'll say it until it hits home as hard as a fascist takeover, every device that is marketed to the consumer as a "can't live without" ultramega-god-toy is a intelligence-backed Trojan horse. Behind every new technology lies intelligence intercepts that track, trace, document, and pull every piece of valued information they can access. They will catalogue your voiceprints, fingerprints (yes they are actually patenting that technology to read it off the easily fingerprinted iPhone glass), contacts and personal associations, email, voice-mail, personal pictures as well as video. Facial recognition software married up to GPS tracking will ensure that they have the right bloke at the right location. In the new world of remote military violence GPS location and the correct target are all essential for what they quaintly dub pre-emptive assassination. And here you thought that drones were exclusively to be used in foreign wars to kill brown people sitting on resources or in strategic locales. Think I'm fuckin' about? Just chattering up wind to have a laugh about all this? Then you better well short-course your studies on military intel tactics and current events. Your future and eventual survival depends solidly upon it.

The Total Information Awareness programme was never dismantled as you were led to believe, just as COINTELPRO, the Phoenix Project and even MKULTRA were never decommissioned, they went underground and the names were changed in their current incarnations. They all run a regular as clockwork behind the scenes achieving and pursuing the objectives that they were created for. We are at the cusp of the establishment of the Total Information Awareness programme in its totality. Instead of going through central agencies, some of the civilian espionage (SIGINT, COMINT) has been contracted out to private concerns such as Google, Apple, IBM, Microsoft just to name a few. With Israeli intelligence setting up strategic interception points to siphon off economic, military, personal and private high value data. When you have compromising information at your disposal it is the simplest of matters to engineer all sorts of blackmail, false flags, covert drug, human and arms trafficking, and pinpoint your allies and opposition.

According to Counterpunch magazine Google in particular was sought out by U.S. intelligence services for their data (mining) collection expertise. Why not they contracted a consultant named Stephen Arnold of the defence and intelligence firm Booz Allen Hamilton Inc. At a audio recorded conference for current and former intelligence officials in Washington, D.C., in January 2006, he stated that relationship between the U.S. intelligence community and Google had become so close that at least three officers from “an unnamed intelligence agency” had been posted at Google’s headquarters in Mountain View, Calif. Kevin Bankston an attorney for the Electronic Frontier Foundation (EFF),  reported that that the Fourth Amendment’s protections against search and seizure do not apply. The caveats are buried deep in the text that users usually skip over, and click “I agree,” to install a new application. But the consequences are huge, says Bankston. “When private data is held by a third party like Google, the Supreme Court has ruled that you ‘assume the risk’ of disclosure of that data.” When you store e-mail at Gmail – or, similarly, in the cloud at Yahoo or Hotmail – “you lose your constitutional protections immediately.”


Google’s links with the intelligence agency may stretch back to 2004. In 1999, the CIA founded an IT venture capital firm called In-Q-Tel to research and invest in new digital technologies focused on intelligence gathering. An In-Q-Tel funded company, Keyhole, Inc., developed the satellite mapping technology that would be acquired in 2004 to become Google Earth. In-Q-Tel’s former director of technology assessment, Rob Painter, joined Google as a senior manager of Google Federal, his focus the “evangelizing and implementing [of ] Google Enterprise solutions for a host of users across the Intelligence and Defense Communities”. Former CNet blogger Christopher Soghoian revealed that Google applications launch without telling users that the processing and data storage is conducted on remote servers, as long as an Internet connection is maintained — easy enough, given the ubiquity of wireless broadband. Even with no connection, software such as Google’s Gears enable “offline” access to the cloud, running applications and storing data on a PC (again, no cost, no fuss) until a connection is re-established and the new data can be uploaded to Google. Thus the naive user transmits information to a third-party unwittingly – a modus operandi close to the definition of covert surveillance.

Google also works with some of the top players in the surveillance industry, notably Lockheed Martin and SRA International. Former CIA officer Robert Steele says that the CIA’s Office of Research and Development had, at one point, provided funding for Google. According to its literature, ORD has a charter to push beyond the state of the art, developing and applying technologies and equipment more advanced than anything commercially available, including communications, sensors, semi-conductors,high-speed computing, artificial intelligence, image recognition and database management. Steele says that Google’s liaison at the ORD is Dr. Rick Steinheiser, a counterterrorism data-mining expert and a long-time CIA analyst. Further, Anthony Kimery, a veteran intelligence reporter at Homeland Security Today, issued a report alleging a “secret relationship” between Google and U.S. intelligence. Google was “co-operating with U.S. intelligence agencies to provide national and homeland security-related user information from its vast databases,” with the intelligence agencies “working to ‘leverage Google’s [user] data monitoring’ capability as part of an effort to glean from this data information of ‘national security intelligence interest’ in the war on terror.” In other words, Google’s databases – or, some targeted portion – may have been dumped straight into the maw of U.S. intelligence agencies.

The hard brick truth, is that they consider us all potential threats to be categorised and dealt with in the short term and the long term. They are fucking well right too, for we mean to fight them and secure a proper life for ourselves, community and world. We mean to wrench our freedom from their filthy, bloody claws. for this generation and the next and have those who plotted our enslavement and destruction dealt with all due judicious permanence. Read that how you see bloody see fit. Challenge the onslaught and refuse to be a slave shitting away your life on death row. Ask yourself this one question before you retire for the night. Did your mother birth a slave to live and die to serve bankers? Your valuable life sacrificed in toil to serve human garbage wrapped in flesh. To make them obscenely rich whilst being simultaneously drained as dry as a vampire's victim. To be exploited mercilessly, summarily discarded when your usefulness expires and summarily replaced with another cog. Is this the future you envision for yourself and your progeny? Take bold steps to secure your privacy, your vanishing freedoms, and a proper standard of living fit for human beings right NOW!

Evil Bastards Update!

Apple has filed a patent on technology that would prevent iPhone users from filming live events such as concerts. The company plans to build into their systems a component that senses via infra-red whether the user is holding up their iPhone to film a concert or perhaps... another event altogether like a false flag, violent police incident or other emergency. You see that parts not up too the user anymore, Apple has decided that for you and you can read here: http://undeletedevidence.blogspot.com/2010/12/grass-devices-iphone-or-spyphone.html that clearly they only have your best intentions at heart.

Apple filed its patent application with U.S. authorities 18 months ago, but details only became available this month. It is not clear if Apple intends to develop the concept into a working system, and if so, whether it will be implemented within the company’s devices. The latest version of iPhone is expected in September. I terms of preventing the filming of concerts, this move has Apple proactively fellating entertainment industry interests. In the hopes of obtaining favourable terms with RIIA (the Recording Industry Association of America) and record labels, when negotiating deals to sell content though its iTunes online store.

So in summation, FUCK APPLE and all the likes of them as well!! If you must have a smart phone find a company that respects you and your privacy, or forgo it altogether and use a pay-as-you-go mobile. Devices like the iPhone and iPad are just glittering toys to show off to other people any way, just another useless status device that screams gullible consumer. Be smart and use a telecom company that doesn't pander to NSA demands or slavishly cater to media entertainment cabals. Never forget it's you who have the power, and can force change by simply refusing to go to concerts and refusing to buy and use their spy technology. Using their toys that serve their interests counter to your own, makes you an accomplice to your own enslavement.

15, June 2012 Update!

Still believe Apple is harmless and just developing "cool" gadgets for your tech-savvy lifestyle? Well, take time to read this little news item: Google and Apple using planes with military cameras to film you sunbathing in your back yard. Apple's newest iOS 6 for their iPhones, iPads and soon laptops as Mac OS X 10.8 Mountain Lion, will have integrated facial-recognition features, voice-print and command technologies, geo-location and tracking just for your pleasure and convenience. After all they wouldn't use this for evil, they're a cute, hip and cuddly corporation with direct NSA participation.

It's much worse than what is being marketed as friendly, helpful, state-of-the-art technology. This new marriage of ultra-invasive spy-surveillance, geo-location and digitised cartography is being integrated with the drones they plan on deploying en-masse over US skies very soon. In Afghanistan, Pakistan and Iraq, intelligence assets and operatives from MI6, Mossad and the CIA plant chips in alleged terrorist's homes, cars, or secretly on their person. The deadly tactical drones then hone in on the chip's transmitter signal and let loose their fire-power on the target and anyone standing near. It will be much the same domestically, except the targeting chip with be your iPhone, and eventually all smartphones, tablets and soon laptops that embed this technology in the device's operating system. Don't forget, in the US, they've gone the extra step of preparation, by naming a character by the name of John Brennan as an actual 'Assassination Czar'. Under this wildly illegal new plan, Brennan’s staff compiles a potential target list and is to run the names of assassination candidates past agencies such as the State Department at weekly White House meetings. We're being set-up for the big, fat kill, and you thought that only happened in Iraq and Afghanistan, where they were being cultivated and field-tested for later use in the domestic home countries.

8, September 2012 Update!

RT News  - Apple has patented a piece of technology which would allow government and police to block transmission of information, including video and photographs, from any public gathering or venue they deem “sensitive”, and “protected from externalities.”

In other words, these powers will have control over what can and cannot be documented on wireless devices during any public event.

And while the company says the affected sites are to be mostly cinemas, theaters, concert grounds and similar locations, Apple Inc. also says “covert police or government operations may require complete ‘blackout’ conditions.”

Those policies would be activated by GPS, and WiFi or mobile base-stations, which would ring-fence (“geofence”) around a building or a “sensitive area” to prevent phone cameras from taking pictures or recording video.

Seriously, Blackberry, Android and other new technologies waved about as the next "must have devices" are all being equipped with NSA mandated backdoors for covert surveillance and tracking. However Apple has stepped up aggressively in not only complying with these illegal government demands, but also innovating the technology to do so. Clearly anyone even entertaining the notion of assisting their efforts by rewarding them with purchases of their devices, needs their heads examined. For shiny-object worshippers have willingly stepped into the trap that will not only end any notions of privacy, but also contribute in the creation of a fascist police state. Oh well... Enjoy your free-range enslavement and electro-Stasi in 4G, and be sure to stop by the vat by the door for a tangy bit of Apple flavoured Flavor-Aid.

Sources:

• Counterpunch April 1-15, 2010 - The Cloud Panopticon
• Google, Cloud Computing and the Surveillance-Industrial Complex by Christopher Ketcham and Travis Kelly
No shooting at protest? Police may block mobile devices via Apple

19 December, 2010

Grass Devices: iPhone or SpyPhone?

The 'i' prefix stands for intelligence.


Everyone loves technology, and have come to depend on it in much the same way that a narcotics addict needs their toxic diversion. It's an acquired addiction that benefits the supplier far more than it does the user and as only exciting as the first fix. The cultures and traditions of hundreds if not thousands of years are being eroded by waves of diversionary trinkets and sensory stimulating baubles. Consumerism has fast become a new pseudo-culture, supplanting ones of substance and progressive value with transitory toys. Technology is now the only advancement that's being proffered to the public as a boon to their lives. Ask yourself when has anything of true merit and significance to humanity been released to the general public to enhance their state of being (save the Internet)? Has Cancer been conquered? AIDS? How about Muscular Dystrophy, who've had telethons that since 1966 have netted a total of $2.45 Billion that haven't advanced a measurable iota towards any kind of cure. Why should it? Suffering children are a commodity to be used ad nauseaum so that every year Sick-Donalds… oops I mean McDonalds, and other shitbank corporate operations can pledge huge sums of lucre for tax write-offs the following year. Plus, the MDA charity in and of itself is a foul scam at its heart, as are a lot of other charities that use sick and starving children as window dressing to cover the real crime of theft through deception. LiveAid anyone? But I digress from my main point greatly, which was to impart to you, that the technologies we are so enthralled with are nothing more than Trojan horse devices grassing us all out. Cavet Emptor played out larger than life.

Apple loves to release the latest wonders to the public with clever PR campaigns that imply that these toys are only for the cool, in-kids. You do want to be one of the cool lot don't you? The hip, effete, jaunty, young, in-the-know (of pop shite knowledge that is). What? Don't fancy one of our Asian-slave produced, grossly over-priced, god devices? Well, fuck straight off dinosaur and slink away to die-off you analogue anachronism. That is the Apple marketing and advert scheme in action. What does it get you when and if you succumb? Well, how about a device that records and collects your voiceprint, fingerprints, photographs and transmit via GPS your exact location with timestamp. How about it being used as an electronic audio surveillance device whether the device is on or off, or live-time video/audio minicam surveillance device with remote activation? Sound too good to be true? Wait… there's still more, how about a telecom device that catalogues the users unique heartbeat signature? What I've just described for you was Apple's iPhone and laptops and their very nasty built-in spyware. Below is but a sampling of information siphoning patents that Apple has applied for and secured:
  • The system can take a picture of the user's face, "without a flash, any noise, or any indication that a picture is being taken to prevent the current user from knowing he is being photographed";
  • The system can record the user's voice, whether or not a phone call is even being made;
  • The system can determine the user's unique individual heartbeat "signature";
  • To determine if the device has been hacked, the device can watch for "a sudden increase in memory usage of the electronic device";
  • The user's "Internet activity can be monitored or any communication packets that are served to the electronic device can be recorded"; and
  • The device can take a photograph of the surrounding location to determine where it is being used.
If that's not bad enough Apple and Google apps are data-mining intel from it's users and transmitting it without their authorisation to marketing concerns and intelligence fronts like MySpace. The apps  collect and transmit back among other pieces of private data, age, gender, income, ethnicity, sexual orientation, parental status and political views. 

Like to snap photos of your friends and family with the camera? Those are fair game as well, complete with geo-tagging the location where you took the pictures and video. Think your address book list of all your contacts is encrypted and safe as houses? How about breached and tarted full out to your local intelligence agency? It's one-stop shopping for device profiling of you, your habits, likes & dislikes, friends, family, finances and the lot. Marketed to you as the next shiny, must-acquire techno accoutrement that anyone who's anyone must have. The device that no one can live without who is a trusted friend you can depend on to enhance your career and life. Think of it all as iStasi, a mini surveillance state in the palm of your hand, or the All-Seeing Eye-Phone. You should be proud consumer, after-all you're saving the intelligence community a fortune in manpower and financial operating costs, by giving up all your personal data and privacy willingly and paying soundly for the privilege. What was once obtained only through court warrant is now available courtesy of Apple, Google, Microsoft and their ever so useful devices and apps.

  * UPDATE 21, March 2012 * 


If all that wasn't bad enough, according to a Wired.com article, CIA Director David Petraeus  want to take domestic espionage to a high technical art by integrating digital surveillance devices in television (New Samsung TVs Have Built-In HD Camera, Microphones, Face and Speech Recognition), car navigation systems, and even remotely controlled light switches and other in-home conveniences. At a summit for In-Q-Tel, the CIA's venture capital firm, Petraeus stated, "All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.

“Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters — all connected to the next-generation internet using abundant, low-cost, and high-power computing,”

Petraeus further said, “the latter now going to cloud computing, in many areas greater and greater supercomputing, and, ultimately, heading to quantum computing.”

The article additionally reveals, that hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation.

That’s not the only data exploit intriguing Petraeus. He’s interested in creating new online identities for his undercover spies — and sweeping away the “digital footprints” of agents who suddenly need to vanish.
“Proud parents document the arrival and growth of their future CIA officer in all forms of social media that the world can access for decades to come,” Petraeus observed. “Moreover, we have to figure out how to create the digital footprint for new identities for some officers.”
It’s hard to argue with that. Online cache is not a spy’s friend. But Petraeus has an inadvertent pal in Facebook.

Why? With the arrival of Timeline, Facebook made it super-easy to backdate your online history. Barack Obama, for instance, hasn’t been on Facebook since his birth in 1961. Creating new identities for CIA non-official cover operatives has arguably never been easier.


  * UPDATE 22, July 2014 * 

Normally I don't fancy gloating when a warning I've issued previously is substantiated by solid evidence, but I'm making an exception here. To all the psychologically disconnected fools who dismissed what we've been alerting you long ago about iPhone spying capabilities, here is some serious corroboration from an expert: Your iPhone May Be Rigged to Spy on You

Here's a brief excerpt:
iOS forensic examiner Jonathan Zdziarski may know more about iPhones than any other non-Apple employee. Yet even he can't find a reason for some of the mystery features buried within the iOS operating system, which look an awful lot like security backdoors that bypass user-designated data protections. The features could be there to let Apple — or even the National Security Agency or the FBI — get access to most of your iOS device's data without you knowing it.

Sources: