Think It Can't Happen Here? Austin Bomber's Capture Exposes Depth Of US Surveillance State

Authored by Jeremiah Johnson via SHTFplan.com,

Many have argued that there is neither a surveillance state, nor a concerted effort to disarm the public door-to-door, house by house, etc. Some of these are far-leftists, masquerading as conservatives..... trying to appear “skeptically cynical.”

We’ll “game” the thought, to bring everyone back from opacity to transparency.

  1. The Communists, Marxists, Leftists, Progressives, Liberals, Democrats, and their ilk deliberately try to disguise the true objectives as outlined in the Planks of the Communist Party…passing themselves off as “middle-ground” in their stances.

  2. By denigrating the concept of an imminent surveillance state and ridiculing it, they draw conservatives who are still undecided (“fringe elements”) out of being proponents of the idea…further weakening and obfuscating people’s awareness.

  3. The movement of the groups mentioned never ceases: It hasn’t ceased with the fall of the Berlin Wall and subsequent reunification of Germany in 1990, nor the fall of the Soviet Union…more a “restructuring” than a fall…in 1992. The Communists are alive and well, operating within the United States at the lowest levels of society, and at the highest levels of government. We’ll stay with “Communists” as the label, as they are the end-state and will purge all the others who aren’t in complete lock step with them. They are Communists.

That being mentioned, as they craft their narratives and lie openly upon the television, radio, and within the newspapers, there is a subtle, devious operation going on right before your eyes:

The emplacement of a complete surveillance state of cameras and listening devices, all a part of the “wondrous internet of things.”

For that last paraphrase, thank David Petraeus... former head of the CIA (in name only) yet without the technical alacrity to avoid the very thing he lauded... and hence, his downfall via Paula Bridewell. Thanks, Dave, for your erstwhile contribution to crafting the surveillance state. Dave serves as the prime example: no matter how much of a “big hitter” toward the NWO (New World Order) a globalist or establishmentarian one is, they are always expendable.

The surveillance state has just been proven with the recent string of bombings in Austin, Texas where the protagonist blew himself up when he was tailed and cornered. This article was released by AP, written by Paul J. Weber on 3/22/18, and it seems to have escaped much notice. I am providing an excerpt that is almost the full article. When you read it, you will see why it is so important. Here it is:

How Police Finally Found the Austin Bomber

AUSTIN, Texas (AP) — The suspected Austin bomber is dead after terrorizing Texas’ capital city for three weeks. And in the end the manhunt wasn’t cracked by hundreds of phoned-in tips, the big pot of reward money or police pleading to the bomber through TV.

One of the largest bombing investigations in the U.S. since the Boston Marathon attacks in 2013 came to an intense close early Wednesday when authorities say they moved in on Mark Anthony Conditt at an interstate hotel. Austin Police Chief Brian Manley said Conditt blew himself up after running his sport utility vehicle into a ditch.

Here is what’s known about how authorities finally zeroed in on the suspected bomber after 19 days, two dead victims and more than 1,000 calls of suspicious packages around the city:

___

GETTING THE BOMBER ON CAMERA

Conditt had been careful to avoid cameras before entering a FedEx store in southwest Austin this week disguised in a blond wig and gloves, said U.S. House Homeland Security chairman Michael McCaul. The Austin congressman had been briefed by police, the FBI and the U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives.

McCaul said going into the store was Conditt’s “fatal mistake.” He said authorities previously had leads on a red truck and that the surveillance video from the FedEx store — where Conditt is believed to have dropped off an explosive package destined for an Austin address — allowed investigators to identify him and the truck.

Said Texas Gov. Greg Abbott, “I’m not sure how much they narrowed him down to an exact person of who he was before he went into that FedEx store.”

___

TRACKING THE CELLPHONE

At the FedEx store, McCaul said investigators got from surveillance the truck license plate that linked the vehicle to Conditt, which in turn gave authorities a cellphone number they could track. McCaul said Conditt had powered down his phone for “quite some time” but that police closed in when he switched it back on.

“He turned it on, it pinged, and then the chased ensued,” McCaul said.

Abbott said police were able to closely monitor Conditt and his movements for about 24 hours before his death. The governor said the phone number was used to tie Conditt to bombing sites around Austin.

“The suspect’s cellphone number showed up at each of the bombing sites as well as some key locations that helped them connect him to the crime,” Abbott said.

___

BUYING BOMB-MAKING MATERIALS

Authorities say they also tracked down Conditt, a 23-year-old unemployed college dropout, through witness accounts and other purchases, including at a Home Depot where McCaul said the suspect bought nails and other bomb-making materials.

Abbott said Conditt’s purchases at the Home Depot also included five “CHILDREN AT PLAY” signs, one of which was used to rig a tripwire that was set off by two men Sunday in a southwest Austin neighborhood. One of them was walking and the other was riding a bike.

William Grote told The Associated Press that his grandson was one of the victims and had nails embedded in his legs from Sunday’s explosion.

The batteries to power the bomb were purchased through the internet, McCaul said.

___

STILL PUTTING TOGETHER A PROFILE

The initial bomber profile sketched out by FBI behavioral scientists was that he was most likely a white male, McCaul said. And while that part was right, the congressman said, a full psychological profile won’t come together until investigators have time to comb through Conditt’s writings and social media posts.

Conditt’s motive is not clear. But on Wednesday, police discovered a 25-minute video recording on a cellphone found with Conditt, which Manley said he considers a “confession” to the bombings. Manley said it described the differences among the bombs in great detail.”

Obviously, someone made a big mistake in revealing this information to the stultified, oblivious public... that self-same public of “We the People” that has the right to know, and yet doesn’t understand what is happening. 

Worse: The public doesn’t care what’s happening.

Let’s summarize what these main points mean, for those of you who docare:

  1. The cellular telephone is nothing more than a tracking device…as mentioned, it “pings” its position and gives away the location of the owner…along with all of his vital information in the file… every four seconds.

  2. The cell phone’s location is tied into the location of every camera, public and private that has a tie-in to the CCTV system monitored by law enforcement in the fusion centers…from the Happy Burger parking lot cameras to the cameras mounted at the intersections in cities, towns, and suburbs. As the happy cell phone passes these locations, the movement is tracked in real time, and recorded.

  3. Granted, they had a suspect, but they can review all of the cameras at any business at any given time…to show what Joe the Plumber-turned-bomber may be purchasing at the friendly store…and they can tie that film in with real-time with the cell phone.

  4. The vehicle is also the “buddy” of the police and the surveillance establishment. They take pictures and film of the license plate, the car, and glimpses of Joe the Plumber driving it…corroborated by the happy, ever-pinging cellular telephone (the tracking device).

  5. All this data for everyone’s movements is recorded, catalogued, and stored…stored away for an indefinite period of time (forever) until the information is needed as evidence or in an investigation. Investigation!  Doesn’t that sound exciting?  Guess what?  Everyone is being investigated, and all of the data on everyone is kept.

  6. Purchases! Everybody has to buy things, stuff, etc.  Every time you pull up to the gas pump, the car is photographed.  The POS (point of sale) at the register tabulates and inventories everything, tying it in to the gas pump, with a picture of Joe and whatever form of fiat he used to pay for the gas and bag of chips.  Purchases track in real time, access whatever form of payment you use, tying you in with others…if you use your spouse’s credit card, for example.

  7. Cops have license plate/tag readers that can read hundreds of different plates, categorizing all of them in accordance with sensitive data that may have nothing to do with driving upon the roads or their record with the vehicle.

  8. Every Internet search, every purchase, every query, every e-mail is saved and read/tabulated into the overall matrix that assesses the potential for an individual to be “harmful” and stored…to be matched against the subject’s behavior and movements at a later date. Systems are already in place that analyze keystrokes for the comparison and narrowing down of who the typist is.

  9. Every library sign-out…film, music, or book…is saved and kept for future reference.

  10. Biometrics are making the “fingerprint” even more specific…with eye to eye distances, ear shapes, and gaits measured.  Any exposed portion of the skin, and the movement and function of the limbs is analyzed and recorded.

  11. Every piece of mail is scanned to save sender and recipient’s addresses and (of course) purchases are recorded within the company and matched against what is sent out and to whom.

  12. Satellites can target and surveil in real time and tie in to all of the little devices just mentioned.

  13. Laptop computers can be traced in accordance with the purchaser’s information from the POS and onward…and the laptops record, photograph, and film as well as putting forth a “ping” of their own…especially when connected to the Internet. All laptop use is matched and corresponded to other places of business (their cameras, etc.)

  14. Association: when you’re on your laptop, and here come Smiling Sam and Brother Bob, each with pinging cell phones…letting the authorities know that in that moment of time (Whitney Houston’s “One Moment in Time”) Sam and Bob were right in front of you. Later they can haul both of them in to corroborate that you were on your laptop in front of HappyBurger at whatever date or time they have on record.

This excerpt shows that all of these items are in place. Yes, they are surveilling you…are watching all of us. The surveillance is not ubiquitous yet. Not yet. It will be, and soon. They utilized every feature mentioned above to find the bomber. Great. Society has triumphed, and the mad bomber has met his end.

But has society really triumphed? That article gives you insight into how the cage is almost completed…the construction is just about finished. What requires further thought is what they will do with this surveillance once it is in place and ubiquitous. Just a few further thoughts for your consideration. You may want to watch what you place into your e-mails and comments. There are techies in the Puzzle Palace and at Ft. Meade whose function is identifying the commenters.

Don’t place anything on the Internet that can come back and bite you later. The most effective means of exchange are not on the Internet when it comes to information. Blogs, writers, and commenters have already been “marginalized” and their effectiveness diminished because it is an open source. Your true effectiveness in getting things done is at the “grass roots” level…locally, in small groups for discussion. Your “tool of transmission” is a manual typewriter.  Need copies?  Get back to Carbon paper. There won’t be a recording of what you copied at your FriendlyCopy center…the one with your information in real-time, right under the eye of the happy surveillance camera in the corner.

The one that superficially is to make sure you don’t take more than 1 or 2 paper clips…but manages to send the fusion centers every bit of data they need to match up their culprit (the copier) to the scene of the crime. They’ll also match up his credit card at the register, tally up his total purchases and copies over a period of time, and get plenty of information as it films him walking through the store and out the door.

Bottom line: we’re all “guilty” according to laws they haven’t even written yet. It is all about building a case against the average citizen. If you’re not the wolves, then you’re one of the cattle, in their eyes.

It will become worse. Much, much worse. If you doubt it and do not take necessary precautions, you may find out it exists when they come knocking on the door. It may already be too late, and their song is “We’ve Only Just Begun,” by Karen Carpenter…. but not to smile. They’ve been doing that for years, as they have taken our taxes to craft the very cages that are almost completed. The next step? Not hard to figure out, and it has happened before…as history repeats itself. Think “Solzhenitsyn,” and think of tomorrow.

Comments

FBaggins NidStyles Wed, 03/28/2018 - 08:30 Permalink

The problem is not so much that "we" are being surveilled as subjects of interest simply because of our political views. The main problem in the Western nations and why "we" are falling apart is that "we the people" are constantly being divided by the people who own and control our governments, including every spy and surveillance agency.

With any objective reflection, their divide and conquer tactics become so obvious that perhaps we deserve what we get. Here we have all of the Western nations rife with the Rothschild agent provocateur, George Soros, and all his societies deliberately (in-your-face) dividing any people having the audacity to assert any semblance of unity, with political disruptions, violence and even coups,  and "we the stupid people" just sit around and wonder why "the authorities" don't do something to stop him. Clearly, the reason is because "the authorities", including the deepstate, are in fact the subjects of the entire financial cabal running things, and "we the people" are constantly being played and manipulated to satisfy their ends, and not just because of the antics of the Soros crowd. Yes, the 1st and 2nd Amendments are under attack but the authorities know they are not going to disappear. Their intention is mainly to create issues to deflect from the major wrongs and screw ups of the establishment they serve, and above all, to keep the people divided so that they do not lose power and are brought to account.  

 

In reply to by NidStyles

Theosebes Goodfellow FBaggins Wed, 03/28/2018 - 10:25 Permalink

Stalin had this shit down cold. Divide and conquer. Split the people into two factions, left & right. black & white, gay & straight, young & old, and then play one side off against the other.

You want to see Americans rise up and fight tyranny? Cut off their video feeds. Whether it's via cable, satellite or the internet, if you shut it down the people will be raging in the streets. Video is the opiate of the masses.

"Kill your television!", or so the cry goes. "Right after the last Voice episode" , comes the response.

In reply to by FBaggins

Mr. Universe mobius8curve Wed, 03/28/2018 - 00:19 Permalink

So the 4th amendment is officially dead. Pretty soon the Bill of Rights will be taught as a failed experiment in revisionist Historical indoctrination class. Let's go over the scorecard shall we? 1st, about done, under attack. 2nd, under full attack. 3rd, gone. 4th, dead. 5th, still alive but considered an admission of guilt. 6th, gone. 7th, half dead. 8th, dead along with 9 & 10.

In reply to by mobius8curve

Bigly Mr. Universe Wed, 03/28/2018 - 00:55 Permalink

Yes. Crisis. Trump is swamp draining.  PLEASE SUPPORT TRUMP.  Keep up pressure on resisting their censorship.See:

Mar 28 2018 00:03:07 (EDT) Q !xowAT4Z3VQ 462

Why did Kim travel to China?
Why was travel impossible in the past?
What changed?
What constitutes the need for a F2F meeting v. secured call?
What US publicly traded co. previously entered N. Korea to establish comms?
Think logically.
WHY DID GOOG VISIT N KOREA?
WHY WOULD THE FORMER CHAIRMAN & CEO [HIMSELF] OF GOOG/ALPHABET PERSONALLY ATTEND?
Who is Sergey Brin?
Where was Sergey born?
Track the 'FAMILY' - IMPORTANT.
Think COLD WAR.
Think KGB.
US, China, N Korea [3].
FACEBOOK data dump?
Who made it public?
Who sold shares -30 days from announcement?
You can't imagine the magnitude of this.
Constitutional CRISIS.
Twitter coming soon.
GOOG coming soon.
AMAZON coming soon.
MICROSOFT coming soon.
+12
Current censorship all relates to push for power [mid-terms].
LAST STAND.
Election FRAUD cases OPEN - DOJ [many].
Follow the FAMILY.
Follow resignations [Business/Gov't].
BIDEN/CHINA VERY IMPORTANT MARKER.
Who made it public?
Who really made it public?
Who is making it all public?
WE ARE THE GATEKEEPERS OF ALL [BY ALL WE MEAN ALL] INFORMATION.
U1>CAN>EU>RUSSIA>IRAN>NK>SYRIA>PAK>>>
IRAN NEXT.
$700B - MILITARY [THIS YEAR].
WHY IS THE MILITARY SO IMPORTANT?
RE_READ ALL.
NATIONAL SECURITY.
NATIONAL SECURITY.
These people are STUPID.
Art of the Deal.
TIDAL WAVE INCOMING.
BUCKLE UP

Q

 

-------

The 4 Types Of Constitutional Crises

https:// fivethirtyeight.com/features/constitutional-crisis/

1. The Constitution doesn’t say what to do.

The U.S. Constitution is brief and vague. (Compare it to a state constitution sometime.) This vagueness has one major advantage: It makes an 18th-century document flexible enough to effectively serve a 21st-century society. But sometimes the Constitution leaves us without sorely needed instructions, such as when William Henry Harrison became the first president to die in office in 1841. At the time, it wasn’t clear whether the vice president should fully assume the office or just safeguard the role until a new president could somehow be chosen. (It wasn’t until 1967 that the 25th amendment officially settled the question.)

2. The Constitution’s meaning is in question.

Sometimes the Constitution’s attempt to address an issue is phrased in a way that could allow multiple interpretations, leaving experts disagreeing about what it means and making it difficult or impossible to address a pressing problem. In this way, both the Great Depression and the Civil War created constitutional crises.

3. The Constitution tells us what to do, but it’s not politically feasible.

This category of constitutional crisis can crop up when presidential elections produce contested and confusing results. In the 2000 presidential election, when George W. Bush and Al Gore were separated by just a few hundred votes in Florida, the tipping-point state whose electoral votes would determine the winner…

4. Institutions themselves fail.

The Constitution’s system of checks and balances sets the various branches against each other for the laudable purpose of constraining tyranny. However, due to partisan polarization, individual corruption, or any number of other reasons, sometimes the political institutions in these arrangements fail, sending the governmental system into a crisis. This was the type of constitutional crisis commentators were seemingly referring to in describing reports that Customs and Border Protection agents (members of the executive branch) weren’t following orders from the judicial branch.

In reply to by Mr. Universe

HushHushSweet mobius8curve Wed, 03/28/2018 - 09:29 Permalink

God has the ultimate and perfect surveillance system, and it has been operational since the beginning of time.

He knows everything you've said and done; and he also knows everything you've ever thought.

But God collects these 'data' for our benefit; to help us find our way home. He uses the data to help us because he loves us. He would never use the data to trick us or hurt us. 

The state is also trying to create a techno-god that knows our every word and deed, but it differs from God's system in that it doesn't know our thoughts and will NEVER know our hearts (which means that we can actually fool the techno-god). It only knows externals, and these can be manipulated. The state's techno-god also differs from God's surveillance in that the state is not doing it for our benefit; it's doing it for the state's benefit.

The state's techno-god is very much imperfect and will always be so (can't read hearts and minds, and so can easily be fooled). 

It is good to be aware of the extent of the surveillance state, but there is no need to fear it. You might not be able to avoid interacting with it, but you can fool it. It will never know what you're really thinking.

Keep that in mind when the time comes.

 

 

In reply to by mobius8curve

MEFOBILLS junction Wed, 03/28/2018 - 00:28 Permalink

The initial bomber profile sketched out by FBI behavioral scientists was that he was most likely a white male

 

He was a lone wolf because white people are often individualists.  Whitey is less likely to conform than say, north east asians.  

Also, the fourth ice ages taught white people to do long range planning.  Setting up targets, scoping out, getting supplies in advance - that is all white man stuff.  An Asian (who also survived fourth ice ages) can also do long range planning, but tends to bow down and conform.

One of my in-laws has been hypnotized by her facebook crowd to think white men are evil, and brought up this subject, and was shocked when I said it was due to long range planning and high intelligence.  Reality has a way of backfiring.

I also informed her that the Police did not easily catch negroes involved in DC Sniper attacks, because Police had profiled for a white man.  It has long been known that white men are profiled for this type of crime.  

Liberal heads explode because they think all people are the same, yet simultaneously white men are evil.  

Negroes tend to not do long range planning, their crimes are more opportunistic and spontaneous without a long time preference.  This trait is easily observable in crime statistics. 

https://en.wikipedia.org/wiki/D.C._sniper_attacks 

 

 

 

,

In reply to by junction

Branded MEFOBILLS Wed, 03/28/2018 - 04:03 Permalink

"The initial bomber profile sketched out by FBI behavioral scientists was that he was most likely a white male"

Hey, I remember the Beltway Sniper years ago.

The FBI Behavioral Scientists had them pegged as 'a lone white male with problems maintaining relationships with women, living in his mom's basement, and driving a white bread truck'.

Turned-out to be two black guys (we'll call them assets) in an old LTD, don't cha' know!

Remember that post hypnotic suggestion kinda thingy issued on the TeeVee by that Sheriff lookin' guy right before they were found sleeping in their car?

. . . good times.

That's one hell of a team they got there in the Hoover Building (paid for by us).

Surprised they weren't able to steal the election or overthrow/assassinate the president, best 'n brightest that they are.

Good thing they tell us who the terrorists are, otherwise I'd think it was them.

A lot of lone white males work at the FBI, now don't they.

In reply to by MEFOBILLS

BrownCoat junction Wed, 03/28/2018 - 07:30 Permalink

"Conditt was already on the FBI database"

You're not understanding the situation here. We live in a police state.
The FBI database. What database? You mean databases with an 'S.'

The Patriot Act allows the government to legally access any database including private corporations. 
Notice the article mentioned libraries. The list of complying companies is much bigger. FB and Google probably get paid by govt spooks for their data. 

Sure Conditt was already in a "database." So are you!!!

In reply to by junction

Offthebeach IridiumRebel Wed, 03/28/2018 - 02:15 Permalink

Left off the list are printers print a id code on each printed page.  Also GMs 'On Star" and the like on your vehicle.  I'm surprised Big Brother hasn't for traffic management and the safety if children, mandated GPS and internet on all new,vehicles .

Also, I think my dog is a FBI  informant.  He gives me weird looks when I ask him.

In reply to by IridiumRebel