Free newsletter

Site Manager

Tami Dickson

Follow Us

Follow Unittus

Custom Search
Warrantless Phone Searches & Tavistock ! Jan 19/12 Print E-mail
Wednesday, 18 January 2012 16:01

Warrantless Phone Searches & Tavistock ! Jan 19/12

Cdsapi’s Added Comment: Hacking and Surveillance ALERT.   In the era of continuous government, military, and corporate surveillance for purposes of control and sabotage, the “convenient technology” -that everyone seems to feel they can’t live without - has embedded in it some very serious inherent dangers.  In particular, the Smart Cellphone comes with a very high price, of which almost no one is aware.  And this is just one of many devices that are routinely “structurally bugged” internally.
The emphasis on expanding the use of wireless comes from the “elite top” – from those who demand an exceedingly easy “monitoring system”.  Since these operate on “frequencies” that can be monitored very easily with the right equipment, there is nothing that is “private” any more.  Orwell 1986???????
How easily we are induced into giving up our liberty and our privacy – all for expediency, disregarding the “hidden agenda” of complete surveillance in the hands of a criminal mafia. /

Police Conduct Warrantless Searches of Smartphones

Police now routinely and with the blessing of the courts in some states are conducting warrantless searches of smart phones.  Currently, the ACLU is seeking records from the Michigan State Police (MSP) which relate to its practice of downloading essentially every piece of information from a citizen’s phone often without a warrant or even a reasonable suspicion of wrongdoing.  The MSP has denied the reports by some citizens in Michigan that motorists and others are having their cell phones searched during routine stops.  What is not in dispute is the fact that the department is using the Cellebrite UFED Physical Pro an extremely powerful tool that can collect nearly every piece of data stored on the device, even some data which has previously been deleted.

While we are unable to find any Michigan Supreme Court case on the issue, other states have decided its legality.  For instance, in January the California Supreme Court held in People v. Diaz that incident to a lawful arrest, a police officer could search a citizen’s cell phone without a warrant.  Other state supreme courts such as Ohio and Wisconsin have decided the issue differently holding that unless there are some emergency or exigent circumstances such a search violates a citizen’s right to be free from an unreasonable search and seizure.  While it is expected that Diaz’ lawyers will appeal to the United States Supreme Court, there appears to be little interest on the part of the Supremes to offer any guidance on the matter, especially in light of the fact that in 2010 they refused to hear the similar Ohio case, State v. Smith.

Your Smartphone Can Record Keystrokes From Your Desktop

Not only can smartphones be used against you in criminal proceedings, but new evidence is emerging that the devices themselves can be used to spy on other computers. Researchers at the Georgia Institute of Technology have been successful at testing an interesting hack using the accelerometer which comes standard on smartphones.  The accelerometer is the built-in hardware which tells the phone if it’s being moved or tilted.  Using the device they have been able to read the words and entire sentences typed onto a desktop computer’s keyboard using a smartphone sitting next to it on the desk, and to do so with up to 80 percent accuracy- essentially turning the smartphone into a wireless keylogger.

“We first tried our experiments with an iPhone 3GS, and the results were difficult to read,” said Patrick Traynor, assistant professor in Georgia Tech’s School of Computer Science.  “But then we tried an iPhone 4, which has an added gyroscope to clean up the accelerometer noise, and the results were much better.  We believe that most smartphones made in the past two years are sophisticated enough to launch this attack.”

While there are no reports that such a hack was been seen in the wild, it is only a matter of time before it surfaces especially as smartphones become more powerful.

Carrier IQ Rootkit Installed on over 140 Million Devices

It was also widely reported that the rootkit Carrier IQ had been installed on a variety of smartphone platforms including Android, iOS and Blackberry handsets.  And, while the software was purportedly designed as a diagnostic tool to collect “performance data”, its installation and operation went largely unnoticed by most users.  Perhaps more importantly was that it was also capable of collecting large swaths of information about the handsets including call information, locations and keystrokes opening the users up to having their passwords, credit card numbers and other sensitive information compromised.

With such a widespread and overt installation (to the industry at least) of spying software, one is left to wonder what other dangers to privacy exist on handsets that are less overt.

What 2012 Holds

Unfortunately, 2012 doesn’t seem to bring any better news for smartphone users.

In response the California Supreme Court’s decision in People v. Diaz, the state legislature passed a bill to make warrantless searches of cell phones illegal in the State.  Governor Jerry Brown, the former California Attorney General and the recipient of hundreds of thousands of dollars in campaign contributions from various police unions, predictably sided with law enforcement and the California Supreme Court and in October vetoed the bill.  Unless and until the US Supreme Court decides differently, warrantless searches of cell phones will remain legal in California, and likely a growing number of other states as well.

And, as for the security of the devices themselves, the outlook is equally bleak.  A recent review by  IEEE Fellow Dr. Jeffrey Voas found over 2,000 free apps for smartphones contained some form of malware. “The issue with free apps is that you’re paying a price you don’t know about,” says Voas, who is also a computer scientist at the National Institute of Standards and Technology (NIST). “Of free mobile applications, approximately 1 in 100 now visibly contain malware – and that doesn’t even account for the ones where the malware is so hidden it’s impossible to spot.  This number is growing by the day and with most of these rogue apps offering good functionality for free, it’s easy to be victimized.”

Accordingly, all we really know going into 2012 is that while a smartphone may have many convenient features, that convenience carries with it a potentially very high price.

Tavistock Global Mind Manipulation

Jan. 14, 2012

The Science of Mass Manipulation through Crisis Creation:

An Introduction to the Tavistock Institute of Human Relations

In this video, we take a look at the Tavistock Institute of Human Relations, which is describe in this video as the nerve center for the global manipulation of human consciousness.

Established in 1921 by the Royal Institute for International Affairs (RIIA), Tavistock has grown into one of the world’s biggest and most influential think tanks, working through governments



Canadian Government Allow Telemarketing Violations on Cell Phones

Gov't of Canada informs us that  Cell Phone Numbers go  Public in November 2011

...if you have a cell phone.

all cell phone numbers are being released to telemarketing companies
and you will start to receive sales calls.


To prevent this, go to the website for Canadian Telephone Numbers:
- then click on English
- and then on "check my registration."  
It is the National DO NOT CALL  list

To REGISTER, follow the instructions.

You can also contact them by phone
1-866-580-DNCL       ( 1-866-580-3625 ).
You must be calling from the number you wish to register.

If you are calling from a TTY device, call:
1-888-DNCL-TTY       (            1-888-362-5889      )

It is good to register your home phone number as well. Not just your cell number.
It is legitimate - it takes a month for it to become activated
and it is good for 5 years.