THIS REPORT HAS BEEN PROVIDED TO THE FBI, FINCEN, FTC, FEC, SEC, OGE, DOJ, INTERPOL AND CONGRESSIONAL INVESTIGATORS (THE MASTER REPORT IS OVER 2000 PAGES). SEE WHY:
TOXIC COMPANIES (LINK)
FIRST THERE IS THIS: 2016 is the first national leaked election
AND THIS: Amazon___s Jeff Bezo___s Funds Domestic Spying Companies.
OH APPLE.. YOU TOO?: APPLE SPIES ON YOUR DEVICES AS MUCH AS THE HACKERS.
PERSONAL INTERNET SECURITY ___ MASTER
TWITTER DISCOVERED RAPING AMERICANS PRIVACY
How To Protect Your Data Before You Get Rid of Your …
Hide your online activity – TorrentPrivacy
Personal Data Leak Checker: Your Email & Data – CyberNews
How To Protect Your Privacy on Apps | Consumer Information
Why you should never allow your web browser to save your …
Who Has Access to Your Personal Cloud Storage in 2022?
Is online banking safe? – Computer Hope
Big Tech Has Bribed Big Government Into Partnering to Track And Spy On Us Everywhere
– Google, Facebook, Linkedin, Netflix and Amazon lobbyists have paid tens of millions in bribes in order to get government agencies to buy into their sham domestic spy projects
George Orwell was a brilliant individual. A man of incredible insight – and foresight.
In his unfathomably predictive novel 1984, Orwell warns of Big Brother:
“(O)stensibly the leader of Oceania, a totalitarian state wherein the ruling party Ingsoc wields total power ‘for its own sake’ over the inhabitants.
“In the society that Orwell describes, every citizen is under constant surveillance by the authorities, mainly by telescreens.…The people are constantly reminded of this by the slogan ‘Big Brother is watching you’: a maxim that is ubiquitously on display.
“In modern culture, the term ‘Big Brother’ has entered the lexicon as a synonym for abuse of government power, particularly in respect to civil liberties, often specifically related to mass surveillance.”
As brilliant as Orwell was, something continuously struck me as incorrect as I read 1984.
Orwell’s government – was extraordinarily competent in its totalitarian imposition of technological power.
In Reality – no government in the history of man has ever been even remotely close to that competent.
For Orwell’s Big Brother dystopia to become Reality – Big Government would need private sector help.
Enter private sector Big Tech.
Big Tech has delivered much of the technology Orwell envisioned. As but one of many examples – Orwell’s telescreens:
“(D)evices that operate as televisions, security cameras, and microphones….(T)elescreens are used by the ruling Party in the totalitarian fictional State of Oceania to keep its subjects under constant surveillance, thus eliminating the chance of secret conspiracies against Oceania.”
We’re already all the way there – via Big Tech.
How Google and Amazon Are ‘Spying’ on You:
“The study found that digital assistants (Google Home and Amazon Echo) can be ‘awake’ even when users think they aren’t listening….
“(T)he devices listen all the time they are turned on – and Amazon has envisioned Alexa using that information to build profiles on anyone in the room….
“Amazon filed a patent application for an algorithm that would let future versions of the device identify statements of interest, such as ‘I love skiing’, enabling the speaker to be monitored based on their interests and targeted for related advertising.
“A Google patent application describes using a future release of it smart Home system to monitor and control everything from screen time and hygiene habits, to meal and travel schedules and other activities.
“The devices are envisioned as part of a surveillance web in the home to chart a families’ patterns….”
Why Google’s Spying on User Data Is Worse than the NSA’s
Is Amazon Spying on Users Through Alexa? Thousands of Employees Listen to Conversations
Amazon-Owned Ring Has Reportedly Been Spying on Customer Camera Feeds
Microsoft Windows 10 Is Spying on Almost Everything You Do
Eleven Insanely Creepy Ways Facebook Is Spying on You Right Now
This is ALL insanely creepy.
Big Tech is…insanely big.
Microsoft (Market Cap: $1.1 trillion)
Amazon (Market Cap: $942 billion)
Google (Market Cap: $775 billion)
Facebook (Market Cap: $550 billion)
These four spying companies – are currently worth a combined $3.7 trillion. Our nation’s entire economy – is $19.4 trillion.
Which mans these four companies – all by themselves – are worth 19% of the United States.
But it’s Big Tech doing the spying – not Big Government.
Anyone who looks at Big Tech’s all-encompassing spying ability and thinks Big Government is capable of doing anything remotely similar – hasn’t paid attention to the past 10,000 years of human history.
The ONLY way Big Government can impose Big Brother – is to partner with Big Tech.
Uh oh.
The Role of Tech Companies in Government Surveillance
Tech Companies Concede to Surveillance Program
Four High-Tech Ways the Federal Government Is Spying on Private Citizens:
“Right now, the government is tracking the movements of private citizens by GPS, reading private citizens’ emails, and possibly even reading what you’re saying on Facebook.”
Big Tech once offered at least token resistance to Big Government’s demands – at least after being outed for acquiescing to Big Government’s demands.
Facebook, Amazon, Google Call for Government Surveillance Reform:
“It first gained attention after the revelations of NSA whistleblower Edward Snowden in 2013. Congress is in the process of weighing reforms for the program. It must vote to renew Section 702 before the end of the year, otherwise it will expire.
“The letter, addressed to the chairman of the House Judiciary Committee, asks Congress to consider several reforms to the program to ensure greater transparency and privacy protections.”
We can now officially refer to those – as the Good Old Days.
Why would Big Tech fight Big Government – when they can get paid to join them?
And the Big Government-Big Tech surveillance state – is getting closer and closer to home.
In fact – just outside…and inside it.
Amazon’s Helping Police Build a Surveillance Network with Ring Doorbells:
“Police departments across the country, from major cities like Houston to towns with fewer than 30,000 people, have offered free or discounted Ring doorbells to citizens, sometimes using taxpayer funds to pay for Amazon’s products.
“While Ring owners are supposed to have a choice on providing police footage, in some giveaways, police require recipients to turn over footage when requested….
“(T)he sheer number of cameras run by Amazon’s Ring business raises questions about privacy involving both law enforcement and tech giants….(C)ritics have pointed out the retail giant’s (other) ventures with law enforcement, like offering facial recognition tools….
“More than 50 local police departments across the US have partnered with Ring over the last two years, lauding how the Amazon-owned product allows them to access security footage in areas that typically don’t have cameras — on suburban doorsteps….
“‘What we have here is a perfect marriage between law enforcement and one of the world’s biggest companies creating conditions for a society that few people would want to be a part of,’ said Mohammad Tajsar, staff attorney at the ACLU of Southern California.”
That’s the outside of your home. Here’s the in….
The Government Just Admitted It Will Use Smart Home Devices for Spying:
“If you want evidence that US intelligence agencies aren’t losing surveillance abilities because of the rising use of encryption by tech companies, look no further than the testimony…by the (then) director of national intelligence, James Clapper….
“Clapper made clear that the internet of things – the many devices like thermostats, cameras and other appliances that are increasingly connected to the internet – are providing ample opportunity for intelligence agencies to spy on targets, and possibly the masses. And it’s a danger that many consumers who buy these products may be wholly unaware of….
“Privacy advocates have known about the potential for government to exploit the internet of things for years. Law enforcement agencies have taken notice too, increasingly serving court orders on companies for data they keep that citizens might not even know they are transmitting. Police have already been asking Google-owned company Dropcam for footage from cameras inside people’s homes meant to keep an eye on their kids.”
Orwell got the tech right – just not Big Government’s ability to create it for totalitarian ends.
Freedom has allowed for the free markets – that allowed the rise of the private sector Big Tech Orwell thought Big Government would produce.
And now Big Tech and Big Government are partnering – to end that freedom.
Well…for we plebeians, anyway.
I’m sure Big Tech and Big Government will be just fine.
Delete Your Information From People-Search Sites …
“Everything has been hacked.” – Alliant Technology Group
7 Critical Steps to Take If You’ve Been Hacked
15 Biggest Companies That have been Hacked – Yahoo
How to recover a hacked or compromised Microsoft account
Computer has been hacked/cloned/compromised. Please help …
6 Signs That You’ve Been Hacked (And What To Do About It)
Your Apple iPhone has been hacked what I … – Apple Community
Remove Your iPhone Has Been Hacked Pop-up Virus (2022 …
In the months leading up to Russia’s invasion of Ukraine, two obscure American startups met to discuss a potential surveillance partnership that would merge the ability to track the movements of billions of people via their phones with a constant stream of data purchased directly from Twitter. According to Brendon Clark of Anomaly Six — or “A6” — the combination of its cellphone location-tracking technology with the social media surveillance provided by Zignal Labs would permit the U.S. government to effortlessly spy on Russian forces as they amassed along the Ukrainian border, or similarly track Chinese nuclear submarines. To prove that the technology worked, Clark pointed A6’s powers inward, spying on the National Security Agency and CIA, using their own cellphones against them.
Virginia-based Anomaly Six was founded in 2018 by two ex-military intelligence officers and maintains a public presence that is scant to the point of mysterious, its website disclosing nothing about what the firm actually does. But there’s a good chance that A6 knows an immense amount about you. The company is one of many that purchases vast reams of location data, tracking hundreds of millions of people around the world by exploiting a poorly understood fact: Countless common smartphone apps are constantly harvesting your location and relaying it to advertisers, typically without your knowledge or informed consent, relying on disclosures buried in the legalese of the sprawling terms of service that the companies involved count on you never reading. Once your location is beamed to an advertiser, there is currently no law in the United States prohibiting the further sale and resale of that information to firms like Anomaly Six, which are free to sell it to their private sector and governmental clientele. For anyone interested in tracking the daily lives of others, the digital advertising industry is taking care of the grunt work day in and day out — all a third party need do is buy access.
Company materials obtained by The Intercept and Tech Inquiry provide new details of just how powerful Anomaly Six’s globe-spanning surveillance powers are, capable of providing any paying customer with abilities previously reserved for spy bureaus and militaries.
Most Read
Noam Chomsky and Jeremy Scahill on the Russia-Ukraine War, the Media, Propaganda, and Accountability
Jared Kushner Flaunted His Influence With Saudi Arabia, Russia in Pitch to Investors
The Armenian Genocide Holds a Bitter Lesson for Those Who Weep for Ukraine
The source of the materials, who spoke on the condition of anonymity to protect their livelihood, expressed grave concern about the legality of government contractors such as Anomaly Six and Zignal Labs “revealing social posts, usernames, and locations of Americans” to “Defense Department” users. The source also asserted that Zignal Labs had willfully deceived Twitter by withholding the broader military and corporate surveillance use cases of its firehose access. Twitter’s terms of service technically prohibit a third party from “conducting or providing surveillance or gathering intelligence” using its access to the platform, though the practice is common and enforcement of this ban is rare. Asked about these concerns, spokesperson Tom Korolsyshun told The Intercept “Zignal abides by privacy laws and guidelines set forth by our data partners.”
A6 claims that its GPS dragnet yields between 30 to 60 location pings per device per day and 2.5 trillion locational data points annually worldwide, adding up to 280 terabytes of location data per year and many petabytes in total, suggesting that the company surveils roughly 230 million devices on an average day. A6’s salesperson added that while many rival firms gather personal location data via a phone’s Bluetooth and Wi-Fi connections that provide general whereabouts, Anomaly 6 harvests only GPS pinpoints, potentially accurate to within several feet. In addition to location, A6 claimed that it has built a library of over 2 billion email addresses and other personal details that people share when signing up for smartphone apps that can be used to identify who the GPS ping belongs to. All of this is powered, A6’s Clark noted during the pitch, by general ignorance of the ubiquity and invasiveness of smartphone software development kits, known as SDKs: “Everything is agreed to and sent by the user even though they probably don’t read the 60 pages in the [end user license agreement].”
The Intercept was not able to corroborate Anomaly Six’s claims about its data or capabilities, which were made in the context of a sales pitch. Privacy researcher Zach Edwards told The Intercept that he believed the claims were plausible but cautioned that firms can be prone to exaggerating the quality of their data. Mobile security researcher Will Strafach agreed, noting that A6’s data sourcing boasts “sound alarming but aren’t terribly far off from ambitious claims by others.” According to Wolfie Christl, a researcher specializing in the surveillance and privacy implications of the app data industry, even if Anomaly Six’s capabilities are exaggerated or based partly on inaccurate data, a company possessing even a fraction of these spy powers would be deeply concerning from a personal privacy standpoint.
Reached for comment, Zignal’s spokesperson provided the following statement: “While Anomaly 6 has in the past demonstrated its capabilities to Zignal Labs, Zignal Labs does not have a relationship with Anomaly 6. We have never integrated Anomaly 6’s capabilities into our platform, nor have we ever delivered Anomaly 6 to any of our customers.”
When asked about the company’s presentation and its surveillance capabilities, Anomaly Six co-founder Brendan Huff responded in an email that “Anomaly Six is a veteran-owned small business that cares about American interests, natural security, and understands the law.”
Companies like A6 are fueled by the ubiquity of SDKs, which are turnkey packages of code that software-makers can slip in their apps to easily add functionality and quickly monetize their offerings with ads. According to Clark, A6 can siphon exact GPS measurements gathered through covert partnerships with “thousands” of smartphone apps, an approach he described in his presentation as a “farm-to-table approach to data acquisition.” This data isn’t just useful for people hoping to sell you things: The largely unregulated global trade in personal data is increasingly finding customers not only at marketing agencies, but also federal agencies tracking immigrants and drone targets as well as sanctions and tax evasion. According to public records first reported by Motherboard, U.S. Special Operations Command paid Anomaly Six $590,000 in September 2020 for a year of access to the firm’s “commercial telemetry feed.”
Anomaly Six software lets its customers browse all of this data in a convenient and intuitive Google Maps-style satellite view of Earth. Users need only find a location of interest and draw a box around it, and A6 fills that boundary with dots denoting smartphones that passed through that area. Clicking a dot will provide you with lines representing the device’s — and its owner’s — movements around a neighborhood, city, or indeed the entire world.
As the Russian military continued its buildup along the country’s border with Ukraine, the A6 sales rep detailed how GPS surveillance could help turn Zignal into a sort of private spy agency capable of assisting state clientele in monitoring troop movements. Imagine, Clark explained, if the crisis zone tweets Zignal rapidly surfaces through the firehose were only a starting point. Using satellite imagery tweeted by accounts conducting increasingly popular “open-source intelligence,” or OSINT, investigations, Clark showed how A6’s GPS tracking would let Zignal clients determine not simply that the military buildup was taking place, but track the phones of Russian soldiers as they mobilized to determine exactly where they’d trained, where they were stationed, and which units they belonged to. In one case, Clark showed A6 software tracing Russian troop phones backward through time, away from the border and back to a military installation outside Yurga, and suggested that they could be traced further, all the way back to their individual homes. Previous reporting by the Wall Street Journal indicates that this phone-tracking method is already used to monitor Russian military maneuvers and that American troops are just as vulnerable.
In another A6 map demonstration, Clark zoomed in closely on the town of Molkino, in southern Russia, where the Wagner Group, an infamous Russian mercenary outfit, is reportedly headquartered. The map showed dozens of dots indicating devices at the Wagner base, along with scattered lines showing their recent movements. “So you can just start watching these devices,” Clark explained. “Any time they start leaving the area, I’m looking at potential Russian predeployment activity for their nonstandard actors, their nonuniform people. So if you see them go into Libya or Democratic Republic of the Congo or things like that, that can help you better understand potential soft power actions the Russians are doing.”
To fully impress upon its audience the immense power of this software, Anomaly Six did what few in the world can claim to do: spied on American spies.
The pitch noted that this kind of mass phone surveillance could be used by Zignal to aid unspecified clients with “counter-messaging,” debunking Russian claims that such military buildups were mere training exercises and not the runup to an invasion. “When you’re looking at counter-messaging, where you guys have a huge part of the value you provide your client in the counter-messaging piece is — [Russia is] saying, ‘Oh, it’s just local, regional, um, exercises.’ Like, no. We can see from the data that they’re coming from all over Russia.”
To fully impress upon its audience the immense power of this software, Anomaly Six did what few in the world can claim to do: spied on American spies. “I like making fun of our own people,” Clark began. Pulling up a Google Maps-like satellite view, the sales rep showed the NSA’s headquarters in Fort Meade, Maryland, and the CIA’s headquarters in Langley, Virginia. With virtual boundary boxes drawn around both, a technique known as geofencing, A6’s software revealed an incredible intelligence bounty: 183 dots representing phones that had visited both agencies potentially belonging to American intelligence personnel, with hundreds of lines streaking outward revealing their movements, ready to track throughout the world. “So, if I’m a foreign intel officer, that’s 183 start points for me now,” Clark noted.
The NSA and CIA both declined to comment.
“It doesn’t take a lot of creativity to see how foreign spies can use this information for espionage, blackmail, all kinds of, as they used to say, dastardly deeds.”
“There is sure as hell a serious national security threat if a data broker can track a couple hundred intelligence officials to their homes and around the world,” Sen. Ron Wyden, D-Ore., a vocal critic of the personal data industry, told The Intercept in an interview. “It doesn’t take a lot of creativity to see how foreign spies can use this information for espionage, blackmail, all kinds of, as they used to say, dastardly deeds.”
Back stateside, the person was tracked to their own home. A6’s software includes a function called “Regularity,” a button clients can press that automatically analyzes frequently visited locations to deduce where a target lives and works, even though the GPS pinpoints sourced by A6 omit the phone owner’s name. Privacy researchers have long shown that even “anonymized” location data is trivially easy to attach to an individual based on where they frequent most, a fact borne out by A6’s own demonstration. After hitting the “Regularity” button, Clark zoomed in on a Google Street View image of their home.
“Industry has repeatedly claimed that collecting and selling this cellphone location data won’t violate privacy because it is tied to device ID numbers instead of people’s names. This feature proves just how facile those claims are,” said Nate Wessler, deputy director of the American Civil Liberties Union’s Speech, Privacy, and Technology Project. “Of course, following a person’s movements 24 hours a day, day after day, will tell you where they live, where they work, who they spend time with, and who they are. The privacy violation is immense.”
The demo continued with a surveillance exercise tagging U.S. naval movements, using a tweeted satellite photo of the USS Dwight D. Eisenhower in the Mediterranean Sea snapped by the commercial firm Maxar Technologies. Clark broke down how a single satellite snapshot could be turned into surveillance that he claimed was even more powerful than that executed from space. Using the latitude and longitude coordinates appended to the Maxar photo along with its time stamp, A6 was able to pick up a single phone signal from the ship’s position at that moment, south of Crete. “But it only takes one,” Clark noted. “So when I look back where that one device goes: Oh, it goes back to Norfolk. And actually, on the carrier in the satellite picture — what else is on the carrier? When you look, here are all the other devices.” His screen revealed a view of the carrier docked in Virginia, teeming with thousands of colorful dots representing phone location pings gathered by A6. “Well, now I can see every time that that ship is deploying. I don’t need satellites right now. I can use this.”
Though Clark conceded that the company has far less data available on Chinese phone owners, the demo concluded with a GPS ping picked up aboard an alleged Chinese nuclear submarine. Using only unclassified satellite imagery and commercial advertising data, Anomaly Six was able to track the precise movements of the world’s most sophisticated military and intelligence forces. With tools like those sold by A6 and Zignal, even an OSINT hobbyist would have global surveillance powers previously held only by nations. “People put way too much on social media,” Clark added with a laugh.
As location data has proliferated largely unchecked by government oversight in the United States, one hand washes another, creating a private sector capable of state-level surveillance powers that can also fuel the state’s own growing appetite for surveillance without the usual judicial scrutiny. Critics say the loose trade in advertising data constitutes a loophole in the Fourth Amendment, which requires the government to make its case to a judge before obtaining location coordinates from a cellular provider. But the total commodification of phone data has made it possible for the government to skip the court order and simply buy data that’s often even more accurate than what could be provided by the likes of Verizon. Civil libertarians say this leaves a dangerous gap between the protections intended by the Constitution and the law’s grasp on the modern data trade.
“The Supreme Court has made clear that cellphone location information is protected under the Fourth Amendment because of the detailed picture of a person’s life it can reveal,” explained Wessler. “Government agencies’ purchases of access to Americans’ sensitive location data raise serious questions about whether they are engaged in an illegal end run around the Fourth Amendment’s warrant requirement. It is time for Congress to end the legal uncertainty enabling this surveillance once and for all by moving toward passage of the Fourth Amendment Is Not For Sale Act.”
Though such legislation could restrict the government’s ability to piggyback off commercial surveillance, app-makers and data brokers would remain free to surveil phone owners. Still, Wyden, a co-sponsor of that bill, told The Intercept that he believes “this legislation sends a very strong message” to the “Wild West” of ad-based surveillance but that clamping down on the location data supply chain would be “certainly a question for the future.” Wyden suggested that protecting a device’s location trail from snooping apps and advertisers might be best handled by the Federal Trade Commission. Separate legislation previously introduced by Wyden would empower the FTC to crack down on promiscuous data sharing and broaden consumers’ ability to opt out of ad tracking.
A6 is far from the only firm engaged in privatized device-tracking surveillance. Three of Anomaly Six’s key employees previously worked at competing firm Babel Street, which named all three of them in a 2018 lawsuit first reported by the Wall Street Journal. According to the legal filing, Brendan Huff and Jeffrey Heinz co-founded Anomaly Six (and lesser-known Datalus 5) months after ending their employment at Babel Street in April 2018, with the intent of replicating Babel’s cellphone location surveillance product, “Locate X,” in a partnership with major Babel competitor Semantic AI. In July 2018, Clark followed Huff and Heinz by resigning from his position as Babel’s “primary interface to … intelligence community clients” and becoming an employee of both Anomaly Six and Semantic.
Like its rival Dataminr, Zignal touts its mundane partnerships with the likes of Levi’s and the Sacramento Kings, marketing itself publicly in vague terms that carry little indication that it uses Twitter for intelligence-gathering purposes, ostensibly in clear violation of Twitter’s anti-surveillance policy. Zignal’s ties to government run deep: Zignal’s advisory board includes a former head of the U.S. Army Special Operations Command, Charles Cleveland, as well as the CEO of the Rendon Group, John Rendon, whose bio notes that he “pioneered the use of strategic communications and real-time information management as an element of national power, serving as a consultant to the White House, U.S. National Security community, including the U.S. Department of Defense.” Further, public records state that Zignal was paid roughly $4 million to subcontract under defense staffing firm ECS Federal on Project Maven for “Publicly Available Information … Data Aggregation” and a related “Publicly Available Information enclave” in the U.S. Army’s Secure Unclassified Network.
The remarkable world-spanning capabilities of Anomaly Six are representative of the quantum leap occurring in the field of OSINT. While the term is often used to describe the internet-enabled detective work that draws on public records to, say, pinpoint the location of a war crime from a grainy video clip, “automated OSINT” systems now use software to combine enormous datasets that far outpace what a human could do on their own. Automated OSINT has also become something of a misnomer, using information that is by no means “open source” or in the public domain, like commercial GPS data that must be bought from a private broker.
While OSINT techniques are powerful, they are generally shielded from accusations of privacy violation because the “open source” nature of the underlying information means that it was already to some extent public. This is a defense that Anomaly Six, with its trove of billions of purchased data points, can’t muster. In February, the Dutch Review Committee on the Intelligence and Security Services issued a report on automated OSINT techniques and the threat to personal privacy they may represent: “The volume, nature and range of personal data in these automated OSINT tools may lead to a more serious violation of fundamental rights, in particular the right to privacy, than consulting data from publicly accessible online information sources, such as publicly accessible social media data or data retrieved using a generic search engine.” This fusion of publicly available data, privately procured personal records, and computerized analysis isn’t the future of governmental surveillance, but the present. Last year, the New York Times reported that the Defense Intelligence Agency “buys commercially available databases containing location data from smartphone apps and searches it for Americans’ past movements without a warrant,” a surveillance method now regularly practiced throughout the Pentagon, the Department of Homeland Security, the IRS, and beyond.