Home » Posts tagged 'smartphones'

Tag Archives: smartphones

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

A New Technology That Will Dangerously Expand Government Spying on Citizens

A New Technology That Will Dangerously Expand Government Spying on Citizens

If you’re worried about the capability of government to conduct surveillance of citizens engaged in political assembly and protest, or even just personal activity, then you should be aware the technological capability of government surveillance is about to expand exponentially.

The US Air Force’s Research Lab (yes, it has its own lab) has recently signed a contract to test new software of a company called SignalFrame, a Washington DC wireless tech company. The company’s new software is able to access smartphones, and from your phone jump off to access any other wireless or bluetooth device in the near vicinity. To quote from the article today in the Wall St. Journal, the smartphone is used “as a window onto usage of hundreds of millions of computers,s routers, fitness trackers, modern automobiles and other networked devices, known collectively as the ‘Internet of Things’.”

Your smartphone in effect becomes a government listening device that detects and accesses all nearby wireless or bluetooth devices, or anything that has a MAC address for that matter. How ‘near’ is nearby is not revealed by the company, or the Air Force, both of which refused to comment on the Wall St. Journal story. But with the expansion of 5G wireless, it should be assumed it’s more than just a couple steps from your smartphone.

One can imagine some scary scenarios with this capability in the hands of government snoops:

Not only would the government know your geographical location via the GPS signal to your cellphone. They’d know what you are doing. And with whom.

A political gathering would allow them to see all the owners of other cellphones in the vicinity of a protest or demonstration. How many are gathering at a particular street or location…

…click on the above link to read the rest of the article…

Darn, This Is Inconvenient: Apple Is Destroying the Planet to Maximize Profits

Darn, This Is Inconvenient: Apple Is Destroying the Planet to Maximize Profits

Stripmining the planet to maximize profits isn’t progressive or renewable–it’s just exploitive and destructive.

How do we describe the finding that the planet’s most widely-owned super-corporation is destroying the planet to maximize its smartphone sales and profits? Shall we start with “inconvenient?” Yes, we’re talking about Apple, famous for coercing customers to upgrade their Apple phones and other gadgets if not annually then every couple years, as the most effective way to maximize profits.

Unfortunately, smartphones require stripmining the planet, as described in this report, Smartphones Are Killing The Planet Faster Than Anyone Expected

Researchers are sounding the alarm after an analysis showed that buying a new smartphone consumes as much energy as using an existing phone for an entire decade.

Smartphones are particularly insidious for a few reasons. With a two-year average life cycle, they’re more or less disposable. The problem is that building a new smartphone–and specifically, mining the rare materials inside them–represents 85% to 95% of the device’s total CO2 emissions for two years. That means buying one new phone takes as much energy as recharging and operating a smartphone for an entire decade despite the recycling programs run by Apple and others, “based on our research and other sources, currently less than 1% of smartphones are being recycled,” Lotfi Belkhir, the study’s lead author, tells me.

The researchers point out that mobile apps actually reinforce our need for these 24/7 servers in a self-perpetuating energy-hogging cycle. More phones require more servers. And with all this wireless information in the cloud, of course we’re going to buy more phones capable of running even better apps.

Google, Facebook, and Apple have all pledged to move to 100% renewable energy in their own operations. In fact, all of Apple’s servers are currently run on renewable power. “It’s encouraging,” says Belkhir of these early corporate efforts. “But I don’t think it’d move the needle at all.”

…click on the above link to read the rest of the article…

Fine-Tuning the Surveillance State

Fine-Tuning the Surveillance State

We have been watching the shift of society and all of its components to collectivist thought and action in preparation for the step into a full-blown totalitarian state. Already the Constitution and our rights enumerated within it have been relegated to impotency and practically abrogated. The key to this has not been the use of force, but the molding of thought and behavior over the decades within the schools, within the fostered predictive programming of pop culture and television, and within the lying, Marxist, mainstream media.

Currently there are 22 states that have made a crime of what is referred to as “disturbing the school,” and this has led to thousands of arrests of students for such things as interrupting a teacher, or even belching in class. Schools have an increased police presence; however, as we have seen with the school shootings this year, they certainly aren’t there to protect the students.

Police are in schools to enforce conformity and submissive behavior: they’re managing the “troupe” of juveniles, driving the herd.

Collective, community thought is the mantra. Advertisements on the radio for high-school sports list all of the acceptable skills that sports convey: leadership, teamwork, cooperation, etc. Gone is personal development, let alone “fun,” the latter being archaic and non-utilitarian. In the past 3 to 4 decades, this collective “consciousness” has become the norm. Creative thought is discouraged unless it is directed…directed by authorities or “approved” controllers/managers. Such thought is supplemented by the actions of those authorities, mislabeled as “government” when the appropriate term is rule.

An article ran out of News 4, posted on NBC Washington on 5/17/18 entitled Potential Spy Devices Which Track Cellphones, Intercept Calls Found All Over D.C., Md., Va. It is worth reading, as it details the Stingray technology (carried in a briefcase) that capture cellular telephones by tricking them into believing the devices are cell phone towers. This means the phones are tracked, and the government is taking information on them surreptitiously.

…click on the above link to read the rest of the article…

Spy agencies target mobile phones, app stores to implant spyware

Spy agencies target mobile phones, app stores to implant spyware

Users of millions of smartphones put at risk by certain mobile browser gaps, Snowden file shows

Canada and its spying partners exploited weaknesses in one of the world’s most popular mobile browsers and planned to hack into smartphones via links to Google and Samsung app stores, a top secret document obtained by CBC News shows.

Electronic intelligence agencies began targeting UC Browser — a massively popular app in China and India with growing use in North America — in late 2011 after discovering it leaked revealing details about its half-billion users.

Their goal, in tapping into UC Browser and also looking for larger app store vulnerabilities, was to collect data on suspected terrorists and other intelligence targets — and, in some cases, implant spyware on targeted smartphones.

The 2012 document shows that the surveillance agencies exploited the weaknesses in certain mobile apps in pursuit of their national security interests, but it appears they didn’t alert the companies or the public to these weaknesses. That potentially put millions of users in danger of their data being accessed by other governments’ agencies, hackers or criminals.

“All of this is being done in the name of providing safety and yet … Canadians or people around the world are put at risk,” says the University of Ottawa’s Michael Geist, one of Canada’s foremost experts on internet law.

CBC News analysed the top secret document in collaboration with U.S. news site The Intercept, a website that is devoted in part to reporting on the classified documents leaked by U.S. whistleblower Edward Snowden.

 

The so-called Five Eyes intelligence alliance — the spy group comprising Canada, the U.S., Britain, Australia and New Zealand — specifically sought ways to find and hijack data links to servers used by Google and Samsung’s mobile app stores, according to the document obtained by Snowden.

…click on the above link to read the rest of the article…

NSA Planned to Hijack Google App Store to Hack Smartphones

NSA Planned to Hijack Google App Store to Hack Smartphones

The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals.

The surveillance project was launched by a joint electronic eavesdropping unit called the Network Tradecraft Advancement Team, which includes spies from each of the countries in the “Five Eyes” alliance — the United States, Canada, the United Kingdom, New Zealand and Australia.

The top-secret document, obtained from NSA whistleblower Edward Snowden, was published Wednesday by CBC News in collaboration withThe Intercept. The document outlines a series of tactics that the NSA and its counterparts in the Five Eyes were working on during workshops held in Australia and Canada between November 2011 and February 2012.

The main purpose of the workshops was to find new ways to exploit smartphone technology for surveillance. The agencies used the Internet spying system XKEYSCORE to identify smartphone traffic flowing across Internet cables and then to track down smartphone connections to app marketplace servers operated by Samsung and Google. (Google declined to comment for this story. Samsung said it would not be commenting “at this time.”)

As part of a pilot project codenamed IRRITANT HORN, the agencies were developing a method to hack and hijack phone users’ connections to app stores so that they would be able to send malicious “implants” to targeted devices. The implants could then be used to collect data from the phones without their users noticing.

 

Previous disclosures from the Snowden files have shown agencies in the Five Eyes alliance designed spyware for iPhones and Android smartphones, enabling them to infect targeted phones and grab emails, texts, web history, call records, videos, photos and other files stored on them. But methods used by the agencies to get the spyware onto phones in the first place have remained unclear.

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress