This page has been archived and commenting is disabled.
Inventor of Antivirus Sofware: The Government Is Planting Malicious Software On Your Phone So It Can See What You're Doing
Spy Agencies Are Intentionally Destroying Digital Security
Top computer and internet experts say that NSA spying breaks the functionality of our computers and of the Internet. It reduces functionality and reduces security by – for example – creating backdoors that malicious hackers can get through.
Remember, American and British spy agencies have intentionally weakened security for many decades. And it’s getting worse and worse. For example, they plan to use automated programs to infect millions of computers.
Smart Phones Vulnerable to Spying
We documented in 2013 that smart phones are very vulnerable to spying:
The government is spying on you through your phone … and may even remotely turn on your camera and microphone when your phone is off.
As one example, the NSA has inserted its code into Android’s operating system … bugging three-quarters of the world’s smartphones. Google – or the NSA – can remotely turn on your phone’s camera and recorder at any time.
Moreover, Google knows just about every WiFi password in the world … and so the NSA does as well, since it spies so widely on Google.
But it’s not just the Android. In reality, the NSA can spy on just about everyone’s smart phone.
Cell towers track where your phone is at any moment, and the major cell carriers, including Verizon and AT&T, responded to at least 1.3 million law enforcement requests for cell phone locations and other data in 2011. (And – given that your smartphone routinely sends your location information back to Apple or Google – it would be child’s play for the government to track your location that way.) Your iPhone, or other brand of smartphone is spying on virtually everything you do (ProPublica notes: “That’s No Phone. That’s My Tracker“). Remember, that might be happening even when your phone is turned off.
The NSA has gathered all of that cellphone location information.
“Encryption Doesn’t Matter In a World Where Anyone Can Plant Software On Your Phone and See What You’re Seeing”
John McAfee invented commercial antivirus software. He may be a controversial and eccentric figure … but the man knows his technology.
Earlier this month, McAfee told security expert Paul Asadoorian that encryption is dead. Specifically, he said:
- Every city in the country has 1 to 3 Stingray spy devices … Bigger cities like New York probably have 200 or 300
- When you buy a Stingray, Harris Corporation makes you sign a contract keeping your Stingray secret (background here and here)
- Stingray pushes automatic “updates” – really malicious software – onto your phone as soon as you come into range
- The software – written by the largest software company in the world – allows people to turn on your phone, microphone and camera, and read everything you do and see everything on your screen
- Encryption doesn’t matter in a world where anyone can plant software on your phone and see what you’re seeing. Protecting transmission of information from one device to the other doesn’t matter anymore … they can see what you see on your device
- There are many intrusions other than Stingray. For example, everyone has a mobile phone or mobile device which has at least 10 apps which have permission to access camera and microphone
- Bank of America’s online banking app requires you to accept microphones and cameras. McAfee called Bank of America and asked why they require microphones and cameras. They replied that – if you emptied all of the money in your account and said “it wasn’t me”, they could check, and then say:
Well, it certainly looks like you. And it certainly sounds like you.
- In order to do that, B of A’s app keeps your microphone and camera on for a half hour after you’ve finished your banking
- In addition, people can call you – and have you call them back – and plant software on your phone when you call them back
- advertisements -


Only a criminal government of treason, treachery, and tyranny need spy on the people.
The banksters need to repay us.
But do they know where the battlefield will be?
All my ideas and inventions stay in my head. I learned that the hard way.
Noise. Much much more noise.
I think vaguely about this often. Can't encrypt, can't really disappear if you need a phone to work. So what to do?
Make a lot of noise. Create bots, programs that continuously produce texts, calls, keyword searches etc. Buy phone numbers and link them to computers. Make them use red flag words. Make them appear to move from place to place. Create so much data, so much stuff to sift through, that it would become impossible to reasonably track any one thing. Now they are dealing with billions of data pieces. Make it so they have to sift trillions of trillions.
One always comes across these almost robotic responses: Yes . . . BUT .
When obvious to anyone with more than two neurons, there is no BUT!
No, individuals cannot emulate super computers or Beowulf clusters, Jocko!
What part of this does this trollbot, chatbot not understand?
Oopsy, guess I'm expecting too much of this contrarian software, huh?
Yes, but NSA and the other alphabet agencies use Google-like searches to search your records. So if there is 99 hours of drivel, but 1 hour where you talk about the Constitution, and they want to search what you think about the Constitution, they'll find it.
Great post, GW, but let us not forget about the hardware side as well:
Good-bye, Mr. Chips!
(Or, why that missing Malaysian Airlines MH370 is a really, really big deal --- besides the murder of 239 souls aboard.)
Onboard flight MH370 were twenty employees of Freescale Semiconductor, a major microchip producer, owner of major fabrication facilities (referred to as foundries in the industry).
Back in 2012, some researchers at an institute connected with Cambridge University discovered a backdoor, at the hardware level, in the Actel/Microsemi chip used for military purposes, designed and manufactured by the Microsemi Corporation. What the authors didn’t mention in their highly technical paper was that these chips are also to be found in ARINC avionics (ACARS: Aircraft Communications and Addressing Reporting System, formerly known as ARINC Communications and Addressing Report System --- plus other avionics communications systems), transponders and the black boxes (flight data recorders, cockpit voice recorders, crash recorders, etc.).
Microsemi chips are produced at Freescale foundries, as well as Freescale chips are also to be found in ARINC avionics, transponders along with a wide range of other industry applications.
It is important to note that the owners of Freescale Semiconductors are the Blackstone Group, the major private equity/leveraged buyout (PE/LBO) firm, and the majority owner, and the Carlyle Group, another PE/LBO firm and a minority owner.
It is also important to note that ARINC (designer and manufacturer of major avionics systems (fly-by-wire) aboard Boeing and Airbus jets was until recently owned by the Carlyle Group, and a portion of ARINC still is, as they moved ARINC’s DoD division over to Booz Allen, the major government intelligence contractor (where Edward Snowden last worked in America), and also owned by the Carlyle Group.
Malaysian Airlines, which may have figured into it, was at that time partially owned by the hedge fund of Lord Jacob Rothschild, long an advisor to the aforementioned Blackstone Group.
The previously mentioned Microsemi Corporation, whose chips are backdoored, or compromised, is managed by James Peterson, CEO and board member. Peterson is one of the sons of Peter G. Peterson, founding member of the Blackstone Group.
Both the process of chipping (purposely introducing defects into chips for cryptographic penetration) and backdoors in chips, dates back to the late 1950s and 1960s.
When the U-2 spy plane was shot down over the Soviet Union, it contained chipped cryptographic communications gear, developed by the NSA at the instigation of the CIA, which the CIA hoped the Soviets would copy, allowing deep penetration by the NSA. Unfortunately, this was around the time of the real defection of two NSA employees (Martin and Mitchell), so after being given the coordinates of the U-2’s air route by previous “defector” Lee Oswald to allow the Soviets to shoot it down, they were now possibly savvy to the covert operation’s agenda.
The first major successful operation involving backdoored chips was supposed to have occurred in the 1980s, when an American industrial controls computer system (SCADA) was sold illegally through a Swiss firm to the Soviets, and resulted in a series of major explosions at their northern Baltic Sea naval installation (chips set to control maximum temperatures of fuels did the opposite).
When a group is seeking to compromise, and therefore control, both the Internet and a wide spectrum of computer hardware applications (communications, transportation, industrial, financial, etc.) the process of chip access is crucial, and to do that covertly it must be done at the chip fabrication point.
Hence the use of, and subsequent disposal (murder), of those Freescale Semiconductor engineers aboard flight MH370.
Below is the youtube link to a video from a SAIConference (SAIC, is one of the two government intelligence contractors, the other being Booz Allen), the expert from University College London (who spent years with the GCHQ), explains in general how to hack into a Boeing 777, but then ends with his opinion that it wasn’t hacked into --- unfortunately, he refrains from mentioning who the systems are designed and manufactured by, and also their ownership!
Very crucial data . . .
https://www.youtube.com/watch?v=uVWc9P4EiME
Suggested reading:
https://www.cl.cam.ac.uk/~sps32/Silicon_scan_draft.pdf
Research Boeing, Honeywell and Raytheon. .. The Boeing system is a US patient owned by Boeing alone although I think Honeywell helped develop it. Look up the patient and pay special attention to where the satellite downlink ends up. You will be appalled. The Raytheon system is a bit older and information on it is hard to dig up. Raytheon shields information behind the DoD national security black curtain.
I have it from two former Raytheon engineers that the autopilot/remote control system can ‘out fly’ a pair of human pilots x 10. The standby test pilots actually DEMANDED to be removed from the test aircraft during testing in the late ‘90s. The ‘out of envelope’ (glide slope) landings were scaring the shit out of the flying cowboys aboard. The techies claim they never bent up an airframe no matter what they subjected the system to.
Something else to look into is the worldwide GPS system which is required to fly the system precisely. Remember what year they demilitarize GPS? It went from something like +/- 300’ to something like +/- 10’. How wide were the WTC towers again?
~ DC
No offense, dood, but I think you are missing the point, besides not being particularly technically proficient regarding avionics systems, airborne airliner avionics systems, satellite systems, chip fabrication systems, etc., etc., etc.
In other words, you are discussing something long ago, and we are discussing the present, i.e., Equation Group, the Stuxnet subset, Snowden leaks, and the penultimate hack, at the chip level.
What you cannot grasp, chum, you cannot begin to understand.
While the cyberjacking and subsequent murder of 239 passengers aboard to masquerade the intended victims (Freescale Semiconductor chip fabrication engineers, i.e., industrial engineers of the digital age) are important, what is even more mind-boggling is the possibility, if not probability, that they are now in control at the FPGA and chip level, which bolsters the blog post's point, along with the report on the Equation Group by Kaspersky Labs.
For mobile devices (supporting OMA-DM*) it's more integrated than planted/implanted
Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol
https://www.blackhat.com/docs/us-14/materials/us-14-Solnik-Cellular-Expl...
* That's 2 BILLION DEVICES according to authors
Swap cell phones.
Cover camera lense.
If you use a smart phone then you have ZERO privacy and security from government, hackers, thieves, etc.
I have a safe deposit box stuffed with the best of the pre-smart phones that have clam-shell design with full physical keyboard excellent for texting, because production of these kinds of phones ended years ago. They are impervious to hacking by anyone for any reason, excellent for texting and voice.
If you use Facebook, then you are begging to get tracked, snooped, hacked, impersonated, invaded, ripped-off, and violated in all the ways that are possible.
your computer can also go into listen mode and record audio at will for hours, then push it out on the internet.
the DoD is now banning computers from office spaces unless they have heavily audited the machines.
Russia has gone back to using typewriters for sensitive documents.
A smart phone is a dumb idea.
True Story =
The day before yesterday we woke up to find a flat tire on a vehicle here so after trying to re-inflate it to no avail I yank the wheel and tire and take it to a local garage.
The proprietor calls and hour or two later and tells me the sidewall on the tire in question is damaged and I will need a new tire. I tell him fine, specify a brand and tell him to just ‘do it’ Star Trek style.
This tire ‘problem’ was dealt with in one short voice only phone call between a cell phone and land line. No online searches, no phoning around town to tire stores for prices, no texting my mechanic for advice, no smoke signals, no mass community involvement what-so-ever.
This morning I flip on my laptop, come to ZH and instead of the normal fair of investment ads, toy spy drone pushing and the ever present hot Asian girls that are just dying to meet me (I never have figured that one out as I’m actually into tight assed redheads and big titted blondes…..but I digress) I find the side bars slathered with tire advertisements, reviews and buy three and get one free retread deals.
WTF? F, F, F, F!
Eavesdropping is just plain rude to begin with but this blatant, ‘in your face’ spying and then while they’re at it let us ‘sell ya a little something’ to boot is just UN FUCKING ACCEPTABLE!!!
Makes me want to run off and join ISIS.
You hear that, you fucking Nefarious Spying Assholes (NSA)!!
~ DC
Here's one right up your alley Georgie.
http://www.cbsnews.com/news/top-law-officials-personal-information-poste...
The following quote given by the DHS is priceless and sounds a lot like what's being said here.
A message along with the posting titled "DHS-CIA-FBI TRAITORS HOME ADDRESSES" states:
"LET THESE EVIL NWO SATANISTS KNOW THAT THERE WILL BE HELL TO PAY FOR THEIR 911 TREASON, AND THEIR FUTURE FEMA CAMP PLANNED PUBLIC CRACKDOWN TREASON ALSO
JESUS IS LORD, AND THE PUBLIC IS IN CHARGE, NOT THESE SATANIC NWO STOOGES"
I expect any metal container or foil lined envelop would protect you phone from tacking.
Criminals will have this worked out. The rest of us will be forced to live under constant surveillance.
This is NOT limited to government -- it happens in Russia and Hungary all the time -- so sleep soundly knowing that all your BitCoins and electronic money could disappear in the blink of an iPhone!
When did you guys start restarting threads and removing all prior comments?
Did Hitlery take over maintainance of your servers?
George, you seem like you'd be on top of this - why is there an ISIS base 8 miles from Texas?
http://www.judicialwatch.org/blog/2015/04/isis-camp-a-few-miles-from-tex...
'
'
'
In the future, you threat level will be elevated by the authorities if you do not own a smart phone.
And hang out commenting on ZeroHedge.
•?•
V-V
(deleted, Paveway IV nailed it)
No commenting necessary. If you spend any amount of time going to or reading alternative news sites, you're going into the FEMA ovens first.
Psychopaths are all about control. If you already went off-script, then you're useless to them.
Google is listening ALL THE TIME, and if Google "hears" it, the NSA can hear it too.
How do I know?
My hub and I has a conversation about buying a scrub brush by Lodge for cast iron cookware. I did NOT search for it online, nor was I near my computer (which was shut off) or any tablet. Conversation took place about 7 pm at night.
The next day I was on the web and EVERY Amazon ad was for the Lodge cast iron or cleaners.
This happened a few months ago with sewing machines and a month or so before that with pressure cookers.
I'm creating a soundproof faraday box that I'm going to start throwing my electronics in.
We are in prison, just haven't noticed the bar yet, well, few of us. I'm sure that'll change soon.
We are now at the point that to get away you have to totally unplug and take your batteries out. Which completely negates the whole reason for having a cell phone - being easily reached.
We suck. Hard.
I had a similar experience late Fall. My son was planning a trip to Europe and he was going to be there last December and wanted some advice on winter wear (we live in SoCal), so I told him about getting a good jacket, from Northface or LL Bean, that would be similar to my field jacket, I had in the Marines. The kind that covers your lower torso completely. The funny part, was that I was discussing this with him in a 'secure' area in my office (no cellphones allowed), but I'm sure he was on his cell. The very next day (just like you), ads were appearing from Northface with full torso length jackets on my WORK PC!
And get this. I haven't posted on Facebook in at least a year or longer and rarely do anyways. I'm fighting a misdemeanor 'vehicle' case (that has a ton of penalties and fines, you'all know what it is) and have never mentioned it on Facebook or anywhere else, when suddenly, Facebook pops up with MY ATTORNEY as someone I might know!!! And I know, he'd never, ever discuss a pending case on line, because that would be a gross violation of the code of ethics and would get him disbarred! He is a great attorney BTW, but WTF???
I'm always surprised that people are surprised by this.
Tinfoil hat 101: Wake the fuck up - there are dozens of computers listening to you on your cell phone, your home (wired) phone and your broadband internet connection.
Experiment for the non-tinfoil hat types: Works best if you have crap like a Facebook and Amazon ID because they're especially good at it and it's probably associated with your cell phone already. People say eBay is getting better at this, too. Call up your home phone from your cell phone. Answer your home phone and leave it off the hook. Carry on a fairly brief conversation and mention a product several times that you would never in your life buy or be interested in on your cell phone. Mention a few top brand names. Expensive yuppie items are the best. Leave it connected, then go over to your home phone and talk briefly about an entirely unrelated product mentioning some brand names. Hang up both phones, you're done. Let the computers digest your new-found 'interests' for a while.
Tomorrow, go to Amazon. Surprise! No go to Google and do a search on the generic versions of those products. WAT?? Now try Bing or Yahoo Search.
50/50 this works to some degree. Some people say you have to have Siri turned on in your iPhone, but it works on other types that don't have Siri.
Israeli technology at its finest.
I was going to respond 'bullshit' since that doesn't happen to me.......but then I remembered I have 'adblock' turned on everywhere so perhaps it is.
Will have to run a little test on this one.
I hope those who may be considering armed resistance against the liberal fascist government are aware of this. Any such resistance would be doomed to failure. The FEMA prisons and the DHS's purchase of one billion rounds of ammunition are further evidence of the futility of armed resistance against the government.
The only options that I see are to 1) educate the mass of people to non-violently resist the government and to vote for true libertarians who would dismantle the police state or 2) leave the USSA for a more peaceful country, and there are many. I have no hope for the first option, but Gandhi was able to pull off a miracle in India; another such miracle could happen here.
Benjamin Franklin said, "Where liberty is, there is my country." I suggest that people not be too beholden to the physical space of this country, but rather love the intellectual space occupied by the founders such as Jefferson, Washington, Franklin, Madison, etc.
One of the greatest hidden strengths of the American people is our naivite. We don't know what we aren't supposed to be able to do.
Our handlers will try the tricks on us they've learned in 60 years of back-and-forth struggle for the control of the popuations of Europe, Asia, South America and Africa, and they will miscalculate because even they won't expect us to be so naive.
Our handlers will set barriers they expect will turn us, and we will surprise them by blundering right through them. People will rise up in anger at atrocities other peoples have become innured to. Perhaps we'll fail to walk into traps they set for us because we don't even see the bait.
And then there are the "Boy Scouts", the Snowdens and Mannings and countless others, even embedded in the security apparatus itself, who still believe in quaint ideas like right and wrong.
We are approaching a very dangerous moment in our history, but I would never counsel despair. The future is unknown and surprises abound.
cell phones have been trackleable for quite sometime
the difference is now the'yre even more track-able
My friends, family and business aquaintances all thought I was a conspiracy crackpot when "smart phones" first came out. I held onto my "Star Trek flip phone" until it gave out last year. Now I am completely trackable, just like everyone else...I am always amazed how even the brightest of people will give up their privacy for the sake of conveneience.
here's a question - is there a cellphone that isn't trackable? obviously smart phones are probably the easiest targets. but what about non-smart cellphones...do they even exist anymore?
IIRC, there is a law that says that the location of cell phones must be knowable for emergency service purposes, and that law existed even in the heyday of flip phones.
No. Even older cell phones are trackable, harder to track, but trackable. Every phone has an ID number unique to that phone (that is how the network routes phone calls to you). Even without the newer tracking spyware, they can track your location by the cell tower servicing your phone.
For a truly secure phone, you have to build your own phone server, place your cell on airplane mode and use only the wifi function and connect with encrypted VoIP apps.
You mean something like this.
http://www.torfone.org/
Get rid of your cellphone completely and build a raspberry pi voip phone instead.
No unless properly shielded for EM leakage. They all have an electronic heartbeat smart or otherwise and no 2 heartbeats are exactly alike. It is called a quartz crystal. There is always minuet timing differences at small enough time intervals. It is only a case of if someone might have a device that is sensitive enough to be able to detect those minuet timing differences. Time is a function of distance, E=MC^2. The 2 distance parameters at play here are the the rate aka mili or nano seconds/minutes etc which each is being observed at and the precision of said measurements aka .001 or .00000001 for example. Observable distance as a function of time is the key. Quartz crystal is pulsed in seconds for example but you are observing it in nanoseconds.
The fact all electrical devices leak EM unless properly shielded makes them 2 way communication devices in this regard.
f a r a d a y
https://en.wikipedia.org/wiki/Faraday_cage
...
Faraday cages cannot block static or slowly varying magnetic fields, such as the Earth's magnetic field (a compass will still work inside). To a large degree, though, they shield the interior from external electromagnetic radiation if the conductor is thick enough and any holes are significantly smaller than the wavelength of the radiation.
...
Key words large degree, it will not filter minuet differences, everything is bounded by an operational range aka observable time interval.
3 words, rare earth magnets. You can't manufacture batteries to the precision level where you control down to the atoms and what type of each atom including isotopes are in it aka small degree. The chemical reaction will never be constant causing some small degree of variability in the voltage which turn causes variability in the magnets and magnetic fields they generate. The preciseness of the faraday cage also counts. You can measure that precise but can't build a faraday cage that precise, yet. We are getting down into quantum mechanics level here. Manufacturing techniques are not there yet as far as I know. You can't fully filter the EM discharge so you would also need to obfuscate it with noise for example or directionally discharge it through some sort of grounding process.
Wrap your cell phone in aluminum foil and call it. If you have fully wrapped it, you will not get the call. This will also block EM radiation coming out of the phone, but it will not block a straight electric field coming out of it. Fortunately, these fields are going to be weak enough that you'd have to be pretty close to get anything out of it with any practical equipment that could be built for police use.
Surfing porn will never be fun again.
1. Our protectors are criminals hiding behind a duty to obey an illegal contract. http://law.academic.ru/9811/illegal_contract
2. Omniscience is useless without intelligent response.
3. We're fools, if we trust government. Our government masters are fools, if they value the info provided by their underlings.
4. What do we know? Nothing. What do our masters in government know? Everything, they believe.
Is there trust among vermin? If we walk out in a field, what do we know, when we can see everything? Very little. Can we see a virus in the air? Can we see a bug which will bite to infect us? Can we predict and control the future? Can our masters?
I get that most have given up and decided that flip-phones from the nineties are the answer but I am for being proactive.
I want to investigate the details into the referenced implanted SW. Looking for suggestions, esp on identifying and removing key-loggers. Suggestions? Links?
Another example, I want to learn details of D-R-O-P-O-U-T--J-E-E-P.
I will not be a slave.
I bet those flip phones are compromised too. The answer, if you don't want them looking over your shoulder, is to go oldschool and leave all of the modern iGadgets at home.
Seriously - I want do due diligence. I may come to same conclusion as you have, or I (and others) may provide a detection and eradication solution that is reliable. In either event, I need to examine the state of play first.
Maybe it's the same woman Assange 'raped'?
Any 2 way communication device by the nature of it being a 2 way device automatically makes it a spy device.
https://en.wikipedia.org/wiki/Near_Field_Communication
...
Near field communication (NFC) is a set of ideas and technology that enables smartphones and other devices to establish radio communication with each other by touching them together or bringing them into proximity, typically a distance of 10 cm (3.9 in) or less.
...
Here is a little experiment for the curious. Take a capacitor and a collection device and put it near your phone and see if the capacitor charges. Then if you do see the nature of how it is charging i.e. is it a steady leak only when the device is on or does it pulse every few nanoseconds etc.
Electricity is a lot of things but intelligent it isn't, laws of nature aka electromagnetic induction still apply. It also follows the path of least resistance and shortest distance.
Bingo!
I am sure that any gang operative with half an IQ point will know how to put the cell phone in another's hands to make sure the phone keeps texting while he is off the grid doing his business. It probably would not be too difficult to rig the phone to some other electronic device that continues its activity at some level while the operator is nowhere near the phone.
Think the intelligence agencies don't already have this wired?
Dependence on electronic evesdropping creates new vulnerabilities for a lazy government. They end up with a multi-billion dollar facility in Utah burning enough electricity to service a medium sized city just to sift through endless quadrillions of communications consisting of nothing but moronic "valley talk" from high school girls.
Then if you are a bad guy, get a phone in the the name of a valley girl, mimic a valley girl for a few months until the Utah center figures out you are a moron and deletes your stuff, then go about your real business in valley talk code.
Why, pray tell is government so utterly moronic??
Even with all of the processing power that these guys have, they're still overloading themselves with information. There will be far more false positives than real alerts, even if they are (are, not aren't - no typo) using the data for nefarious purposes, which they most likely are. This causes them to waste resources running around harassing people over nothing. Overload the fuckers with data. We want them wasting resources. It will hasten their demise by their own hands. Find ways to send them even more data. Play GPS based games on your phone that send location data back, for example. Make sure that you are strictly playing the game when you do it, not going to the store and playing on the way. Give them tons and tons of useless data. Make it impossible to sift through.
Because of this, IMO, their capabilities are overstated. But anybody who saw the water and power requirements of the Bluffdale center knew that they were up to no good even before Snowden leaked. Supersecret government isn't really that good at being supersecret.
If you want to bypass them, avoid all forms of electronic communication. Leave your shit at home and go out into the boonies. They do not have the resources to track everybody who does this.
I could not have said it better myself.