All Episodes
Dec. 22, 2023 - Jim Fetzer
01:12:08
JACK MULLEN – Privacy and Freedom in a Digital World
| Copy link to current segment

Time Text
Welcome back, everyone, to Faults, Flags, and Conspiracies 2023.
I'm your evening host, Lorien Fenton, and Dr. James Fetzer is our illustrious leader.
He is the person who put together all of these amazing speakers today, and tomorrow looks like it's going to be equally as powerful.
What can I say?
Dr. Rima Laboe was just with us.
And now we have Jack Mullen, and I'm very excited to hear what he's got to say about our privacy, which personally, I don't think there is any, but hey, that's just my opinion for being a computer nerd for all these years.
And the way the AI is going now, I think we're in deep trouble, but that's something for Jack to address here.
So, without further ado, let's have Jack Mullen start his presentation.
And, Jack, be sure to tell everybody how they can find you and where they can listen to any podcast or be in touch with you about your presentation.
So, thank you.
Okay.
All right.
Thank you, Lauren.
Hello, everyone.
Thank you for stopping by tonight.
I'm better in the middle of the day, I think, but we'll make it happen.
Anyway, I can be found in various places.
One of the places that you can find everything that I've ever uttered, basically, is at thegovernmentrag.com and the sister site called blog.thegovernmentrag.com.
And there's ways to contact me through there.
I also am part of James Fetzer's various projects and his latest project is allthingsreconsidered.tv, which is his membership site.
I encourage anyone who's interested in Jim and wants to support him and at the same time get an inside look, become a member and Jim and I usually get together every week and talk and I can be reached directly there through the comments and through email.
So that's another place you can find me.
I do a lot of things.
I'm associated with MyPatriotsNetwork.com, which is a site that supposedly we created originally to try to make a social media out of it for patriots, but we've kind of moved it into the position where it's more about Providing information to patriots, but regardless, it's a great site, and I'm a co-founder of that, too.
So, that's how you can get in touch with me.
Now, I noticed, Lorne, when you mentioned that there's no privacy left, you kind of smiled, and I think that's the general synopsis, or the way in which all Americans think about privacy, especially when it comes to not peeping Toms and people in your yard, but the idea that you can be
Completely surveilled in a digital world that you can be involved with drag nets that you don't even understand are happening.
And that you every single thing that you do in the digital world is tracked and it is listed in databases.
It's available to law enforcement.
All of your text messages are available to law enforcement and all of your phone calls.
They're recorded, and they're available to law enforcement.
Now, it's even worse than that, though.
The telephone system has a data channel, which is referred to as SS7.
It's possible with people with the right knowledge to be able to access SS7, and private people pick up your text messages.
So, I'm going to give tips through this, and I want to qualify everything here as I'm not an expert in this subject.
I got interested in it in about I don't know, three or four months ago and took a deep dive.
I was interested in knowing whether my Apple products.
Because I'm a big Linux fan and everything that I do in the cyber security world and in the web hosting world, etc.
I do with Linux boxes and I love Linux.
I think Linux is a wonderful operating system and I've had several Linux laptops and desktops and so forth.
But I could never get over the fact that I just loved the way Apple's operating system looks and feels.
And how comfortable it is to use the keyboard.
And so, you know, having used Mac for 20 years or more, it's hard to give up.
And so I was thinking about it's time to just give it up altogether.
And I started thinking about the iPhone.
And, you know, Apple presents itself as a privacy company.
I mean, that's one of the things that people Believe about Apple and their marketing works really well.
I don't, we might remember most of us when McAfee, well yeah, McAfee was one of them, but back when the FBI was trying to, it was the shooting that was in San Bernardino, California and apparently the shooter had Something on the phone that the police thought they had to have, but they couldn't get into the phone.
And McAfee comes into this story in a minute, but they went to Apple and said, you know, could you break into this phone for us and give us the information we want?
And Apple refused to do so.
And they did so very publicly.
And that that bought them a lot of customers because they felt like Apple was standing up against the government and, you know, all forces that would would steal your privacy.
And they were taking, you know, taking up for the customer.
But as you will see, and I hope I can convey with this discussion tonight, it's It's rather, I don't know, ad hoc.
It represents me doing a deep dive into a situation that I had only a cursory knowledge of, and my background is in electrical engineering and computer science and software and so forth, but this component of how these various technologies we're going to talk about tonight work, I never looked at at all, and so I was shocked by some of the things I learned.
I mean, some of it is Oh, and I'll mention it blew me away.
And I think that if you haven't heard these things, it'll blow you away, too.
Now, there may be people in the audience that have heard all of this, and therefore, you know, I encourage you to stick with me for a little bit.
Maybe you'll hear something you haven't heard, but regardless, I get it.
So anyway, in that story, McCarthy was asked if he would Come up with a way to break into that iPhone.
Publicly, he said that he could break into it.
I think he said in less than 15 minutes, and of course, I read his solution to how it would break into it and it was pretty trivial.
And yes, he could break into it in 15 minutes, but the police never came back to him for that.
To take him up on his offer, so I marked that down.
As a false flag event and.
I've listened to the presenters here today and, you know, I think everybody here understands this world isn't what we think it is at all.
It's something that is so radically different than what we think it is that all of our lives have been living in an illusion.
And so when it comes to how things present themselves in the mainstream media or television, how the news media presents information to us, It is not truth at all.
It's entirely 100% propaganda.
Anything that makes primetime news is something that has such extraordinary value to the propaganda agenda that it breaks through and makes it to the top.
But if it's something that has nothing much to do with the agenda, no matter how important, how exciting, how dangerous, whatever it happens to be about, it will not be on these news stations, the things we call mainstream news.
And as we've seen, and this is part of my talk tonight, we can't find things anymore on the Internet.
It used to be I could search for something that I was looking for an idea to get a thread of where to start looking and things would pop right up like crazy and I never use Google and I'm going to say that at the beginning of this right now.
Stop using Google search.
Google search isn't even any good.
I mean it's unless you're looking for recipes and anything mainstream you want to know what the latest fad is or your Interest in Taylor Swift.
Yeah, Google worked pretty fine for that kind of thing.
But the problem is, and we'll get to this soon too, is that Google is only in the business of surveillance and selling your information.
It's only in the business of figuring out who you are, exactly who you are.
Figuring out everything that you know, figuring out what kind of person you are.
In fact, figuring it out to the point where they could take their data and stick it into an avatar in a game of life, a computer simulation, and you would just begin to act like yourself.
That's what Google wants.
And that's what Google has.
So when you're using Google Search, you're providing them an enormous amount of information that they don't deserve.
And that they don't come clean and tell you that they're selling to anybody who would like to have information on any particular one of us.
And so.
The point being is that this world isn't what we think it is.
And I'm going to start off with a couple of seconds to talk about the nature of this talk.
It's about freedom and privacy.
And is there any such thing as privacy?
And Lauren had laughed.
And I think most Americans feel the same way.
I don't really care.
I'm not doing anything wrong.
You're not looking through my bedroom window, which is not true.
And you're not standing in my kitchen or harassing any of my children.
That's not true.
These things are all happening, but you can't see them and you're not aware of them.
And because of that, it seems like people don't care.
Lauren, I'm going to try to share my PowerPoint as we tried to do last night.
I think I cleaned it up a little bit.
If you don't like it, you jump in and I'll switch over to... Oh, no, I think it'll be fine, Jack.
Just go ahead.
Okay, but I can switch over to a PDF, which I made, which looks pretty nice, too.
Okay.
We'll give this a shot here.
Now, we're not in the play mode yet.
There.
How's that look?
I'm not seeing the slideshow presentation.
I'm just seeing the back end.
Well, that must not look too good.
Let's see if we can do that again.
And I selected the WP Office.
What back end were you seeing, by the way?
I was seeing where you create the slides, you know, the usual.
Oh, OK.
OK, so that and I was showing you the front end.
So I'm just going to go ahead and we're going to jump over to the.
And I'm not using Word and I'm using WPS for Mac, and I think that that's what's going on with that.
Anyway, we'll jump over here and I'll bring this back to where it belongs on slide one.
And how about that?
That's better.
Yeah, that looks nice.
I can still see the sidebar with the different, but that's okay.
Yeah, and that's going to have to stay there because that's fine.
Okay, so anyway, this conversation can begin with Snowden and the stuff in 2013 that Snowden brought to our attention.
He was a young man, 29-year-old intelligence contractor, working for one of the most I don't know what you would call them evil companies on planet Earth.
But Booz Allen Hamilton is one of the largest contractors to the U.S.
government, the U.S.
military, anybody that needs help, DARPA, you name it.
And they have over 10,000 employees.
And this company is mostly made up of former intelligence operators that worked as contractors or directly for the US government in intelligence work.
So we can say we have a whole company filled of intelligence operators.
And that makes it interesting, because that means that Booz Allen is a private company functioning in the capacity of a Intelligence operation working for the US government, but it's not a US government employee and being private gives it a whole lot of flexibility that I'm going to mention here in a little bit as to what they can do with what they know.
Anyway, I don't know what motivated Edward Snowden and whether he's a false flag.
You know, my heart wants to say he brought this information to us not because he wanted to just live in Russia for the rest of his life or be stuck.
But because somewhere else in this world, there's somebody, some group, some handful of people that encouraged him one way or another to do something for humanity.
Because as every one of your people that we heard from today have mentioned, humanity is about ready to walk off the cliff.
And it's literally a walk-off.
I mean, there's hardly anybody standing up and doing what's right, and doing that scream that Dr. Rima was talking about, and pushing these people back.
And that's all it's going to take.
I mean, these people are weak, afeet, ancient, Diseased.
I can think of a lot of other negative things, but that's what they are.
And for us to give our life up and our way of living and our children's future to this group of monsters is uncomfortable.
Anyway, so Snowden releases more than 7,000 documents, and he does that by traveling to Hong Kong and meeting with some journalists.
And from the BBC, and others, and he, he began detailing the amount of spying that he was involved with and had and was witness to and he also quote stole these documents.
So, in my frame of thinking.
He actually did humanity a service, and he took something from an organization that was stealing something from us, and that is our lives.
So anyway, I think most of us heard many of the things that came out, and I just have a little list here, and I'm sorry, I'm going to have to take a drink.
I love this bottled water from Arkansas.
Anyway, some of the things that he came up with was the NSA has a program called Evil Olive that collects and stores large quantities of America's internet metadata, which contains only certain information about online content Now, the word metadata is important to understand.
Email metadata, for example, reveals the sender And the recipient's address and the time, but not the content.
Now, we live in a strange world where the government's allowed to deal with metadata, especially when it comes to things like phone calls and text messages and so forth, although they become pretty lax on that.
But regardless, they have...
They're allowed to look at metadata.
Metadata is something that comes along with a message.
Metadata might be considered the return address on an envelope, but it's not the message itself.
And so over the years, they've figured out a way to say, we can look at the metadata, but we can't look at the message itself.
But the metadata is very revealing.
So we can see here, in this case, that the metadata has the sender and the recipient's address, the time, and so forth.
Until 2011, the Obama administration permitted the NSA's continued collections of vast amounts of Americans' emails and Internet metadata under the Bush-era program called Stellar Wind, which It was mind-boggling.
If you ever feel like getting into any of these topics, you know, you can find a lot of good books about Snowden, and you can watch the movie.
The Washington Post publishes a new slide detailing NSA's upstream program of collecting communications from tech companies through fiber optic cables to then feed it into PRISM, into the PRISM database, which is a very famous Long standing, and it goes back into the 70s, database of information and software to gather information that had been long running.
Anyway, they get this upstream program of collecting communications from tech companies.
Now, these are, you know, American private companies that are providing this data.
They're not getting in the way of it.
They're not complaining.
They're basically partnering with the NSA.
And Google is part of this partnering.
And Google and Facebook both allowed the NSA to monitor and collect large amounts of data.
And both of those operations are just spying operations.
We hear a lot of negative comments in this world today about TikTok, you know, and Trump was all about TikTok for whatever, who knows what reason.
You know, how it's evil when they're collecting information on Americans and they have software on the phones that's tracking you.
And of course, none of that's true.
And TikTok doesn't even require two-factor authentication.
Facebook, on the other hand, requires two-factor authentication.
So when you sign up for account, They won't let you have an account unless you agree to do two-factor authentication, which is only useful to them to get your phone number.
Now, you know, what's Facebook?
It's just a social media.
What do we need two-factor authentication for?
And even if you think, well, I still don't want people to be able to fake being me or whatever, that's not what Facebook was about when it was two-factor authentication.
And we're going to talk about why two-factor authentication is a method of stealing information from you.
Anyway, the NSA sifts through vast amounts of American email and text communications going in and out of the country.
Internal NSA document reveals agency loophole that allows secret backdoor for the agency to search its database for U.S.
citizens and phone calls without a warrant.
And of course, these things make me laugh.
Loopholes and secret backdoors.
There's nothing secret about the backdoors.
They're there.
And there doesn't require any loophole at all.
None of these people I don't have any physical block to them doing to any data set they want anything they'd like to do.
And they do it routinely.
They set up monitoring stations.
They have monitoring stations all over Europe, all over the Middle East, places where they, you know, tie into the Cisco network routers and monitor the traffic.
It's something we can talk about all day.
And it, you know, there's nothing that prevents them to do whatever they want.
How do we know?
Now, you know, a few whistleblowers may show up, but I contend that any whistleblower will be bought out.
I mean, we live in a world of being bought out.
And I would say that because of the ability of these companies to actually put a window in your life, if you can imagine, say, the movie 1984, where we had a great big television screen, which was two-way, That was a window into, you know, the individuals in that scenario's life.
Winston Smith, for example, you know, he had just a small room with a large screen in front of him and people watched everything he did 24-7.
And I think that that's probably why most of the people that get into government now, the good ones, have to get out because they know they're being watched and they will be compromised.
So anyway, Snowden reveals data leak between private big tech companies and the government citizen spying, and I basically covered this information, but we see that they collected data through backdoors in the U.S.
internet companies such as Google and Facebook with the program called PRISM, which we talked about, and they use the word backdoors because that's supposed to sound technical.
You know, it's just another one of those damn backdoors.
But backdoors are generally straightforward entries to computer systems through open ports or password protected or passkey protected entry points where they're given access and then go in and do whatever they need to do.
Using a man in the middle attack, NSA spied on Google, the French Ministry of Foreign Affairs, the Society of World Bank, Worldwide Interbank Financial Telecommunications, and the Brazilian oil company Petrobras.
I don't know how to say that either.
The NSA has the ability to access user data from most major smartphones on the market, including Apple, iPhones, Blackberries, Google Android phones, etc.
I would argue that they may not have the ability to access that data from this one, because this is the granddaddy of all surveillance systems.
But anyway, there was a recent so-called hack.
It was a Trojan.
Anyway, it was a piece of software called Pegasus that was able to get into, and still is, and able, so from the point of view of a person using their phone, and this is, I'm talking about Apple, going to a particular website, being set up to go to that website, maybe through a text message, and then using Safari, Apple Safari, which they fixed this one in Safari, but people were running around with old versions of the software.
But anyway, with Safari, it would download a piece of software and then through an error or a... I guess you could call that a...
Software failure inside of the kernel.
The kernel is the control system inside of the technology that is the Apple's computer system.
Now on every phone we have two computer systems.
We have a computer system that manages the modem and works essentially for the phone company.
And that particular computer is basically spying and only accountable to the phone system.
And then we have the computer inside of a A phone that belongs to big tech and in the case Apple has their own hardware and and it is not open source and it is completely proprietary and And therefore, it is supposedly easier to do things with it that you can't see.
But at the same time, they may have some errors in software that go undetected.
And this particular issue was with the kernel in the central processor of the Apple phones, where this particular software that was derived by coming through a browser Was able to activate and then download software and become root on the Apple phone, which means that it could download its own software and then take over the phone fundamentally at the position of being the same as you at your own computer when you log in as admin.
Or if you're using Mac, your root, or if you're using Linux, your root.
Now the way a telephone works, a cell phone for example, iPhones, Blackberries, now they're pretty much out of the picture, but let's say Google Android phones, is that they set up a virtual machine and so all apps and so forth that run on these phones do not have access to the root level.
So they can't do things that people think they can do.
And that's why I'm hesitant to believe that the NSA can do something with Apple unless they happen to be using this particular piece of software that's in the hands of three Israelis who manage a company that does nothing but provide hacking and surveillance and data stealing.
Hardware and software to the highest bidder and this particular software was called Pegasus and Pegasus was able to be bought for I think Saudi Arabia paid him 55 million dollars for a copy and then they could set up the particular person that was going to be the target and it would download the software necessary, take advantage of the day one software issue that was
Part of Apple's kernel and then take over the phone and from then they had complete total access.
They could listen to phone calls.
They could read data and documents.
There was no nothing they couldn't do.
They could turn the camera on and surreptitiously watch you and so forth.
And then we're going to see that that's not only.
Pegasus that can do that, but in fact, Apple can do that.
And Apple has one of the most sophisticated surveillance systems ever developed.
Anyway, the last thing here was piggybacking on online cookies acquired by Google.
Of course, Google is going to make sure they have them.
They use those cookies to track advertisers.
The NSA is able to locate new targets for hacking.
I don't know what they were looking for there and what kind of hackers.
But anyway, I came upon this years ago, and I'm not particularly fond of Louis D. Brandeis, but I do like this particular quote, the makers of the Constitution conferred the most comprehensive of rights and the right most valued by all civilized men, the right to be left alone.
And I think as Americans, that's what we were brought up to believe.
And I believe anyone in the room right now who is, say, over the age of
40 is probably been brought up in that environment and you know people my age and I'm the tail end of the boomers we came up with all kinds of illusions you know the government was here to protect us and this can't happen here and greatest nation on earth and always looking for you know the most peaceful solutions to any problem and and the list goes on and on and on and of course as I said at the beginning none of that was true at all certainly hasn't been true since 1913
When we lost control of our ability to be the creator of our own credit and manage of our own money that was given to the Federal Reserve, the most corrupt institution on earth, and primarily the primary reason for why we're in this situation today, regardless of who Klaus Schwab works for or any of the people that that are planning for us to eat bugs and, you know, Bill Gates's little
Decision to buy Cargill and other massive farming operations so they can get rid of our meat.
None of those people would have the resources necessary if it weren't for the fact that the Federal Reserve stole the American wealth and in doing so then built this almost a parallel civilization by which most Americans didn't know existed and now suddenly we're getting aware of it.
Anyway, Quickly, freedom and privacy.
Mostly, we don't have a good set of rules for what privacy is about.
Definitions are hard to find.
I mean, it means the right to personal autonomy and the right to choose whether or not to engage in certain acts or have certain experiences.
And these things here don't have any way to address the problem of private companies Having access to your personal information in a digital sense.
This is where all of our past leftists without a solution.
But I'm going to show you one interesting thing here in a minute that I think is pretty interesting about the U.S.
Constitution.
Anyway, the amendments that were created, and I'm not saying right now, because I'm going to say here in a few minutes, the Constitution doesn't apply to private corporations.
And so a few weeks ago, I think it was back in 22 when Trump sued Twitter and he sued them for violating his right to free speech.
I mean, the judge didn't even look at the thing.
It just threw it back at him and said, you're not you didn't bring a constitutional issue.
The government's not involved here.
This is a private company.
And if they don't want to let you talk, they don't have to let you talk.
And if you've signed their agreements and agreed to their terms of service and So anyway, but for the average American, and that includes me in my heart, because we all go back to when we're young and think this is the way it's supposed to be.
You know, we felt like the First Amendment was about privacy of beliefs.
The Third Amendment protected the home against the use of it for housing soldiers, and I'm going to come back to that one.
The Fourth Amendment protects privacy against unreasonable searches, and this is one of the places where people like myself would have originally gone to to look for A way around the kinds of things that Google and Apple and Facebook and others, you know, treat our private matters.
The Fifth Amendment protects us against self-incrimination, and this comes up easily with Google, because you self-incriminate yourself with these cell phone companies all the time, and you don't know it.
And It in turn protects the privacy of personal information.
Ninth Amendment says that, you know, certain rights should not be construed or deny or disparage other rights retained by the people.
And that basically is saying that, you know, all rights not left to the government belong to us.
And that would include the right to privacy.
And then the 14th Amendment.
In the Due Process Clause of the 14th Amendment, which states, no state shall make or enforce any law that shall bridge the privileges or immunities of citizens of the United States, nor shall any state deprive any person of life, liberty, and property without due process of law, nor deny to any person within its jurisdiction the equal protection of laws.
And so the due process of law is the idea that if you're going to steal my information or come in and spy on me, you should have some sort of court order, and it should be at least quasi legal.
Anyway, I started thinking about the Third Amendment today, and I work with, I manage and am part of the staff basically for the CSPOA's website, and Stephanie also works for Sheriff Richard Mack as well.
And we take care of the site and make sure it's up and running and any kind of technical problems, etc.
Anyway, I also work with Sheriff Mack once a week on his weekly program for members, because it's a membership site, called the Posse.
And in that Posse program, we talk about everything that has to do with the Constitution.
And Sheriff Mack, and we call him Sheriff Mack, but he's former Sheriff Richard Mack, And he's also the founder of CSPOA, and he is the inspiration for its continued operation.
He always has amazing things to discuss, and one day, a couple weeks ago, he was talking about how the Founding Fathers organized the Bill of Rights, and they organized it, he thought, in order of importance, not saying that anything In the whole was less important than everything else.
It all requires it all to be there.
But if you're going to read one of them first, which one would you choose?
Then the second and third and so forth.
And so we all know that the freedom of speech is entirely encompasses freedom.
I mean, without freedom of speech, you have no freedom at all.
And without elaborating longer on that, the Second Amendment is there for purposes of maintaining the first and all the rest of them.
And that's unquestionable.
Now, the next one came up, he said, I wonder why, and he was being a little bit funny, you know, they thought it was so important that they made number three, the third amendment, which is a simple little amendment that says no soldier shall in time of peace be quartered in any house without the consent of the owner, nor in time of war, but in a manner that is prescribed by law.
And he said, I think that that was number three there because that was extremely important to those people at that time.
And he went on to suggest that he had read some, you know, some newspaper clippings and maybe pieces from diaries and stuff where people were Really put out.
I mean they they had no privacy.
Okay.
So this is where I'm going to get back to privacy in the Constitution because most people say it's not there.
I say it's right here.
They left it with us.
They had no privacy because they had an individual living in their home that listened to every word.
They said that could spy on every behavior that could look through their papers when they weren't looking and so Anything that they saw that they may not agree with or thought was a conspiracy to undermine whatever it was that the soldiers were standing for, they believed that this was something that they could go tell somebody.
So, in this particular case, the Third Amendment prohibited the use of the current technology of that day to subdue, control, monitor, surveil, eavesdrop, and spy on a population.
It prohibited the 16th century equivalent of 24-hour day mass surveillance of the population.
Now, even though these soldiers may or may not have been friendly soldiers, in the case of the British, the British would force themselves into your house.
And in that case, they were definitely enemy soldiers.
They certainly weren't there on your behalf.
I think that this is a way we can look at what's happening to us today, because everybody's home is completely filled with an army of soldiers.
And these soldiers work for enemy governments.
They work for enemy corporations.
They work for our own government in a way in which you would call an enemy.
And therefore, the Third Amendment, I believe, is one of the things that people should point to when they're talking about Constitutional ways to protect your privacy.
So anyway, this brings me to the portion of this conversation that may get along and a little bit boring for people, but I wanted to talk a little bit about how all this is done, and I hope that I can maintain myself through this.
What about Big Tech and their occupation of homes and extended homes at work and car and private activity?
Okay, so let's talk about personal surveillance by private tech.
Big tech spying technology.
Google, Apple, and Facebook.
They are very aggressive.
They do not tell you the truth.
They're not forthcoming.
Facebook is the most aggressive and dangerous player on the actual internet, outside of the fact that Google controls most of the internet.
So you got to give them some extra points there.
These people are in your lives every day, whether you know it or not.
Okay, so people talk about personal surveillance by private tech by looking at tracking.
All right, so we'll start with tracking.
So we have a system of satellites in the air that are called Global Navigation Satellite Systems.
And in the United States, it's called GPS.
But it's not called that in England, for example, in the UK, it's called Galileo.
And China has their own version.
The Russian version is called GLONASS.
Anyway, these are just massive amounts of satellites that are used for purposes of geolocation information and providing data to militaries and rockets that are being launched and to cell phones.
And we have satellites and cell phones that use this information to get position information and location information.
And I want to talk a little bit of how that works.
Okay, so we have satellites and cell phones.
And people think that somehow there's a GPS type of apparatus on the phone that just figures out where it is.
But in reality, a cell phone It has to make contact with four satellites.
Now, obviously, it's not bi-directional, so it has to sense four satellites.
And in the beginning, back when this was created, back in the 60s, there were 24 satellites in the early 70s.
There's a lot more than that now.
But regardless, they had to get four good signals, three of which were for triangulation.
One of them was a time standard.
And they needed this information and after they got it, they could then calculate their own position in space relative to the positions and the known positions of these satellites.
All right.
Well, the problem with this is that this takes time and it can take up to four minutes for a cell phone to find the nearest satellites with the best signals and then lock in and get the necessary data and so forth and then figure out where it is.
Well, If they do walk in and get the four positional satellites, they end up with a location accuracy of 11.8 inches.
And it used to be a lot less than that.
I mean, people would say, you know, if you're not in the military, you don't get it any better than 100 feet.
But I think we do get it a lot better than 100 feet now.
Google and people surrounding Google in the tech world came up with a way in which cell phones could get that information faster.
In other words, they didn't need to sit there and wait for positional satellites to be sensed and then decide which four were the strongest and go through that procedure.
What they did was they came up with a Well, they didn't come up with some individual came up with this idea, which was called Supple, and that is its short name.
Its long name is something that I have trouble remembering, but I did put it in my notes.
Anyway, we'll get to it in a second, because I got to go back to my notes.
Anyway, the way it works is like this.
When a cell phone is outside, it makes contact with the nearest router.
I'm sorry, the nearest cell phone tower.
And that cell phone tower advertises its ID.
So the phone just looks around, finds the highest signal and the best signal, and then gets the ID from that cell tower.
It doesn't matter what cell tower it is.
It's not related to whatever phone company your phone's with.
As soon as it gets that piece of information, it sends this information through the Internet that the phone has.
All phones are generally connected to the Internet through the phone company to supple.google.com.
And then supple.google.com takes that information, And returns the location of the four closest and best suited satellites.
So within a few seconds, the phone has the location, it makes contact by sensing the satellite signal, it gets its location and it's ready to roll.
And it was necessary to do that because people wanted to use this, these positioning signals for purposes of, you know, maps, Google Maps, your navigation maps in your car and so forth.
So it became possible then for them to speed this up dramatically.
This idea of Supple was created by an individual who had a patent on it and sold it to Google for who knows what.
But the thing about it is Google owns the patent and Google owns all of the data that comes to Supple.
And Google is not the only phone company that uses Supple.
So does all the rest of them.
And one of the things that I found by looking around is that And I put the link to this right here, Wireless Moves, blah, blah, blah, blah, blah.
And anybody that wants this and can't get it from here can contact me.
Regardless, and you can find it, it's blog.wirelessmoves.com and look up Supple Reveals My Identity and Location to Google.
Okay, so here we go with the first part of this privacy invasion.
When Google sends the name of the cell phone tower that the phone found for it to Supple, it also sends with it information from your phone.
And namely, it sends one and probably two pieces of information.
Both of them could be considered serial numbers.
Both of them belong individually to one of the processors.
The processor that goes with the phone itself has a number, a serial number, if you will, that's called an IMEI.
And I am a number, and then the owners of the modem, or the people that connect you to the cell phone system their processor has a number that goes with your SIM card it's called an MZ.
These are two pieces of information that define your phone, define you.
If used properly, they present an identity.
Because we know that in order to get a phone nowadays, you have to go through the Know Your Customer stuff.
And that's not to, you know, protect you from fraud or whatever it is they might tell you it is, but it's basically to give them exact knowledge about who owns the phone.
And so, When data is sent to SEPL from Apple or Google, along goes with it information about your phone.
And in particular, the EMSI number is a dead giveaway to your phone number.
And in the case of Google, they'll be sending perhaps your Google ID with that as well.
So anyway, Google ends up with almost immediately the information about who owns the phone.
All right, so now we know where you are, and we know who you are, basically, just by the phone saying, you know, I need to find out where I am, so I can tell Google where I am, and then I can power navigation, and so forth.
Now, I want to make this other point, and maybe I'm going to slip through this stuff, but the things that get on your cell phone, and I'm going to use the Apple, because the Apple is no comparison There's no comparison between Google's Android phones and the Apple phone.
I mean, in terms of the technology, the quality, the built-in things that it can do, and more things that I'm going to tell you it's going to do that you probably don't know it does, it stands hands and feet above the Google phones.
Now, I call them Google phones because they are Google phones.
They have Google software on.
Google creates the operating system, and therefore, it's basically a Google phone.
But the operating system sits on top of the Android operating system, which is open source, which is the AOSP, Android Open Source Projects operating system, which makes that phone a better choice for everybody, and we're going to see why.
But when Google puts their software on it, you don't want it.
So in the end of this thing, I'm going to tell you how you can get your hands on phones that are de-googled, and doing so will free you up significantly from some of the change that Google's put around you.
But in the meantime, the phones get your exact location.
Now, I'm going to just stop there for a second and say, just with that information alone, what could we do with that?
Well, That information says, I know where you are, and I know basically who you are.
Now with that information alone, Google could track any phone it wants to track.
It's not exact, and these organizations are becoming more and more insane.
They don't want to know where you are within a quarter of a mile.
They want to know where you are within 11 inches.
So at this point, they don't know that.
They just know that we know you're near this particular cell tower, and this is your phone information, and I've got your SIM card information.
So with that information alone, they can track phones.
All right, so we hear a lot of fairytale stuff, like we know that we've got mass numbers of immigrants coming across the border.
We know 12,000 a day are coming across in some locations in Texas and Arizona.
They're all given phones.
They're given computers.
They're given cash.
They're given hotel rooms and airline tickets.
You know, welcome to the USA.
So then we hear stories about, but then they just vanished into the woods.
You know, we don't know where they went.
They got on airplanes.
They're gone.
But in fact, they're not gone.
I mean, Google can know where they are for the most part.
Within whatever distance is typical for most cell towers.
So, you know, most cell towers are pretty close to people.
I would say where I live right now, I'm probably less than a half mile from a cell phone tower.
So anyway, you know where you are within a half mile and you know whose phone it is.
Now, another thing you can do with that is you can monitor troop movement.
You can monitor people movement.
So I call these immigrants troops because they're fighting age males.
Coming into this country with no females, no loved ones, no apparent interest in going back to where they came from.
And I have to wonder what they're here for.
And I think that we're going to find out what they're here for.
But in the meantime, I feel if we consider them a block, we can say we can follow these block of people and see where they're going.
The same way, for example, when the Wagner Group, which is a mercenary operation that was operating out of Russia on behalf of Russia, suddenly decided they were going to turn on Russia.
They were heading towards what people believed was a location where they could find Putin.
To do something, you know, that probably wasn't going to be nice.
That didn't happen.
But regardless, they all have cell phones.
I mean, I can see pictures of them.
I looked them up.
They have cell phones.
So whether they know it or not, you can track large groups of people very simply with a cell phone without even trying.
But that doesn't get down to the nitty gritty because this thing gets so interesting that I hope I can explain it to you properly.
I don't want to have to read it out of my notes.
But let's just get moving with it.
All right.
So we got we got the supple and they got your phone and they know approximately where you are.
But we want to know exactly where you are.
All right.
So the cell phone gets back that information.
It recomputes its location and suddenly it knows where it is within 11 inches.
And the cell phone knows where it is.
We're within 11 inches and therefore so does Google.
All right.
So very quickly it finds out.
But at the same time.
GPS doesn't work in inside houses.
And this is where the thing blew me away.
This is one of the most important parts of this first part of this conversation.
So when you walk into your home, the GPS functionality stops.
And for the most part, your phone is contacting and updating its position in milliseconds.
And so that means it's pretty busy doing that all the time.
And that means that somebody tracking you can get this information all, you know, precisely.
Every place you've stopped along the way from the kitchen to the restroom, it's going to know.
But let's say we're inside.
All right.
We don't have any GPS.
Well, the next thing that we find out is that Google and Apple and the other spying companies have created a way in which there is a process called Wi-Fi scanning.
And what they do is your phone will then beginning as soon as it gets inside realizes it's lost GPS, it'll begin to scan for Wi-Fi.
Now if you've looked at your own phone, you know that Wi-Fi is not a very private thing.
I mean if you if I open my phone up right here I'd see maybe 20 different Wi-Fi's.
So, your phone looks it up at the Wi-Fi's and goes, whoo-hoo!
You know, there's plenty of them here.
Let me pick out the top three signal strength-wise.
And with that top three signal sense, it takes that information and it uses something called Network Location Protocol, which is part of your phone, to send the information about the Wi-Fi's it found.
All right, so what does it find?
It finds The signal strength, and it finds its MAC address.
All right, a Wi-Fi advertises itself as being available.
Now, most of us see something called the SSID, but that's not that important.
You can find a Wi-Fi without the SSID.
But a Wi-Fi's most important attribute when you first find it is that it tells you how to talk to it, and it gives you an address, and that address is called a MAC address.
All right, so your phone gets the MAC addresses of the three top signal Wi-Fi's in your area.
It sends them to the network location protocol.
Network location protocol sends back to your phone an exact location for where it is.
And this is one of the things that I thought was one of the most startling things when I first started looking into this.
is that Google and Apple know the exact location of every router on Earth, every Wi-Fi router on planet Earth.
And I'm going to get to in a second how they do that.
But I'm going to remind you that back in the 80s and 90s, I don't think 80s, but back in the 90s, we all remember those Google buses driving around and vans.
Doing photographs and taking photographs and videos of locations for purposes of Google Earth, and that's what we were told.
But in the meantime... Hey, Jack!
I just wanted to let you know you've got about 10 minutes left.
Oh, wow!
Well, let's just move through this quickly.
Anyway, so Google didn't, at that time, they mapped all the locations of the Of the routers and so they got the signal strength from the routers and they triangulated with other known positions including their own and they were able to calculate the exact position of those routers.
Okay.
Well, that was in the 90s and early 2000s.
Well, how do they continue to do that?
Well, your phone does it for them now.
So every time your phone's outside and not in GP not needing To find its location through using the Network Location Program, it works in reverse.
It finds all the various routers that it can see and begins sending information about the signal strength and the MAC addresses to the Network Location Program, and it also sends its exact position from GPS.
So with that information and knowing the signal strengths, they can calculate the positions of the routers.
Now, they'll already have them because people have been there before with cell phones, but maybe somebody bought a new one.
It comes a line of movements into the system.
So for free, People walk around and they give Google and Apple information about where you are, and also they find out where every router is, including your own, which you thought maybe was private and personal to yourself.
That's why I call this section, The Enemy Within.
Okay, because this information is your personal technology, your phone and computers and tablets and so forth, they work against you continuously.
Not only do you pay for a phone, But you're not the primary user of the phone.
The primary user of the phone is Apple and Google.
And, or, you know, if you have some other service set, they're the primary user.
They constantly monitor your phone, they take data from it, they learn things about the environment and other sensors.
Okay, we get back to the Apple computer and the Apple.
And by the way, this all applies to a computer.
So computers don't have GPS sensing devices in them.
They don't need them.
They just use the same protocol, the network location protocol, and they can tell you within a few inches of where they're sitting.
And it's just an amazing system.
Anyway, There are additional networks out there that you're not aware of, or maybe not aware of, that operate in secret or underneath that you can't see and don't realize are there.
And that is something called the Mesh Network.
And the Mesh Network is primarily an Apple and Amazon product right now.
Google doesn't currently have a Mesh Network, which is surprising, but I would imagine they're going to get involved with it soon.
But anyway, I'm going to rush through these slides.
The Mesh Network is created by something called Bluetooth Low Energy.
It's a technology of secret networks.
It is the thing that powers the Amazon AirTag, the Amazon, I'm sorry, this should be Apple AirTag, the Amazon Sidewalk Network, Ring cameras, and the Amazon Echo.
And Amazon Echo and Apple Alexa, tech, by the way, are always listening to you.
And there's something important about that, and I don't, I hate that I'm running out of time, but Snowden alerted us to something called voice prints.
And not only do you have a fingerprint and other kinds of prints, you know, your optic nerve print, you have a voiceprint.
And a voiceprint was something that was discovered in the 1970s and has been used ever since to identify accurately where somebody is on the planet simply by listening.
Now, this voiceprint is different than just your voice.
So, Amazon Echo and the Alexa stuff, they send your voice to the headquarters.
It's not done in the phone.
The voice is then transcribed there, and then whatever the AI decides it's going to tell you to do or do for you, it sends that information back to the phone.
That means that your voice is saved there, and that means that you can have a voiceprint created by these organizations, and you undoubtedly do.
A voiceprint then can within, I mean, I'm reading multiple sources saying within a few minutes, if you speak and somebody's looking for you, you're found because phones listen when you don't know, outside cameras are listening when you don't know, blah, blah, blah.
So that's another thing to be concerned about.
These technologies sound neat, but they're in your house to spy on you.
So Apple has something that it uses that I'm calling a secret mesh network.
But what it is, is a system where it produces Things like AirTags.
An AirTag is a device that you can say, you know, find my keys, and it can find your keys for you, or you can put it in your car in case it's stolen, or you can hang it on your child's bag going out the door in case they get lost, etc.
These AirTags, they use the same technology, Bluetooth Low Energy.
The AirTag sits wherever it is, dormant, until an iPhone comes by.
When an iPhone comes by, This thing on a regular basis wakes up to see if an iPhone is in the vicinity and it sends out a chirp, a blast of energy and in that energy is a ID tag and if an iPhone is walking by it has the ability to hear that and that Bluetooth low energy signal.
And that information, then, that this AirTag has is there's a communication process that takes place between the AirTag and the Apple.
The Apple iPhone figures out the exact location of the AirTag.
I mean, amazing how it can find it.
It finds the exact angle the AirTag is away from the phone.
It can compute the distance because of this technology.
And then it finds its own location, sends the AirTags information, which is his ID, and its own location back to Apple and says, aha, here's an AirTag.
It's not necessarily that somebody's looking for the AirTag at that second.
It's just updating the information about where that AirTag is.
Somebody may have stolen your bag and your AirTag's in the bag.
Every iPhone along the way will report its location.
Well, the other interesting thing about the iPhone is it also behaves as an AirTag when you turn it off.
So when you turn off an iPhone, it still monitors you.
You cannot get out of the surveillance of an iPhone without using a Faraday bag.
You put your iPhone in shut-off mode and power it down, the Bluetooth receiver becomes an AirTag.
And every so often, it wakes up and sends out a message saying, I'm an AirTag.
Is there any iPhones around?
And if it finds an iPhone, guess what it does?
It sends its last known information and other information, like perhaps its MZ and IMEI number, to the listening Bluetooth device, another iPhone, and that particular device then takes that information and makes a decision whether it's able to rebroadcast it on the Bluetooth network because it has no internet connection and it's not inside of a Wi-Fi zone, or it's also off
It can then therefore decide I'm going to have to wait and rebroadcast this information.
You can see, and quickly I can, you know, let you understand that there are really millions of iPhones in the world, and this network is everywhere, and the information that gets transferred through it is unbelievable.
And it's involved with something that Google, I'm sorry, that Apple can do alone right now, and it's called client-side scanning, and it's where they can scan everything on your phone, and they have a built-in neural network, and it's a system that they unleashed with iOS 13.
It was announced that they were going to start using it to look for images of child sexual Abuse, CSAM, but they later backed down from it because they got some backlash.
But that technology still exists in the phone, and that technology can be used to receive information from the Bluetooth Mesh Network about what to do.
Like, for example, here's information that we would like you to start searching for broadly, meaning that it will be sent out to a whole slew of phones.
And then the individual iPhones will make the decision about whether it's applicable to them and then begin searching their own phone.
The Apple is able to use your images and with their own neural technology, the AI built in, they can see the images, they can see the people in them, they can see Physical things in the images, etc.
Your phone is completely open to this technology.
And this Bluetooth technology then can be used to send the information back to Apple headquarters without anyone ever the wiser.
And because there are people that pay attention to the emissions of these phones looking for privacy breaches.
Not knowing that they have another secondary channel and out of band channel that's independent completely of the phone.
The phone has very little control over that, and it will still operate even if you're using your own Bluetooth situation.
So remember ring cameras.
And Apple iPhones have facial recognition technology.
You can see it.
If you bring up the camera on your phone, you'll see it draws a little square around images and they give you other reasons for what that is.
But that is in all likelihood related to the neural networks that they've the neural network software they created and the A.I.
that goes with it in order to get a facial recognition from pictures.
Ring cameras are the same way.
In fact, any camera that you're now putting in your home will support facial recognition.
What does that mean?
That means that when you put them in your home, all of your pictures go out.
When you put them in your baby's bedroom and watching your loved one, the facial recognition software is working.
That information goes to a third party.
You access the third party to see it.
And if you're looking to find Fine lines of their terms of service.
There's no promise of absolute privacy.
So when the US government is looking for someone, they will not only talk to Apple and Google, but they'll talk to these networks that control these cameras and say, you know, we're looking for this particular person and the facial recognition stuff will do it.
It's like being in a Panopticon prison.
It's a prison of total supervision.
Now, are there more of these networks?
We don't know, but we do know that Bluetooth low energy is probably the likely candidate.
It is so amazing what it can do and how it can coexist with others on the using the same energy and same wavelengths.
And yet not clash with them.
You can encrypt the messages and all the encryption is done out of band, meaning that no matter what, you can't put a man in the middle and see what's on the messages being sent from these Bluetooth devices because the encryption is being done out of band, meaning it's being done back at encryption and decryption is being done at the level of Apple headquarters.
So anyway, Quickly, we have surveillance capitalism.
We have Google IDs and Apple IDs.
Google and Apple monitor your app usage.
They know everything you look at.
They know everything that you do with your app.
They know how many hours you look at it, what applications you like, what you like to download.
Stop using Google searches now.
The browsers get fingerprinted and it's very easy to decide that this browser always goes with the guy that likes to go to Amazon and go to a particular section of books.
So that goes into a little folder.
If they can connect you with your browser, then boom, they've got that folder tied to you.
All right.
One of the things that two-factor authentication does is it allows them to do cross-platform tracking.
So you're trying to log into your YouTube account or your Gmail account on another computer in your house, and Gmail won't let you in.
It says you're going to have to do two-factor authentication.
Well, they don't let you do telephone SMS type two-factor authentication.
Now, they want you to use an application.
They'll tell you to go back to your other computer or your iPhone.
Actually, they want you to go to your iPhone.
They want you to go to your Google phone, and they'll tell you to open the YouTube app.
Okay, you do that, and that YouTube app immediately begins sending your phone information to Google or Apple, depending on which phone we're talking about, and that two-factor authentication then confirms for Google That secondary computer that you're on, that they don't recognize, belongs to you.
So they begin to do cross-platform tracking across your whole sphere.
I'd like people to look up this stuff, Google Jigsaw and Moonshot CVE, and see how Google uses different disinformation campaigns by redirecting search results to sites that they determine appropriate.
I have a list of tips here.
I wanted to go quickly through this jigsaw thing.
It's very important to see what they're doing with your information.
They have programs that they claim deradicalize jihadis, and they're planning to use it for right-wing American extremists next.
Well, this is from 2016, so that's the sort of thing they're doing.
You can get an idea of what Moonshot and Jigsaw are about by reading their three main areas of work.
They're going to find stuff that's about you, they're going to understand what kind of person you are, and then they're going to intervene in your life.
They can produce maps of where
Domestic violence extremists are mobilizing and here's a map from Texas and this is based on a particular title of a project title and this was final report violent far-right North America search engines domestic violent extremist mobilization United States now they know who's searching for this kind of information was 46 percent male and 54 percent female but not only that they know what county what happens if you live in that county
Have you been looking at too many Trump advertisements or going to Trump websites or even worse?
You know, maybe you're looking up how to protect your privacy.
Anyway, these are the sort of things that you may or may not know that Google can do with your information.
But none of these companies are out for you.
All right?
I suggest you get out of Apple products altogether.
I'm doing so.
I've already moved to a de-Googled phone.
My iPhone stays entirely in a Faraday bag.
You can buy the Google phones and a lot of this information I'm giving you today came from this individual named Rob Braxman and you can find him on YouTube at Rob Braxman Tech and his site Braxme.com.
He sells these products and I can tell you that I have one and I believe in it.
But anyway, you should use cell phone sources for your internet instead of using DSL and other connected to your home systems, because they can't track your IP.
And that's because they don't have enough IPs to go around.
So they're using entirely IP6 IP addresses internally, which means that when it's time to talk to you with IP4, which is what everybody is listening for, They have to go to a broad bank and borrow an IP address and they may have thousands of people using the same IP.
You should use a VPN to protect your IP, but also to protect your information from your ISP and cell phone companies.
It becomes encrypted and they can't see it.
But if you do not have a VPN from where it goes from hop to hop, it gets decrypted.
Your information can be seen.
You can remove your SIM card when you're in locations like the January 6th event and you're wanting to go to something that you feel like you don't want to be tracked there.
Get rid of your SIM card to stop your EMSI tracking.
The geofencing that found 985 Trump supporters and the FBI visited their homes through geofencing.
The idea that your phone can provide Google with enough information about where you are 24-7, that the Justice Department, in quotes, can then do a subpoena from Google and, you know, tell you exactly where you were at that given day, and a thousand other people.
Try to separate your browsers, put all Google stuff on one browser, and remember Google Analytics and Google Ads are on every site.
Those things query the cookies that are on your machine, and if you recently logged into a Google application, your Google ID is in the cookies.
So, if you go to someplace else, the Google ID goes with you, and Google's analytics on somewhere else can say, oh, there's one of our friends here.
I'll note that this ID was at this site at this time.
You should be aware that your pictures on your phones all contain metadata, and that metadata needs to be removed.
And there are removing software applications you can get.
It's called EXIF.
It has everything from where you were, your exact time, and all sorts of other things that go with it that describe that picture.
So if you ever want to send a picture that you don't want to know somebody to know where it came from.
If you don't get rid of this metadata, then then you're screwed.
All right.
I think that I can get out of here at this time and feel like I've covered this information.
I plan on making a part two to this.
And I'm going to put this up with links.
And the second part is going to be more about how we can fight back.
But let's start off with first everybody thinking about getting a de-Google phone.
So that means you've got to look it up.
And I recommend Rob Braxman's YouTube channel to do that.
The man is actually a brilliant individual.
And that's the place to start first.
And is his YouTube channel his name?
Yes, Rob Braxman Tech, T-E-C-H.
OK, and that's B-R-A-X-M-A-N?
Braxman?
B-R-A-X-M-A-N.
Yep, that's it.
OK, perfect.
OK, so you guys got that, Rob Braxman Tech, and that is on YouTube, correct?
Yeah, and his other website is BraxMe.com.
And he's seen all sorts of privacy things.
I subscribe to his email, okay?
And email is highly surveyed.
If you think that Google drives and the various ways in which Google can store your information is private, it's not.
And also, if you have mail and Gmail, consider it read.
And there are ways to keep your email safe.
Using Google for any reason whatsoever will not do that.
So be careful with any kind of outside drive that you put your stuff on.
Them telling you that it's end-to-end encrypted, that only means... I mean, it's really a funny thing.
All stuff's end-to-end encrypted when it's transmitted by HTTPS.
When it gets to the other side, it's not encrypted, and they're going to look at it, guaranteed.
That's right.
Absolutely.
That's why I kind of laugh when everybody says, oh, Lori, we got to be on Signal.
And I said, the NSA got through Signal like the third day it was in existence.
So why are we going to Signal when they hear everything we say in here?
So, but it's okay.
I mean, it makes people feel better that they're trying all these different apps.
And the best thing is, as you've pointed out, is to get to a non-Google phone.
It's the most important thing people have got to take away from this presentation.
Thank you so much.
I'm going to let everybody know we're going to bring back our panel.
They're all probably falling asleep, but we'll get them back here.
And we'll get them with Jack, and we can answer your questions for all of you late night, you know, you night owl conspiracy theorists that have stuck around with us.
Export Selection