Online: | |
Visits: | |
Stories: |
Here are a few things, and a few ways:
1. Your cell phone can become a ‘bug’, even when it is OFF. Not when batteries are out of it, though. When you flip the lid (if it has one) and shut it ‘off’ and leave it lying around (like in the Congressional Lounge, for example), so long as it can receive a PING from the cell phone tower, that cell phone mic may be used to transmit the voice of anyone around that phone. Further, so can the SPEAKER of the phone (but turned into a microphone).
2. Your computer speaker may be tapped, and turned into a microphone (listening ‘bug’ or device), should you not have a microphone turned on or plugged in. Yes, a speaker can be turned into a microphone.
3. Your regular telephone—-especially if digital—-even if it is ‘hung up’, may be utilized as a microphone. Again, like the cell phone, both the mic and the speaker may be utilized to pick up conversation in the vicinity.
4. Your internet protocol (IP) address may be manipulated in so many ways—-including “spoofing”, which is when it makes it look like YOU sent a Denial Of Service (DOS) attack to another computer. Even if you didn’t, it will look like you did. It can be made to look like you visited websites you didn’t (this is the basis for proxy addresses, when it comes to utilizing a web service that ‘masks’ your real IP address, in favor of another unknown one—-so anyone looking for you won’t see yours and will never think or know to look at the one you use; and if they came across the fake one elsewhere, they’d never be able to trace it back to you—-at least in theory. Even that can be done, if it is known what proxy service you used).
5. Want to know why all that lead had to come out of house paint? Or asbestos come out of homes and buildings? Do you REALLY? Because those materials (harmful or not) prevent sound waves, frequencies, from moving through them. Such materials (lead, asbestos) are dense, and slow|retard the travel of the frequencies. With those removed, satellites may peer all the way down, layer by layer, through a skyscraper, picking up all kinds of…information, converting it to thermal|heat, seeing movement, hearing conversations, even being able to watch, in 3D (thanks to triangulation of signals across more than one satellite) the goings-on. If this description wasn’t clear, maybe this one is: satellites can see through your walls and roof, using frequencies; and those can build a 3D image. They can detect heat, cold, radiation, your heartbeat; and in the future, your brainwaves, what you’re thinking—-your state of mind. With attached facial recognition software, they can tell WHO is home and where in the house or building that person is.
6. If a surveillance agency is able to upload anything to your computer–via Flash, Java, or through other download—-all manner of spyware may be put there, and regularly send back information. Watching your Keystrokes (keylogger program), of what communications you type, watching video (gee, hope you’re not doing video sex), rifling through your computer hard drive files; and even sending back what they wish to have a copy of. Once they are in—-depending upon your computer security—-the sky is the limit. Whatever you can do on your computer, they can do remotely. Snap-shots (of what they find interesting, while watching your computer activities live) may be made from their machine, and the resulting image resides on their machine thereafter. Similar to Firefox’s thumbnails security problem (where the thumbnails are convenient for you, but others may, through some means, tap in and see those websites you just visited).
7. Compact Fluorescent Light (CFL) Bulbs contain Mercury in them. Though any bulb is technically fit for this sort of surveillance, CFL is really fit for it—-being able to PING those bulbs and utilize their placement in the house or building, to generate a kind of radar or sonar of where you are in the house, and a rudimentary map of the place, and particularly voice communication. Talk near a bulb? Maybe someone is listening. The bulb itself is not a ‘bug’; but can provide the ‘vehicle’ for a kind of listening device. Obstructions to it? Sure. A cacaphony of sounds would be difficult to weed through, but if there’s no TV on and two people are talking, no problem.
8. Got GPS on anything? Car? Phone? (well, even if you don’t have it on the phone, you really DO have it on your phone—-thanks to those cell phone towers and their PING). But if you really have GPS in anything, not only you know where you are.
9. Order something from some online company? If you have order information sitting on a server, it may be available to a surveillance company that likes to hack—-or who has an agreement with the retail company. What you ordered…becomes information in the database of the surveillance company. (gee, hope you didn’t order a sex toy or something like a gun you didn’t register).
10. Get anything through the mail? Of course you do. So did the surveillance people—-the address of those who wrote you or sent you something. It goes into the nice ‘relational database’, which of course does a whole lot more than collate a mailing list.
11. Been to the hospital or doctor for anything? Yeah. Guess who has your healthcare records, and knows you had the measles at age 8. Or if you’re infertile.
12. Shop at the grocery store? Oh yeah. In the future, you may hear something along the lines of: “Mr. Smith, you’ve been eating foods with a lot of sugar, for over 25 years. This has contributed to your Type 1 Diabetes listed in your health records. And those bulk packs of candy bars you order from Amazon.com aren’t helping. We’re going to put a block level on the types of foods you eat, in cooperation with your doctor, so that next time you’re at the grocery store, you’re not going to be able to buy so many sweets.”
AND THAT IS JUST FOR STARTERS!